Follow
Ren Pang
Title
Cited by
Cited by
Year
Graph backdoor
Z Xi, R Pang, S Ji, T Wang
30th USENIX security symposium (USENIX Security 21), 1523-1540, 2021
1312021
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models
R Pang, H Shen, X Zhang, S Ji, Y Vorobeychik, X Luo, A Liu, T Wang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
932020
Trojanzoo: Towards unified, holistic, and practical evaluation of neural backdoors
R Pang, Z Zhang, X Gao, Z Xi, S Ji, P Cheng, X Luo, T Wang
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 684-702, 2022
56*2022
AdvMind: Inferring Adversary Intent of Black-Box Attacks
R Pang, X Zhang, S Ji, X Luo, T Wang
Proceedings of the ACM SIGKDD International Conference on Knowledge …, 2020
352020
An embarrassingly simple backdoor attack on self-supervised learning
C Li, R Pang, Z Xi, T Du, S Ji, Y Yao, T Wang
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
19*2023
On the Security Risks of AutoML
R Pang, Z Xi, S Ji, X Luo, T Wang
31th USENIX Security Symposium (USENIX Security 22), 2021
62021
i-Algebra: towards interactive interpretability of deep neural networks
X Zhang, R Pang, S Ji, F Ma, T Wang
Proceedings of the AAAI Conference on Artificial Intelligence 35 (13), 11691 …, 2021
42021
On the security risks of knowledge graph reasoning
Z Xi, T Du, C Li, R Pang, S Ji, X Luo, X Xiao, F Ma, T Wang
32nd USENIX Security Symposium (USENIX Security 23), 3259-3276, 2023
22023
The dark side of automl: Towards architectural backdoor search
R Pang, C Li, Z Xi, S Ji, T Wang
The 11th International Conference on Learning Representations, 2023
22023
Defending pre-trained language models as few-shot learners against backdoor attacks
Z Xi, T Du, C Li, R Pang, S Ji, J Chen, F Ma, T Wang
Advances in Neural Information Processing Systems 36, 2024
12024
Model Extraction Attacks Revisited
J Liang, R Pang, C Li, T Wang
arXiv preprint arXiv:2312.05386, 2023
12023
Reasoning over Multi-view Knowledge Graphs
Z Xi, R Pang, C Li, T Du, S Ji, F Ma, T Wang
arXiv preprint arXiv:2209.13702, 2022
12022
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks
C Li, R Pang, B Cao, Z Xi, J Chen, S Ji, T Wang
arXiv preprint arXiv:2312.09057, 2023
2023
A Change of Heart: Backdoor Attacks on Security-Centric Diffusion Models
C Li, R Pang, B Cao, J Chen, T Wang
2023
Neural Architectural Backdoors
R Pang, C Li, Z Xi, S Ji, T Wang
arXiv preprint arXiv:2210.12179, 2022
2022
Towards Robust Reasoning over Knowledge Graphs
Z Xi, R Pang, C Li, S Ji, X Luo, X Xiao, T Wang
arXiv preprint arXiv:2110.14693, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–16