Guanhong Tao

Orcid: 0000-0002-4701-1327

Affiliations:
  • Purdue University, West Lafayette, IN, USA


According to our database1, Guanhong Tao authored at least 58 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Extractive-and-Abstractive Framework for Source Code Summarization.
ACM Trans. Softw. Eng. Methodol., March, 2024

LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning.
CoRR, 2024

Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia.
CoRR, 2024

Opening A Pandora's Box: Things You Should Know in the Era of Custom GPTs.
CoRR, 2024

Threat Behavior Textual Search by Attention Graph Isomorphism.
Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics, 2024

Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Make Them Spill the Beans! Coercive Knowledge Extraction from (Production) LLMs.
CoRR, 2023

Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift.
CoRR, 2023

ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP.
CoRR, 2023

Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving.
CoRR, 2023

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering.
CoRR, 2023

Hard-label Black-box Universal Adversarial Patch Attack.
Proceedings of the 32nd USENIX Security Symposium, 2023

PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023

ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Django: Detecting Trojans in Object Detection Models via Gaussian Focus Calibration.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

BIRD: Generalizable Backdoor Detection and Removal for Deep Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World Attacks.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

MEDIC: Remove Model Backdoors via Importance Driven Cloning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Detecting Backdoors in Pre-trained Encoders.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Backdooring Neural Code Search.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Backdoor Vulnerabilities in Normally Trained Deep Learning Models.
CoRR, 2022

DECK: Model Hardening for Defending Pervasive Backdoors.
CoRR, 2022

An Extractive-and-Abstractive Framework for Source Code Summarization.
CoRR, 2022

Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense.
CoRR, 2022

Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Piccolo: Exposing Complex Backdoors in NLP Transformer Models.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

RULER: discriminative and iterative adversarial training for deep neural network fairness.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Code Search based on Context-aware Code Translation.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense.
Proceedings of the International Conference on Machine Learning, 2022

Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches.
Proceedings of the Computer Vision - ECCV 2022, 2022

Bounded Adversarial Attack on Deep Content Features.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Better Trigger Inversion Optimization in Backdoor Scanning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Complex Backdoor Detection by Symmetric Feature Differencing.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Checkpointing and deterministic training for deep learning.
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022

2021
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry.
CoRR, 2021

OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Backdoor Scanning for Deep Neural Networks through K-Arm Optimization.
Proceedings of the 38th International Conference on Machine Learning, 2021

Towards Feature Space Adversarial Attack by Style Perturbation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack.
CoRR, 2020

Towards Feature Space Adversarial Attack.
CoRR, 2020

Correlations between deep neural network model coverage criteria and model quality.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

CPC: automatically classifying and propagating natural language comments via program analysis.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation.
Proc. ACM Program. Lang., 2019

NIC: Detecting Adversarial Samples with Neural Network Invariant Checking.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs.
IEEE Trans. Reliab., 2018

Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Precise Android API Protection Mapping Derivation and Reasoning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2016
User-Specific Rating Prediction for Mobile Applications via Weight-Based Matrix Factorization.
Proceedings of the IEEE International Conference on Web Services, 2016


  Loading...