Training with more confidence: Mitigating injected and natural backdoors during training Z Wang, H Ding, J Zhai, S Ma Advances in Neural Information Processing Systems 35, 36396-36410, 2022 | 28 | 2022 |
Rethinking the reverse-engineering of trojan triggers Z Wang, K Mei, H Ding, J Zhai, S Ma Advances in Neural Information Processing Systems 35, 9738-9753, 2022 | 27 | 2022 |
{ELISE}: A storage efficient logging system powered by redundancy reduction and representation learning H Ding, S Yan, J Zhai, S Ma 30th USENIX Security Symposium (USENIX Security 21), 3023-3040, 2021 | 13 | 2021 |
{AIRTAG}: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts H Ding, J Zhai, Y Nan, S Ma 32nd USENIX Security Symposium (USENIX Security 23), 373-390, 2023 | 4 | 2023 |
The case for learned provenance graph storage systems H Ding, J Zhai, D Deng, S Ma 32nd USENIX Security Symposium (USENIX Security 23), 3277-3294, 2023 | 3 | 2023 |
Data sampling method based on double decision tree [J] C Li, F Hongxiao, D Hailun Computer Engineering and Science 41 (289), 134-139, 2019 | 2 | 2019 |
Adversarial feature genome: a data driven adversarial examples recognition method L Chen, H Ding, Q Li, J Zhu, H Huang, Y Chang, H Li arXiv preprint arXiv:1812.10085, 2018 | 2 | 2018 |
Merlin: Multi-tier Optimization of eBPF Code for Performance and Compactness J Mao, H Ding, J Zhai, S Ma Proceedings of the 29th ACM International Conference on Architectural …, 2024 | | 2024 |
Neural Network Trojans Analysis and Mitigation from the Input Domain. Z Wang, H Ding, J Zhai, S Ma CoRR, 2022 | | 2022 |
Procedural Learning With Robust Visual Features via Low Rank Prior H Li, L Chen, H Ding, Q Li, B Sun, G Wu IEEE Access 7, 18884-18893, 2019 | | 2019 |
Understanding the Importance of Single Directions via Representative Substitution L Chen, H Ding, Q Li, Z Li, J Peng, H Li arXiv preprint arXiv:1811.11053, 2018 | | 2018 |