Follow
Tianyu Du
Title
Cited by
Cited by
Year
Textbugger: Generating adversarial text against real-world applications
J Li, S Ji, T Du, B Li, T Wang
Proceedings of the 26th Annual Network and Distributed System Security …, 2019
7922019
Sirenattack: Generating adversarial audio for end-to-end acoustic systems
T Du, S Ji, J Li, Q Gu, T Wang, R Beyah
15th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2020), 2020
1482020
Online e-commerce fraud: a large-scale detection and analysis
H Weng, Z Li, S Ji, C Chu, H Lu, T Du, Q He
2018 IEEE 34th International Conference on Data Engineering (ICDE), 1435-1440, 2018
592018
机器学习模型可解释性方法, 应用与安全研究综述
纪守领, 李进锋, 杜天宇, 李博
计算机研究与发展 56 (10), 2071-2096, 2019
422019
An Embarrassingly Simple Backdoor Attack on Self-supervised Learning
C Li, R Pang, Z Xi, T Du, S Ji, Y Yao, T Wang
IEEE International Conference on Computer Vision (ICCV), 2023
38*2023
Neuronfair: Interpretable white-box fairness testing through biased neuron identification
H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ji, J Wang, Y Yu, J Chen
Proceedings of the 44th International Conference on Software Engineering …, 2022
362022
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang
ACM Conference on Computer and Communications Security (CCS), 2021
342021
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation
J Li, T Du, S Ji, R Zhang, Q Lu, M Yang, T Wang
29th USENIX Security Symposium (USENIX Security 20), 1381-1398, 2020
342020
Spreading social influence with both positive and negative opinions in online networks
JS He, M Han, S Ji, T Du, Z Li
Big Data Mining and Analytics 2 (2), 100-117, 2019
302019
Invisible poisoning: Highly stealthy targeted poisoning attack
J Chen, H Zheng, M Su, T Du, C Lin, S Ji
Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020
292020
Your labels are selling you out: Relation leaks in vertical federated learning
P Qiu, X Zhang, S Ji, T Du, Y Pu, J Zhou, T Wang
IEEE Transactions on Dependable and Secure Computing 20 (5), 3653-3668, 2022
282022
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique
J Chen, H Zheng, H Xiong, R Chen, T Du, Z Hong, S Ji
Computers & Security 104, 102220, 2021
262021
RA-ISF: Learning to Answer and Understand from Retrieval Augmentation via Iterative Self-feedback
Y Liu, X Peng, X Zhang, W Liu, J Yin, J Cao, T Du
ACL Findings 2024, 2024
212024
VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models
Z Yin, M Ye, T Zhang, T Du, J Zhu, H Liu, J Chen, T Wang, F Ma
Neural Information Processing Systems (NeurIPS), 2023
172023
GuardFL: Safeguarding Federated Learning Against Backdoor Attacks through Attributed Client Graph Clustering
H Yu, C Ma, M Liu, T Du, M Ding, T Xiang, S Ji, X Liu
arXiv preprint arXiv:2306.04984, 2023
112023
ReMasker: Imputing Tabular Data with Masked Autoencoding
T Du, L Melis, T Wang
International Conference on Learning Representations (ICLR), 2024
102024
Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks
Z Xi, T Du, C Li, R Pang, S Ji, J Chen, F Ma, T Wang
Neural Information Processing Systems (NeurIPS), 2023
102023
Quantifying graph anonymity, utility, and de-anonymity
S Ji, T Du, Z Hong, T Wang, R Beyah
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1736-1744, 2018
102018
深度学习模型鲁棒性研究综述
纪守领, 杜天宇, 邓水光, 程鹏, 时杰, 杨珉, 李博
计算机学报 45 (1), 190-206, 2022
92022
机器学习模型安全与隐私研究综述
纪守领, 杜天宇, 李进锋, 沈超, 李博
软件学报 32 (1), 41-67, 2021
92021
The system can't perform the operation now. Try again later.
Articles 1–20