Author of the publication

Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks.

, , , , , , and . IEEE Symposium on Security and Privacy, page 707-723. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites., , , , , and . AsiaCCS, page 181-192. ACM, (2019)You are who you know: inferring user profiles in online social networks, , , and . Proceedings of the third ACM international conference on Web search and data mining, page 251--260. New York, NY, USA, ACM, (2010)Specializing Neural Networks for Cryptographic Code Completion Applications., , , , , and . IEEE Trans. Software Eng., 49 (6): 3524-3535 (June 2023)Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons., , , , , and . CoRR, (2021)Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion., , , , , and . ICSE-Companion, page 360-361. ACM/IEEE, (2022)Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation., , , , , , and . SP, page 1190-1206. IEEE, (2020)Deepfake Text Detection: Limitations and Opportunities., , , , , , , and . SP, page 1613-1630. IEEE, (2023)Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models., , , , and . CoRR, (2021)I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions., , , , , and . EuroS&P, page 47-61. IEEE, (2018)A First Look at Toxicity Injection Attacks on Open-domain Chatbots., , , , , and . ACSAC, page 521-534. ACM, (2023)