Follow
Hailun Ding
Title
Cited by
Cited by
Year
Training with more confidence: Mitigating injected and natural backdoors during training
Z Wang, H Ding, J Zhai, S Ma
Advances in Neural Information Processing Systems 35, 36396-36410, 2022
282022
Rethinking the reverse-engineering of trojan triggers
Z Wang, K Mei, H Ding, J Zhai, S Ma
Advances in Neural Information Processing Systems 35, 9738-9753, 2022
272022
{ELISE}: A storage efficient logging system powered by redundancy reduction and representation learning
H Ding, S Yan, J Zhai, S Ma
30th USENIX Security Symposium (USENIX Security 21), 3023-3040, 2021
132021
{AIRTAG}: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts
H Ding, J Zhai, Y Nan, S Ma
32nd USENIX Security Symposium (USENIX Security 23), 373-390, 2023
42023
The case for learned provenance graph storage systems
H Ding, J Zhai, D Deng, S Ma
32nd USENIX Security Symposium (USENIX Security 23), 3277-3294, 2023
32023
Data sampling method based on double decision tree [J]
C Li, F Hongxiao, D Hailun
Computer Engineering and Science 41 (289), 134-139, 2019
22019
Adversarial feature genome: a data driven adversarial examples recognition method
L Chen, H Ding, Q Li, J Zhu, H Huang, Y Chang, H Li
arXiv preprint arXiv:1812.10085, 2018
22018
Merlin: Multi-tier Optimization of eBPF Code for Performance and Compactness
J Mao, H Ding, J Zhai, S Ma
Proceedings of the 29th ACM International Conference on Architectural …, 2024
2024
Neural Network Trojans Analysis and Mitigation from the Input Domain.
Z Wang, H Ding, J Zhai, S Ma
CoRR, 2022
2022
Procedural Learning With Robust Visual Features via Low Rank Prior
H Li, L Chen, H Ding, Q Li, B Sun, G Wu
IEEE Access 7, 18884-18893, 2019
2019
Understanding the Importance of Single Directions via Representative Substitution
L Chen, H Ding, Q Li, Z Li, J Peng, H Li
arXiv preprint arXiv:1811.11053, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–11