default search action
Shouling Ji
Person information
- affiliation: Zhejiang University, College of Computer Science and Technology, China
- affiliation (PhD 2016): Georgia Institute of Technology, Atlanta, GA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j102]Zuohui Chen, Renxuan Wang, Jingyang Xiang, Yue Yu, Xin Xia, Shouling Ji, Qi Xuan, Xiaoniu Yang:
GGT: Graph-guided testing for adversarial sample detection of deep neural network. Comput. Secur. 140: 103710 (2024) - [j101]Yiming Wu, Gaoyun Lin, Lisong Liu, Zhen Hong, Yangyang Wang, Xing Yang, Zoe Lin Jiang, Shouling Ji, Zhenyu Wen:
MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework. IEEE Internet Things J. 11(14): 25136-25146 (2024) - [j100]Ping He, Xuhong Zhang, Changting Lin, Ting Wang, Shouling Ji:
Towards understanding bogus traffic service in online social networks. Frontiers Inf. Technol. Electron. Eng. 25(3): 415-431 (2024) - [j99]Hao Peng, Zhe Wang, Chao Wei, Dandan Zhao, Guangquan Xu, Jianming Han, Shixin Guo, Ming Zhong, Shouling Ji:
TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples. Knowl. Based Syst. 300: 112188 (2024) - [j98]Jie Su, Zhen Hong, Lei Ye, Tao Liu, Sizhuang Liang, Shouling Ji, Gagangeet Singh Aujla, Reheem Beyah, Zhenyu Wen:
Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices. IEEE Trans. Consumer Electron. 70(1): 4605-4616 (2024) - [j97]Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. IEEE Trans. Dependable Secur. Comput. 21(1): 168-185 (2024) - [j96]Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. IEEE Trans. Dependable Secur. Comput. 21(3): 1372-1389 (2024) - [j95]Hui Sun, Tianqing Zhu, Jie Li, Shouling Ji, Wanlei Zhou:
Attribute-Based Membership Inference Attacks and Defenses on GANs. IEEE Trans. Dependable Secur. Comput. 21(4): 2376-2393 (2024) - [j94]Hao Peng, Shixin Guo, Dandan Zhao, Xuhong Zhang, Jianmin Han, Shouling Ji, Xing Yang, Ming Zhong:
TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting. IEEE Trans. Dependable Secur. Comput. 21(4): 3901-3916 (2024) - [j93]Jinyin Chen, Haibin Zheng, Tao Liu, Jiawei Liu, Yao Cheng, Xuhong Zhang, Shouling Ji:
EdgePro: Edge Deep Learning Model Protection via Neuron Authorization. IEEE Trans. Dependable Secur. Comput. 21(5): 4967-4981 (2024) - [j92]Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. IEEE Trans. Dependable Secur. Comput. 21(5): 5029-5045 (2024) - [j91]Yuanchao Chen, Yuwei Li, Zulie Pan, Yuliang Lu, Juxing Chen, Shouling Ji:
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing. IEEE Trans. Inf. Forensics Secur. 19: 1251-1266 (2024) - [j90]Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu:
AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service. IEEE Trans. Inf. Forensics Secur. 19: 2623-2638 (2024) - [j89]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, Ting Wang:
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 3435-3450 (2024) - [j88]Hao Peng, Jieshuai Yang, Dandan Zhao, Xiaogang Xu, Yuwen Pu, Jianmin Han, Xing Yang, Ming Zhong, Shouling Ji:
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space. IEEE Trans. Inf. Forensics Secur. 19: 4881-4896 (2024) - [j87]Yaguan Qian, Kecheng Chen, Bin Wang, Zhaoquan Gu, Shouling Ji, Wei Wang, Yanchun Zhang:
Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs. IEEE Trans. Inf. Forensics Secur. 19: 7633-7645 (2024) - [j86]Li Wang, Xiangtao Meng, Dan Li, Xuhong Zhang, Shouling Ji, Shanqing Guo:
DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models. ACM Trans. Priv. Secur. 27(1): 10:1-10:34 (2024) - [j85]Han Bao, Xuhong Zhang, Qinying Wang, Kangming Liang, Zonghui Wang, Shouling Ji, Wenzhi Chen:
MILG: Realistic lip-sync video generation with audio-modulated image inpainting. Vis. Informatics 8(1): 71-81 (2024) - [c155]Zhe Ma, Jianfeng Dong, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Zonghui Wang, Sifeng He, Feng Qian, Xiaobo Zhang, Lei Yang:
Let All Be Whitened: Multi-Teacher Distillation for Efficient Visual Retrieval. AAAI 2024: 4126-4135 - [c154]Pengyu Qiu, Yuwen Pu, Yongchao Liu, Wenyan Liu, Yun Yue, Xiaowei Zhu, Lichun Li, Jinbao Li, Shouling Ji:
Integer Is Enough: When Vertical Federated Learning Meets Rounding. AAAI 2024: 14704-14712 - [c153]Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji:
AdaCCD: Adaptive Semantic Contrasts Discovery Based Cross Lingual Adaptation for Code Clone Detection. AAAI 2024: 17942-17950 - [c152]Yunruo Zhang, Lujia Shen, Shanqing Guo, Shouling Ji:
GaLileo: General Linear Relaxation Framework for Tightening Robustness Certification of Transformers. AAAI 2024: 21797-21805 - [c151]Han Bao, Xuhong Zhang, Qinying Wang, Kangming Liang, Zonghui Wang, Shouling Ji, Wenzhi Chen:
Pluggable Watermarking of Deepfake Models for Deepfake Detection. IJCAI 2024: 331-339 - [c150]Zeyu Li, Yuwen Pu, Xuhong Zhang, Yu Li, Jinbao Li, Shouling Ji:
Protecting Object Detection Models from Model Extraction Attack via Feature Space Coverage. IJCAI 2024: 431-439 - [c149]Jiashui Wang, Peng Qian, Xilin Huang, Xinlei Ying, Yan Chen, Shouling Ji, Jianhai Chen, Jundong Xie, Long Liu:
Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment. ISSTA 2024: 1174-1185 - [c148]Tong Ye, Lingfei Wu, Tengfei Ma, Xuhong Zhang, Yangkai Du, Peiyu Liu, Shouling Ji, Wenhai Wang:
Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization. NAACL-HLT (Findings) 2024: 2959-2971 - [c147]Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang:
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. NDSS 2024 - [c146]Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang:
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention. NDSS 2024 - [c145]Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, Jiming Chen:
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency. NDSS 2024 - [c144]Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. SP 2024: 2310-2387 - [c143]Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu:
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild. USENIX Security Symposium 2024 - [c142]Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang:
Exploring ChatGPT's Capabilities on Vulnerability Management. USENIX Security Symposium 2024 - [c141]Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang:
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks. USENIX Security Symposium 2024 - [c140]Dinghao Liu, Shouling Ji, Kangjie Lu, Qinming He:
Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis. USENIX Security Symposium 2024 - [c139]Dinghao Liu, Zhipeng Lu, Shouling Ji, Kangjie Lu, Jianhai Chen, Zhenguang Liu, Dexin Liu, Renyi Cai, Qinming He:
Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences. USENIX Security Symposium 2024 - [c138]Yi Xiang, Xuhong Zhang, Peiyu Liu, Shouling Ji, Xiao Xiao, Hong Liang, Jiacheng Xu, Wenhai Wang:
Critical Code Guided Directed Greybox Fuzzing for Commits. USENIX Security Symposium 2024 - [i108]Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu:
AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service. CoRR abs/2401.02615 (2024) - [i107]Mengyao Du, Miao Zhang, Yuwen Pu, Kai Xu, Shouling Ji, Quanjun Yin:
The Risk of Federated Learning to Skew Fine-Tuning Features and Underperform Out-of-Distribution Robustness. CoRR abs/2401.14027 (2024) - [i106]Oubo Ma, Yuwen Pu, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, Shouling Ji:
SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems. CoRR abs/2402.03741 (2024) - [i105]Yong Yang, Xuhong Zhang, Yi Jiang, Xi Chen, Haoyu Wang, Shouling Ji, Zonghui Wang:
PRSA: Prompt Reverse Stealing Attacks against Large Language Models. CoRR abs/2402.19200 (2024) - [i104]Zhenyuan Li, Yangyang Wei, Xiangmin Shen, Lingzhi Wang, Yan Chen, Haitao Xu, Shouling Ji, Fan Zhang:
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events. CoRR abs/2403.12541 (2024) - [i103]Zhe Ma, Xuhong Zhang, Qingming Li, Tianyu Du, Wenzhi Chen, Zonghui Wang, Shouling Ji:
Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models. CoRR abs/2405.05846 (2024) - [i102]Yang Dai, Oubo Ma, Longfei Zhang, Xingxing Liang, Shengchao Hu, Mengzhu Wang, Shouling Ji, Jincai Huang, Li Shen:
Is Mamba Compatible with Trajectory Optimization in Offline Reinforcement Learning? CoRR abs/2405.12094 (2024) - [i101]Yuwen Pu, Jiahao Chen, Chunyi Zhou, Zhou Feng, Qingming Li, Chunqiang Hu, Shouling Ji:
How to Train a Backdoor-Robust Model on a Poisoned Dataset without Auxiliary Data? CoRR abs/2405.12719 (2024) - [i100]Yuwen Pu, Zhuoyuan Ding, Jiahao Chen, Chunyi Zhou, Qingming Li, Chunqiang Hu, Shouling Ji:
A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning. CoRR abs/2405.12751 (2024) - [i99]Jiahao Chen, Zhiqiang Shen, Yuwen Pu, Chunyi Zhou, Changjiang Li, Ting Wang, Shouling Ji:
Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective. CoRR abs/2405.12786 (2024) - [i98]Qingming Li, Juzheng Miao, Puning Zhao, Li Zhou, Shouling Ji, Bowen Zhou, Furui Liu:
Emulating Full Client Participation: A Long-Term Client Selection Strategy for Federated Learning. CoRR abs/2405.13584 (2024) - [i97]Tong Ye, Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji, Wenhai Wang:
Uncovering LLM-Generated Code: A Zero-Shot Synthetic Code Detector via Code Rewriting. CoRR abs/2405.16133 (2024) - [i96]Changjiang Li, Ren Pang, Bochuan Cao, Jinghui Chen, Fenglong Ma, Shouling Ji, Ting Wang:
Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion Models. CoRR abs/2406.09669 (2024) - [i95]Tong Ye, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji, Wenhai Wang:
Iterative or Innovative? A Problem-Oriented Perspective for Code Optimization. CoRR abs/2406.11935 (2024) - [i94]Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu:
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild. CoRR abs/2407.02886 (2024) - [i93]Yifan Xia, Zichen Xie, Peiyu Liu, Kangjie Lu, Yan Liu, Wenhai Wang, Shouling Ji:
Exploring Automatic Cryptographic API Misuse Detection in the Era of LLMs. CoRR abs/2407.16576 (2024) - [i92]Jiahao Chen, Zhou Feng, Rui Zeng, Yuwen Pu, Chunyi Zhou, Yi Jiang, Yuyou Gan, Jinbao Li, Shouling Ji:
Enhancing Adversarial Transferability with Adversarial Weight Tuning. CoRR abs/2408.09469 (2024) - [i91]Xing He, Jiahao Chen, Yuwen Pu, Qingming Li, Chunyi Zhou, Yingcai Wu, Jinbao Li, Shouling Ji:
CAMH: Advancing Model Hijacking Attack in Machine Learning. CoRR abs/2408.13741 (2024) - [i90]Rui Zeng, Xi Chen, Yuwen Pu, Xuhong Zhang, Tianyu Du, Shouling Ji:
CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models. CoRR abs/2409.01193 (2024) - [i89]Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. CoRR abs/2409.13139 (2024) - [i88]Jiale Zhang, Chengcheng Zhu, Bosen Rao, Hao Sui, Xiaobing Sun, Bing Chen, Chunyi Zhou, Shouling Ji:
"No Matter What You Do!": Mitigating Backdoor Attacks in Graph Neural Networks. CoRR abs/2410.01272 (2024) - 2023
- [j84]Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu:
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art. Comput. Secur. 128: 103134 (2023) - [j83]Zhixiao Fu, Xinyuan Chen, Daizong Liu, Xiaoye Qu, Jianfeng Dong, Xuhong Zhang, Shouling Ji:
Multi-level feature disentanglement network for cross-dataset face forgery detection. Image Vis. Comput. 135: 104686 (2023) - [j82]Hao Peng, Shixin Guo, Dandan Zhao, Yiming Wu, Jianming Han, Zhe Wang, Shouling Ji, Ming Zhong:
Query-efficient model extraction for text classification model in a hard label setting. J. King Saud Univ. Comput. Inf. Sci. 35(4): 10-20 (2023) - [j81]Hao Peng, Zhe Wang, Dandan Zhao, Yiming Wu, Jianming Han, Shixin Guo, Shouling Ji, Ming Zhong:
Efficient text-based evolution algorithm to hard-label adversarial attacks on text. J. King Saud Univ. Comput. Inf. Sci. 35(5): 101539 (2023) - [j80]Zhenguang Liu, Shuang Wu, Shuyuan Jin, Shouling Ji, Qi Liu, Shijian Lu, Li Cheng:
Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction. IEEE Trans. Pattern Anal. Mach. Intell. 45(1): 681-697 (2023) - [j79]Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, Raheem Beyah:
Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study. IEEE Trans. Dependable Secur. Comput. 20(2): 1169-1185 (2023) - [j78]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, Ting Wang:
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 3653-3668 (2023) - [j77]Shuiguang Deng, Yishan Chen, Gong Chen, Shouling Ji, Jianwei Yin, Albert Y. Zomaya:
Incentive-Driven Proactive Application Deployment and Pricing on Distributed Edges. IEEE Trans. Mob. Comput. 22(2): 951-967 (2023) - [j76]Xiang Ling, Lingfei Wu, Saizhuo Wang, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji:
Multilevel Graph Matching Networks for Deep Graph Similarity Learning. IEEE Trans. Neural Networks Learn. Syst. 34(2): 799-813 (2023) - [c137]Ping He, Yifan Xia, Xuhong Zhang, Shouling Ji:
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting. CCS 2023: 90-104 - [c136]Yi Jiang, Chenghui Shi, Oubo Ma, Youliang Tian, Shouling Ji:
Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models. Inscrypt (2) 2023: 3-23 - [c135]Tong Ye, Lingfei Wu, Tengfei Ma, Xuhong Zhang, Yangkai Du, Peiyu Liu, Shouling Ji, Wenhai Wang:
CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code. EMNLP 2023: 14740-14752 - [c134]Yifan Xia, Ping He, Xuhong Zhang, Peiyu Liu, Shouling Ji, Wenhai Wang:
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection. ESORICS (2) 2023: 255-276 - [c133]Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang:
An Embarrassingly Simple Backdoor Attack on Self-supervised Learning. ICCV 2023: 4344-4355 - [c132]Ren Pang, Changjiang Li, Zhaohan Xi, Shouling Ji, Ting Wang:
The Dark Side of AutoML: Towards Architectural Backdoor Search. ICLR 2023 - [c131]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, Ting Wang:
Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks. NeurIPS 2023 - [c130]Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Jingchang Qin, Wenhai Wang, Wenzhi Chen:
How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices. SP 2023: 3365-3381 - [c129]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang:
On the Security Risks of Knowledge Graph Reasoning. USENIX Security Symposium 2023: 3259-3276 - [c128]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. USENIX Security Symposium 2023: 3421-3438 - [c127]Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, Zhiniang Peng:
Detecting Union Type Confusion in Component Object Model. USENIX Security Symposium 2023: 4265-4281 - [c126]Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Cheng, Raheem Beyah:
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing. USENIX Security Symposium 2023: 4517-4534 - [c125]Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin:
FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases. USENIX Security Symposium 2023: 6399-6416 - [d1]Jie Su, Zhen Hong, Lei Ye, Tao Liu, Sizhuang Liang, Shouling Ji, Gagangeet Singh Aujla, Reheem Beyah, Zhenyu Wen:
AC Power Consumption Dataset. IEEE DataPort, 2023 - [i87]Lujia Shen, Xuhong Zhang, Shouling Ji, Yuwen Pu, Chunpeng Ge, Xing Yang, Yanghe Feng:
TextDefense: Adversarial Text Detection based on Word Importance Entropy. CoRR abs/2302.05892 (2023) - [i86]Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin:
FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases. CoRR abs/2302.14500 (2023) - [i85]Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Raheem Beyah:
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing. CoRR abs/2303.02545 (2023) - [i84]Jinyin Chen, Haibin Zheng, Tao Liu, Rongchang Li, Yao Cheng, Xuhong Zhang, Shouling Ji:
Edge Deep Learning Model Protection via Neuron Authorization. CoRR abs/2303.12397 (2023) - [i83]Yuxuan Duan, Xuhong Zhang, Chuer Yu, Zonghui Wang, Shouling Ji, Wenzhi Chen:
Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models. CoRR abs/2303.13131 (2023) - [i82]Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. CoRR abs/2303.18174 (2023) - [i81]Yunruo Zhang, Tianyu Du, Shouling Ji, Peng Tang, Shanqing Guo:
RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks. CoRR abs/2304.07980 (2023) - [i80]Yuchen Sun, Tianpeng Liu, Panhe Hu, Qing Liao, Shouling Ji, Nenghai Yu, Deke Guo, Li Liu:
Deep Intellectual Property: A Survey. CoRR abs/2304.14613 (2023) - [i79]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang:
On the Security Risks of Knowledge Graph Reasoning. CoRR abs/2305.02383 (2023) - [i78]Tong Ye, Lingfei Wu, Tengfei Ma, Xuhong Zhang, Yangkai Du, Peiyu Liu, Wenhai Wang, Shouling Ji:
Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization. CoRR abs/2305.11074 (2023) - [i77]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. CoRR abs/2306.11206 (2023) - [i76]Ping He, Yifan Xia, Xuhong Zhang, Shouling Ji:
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting. CoRR abs/2309.01866 (2023) - [i75]Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang:
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. CoRR abs/2309.03081 (2023) - [i74]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, Ting Wang:
Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks. CoRR abs/2309.13256 (2023) - [i73]Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. CoRR abs/2309.14742 (2023) - [i72]Yaguan Qian, Chenyu Zhao, Zhaoquan Gu, Bin Wang, Shouling Ji, Wei Wang, Boyang Zhou, Pan Zhou:
F2AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns. CoRR abs/2310.14561 (2023) - [i71]Yuwen Pu, Jiahao Chen, Jiayu Pan, Hao Li, Diqun Yan, Xuhong Zhang, Shouling Ji:
Facial Data Minimization: Shallow Model as Your Privacy Filter. CoRR abs/2310.15590 (2023) - [i70]Tong Ye, Lingfei Wu, Tengfei Ma, Xuhong Zhang, Yangkai Du, Peiyu Liu, Shouling Ji, Wenhai Wang:
CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code. CoRR abs/2310.16853 (2023) - [i69]Yifan Xia, Ping He, Xuhong Zhang, Peiyu Liu, Shouling Ji, Wenhai Wang:
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection. CoRR abs/2310.17304 (2023) - [i68]Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang:
How ChatGPT is Solving Vulnerability Management Problem. CoRR abs/2311.06530 (2023) - [i67]Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji:
AdaCCD: Adaptive Semantic Contrasts Discovery based Cross Lingual Adaptation for Code Clone Detection. CoRR abs/2311.07277 (2023) - [i66]Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang:
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention. CoRR abs/2311.17400 (2023) - [i65]Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang:
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks. CoRR abs/2312.09057 (2023) - [i64]Zhe Ma, Jianfeng Dong, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Zonghui Wang, Sifeng He, Feng Qian, Xiaobo Zhang, Lei Yang:
Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval. CoRR abs/2312.09716 (2023) - [i63]Zeyu Li, Chenghui Shi, Yuwen Pu, Xuhong Zhang, Yu Li, Jinbao Li, Shouling Ji:
MEAOD: Model Extraction Attack against Object Detectors. CoRR abs/2312.14677 (2023) - 2022
- [j75]Juan Du, Dajian Zeng, Zhao Li, Jingxuan Liu, Mingqi Lv, Ling Chen, Dan Zhang, Shouling Ji:
An interpretable outcome prediction model based on electronic health records and hierarchical attention. Int. J. Intell. Syst. 37(6): 3460-3479 (2022) - [j74]Lirong Fu, Shouling Ji, Changchang Liu, Peiyu Liu, Fuzheng Duan, Zonghui Wang, Whenzhi Chen, Ting Wang:
Focus : Function clone identification on cross-platform. Int. J. Intell. Syst. 37(8): 5082-5112 (2022) - [j73]Tianyu Du, Shouling Ji, Bo Wang, Sirui He, Jinfeng Li, Bo Li, Tao Wei, Yunhan Jia, Raheem Beyah, Ting Wang:
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks. Int. J. Intell. Syst. 37(9): 6463-6492 (2022) - [j72]Rui Wang, Zhihua Wei, Haoran Duan, Shouling Ji, Yang Long, Zhen Hong:
EfficientTDNN: Efficient Architecture Search for Speaker Recognition. IEEE ACM Trans. Audio Speech Lang. Process. 30: 2267-2279 (2022) - [j71]Yuwei Li, Shouling Ji, Chenyang Lyu, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu, Raheem Beyah:
V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs. IEEE Trans. Cybern. 52(5): 3745-3756 (2022) - [j70]Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, Ting Wang:
Adversarial CAPTCHAs. IEEE Trans. Cybern. 52(7): 6095-6108 (2022) - [j69]Binbin Zhao, Shouling Ji, Wei-Han Lee, Changting Lin, Haiqin Weng, Jingzheng Wu, Pan Zhou, Liming Fang, Raheem Beyah:
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices. IEEE Trans. Dependable Secur. Comput. 19(3): 1826-1840 (2022) - [j68]Zhangjie Fu, Yueyan Zhi, Shouling Ji, Xingming Sun:
Remote Attacks on Drones Vision Sensors: An Empirical Study. IEEE Trans. Dependable Secur. Comput. 19(5): 3125-3135 (2022) - [j67]Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu G. Bourgeois, Raheem Beyah:
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 19(5): 3218-3230 (2022) - [j66]Liming Fang, Minghui Li, Zhe Liu, Changting Lin, Shouling Ji, Anni Zhou, Willy Susilo, Chunpeng Ge:
A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy. IEEE Trans. Dependable Secur. Comput. 19(5): 3564-3578 (2022) - [j65]Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, Ting Wang:
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications. IEEE Trans. Dependable Secur. Comput. 19(6): 3987-4001 (2022) - [j64]Haibin Zheng, Jinyin Chen, Hang Du, Weipeng Zhu, Shouling Ji, Xuhong Zhang:
GRIP-GAN: An Attack-Free Defense Through General Robust Inverse Perturbation. IEEE Trans. Dependable Secur. Comput. 19(6): 4204-4224 (2022) - [j63]Hanlu Wu, Tengfei Ma, Lingfei Wu, Fangli Xu, Shouling Ji:
Exploiting Heterogeneous Graph Neural Networks with Latent Worker/Task Correlation Information for Label Aggregation in Crowdsourcing. ACM Trans. Knowl. Discov. Data 16(2): 27:1-27:18 (2022) - [j62]Mingqi Lv, Dajian Zeng, Ling Chen, Tieming Chen, Tiantian Zhu, Shouling Ji:
Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network. IEEE Trans. Mob. Comput. 21(8): 2967-2977 (2022) - [c124]Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang:
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution. CCS 2022: 1157-1171 - [c123]Qingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, Kangjie Lu:
Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs. CCS 2022: 3253-3267 - [c122]Yi Cao, Sihao Hu, Yu Gong, Zhao Li, Yazheng Yang, Qingwen Liu, Shouling Ji:
GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction. CIKM 2022: 2964-2973 - [c121]Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang:
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors. EuroS&P 2022: 684-702 - [c120]Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen:
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification. ICSE 2022: 1519-1531 - [c119]Xiang Ling, Lingfei Wu, Wei Deng, Zhenqing Qu, Jiangyu Zhang, Sheng Zhang, Tengfei Ma, Bin Wang, Chunming Wu, Shouling Ji:
MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection. INFOCOM 2022: 1998-2007 - [c118]Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, Raheem Beyah:
SLIME: program-sensitive energy allocation for fuzzing. ISSTA 2022: 365-377 - [c117]Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware. ISSTA 2022: 442-454 - [c116]Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, Raheem Beyah:
EMS: History-Driven Mutation for Coverage-based Fuzzing. NDSS 2022 - [c115]Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. SP 2022: 824-841 - [c114]Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang:
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings. SP 2022: 1423-1439 - [c113]Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang:
Label Inference Attacks Against Vertical Federated Learning. USENIX Security Symposium 2022: 1397-1414 - [c112]Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang:
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era. USENIX Security Symposium 2022: 2673-2690 - [c111]Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang:
On the Security Risks of AutoML. USENIX Security Symposium 2022: 3953-3970 - [i62]Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang:
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era. CoRR abs/2202.10673 (2022) - [i61]Sihao Hu, Yi Cao, Yu Gong, Zhao Li, Yazheng Yang, Qingwen Liu, Wengwu Ou, Shouling Ji:
GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction. CoRR abs/2202.11525 (2022) - [i60]Dayong Ye, Huiqiang Chen, Shuai Zhou, Tianqing Zhu, Wanlei Zhou, Shouling Ji:
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It. CoRR abs/2203.06570 (2022) - [i59]Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang:
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings. CoRR abs/2204.04063 (2022) - [i58]Yangkai Du, Tengfei Ma, Lingfei Wu, Yiming Wu, Xuhong Zhang, Bo Long, Shouling Ji:
Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning. CoRR abs/2205.10511 (2022) - [i57]Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng, Jiming Chen:
VeriFi: Towards Verifiable Federated Unlearning. CoRR abs/2205.12709 (2022) - [i56]Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah:
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. CoRR abs/2208.08751 (2022) - [i55]Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang:
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution. CoRR abs/2209.01782 (2022) - [i54]Zhaohan Xi, Ren Pang, Changjiang Li, Tianyu Du, Shouling Ji, Fenglong Ma, Ting Wang:
Reasoning over Multi-view Knowledge Graphs. CoRR abs/2209.13702 (2022) - [i53]Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang:
Demystifying Self-supervised Trojan Attacks. CoRR abs/2210.07346 (2022) - [i52]Ren Pang, Changjiang Li, Zhaohan Xi, Shouling Ji, Ting Wang:
The Dark Side of AutoML: Towards Architectural Backdoor Search. CoRR abs/2210.12179 (2022) - [i51]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang:
Hijack Vertical Federated Learning Models with Adversarial Embedding. CoRR abs/2212.00322 (2022) - [i50]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Yuwen Pu, Ting Wang:
All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning. CoRR abs/2212.00325 (2022) - [i49]Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. CoRR abs/2212.13716 (2022) - [i48]Rongkuan Ma, Qiang Wei, Jingyi Wang, Shunkai Zhu, Shouling Ji, Peng Cheng, Yan Jia, Qingxian Wang:
Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study. CoRR abs/2212.14296 (2022) - 2021
- [j61]Jinyin Chen, Haibin Zheng, Hui Xiong, Ruoxi Chen, Tianyu Du, Zhen Hong, Shouling Ji:
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique. Comput. Secur. 104: 102220 (2021) - [j60]Jianfeng Dong, Zhongzi Long, Xiaofeng Mao, Changting Lin, Yuan He, Shouling Ji:
Multi-level Alignment Network for Domain Adaptive Cross-modal Retrieval. Neurocomputing 440: 207-219 (2021) - [j59]Jinyin Chen, Haibin Zheng, Wenchang Shangguan, Liangying Liu, Shouling Ji:
ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks. Inf. Sci. 564: 163-192 (2021) - [j58]Haiqin Weng, Shouling Ji, Changchang Liu, Ting Wang, Qinming He, Jianhai Chen:
Fast-RCM: Fast Tree-Based Unsupervised Rare-Class Mining. IEEE Trans. Cybern. 51(10): 5198-5211 (2021) - [j57]Kun He, Jing Chen, Quan Yuan, Shouling Ji, Debiao He, Ruiying Du:
Dynamic Group-Oriented Provable Data Possession in the Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1394-1408 (2021) - [j56]Xurong Li, Shouling Ji, Meng Han, Juntao Ji, Zhenyu Ren, Yushan Liu, Chunming Wu:
Adversarial Examples versus Cloud-Based Detectors: A Black-Box Empirical Study. IEEE Trans. Dependable Secur. Comput. 18(4): 1933-1949 (2021) - [j55]Chengkun Wei, Qinchen Gu, Shouling Ji, Wenzhi Chen, Zonghui Wang, Raheem Beyah:
OB-WSPES: A Uniform Evaluation System for Obfuscation-Based Web Search Privacy. IEEE Trans. Dependable Secur. Comput. 18(6): 2719-2735 (2021) - [j54]Qianjun Liu, Shouling Ji, Changchang Liu, Chunming Wu:
A Practical Black-Box Attack on Source Code Authorship Identification Classifiers. IEEE Trans. Inf. Forensics Secur. 16: 3620-3633 (2021) - [j53]Jianfeng Dong, Zhe Ma, Xiaofeng Mao, Xun Yang, Yuan He, Richang Hong, Shouling Ji:
Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning. IEEE Trans. Image Process. 30: 8410-8425 (2021) - [j52]Mingqi Lv, Zhaoxiong Hong, Ling Chen, Tieming Chen, Tiantian Zhu, Shouling Ji:
Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction. IEEE Trans. Intell. Transp. Syst. 22(6): 3337-3348 (2021) - [j51]Xiang Ling, Lingfei Wu, Saizhuo Wang, Gaoning Pan, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji:
Deep Graph Matching and Searching for Semantic Code Retrieval. ACM Trans. Knowl. Discov. Data 15(5): 88:1-88:21 (2021) - [j50]Jianhai Chen, Deshi Ye, Zhenguang Liu, Shouling Ji, Qinming He, Yang Xiang:
A Truthful and Near-Optimal Mechanism for Colocation Emergency Demand Response. IEEE Trans. Mob. Comput. 20(9): 2728-2744 (2021) - [c110]Zhenguang Liu, Kedi Lyu, Shuang Wu, Haipeng Chen, Yanbin Hao, Shouling Ji:
Aggregated Multi-GANs for Controlled 3D Human Motion Prediction. AAAI 2021: 2225-2232 - [c109]Xinyang Zhang, Ren Pang, Shouling Ji, Fenglong Ma, Ting Wang:
i-Algebra: Towards Interactive Interpretability of Deep Neural Networks. AAAI 2021: 11691-11698 - [c108]Aiping Zhang, Kui Liu, Liming Fang, Qianjun Liu, Xinyu Yun, Shouling Ji:
Learn To Align: A Code Alignment Network For Code Clone Detection. APSEC 2021: 1-11 - [c107]Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, Ting Wang:
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. CCS 2021: 516-534 - [c106]Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, Yanjun Wu:
CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels. CCS 2021: 794-810 - [c105]Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, Jiming Chen:
AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy. CCS 2021: 1266-1288 - [c104]Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, Qinming He:
Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths. CCS 2021: 1627-1644 - [c103]Gaoning Pan, Xingwei Lin, Xuhong Zhang, Yongkang Jia, Shouling Ji, Chunming Wu, Xinlei Ying, Jiashui Wang, Yanjun Wu:
V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing. CCS 2021: 2197-2213 - [c102]Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:
Backdoor Pre-trained Models Can Transfer to All. CCS 2021: 3141-3158 - [c101]Zhenguang Liu, Haoming Chen, Runyang Feng, Shuang Wu, Shouling Ji, Bailin Yang, Xun Wang:
Deep Dual Consecutive Network for Human Pose Estimation. CVPR 2021: 525-534 - [c100]Yangkai Du, Tengfei Ma, Lingfei Wu, Fangli Xu, Xuhong Zhang, Bo Long, Shouling Ji:
Constructing contrastive samples via summarization for text classification with limited annotations. EMNLP (Findings) 2021: 1365-1376 - [c99]Xinyang Zhang, Zheng Zhang, Shouling Ji, Ting Wang:
Trojaning Language Models for Fun and Profit. EuroS&P 2021: 179-197 - [c98]Zhixiao Fu, Xinyuan Chen, Jianfeng Dong, Shouling Ji:
Multi-Order Adversarial Representation Learning for Composed Query Image Retrieval. ICASSP 2021: 1685-1689 - [c97]Zhe Ma, Fenghao Liu, Jianfeng Dong, Xiaoye Qu, Yuan He, Shouling Ji:
Hierarchical Similarity Learning for Language-Based Product Image Retrieval. ICASSP 2021: 4335-4339 - [c96]Jinfeng Li, Tianyu Du, Xiangyu Liu, Rong Zhang, Hui Xue, Shouling Ji:
Enhancing Model Robustness by Incorporating Adversarial Knowledge into Semantic Representation. ICASSP 2021: 7708-7712 - [c95]Sihao Hu, Xuhong Zhang, Junfeng Zhou, Shouling Ji, Jiaqi Yuan, Zhao Li, Zhipeng Wang, Qi Chen, Qinming He, Liming Fang:
Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining. ICDE 2021: 2583-2594 - [c94]Zhenguang Liu, Peng Qian, Xiang Wang, Lei Zhu, Qinming He, Shouling Ji:
Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion. IJCAI 2021: 2751-2759 - [c93]Meng Jia, Kun He, Jing Chen, Ruiying Du, Weihang Chen, Zhihong Tian, Shouling Ji:
PROCESS: Privacy-Preserving On-Chain Certificate Status Service. INFOCOM 2021: 1-10 - [c92]Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, Raheem Beyah:
IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware. ASE 2021: 805-816 - [c91]Zuohui Chen, Renxuan Wang, Jingyang Xiang, Yue Yu, Xin Xia, Shouling Ji, Qi Xuan, Xiaoniu Yang:
Detecting Adversarial Samples with Graph-Guided Testing. ASE 2021: 1196-1198 - [c90]Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang:
Graph Backdoor. USENIX Security Symposium 2021: 1523-1540 - [c89]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. USENIX Security Symposium 2021: 2777-2794 - [c88]Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah:
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. USENIX Security Symposium 2021: 4205-4222 - [i47]Xinyang Zhang, Ren Pang, Shouling Ji, Fenglong Ma, Ting Wang:
i-Algebra: Towards Interactive Interpretability of Deep Neural Networks. CoRR abs/2101.09301 (2021) - [i46]Qi Zheng, Jianfeng Dong, Xiaoye Qu, Xun Yang, Shouling Ji, Xun Wang:
Progressive Localization Networks for Language-based Moment Localization. CoRR abs/2102.01282 (2021) - [i45]Zhe Ma, Fenghao Liu, Jianfeng Dong, Xiaoye Qu, Yuan He, Shouling Ji:
Hierarchical Similarity Learning for Language-based Product Image Retrieval. CoRR abs/2102.09375 (2021) - [i44]Jinfeng Li, Tianyu Du, Xiangyu Liu, Rong Zhang, Hui Xue, Shouling Ji:
Enhancing Model Robustness By Incorporating Adversarial Knowledge Into Semantic Representation. CoRR abs/2102.11584 (2021) - [i43]Zhenguang Liu, Haoming Chen, Runyang Feng, Shuang Wu, Shouling Ji, Bailin Yang, Xun Wang:
Deep Dual Consecutive Network for Human Pose Estimation. CoRR abs/2103.07254 (2021) - [i42]Zhenguang Liu, Kedi Lyu, Shuang Wu, Haipeng Chen, Yanbin Hao, Shouling Ji:
Aggregated Multi-GANs for Controlled 3D Human Motion Prediction. CoRR abs/2103.09755 (2021) - [i41]Rui Wang, Zhihua Wei, Shouling Ji, Zhen Hong:
EfficientTDNN: Efficient Architecture Search for Speaker Recognition in the Wild. CoRR abs/2103.13581 (2021) - [i40]Jianfeng Dong, Zhe Ma, Xiaofeng Mao, Xun Yang, Yuan He, Richang Hong, Shouling Ji:
Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning. CoRR abs/2104.02429 (2021) - [i39]Yangkai Du, Tengfei Ma, Lingfei Wu, Fangli Xu, Xuhong Zhang, Shouling Ji:
Constructing Contrastive samples via Summarization for Text Classification with limited annotations. CoRR abs/2104.05094 (2021) - [i38]Zhenguang Liu, Peng Qian, Xiang Wang, Lei Zhu, Qinming He, Shouling Ji:
Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion. CoRR abs/2106.09282 (2021) - [i37]Zuohui Chen, Renxuan Wang, Jingyang Xiang, Yue Yu, Xin Xia, Shouling Ji, Qi Xuan, Xiaoniu Yang:
GGT: Graph-Guided Testing for Adversarial Sample Detection of Deep Neural Network. CoRR abs/2107.07043 (2021) - [i36]Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang:
On the Security Risks of AutoML. CoRR abs/2110.06018 (2021) - [i35]Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, Jiming Chen:
AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy. CoRR abs/2110.07505 (2021) - [i34]Zhaohan Xi, Ren Pang, Changjiang Li, Shouling Ji, Xiapu Luo, Xusheng Xiao, Ting Wang:
Towards Robust Reasoning over Knowledge Graphs. CoRR abs/2110.14693 (2021) - [i33]Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:
Backdoor Pre-trained Models Can Transfer to All. CoRR abs/2111.00197 (2021) - [i32]Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. CoRR abs/2112.05588 (2021) - [i31]Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu:
Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art. CoRR abs/2112.12310 (2021) - [i30]Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen:
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification. CoRR abs/2112.13214 (2021) - [i29]Zhenguang Liu, Shuang Wu, Shuyuan Jin, Shouling Ji, Qi Liu, Shijian Lu, Li Cheng:
Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction. CoRR abs/2112.15012 (2021) - 2020
- [j49]Lujia Shen, Qianjun Liu, Gong Chen, Shouling Ji:
Text-based price recommendation system for online rental houses. Big Data Min. Anal. 3(2): 143-152 (2020) - [j48]Xurong Li, Shouling Ji, Juntao Ji, Zhenyu Ren, Chunming Wu, Bo Li, Ting Wang:
Adversarial examples detection through the sensitivity in space mappings. IET Comput. Vis. 14(5): 201-213 (2020) - [j47]Liming Fang, Yang Li, Xinyu Yun, Zhenyu Wen, Shouling Ji, Weizhi Meng, Zehong Cao, Muhammad Tanveer:
THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network. IEEE Internet Things J. 7(7): 5745-5759 (2020) - [j46]Fei Wang, Yifan Lei, Zhenguang Liu, Xun Wang, Shouling Ji, Anthony K. H. Tung:
Fast and parameter-light rare behavior detection in maritime trajectories. Inf. Process. Manag. 57(5): 102268 (2020) - [j45]Liming Fang, Hongwei Zhu, Boqing Lv, Zhe Liu, Weizhi Meng, Yu Yu, Shouling Ji, Zehong Cao:
HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM. Trans. Data Sci. 1(4): 25:1-25:18 (2020) - [j44]Chengkun Wei, Shouling Ji, Changchang Liu, Wenzhi Chen, Ting Wang:
AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 15: 3239-3254 (2020) - [j43]Pan Zhou, Qiben Yan, Kehao Wang, Zichuan Xu, Shouling Ji, Kaigui Bian:
Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack. IEEE Trans. Netw. Sci. Eng. 7(3): 1862-1878 (2020) - [j42]Zhenyu Wen, Tao Lin, Renyu Yang, Shouling Ji, Rajiv Ranjan, Alexander B. Romanovsky, Chang-Ting Lin, Jie Xu:
GA-Par: Dependable Microservice Orchestration Framework for Geo-Distributed Clouds. IEEE Trans. Parallel Distributed Syst. 31(1): 129-143 (2020) - [c87]Zhe Ma, Jianfeng Dong, Zhongzi Long, Yao Zhang, Yuan He, Hui Xue, Shouling Ji:
Fine-Grained Fashion Similarity Learning by Attribute-Specific Embedding Network. AAAI 2020: 11741-11748 - [c86]Tariro Manyumwa, Phillip Francis Chapita, Hanlu Wu, Shouling Ji:
Towards Fighting Cybercrime: Malicious URL Attack Type Detection using Multiclass Classification. IEEE BigData 2020: 1813-1822 - [c85]Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex X. Liu, Ting Wang:
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models. CCS 2020: 85-99 - [c84]Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah:
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. AsiaCCS 2020: 357-369 - [c83]Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah, Ting Wang:
Text Captcha Is Dead? A Large Scale Deployment and Empirical Study. CCS 2020: 1391-1406 - [c82]Benyu Zhang, Matei Zaharia, Shouling Ji, Raluca Ada Popa, Guofei Gu:
PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In Practice. CCS 2020: 2139-2140 - [c81]Zhao Li, Chenyi Lei, Pengcheng Zou, Donghui Ding, Shichang Hu, Zehong Hu, Shouling Ji, Jianliang Gao:
Attention with Long-Term Interval-Based Gated Recurrent Units for Modeling Sequential User Behaviors. DASFAA (1) 2020: 663-670 - [c80]Hanlu Wu, Tengfei Ma, Lingfei Wu, Tariro Manyumwa, Shouling Ji:
Unsupervised Reference-Free Summary Quality Evaluation via Contrastive Learning. EMNLP (1) 2020: 3612-3621 - [c79]Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, Raheem Beyah:
Understanding the Security Risks of Docker Hub. ESORICS (1) 2020: 257-276 - [c78]Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li, Raheem Beyah, Ting Wang:
De-Health: All Your Online Health Information Are Belong to Us. ICDE 2020: 1609-1620 - [c77]Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
AdvMind: Inferring Adversary Intent of Black-Box Attacks. KDD 2020: 1899-1907 - [c76]Xudong Pan, Mi Zhang, Shouling Ji, Min Yang:
Privacy Risks of General-Purpose Language Models. SP 2020: 1314-1331 - [c75]Jinyin Chen, Xueke Wang, Yan Zhang, Haibin Zheng, Shouling Ji:
Attention Mechanism Based Adversarial Attack Against Deep Reinforcement Learning. SpaCCS 2020: 19-43 - [c74]Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang:
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation. USENIX Security Symposium 2020: 1381-1398 - [c73]Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, Min Yang:
Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent. USENIX Security Symposium 2020: 1641-1658 - [c72]Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang:
Interpretable Deep Learning under Fire. USENIX Security Symposium 2020: 1659-1676 - [c71]Xurong Li, Kun Yu, Shouling Ji, Yan Wang, Chunming Wu, Hui Xue:
Fighting Against Deepfake: Patch&Pair Convolutional Neural Networks (PPCNN). WWW (Companion Volume) 2020: 88-89 - [e1]Benyu Zhang, Raluca Ada Popa, Matei Zaharia, Guofei Gu, Shouling Ji:
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, Virtual Event, USA, November, 2020. ACM 2020, ISBN 978-1-4503-8088-1 [contents] - [i28]Zhe Ma, Jianfeng Dong, Yao Zhang, Zhongzi Long, Yuan He, Hui Xue, Shouling Ji:
Fine-Grained Fashion Similarity Learning by Attribute-Specific Embedding Network. CoRR abs/2002.02814 (2020) - [i27]Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
AdvMind: Inferring Adversary Intent of Black-Box Attacks. CoRR abs/2006.09539 (2020) - [i26]Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang:
Graph Backdoor. CoRR abs/2006.11890 (2020) - [i25]Xiang Ling, Lingfei Wu, Saizhuo Wang, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji:
Hierarchical Graph Matching Networks for Deep Graph Similarity Learning. CoRR abs/2007.04395 (2020) - [i24]Hanlu Wu, Tengfei Ma, Lingfei Wu, Tariro Manyumwa, Shouling Ji:
Unsupervised Reference-Free Summary Quality Evaluation via Contrastive Learning. CoRR abs/2010.01781 (2020) - [i23]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. CoRR abs/2010.01785 (2020) - [i22]Xiang Ling, Lingfei Wu, Saizhuo Wang, Gaoning Pan, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji:
Deep Graph Matching and Searching for Semantic Code Retrieval. CoRR abs/2010.12908 (2020) - [i21]Hanlu Wu, Tengfei Ma, Lingfei Wu, Shouling Ji:
Exploiting Heterogeneous Graph Neural Networks with Latent Worker/Task Correlation Information for Label Aggregation in Crowdsourcing. CoRR abs/2010.13080 (2020) - [i20]Haiqin Weng, Juntao Zhang, Feng Xue, Tao Wei, Shouling Ji, Zhiyuan Zong:
Privacy Leakage of Real-World Vertical Federated Learning. CoRR abs/2011.09290 (2020) - [i19]Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Ting Wang:
TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask). CoRR abs/2012.09302 (2020)
2010 – 2019
- 2019
- [j41]Jing (Selena) He, Meng Han, Shouling Ji, Tianyu Du, Zhao Li:
Spreading social influence with both positive and negative opinions in online networks. Big Data Min. Anal. 2(2): 100-117 (2019) - [j40]Haiqin Weng, Binbin Zhao, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Raheem Beyah:
Towards understanding the security of modern image captchas and underground captcha-solving services. Big Data Min. Anal. 2(2): 118-144 (2019) - [j39]Zhikang Zou, Yu Cheng, Xiaoye Qu, Shouling Ji, Xiaoxiao Guo, Pan Zhou:
Attend to count: Crowd counting with adaptive capacity multi-scale CNNs. Neurocomputing 367: 75-83 (2019) - [j38]Pan Zhou, Guohui Zhong, Menglan Hu, Ruixuan Li, Qiben Yan, Kun Wang, Shouling Ji, Dapeng Oliver Wu:
Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment. IEEE Internet Things J. 6(5): 7450-7468 (2019) - [j37]Pan Zhou, Wenbo Chen, Shouling Ji, Hao Jiang, Li Yu, Dapeng Oliver Wu:
Privacy-Preserving Online Task Allocation in Edge-Computing-Enabled Massive Crowdsensing. IEEE Internet Things J. 6(5): 7773-7787 (2019) - [j36]Kaiyu Tang, Meng Han, Qinchen Gu, Anni Zhou, Raheem Beyah, Shouling Ji:
ShareSafe: An Improved Version of SecGraph. KSII Trans. Internet Inf. Syst. 13(11): 5731-5754 (2019) - [j35]Wenbo Chen, Anni Zhou, Pan Zhou, Liang Gao, Shouling Ji, Dapeng Wu:
A Privacy-Preserving Online Learning Approach for Incentive-Based Demand Response in Smart Grid. IEEE Syst. J. 13(4): 4208-4218 (2019) - [j34]Wenbo Chen, Anni Zhou, Pan Zhou, Liang Gao, Shouling Ji, Dapeng Wu:
Corrections to "A Privacy-Preserving Online Learning Approach for Incentive-Based Demand Response in Smart Grid". IEEE Syst. J. 13(4): 4482-4483 (2019) - [j33]Shouling Ji, Ting Wang, Jianhai Chen, Weiqing Li, Prateek Mittal, Raheem Beyah:
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data. IEEE Trans. Dependable Secur. Comput. 16(4): 594-607 (2019) - [j32]Zhen Hong, Rui Wang, Shouling Ji, Raheem Beyah:
Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems. IEEE Trans. Inf. Forensics Secur. 14(5): 1337-1350 (2019) - [j31]Yinan Feng, Pan Zhou, Jie Xu, Shouling Ji, Dapeng Wu:
Video Big Data Retrieval Over Media Cloud: A Context-Aware Online Learning Approach. IEEE Trans. Multim. 21(7): 1762-1777 (2019) - [j30]Pan Zhou, Jie Xu, Wei Wang, Yuchong Hu, Dapeng Oliver Wu, Shouling Ji:
Toward Optimal Adaptive Online Shortest Path Routing With Acceleration Under Jamming Attack. IEEE/ACM Trans. Netw. 27(5): 1815-1829 (2019) - [j29]Xuhong Zhang, Jun Wang, Shouling Ji, Jiangling Yin, Rui Wang, Xiaobo Zhou, Changjun Jiang:
An I/O Efficient Distributed Approximation Framework Using Cluster Sampling. IEEE Trans. Parallel Distributed Syst. 30(7): 1494-1511 (2019) - [c70]Yueyao Chen, Qianjun Liu, Tianyu Du, Yuan Chen, Shouling Ji:
Symmetric Frame Cracking: A Powerful Dynamic Textual CAPTCHAs Cracking Policy. Inscrypt 2019: 157-172 - [c69]Jinyin Chen, Haibin Zheng, Mengmeng Su, Tianyu Du, Chang-Ting Lin, Shouling Ji:
Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack. Inscrypt 2019: 173-198 - [c68]Changjiang Li, Haiqin Weng, Shouling Ji, Jianfeng Dong, Qinming He:
DeT: Defending Against Adversarial Examples via Decreasing Transferability. CSS (1) 2019: 307-322 - [c67]Jianfeng Dong, Xirong Li, Chaoxi Xu, Shouling Ji, Yuan He, Gang Yang, Xun Wang:
Dual Encoding for Zero-Example Video Retrieval. CVPR 2019: 9346-9355 - [c66]Haiqin Weng, Shouling Ji, Fuzheng Duan, Zhao Li, Jianhai Chen, Qinming He, Ting Wang:
CATS: Cross-Platform E-Commerce Fraud Detection. ICDE 2019: 1874-1885 - [c65]Lujia Shen, Tianyu Du, Shouling Ji:
Neural Network Model for Classifying the Economic Recession and Construction of Financial Stress Index. ICPCSEE (2) 2019: 564-578 - [c64]Xu Duan, Jingzheng Wu, Shouling Ji, Zhiqing Rui, Tianyue Luo, Mutian Yang, Yanjun Wu:
VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities. IJCAI 2019: 4665-4671 - [c63]Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu:
A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers. INFOCOM 2019: 2557-2565 - [c62]Lingfei Wu, Ian En-Hsu Yen, Siyu Huo, Liang Zhao, Kun Xu, Liang Ma, Shouling Ji, Charu C. Aggarwal:
Efficient Global String Kernel with Random Features: Beyond Counting Substructures. KDD 2019: 520-528 - [c61]Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, Ting Wang:
TextBugger: Generating Adversarial Text Against Real-world Applications. NDSS 2019 - [c60]Xiang Ling, Shouling Ji, Jiaxu Zou, Jiannan Wang, Chunming Wu, Bo Li, Ting Wang:
DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model. IEEE Symposium on Security and Privacy 2019: 673-690 - [c59]Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah:
MOPT: Optimized Mutation Scheduling for Fuzzers. USENIX Security Symposium 2019: 1949-1966 - [c58]Chenyi Lei, Shouling Ji, Zhao Li:
TiSSA: A Time Slice Self-Attention Approach for Modeling Sequential User Behaviors. WWW 2019: 2964-2970 - [i18]Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem A. Beyah, Ting Wang:
Adversarial CAPTCHAs. CoRR abs/1901.01107 (2019) - [i17]Yuwei Li, Shouling Ji, Chenyang Lv, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu:
V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing. CoRR abs/1901.01142 (2019) - [i16]Xurong Li, Shouling Ji, Meng Han, Juntao Ji, Zhenyu Ren, Yushan Liu, Chunming Wu:
Adversarial Examples versus Cloud-based Detectors: A Black-box Empirical Study. CoRR abs/1901.01223 (2019) - [i15]Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu:
A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers. CoRR abs/1901.02978 (2019) - [i14]Shouling Ji, Haiqin Weng, Yiming Wu, Pan Zhou, Qinming He, Raheem Beyah, Ting Wang:
FDI: Quantifying Feature-based Data Inferability. CoRR abs/1902.00714 (2019) - [i13]Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Qinming He, Raheem Beyah, Ting Wang:
De-Health: All Your Online Health Information Are Belong to Us. CoRR abs/1902.00717 (2019) - [i12]Zhikang Zou, Yu Cheng, Xiaoye Qu, Shouling Ji, Xiaoxiao Guo, Pan Zhou:
Attend To Count: Crowd Counting with Adaptive Capacity Multi-scale CNNs. CoRR abs/1908.02797 (2019) - [i11]Ren Pang, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Ting Wang:
The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models. CoRR abs/1911.01559 (2019) - [i10]Lingfei Wu, Ian En-Hsu Yen, Siyu Huo, Liang Zhao, Kun Xu, Liang Ma, Shouling Ji, Charu C. Aggarwal:
Efficient Global String Kernel with Random Features: Beyond Counting Substructures. CoRR abs/1911.11121 (2019) - 2018
- [j28]Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, Raheem A. Beyah:
Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too. IEEE Secur. Priv. 16(5): 49-59 (2018) - [j27]Shukun Yang, Shouling Ji, Raheem A. Beyah:
DPPG: A Dynamic Password Policy Generation System. IEEE Trans. Inf. Forensics Secur. 13(3): 545-558 (2018) - [c57]Ningfei Wang, Shouling Ji, Ting Wang:
Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization. AISec@CCS 2018: 74-84 - [c56]Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Reheem Beyah:
Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs. AISec@CCS 2018: 85-96 - [c55]Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
Model-Reuse Attacks on Deep Learning Systems. CCS 2018: 349-363 - [c54]Anni Zhou, Pan Zhou, Dapeng Oliver Wu, Yuchong Hu, Shouling Ji:
T-PriDO: A Tree-based Privacy-Preserving and Contextual Collaborative Online Big Data Processing System. CNS 2018: 1-9 - [c53]Haiqin Weng, Zhao Li, Shouling Ji, Chen Chu, Haifeng Lu, Tianyu Du, Qinming He:
Online E-Commerce Fraud: A Large-Scale Detection and Analysis. ICDE 2018: 1435-1440 - [c52]Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang, Raheem A. Beyah:
Quantifying Graph Anonymity, Utility, and De-anonymity. INFOCOM 2018: 1736-1744 - [c51]Jing Chen, Shixiong Yao, Quan Yuan, Kun He, Shouling Ji, Ruiying Du:
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections. INFOCOM 2018: 2060-2068 - [c50]Mutian Yang, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu:
Pre-Patch: Find Hidden Threats in Open Software Based on Machine Learning Method. SERVICES 2018: 48-65 - [i9]Xinyang Zhang, Shouling Ji, Ting Wang:
Differentially Private Releasing via Deep Generative Model. CoRR abs/1801.01594 (2018) - [i8]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Blind De-anonymization Attacks using Social Networks. CoRR abs/1801.05534 (2018) - [i7]Chenyang Lv, Shouling Ji, Yuwei Li, Junfeng Zhou, Jianhai Chen, Pan Zhou, Jing Chen:
SmartSeed: Smart Seed Generation for Efficient Fuzzing. CoRR abs/1807.02606 (2018) - [i6]Chang-Ting Lin, Ning Ma, Xun Wang, Zhenguang Liu, Jianhai Chen, Shouling Ji:
Rapido: A Layer2 Payment System for Decentralized Currencies. CoRR abs/1808.01561 (2018) - [i5]Jianfeng Dong, Xirong Li, Chaoxi Xu, Shouling Ji, Xun Wang:
Dual Dense Encoding for Zero-Example Video Retrieval. CoRR abs/1809.06181 (2018) - [i4]Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
Model-Reuse Attacks on Deep Learning Systems. CoRR abs/1812.00483 (2018) - [i3]Xinyang Zhang, Ningfei Wang, Shouling Ji, Hua Shen, Ting Wang:
Interpretable Deep Learning under Fire. CoRR abs/1812.00891 (2018) - [i2]Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, Ting Wang:
TextBugger: Generating Adversarial Text Against Real-world Applications. CoRR abs/1812.05271 (2018) - 2017
- [j26]Shouling Ji, Prateek Mittal, Raheem A. Beyah:
Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey. IEEE Commun. Surv. Tutorials 19(2): 1305-1326 (2017) - [j25]Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, Raheem A. Beyah:
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords. IEEE Trans. Dependable Secur. Comput. 14(5): 550-564 (2017) - [c49]Jing (Selena) He, Shouling Ji, Patrick Otoo Bobbie:
Internet of Things (IoT)-based Learning Framework to Facilitate STEM Undergraduate Education. ACM Southeast Regional Conference 2017: 88-94 - [c48]Jing (Selena) He, Ying Xie, Tianyu Du, Shouling Ji, Zhao Li:
Influence Spread in Social Networks with both Positive and Negative Influences. COCOON 2017: 615-629 - [c47]Bin Xiong, Guangli Xiang, Tianyu Du, Jing (Selena) He, Shouling Ji:
Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications. CSS 2017: 16-31 - [c46]Jing He, Yiming Wu, Guangli Xiang, Zhendong Wu, Shouling Ji:
Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data. CSS 2017: 452-459 - [c45]Xinyang Zhang, Shouling Ji, Hui Wang, Ting Wang:
Private, Yet Practical, Multiparty Deep Learning. ICDCS 2017: 1442-1452 - [c44]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
How to Quantify Graph De-anonymization Risks. ICISSP (Revised Selected Papers) 2017: 84-104 - [c43]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Quantification of De-anonymization Risks in Social Networks. ICISSP 2017: 126-135 - [c42]Jianyu Wang, Chunming Wu, Shouling Ji, Qinchen Gu, Zhao Li:
Fraud Detection via Coding Nominal Attributes. ICMSSP 2017: 42-45 - [c41]Chang-Ting Lin, Chunming Wu, Yifei Tian, Zhenyu Wen, Shouling Ji:
PBUF: Sharing Buffer to Mitigate Flooding Attacks. ICPADS 2017: 392-399 - [c40]JingZheng Wu, Shen Liu, Shouling Ji, Mutian Yang, Tianyue Luo, Yanjun Wu, Yongji Wang:
Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception". ICSE-SEIP 2017: 283-292 - [c39]Shouling Ji, Shukun Yang, Anupam Das, Xin Hu, Raheem A. Beyah:
Password correlation: Quantification, evaluation and application. INFOCOM 2017: 1-9 - [c38]Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu, Raheem A. Beyah:
HSTS Measurement and an Enhanced Stripping Attack Against HTTPS. SecureComm 2017: 489-509 - [c37]Xiang Ling, Chunming Wu, Shouling Ji, Meng Han:
H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol. SecureComm 2017: 550-570 - [c36]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Blind De-anonymization Attacks using Social Networks. WPES@CCS 2017: 1-4 - [i1]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Quantification of De-anonymization Risks in Social Networks. CoRR abs/1703.04873 (2017) - 2016
- [b1]Shouling Ji:
Evaluating the security of anonymized big graph/structural data. Georgia Institute of Technology, Atlanta, GA, USA, 2016 - [j24]Xuhong Zhang, Jun Wang, Jiangling Yin, Shouling Ji:
Sapprox: Enabling Efficient and Accurate Approximations on Sub-datasets with Distribution-aware Online Sampling. Proc. VLDB Endow. 10(3): 109-120 (2016) - [j23]Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah:
Seed-Based De-Anonymizability Quantification of Social Networks. IEEE Trans. Inf. Forensics Secur. 11(7): 1398-1411 (2016) - [j22]Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah:
General Graph Data De-Anonymization: From Mobility Traces to Social Networks. ACM Trans. Inf. Syst. Secur. 18(4): 12:1-12:29 (2016) - [j21]Shouling Ji, Mingyuan Yan, Raheem A. Beyah, Zhipeng Cai:
Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks. IEEE Trans. Mob. Comput. 15(4): 996-1008 (2016) - [j20]Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah:
Structural Data De-Anonymization: Theory and Practice. IEEE/ACM Trans. Netw. 24(6): 3523-3536 (2016) - [c35]Yushan Liu, Shouling Ji, Prateek Mittal:
SmartWalk: Enhancing Social Network Security via Adaptive Random Walks. CCS 2016: 492-503 - [c34]Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, Teryl Taylor:
BotMeter: Charting DGA-Botnet Landscapes in Large Networks. ICDCS 2016: 334-343 - [c33]Gong Chen, Shouling Ji, John A. Copeland:
Towards a Framework to Facilitate the Mobile Advertising Ecosystem. ICPADS 2016: 456-465 - [c32]Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, Raheem A. Beyah:
On the relative de-anonymizability of graph data: Quantification and evaluation. INFOCOM 2016: 1-9 - 2015
- [j19]Jinbao Li, Xiaohang Guo, Longjiang Guo, Shouling Ji, Meng Han, Zhipeng Cai:
Optimal routing with scheduling and channel assignment in multi-power multi-radio wireless sensor networks. Ad Hoc Networks 31: 45-62 (2015) - [j18]Jing (Selena) He, Shouling Ji, Raheem A. Beyah, Ying Xie, Yingshu Li:
Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm. Trans. Emerg. Telecommun. Technol. 26(2): 147-163 (2015) - [j17]Shouling Ji, Raheem A. Beyah, Zhipeng Cai:
Broadcast Scheduling With Latency and Redundancy Analysis for Cognitive Radio Networks. IEEE Trans. Veh. Technol. 64(7): 3090-3097 (2015) - [c31]Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, Raheem A. Beyah:
PARS: A Uniform and Open-source Password Analysis and Research System. ACSAC 2015: 321-330 - [c30]Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah:
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge. NDSS 2015 - [c29]Shouling Ji, Zhipeng Cai, Jing (Selena) He, Raheem A. Beyah:
Primary social behavior aware routing and scheduling for Cognitive Radio Networks. SECON 2015: 417-425 - [c28]Shouling Ji, Zhipeng Cai, Meng Han, Raheem A. Beyah:
Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective. SECON 2015: 435-443 - [c27]Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, Raheem A. Beyah:
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization. USENIX Security Symposium 2015: 303-318 - 2014
- [j16]Jing (Selena) He, Shouling Ji, Yi Pan, Zhipeng Cai:
A Genetic Algorithm with Immigrants Schemes for Constructing a σ-Reliable MCDS in Probabilistic Wireless Networks. Ad Hoc Sens. Wirel. Networks 20(3-4): 153-178 (2014) - [j15]Meng Han, Mingyuan Yan, Jinbao Li, Shouling Ji, Yingshu Li:
Neighborhood-based uncertainty generation in social networks. J. Comb. Optim. 28(3): 561-576 (2014) - [j14]Guoliang Liu, Shouling Ji, Zhipeng Cai:
Strengthen nodal cooperation for data dissemination in mobile social networks. Pers. Ubiquitous Comput. 18(8): 1797-1811 (2014) - [j13]Shouling Ji, Raheem A. Beyah, Zhipeng Cai:
Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks. IEEE Trans. Mob. Comput. 13(3): 626-637 (2014) - [j12]Jing He, Shouling Ji, Yi Pan, Yingshu Li:
Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 25(7): 1681-1690 (2014) - [j11]Zhipeng Cai, Shouling Ji, Jing He, Lin Wei, Anu G. Bourgeois:
Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration. IEEE Trans. Parallel Distributed Syst. 25(8): 2020-2029 (2014) - [j10]Jing (Selena) He, Shouling Ji, Yi Pan, Yingshu Li:
Greedy construction of load-balanced virtual backbones in wireless sensor networks. Wirel. Commun. Mob. Comput. 14(7): 673-688 (2014) - [j9]Mingyuan Yan, Jing (Selena) He, Shouling Ji, Yingshu Li:
Multi-regional query scheduling in wireless sensor networks with minimum latency. Wirel. Commun. Mob. Comput. 14(9): 849-864 (2014) - [c26]Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah:
Structural Data De-anonymization: Quantification, Practice, and Implications. CCS 2014: 1040-1053 - [c25]Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah:
Structure Based Data De-Anonymization of Social Networks and Mobility Traces. ISC 2014: 237-254 - [c24]Jing (Selena) He, Shouling Ji, Raheem A. Beyah, Zhipeng Cai:
Minimum-sized influential node set selection for social networks under the independent cascade model. MobiHoc 2014: 93-102 - [c23]Mingyuan Yan, Shouling Ji, Meng Han, Yingshu Li, Zhipeng Cai:
Data aggregation scheduling in wireless networks with Cognitive Radio capability. SECON 2014: 513-521 - 2013
- [j8]Shouling Ji, A. Selcuk Uluagac, Raheem A. Beyah, Zhipeng Cai:
Practical unicast and convergecast scheduling schemes for cognitive radio networks. J. Comb. Optim. 26(1): 161-177 (2013) - [j7]Shouling Ji, Jing (Selena) He, Yi Pan, Yingshu Li:
Continuous data aggregation and capacity in probabilistic wireless sensor networks. J. Parallel Distributed Comput. 73(6): 729-745 (2013) - [j6]Jing (Selena) He, Shouling Ji, Yi Pan, Zhipeng Cai:
Approximation algorithms for load-balanced virtual backbone construction in wireless sensor networks. Theor. Comput. Sci. 507: 2-16 (2013) - [j5]Shouling Ji, Zhipeng Cai:
Distributed Data Collection in Large-Scale Asynchronous Wireless Sensor Networks Under the Generalized Physical Interference Model. IEEE/ACM Trans. Netw. 21(4): 1270-1283 (2013) - [j4]Shouling Ji, Jing (Selena) He, A. Selcuk Uluagac, Raheem A. Beyah, Yingshu Li:
Cell-based snapshot and continuous data collection in wireless sensor networks. ACM Trans. Sens. Networks 9(4): 47:1-47:29 (2013) - [c22]Meng Han, Mingyuan Yan, Jinbao Li, Shouling Ji, Yingshu Li:
Generating Uncertain Networks Based on Historical Network Snapshots. COCOON 2013: 747-758 - [c21]Jing He, Shouling Ji, Raheem A. Beyah, Yingshu Li:
A Multi-Objective Genetic Algorithm for constructing load-balanced virtual backbones in probabilistic Wireless Sensor Networks. GLOBECOM 2013: 261-266 - [c20]Mingyuan Yan, Shouling Ji, Zhipeng Cai:
Time efficient data aggregation scheduling in Cognitive Radio Networks. GLOBECOM 2013: 1185-1190 - [c19]Jing He, Shouling Ji, Xiaojing Liao, Hisham M. Haddad, Raheem A. Beyah:
Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences. IPCCC 2013: 1-8 - [c18]Shouling Ji, Mingyuan Yan, Raheem A. Beyah, Zhipeng Cai:
Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks. MASS 2013: 168-172 - [c17]Shouling Ji, Raheem A. Beyah, Zhipeng Cai:
Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks. SECON 2013: 389-397 - 2012
- [j3]Zhipeng Cai, Shouling Ji, Jinbao Li:
Data caching-based query processing in multi-sink wireless sensor networks. Int. J. Sens. Networks 11(2): 109-125 (2012) - [j2]Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, Yingshu Li:
Load-balanced CDS construction in wireless sensor networks via genetic algorithm. Int. J. Sens. Networks 11(3): 166-178 (2012) - [j1]Shouling Ji, Zhipeng Cai, Yingshu Li, Xiaohua Jia:
Continuous Data Collection Capacity of Dual-Radio Multichannel Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(10): 1844-1855 (2012) - [c16]Jing He, Shouling Ji, Yi Pan, Zhipeng Cai:
Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks. COCOA 2012: 1-12 - [c15]Jing (Selena) He, Shouling Ji, Pingzhi Fan, Yi Pan, Yingshu Li:
Constructing a load-balanced virtual backbone in Wireless Sensor Networks. ICNC 2012: 959-963 - [c14]Zhipeng Cai, Shouling Ji, Jing He, Anu G. Bourgeois:
Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks. ICDCS 2012: 245-254 - [c13]Shouling Ji, Raheem A. Beyah, Zhipeng Cai:
Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks. INFOCOM 2012: 1035-1043 - [c12]Shouling Ji, Zhipeng Cai:
Distributed data collection and its capacity in asynchronous wireless sensor networks. INFOCOM 2012: 2113-2121 - 2011
- [c11]Shouling Ji, Yingshu Li, Xiaohua Jia:
Capacity of dual-radio multi-channel wireless sensor networks for continuous data collection. INFOCOM 2011: 1062-1070 - [c10]Yueming Duan, Shouling Ji, Zhipeng Cai:
Generalized broadcast scheduling in duty-cycle multi-hop wireless networks. IPCCC 2011: 1-6 - [c9]Mingyuan Yan, Jing He, Shouling Ji, Yingshu Li:
Minimum latency scheduling for Multi-Regional Query in Wireless Sensor Networks. IPCCC 2011: 1-8 - [c8]Shouling Ji, Raheem A. Beyah, Yingshu Li:
Continuous Data Collection Capacity of Wireless Sensor Networks under Physical Interference Model. MASS 2011: 222-231 - [c7]Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, Yingshu Li:
Genetic-algorithm-based construction of Load-Balanced CDSs in Wireless Sensor Networks. MILCOM 2011: 667-672 - [c6]Jing He, Zhipeng Cai, Shouling Ji, Raheem A. Beyah, Yi Pan:
A Genetic Algorithm for Constructing a Reliable MCDS in Probabilistic Wireless Networks. WASA 2011: 96-107 - 2010
- [c5]Jinbao Li, Desheng Zhang, Shouling Ji, Longjiang Guo:
RCS: A Random Channel Selection with Probabilistic Backoff for Multi-Channel MAC Protocols in WSNs. GLOBECOM 2010: 1-5 - [c4]Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li:
M-cube: A Duty Cycle Based Multi-channel MAC Protocol with Multiple Channel Reservation for WSNs. ICPADS 2010: 107-114 - [c3]Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li:
ARM: An asynchronous receiver-initiated multichannel MAC protocol with duty cycling for WSNs. IPCCC 2010: 114-121
2000 – 2009
- 2009
- [c2]Jinbao Li, Shouling Ji, Jinghua Zhu:
Data Caching Based Queries in Multi-sink Sensor Networks. MSN 2009: 9-16 - 2008
- [c1]Jinbao Li, Shouling Ji, Hu Jin, Qianqian Ren:
Routing in Multi-Sink Sensor Networks Based on Gravitational Field. ICESS 2008: 368-375
Coauthor Index
aka: Jingzheng Wu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint