Exploring the security boundary of data reconstruction via neuron exclusivity analysis X Pan, M Zhang, Y Yan, J Zhu, Z Yang 31st USENIX Security Symposium (USENIX Security 22), 3989-4006, 2022 | 39* | 2022 |
Rethinking {White-Box} Watermarks on Deep Learning Models under Neural Structural Obfuscation Y Yan, X Pan, M Zhang, M Yang 32nd USENIX Security Symposium (USENIX Security 23), 2347-2364, 2023 | 11 | 2023 |
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting X Pan, Y Yan, M Zhang, M Yang Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and …, 2022 | 11 | 2022 |
Cracking white-box dnn watermarks via invariant neuron transforms X Pan, M Zhang, Y Yan, Y Wang, M Yang Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and …, 2023 | 10 | 2023 |
Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains X Pan, M Zhang, Y Yan, M Yang Annual Computer Security Applications Conference (ACSAC), 634-645, 2021 | 9 | 2021 |
Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model X Pan, Y Yan, S Zhang, M Zhang, M Yang arXiv preprint arXiv:2206.14371, 2022 | 1 | 2022 |
House of Cans: Covert Transmission of Internal Datasets via Capacity-Aware Neuron Steganography X Pan, S Zhang, M Zhang, Y Yan, M Yang Advances in Neural Information Processing Systems 35, 24838-24850, 2022 | | 2022 |