Shangwei Guo

Orcid: 0000-0002-6443-5308

According to our database1, Shangwei Guo authored at least 65 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Efficient Preprocessing-Based Approach to Mitigate Advanced Adversarial Attacks.
IEEE Trans. Computers, March, 2024

TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability.
CoRR, 2024

2023
A novel noise-robustness and rotation-invariant LADAR point cloud target classification method.
Eng. Appl. Artif. Intell., November, 2023

EHNQ: Subjective and Objective Quality Evaluation of Enhanced Night-Time Images.
IEEE Trans. Circuits Syst. Video Technol., September, 2023

Automatic Transformation Search Against Deep Leakage From Gradients.
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023

Towards Query-Efficient Black-Box Attacks: A Universal Dual Transferability-Based Framework.
ACM Trans. Intell. Syst. Technol., August, 2023

Secure Decentralized Image Classification With Multiparty Homomorphic Encryption.
IEEE Trans. Circuits Syst. Video Technol., July, 2023

Efficient Top-k Matching for Publish/Subscribe Ride Hitching.
IEEE Trans. Knowl. Data Eng., April, 2023

BMIF: Privacy-preserving Blockchain-based Medical Image Fusion.
ACM Trans. Multim. Comput. Commun. Appl., February, 2023

Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding.
IEEE Trans. Inf. Forensics Secur., 2023

Rethinking Adversarial Training with Neural Tangent Kernel.
CoRR, 2023

Towards the Vulnerability of Watermarking Artificial Intelligence Generated Content.
CoRR, 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023

Smaller Is Bigger: Rethinking the Embedding Rate of Deep Hiding.
CoRR, 2023

Contrastive Fusion Representation: Mitigating Adversarial Attacks on VQA Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Extracting Robust Models with Uncertain Examples.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

MERCURY: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator.
Proceedings of the International Conference on Field Programmable Technology, 2023

Text Classification via Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

2022
ELAA: An efficient local adversarial attack using model interpreters.
Int. J. Intell. Syst., December, 2022

EGM: An Efficient Generative Model for Unrestricted Adversarial Examples.
ACM Trans. Sens. Networks, November, 2022

Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data.
IEEE Trans. Serv. Comput., 2022

Ownership Verification of DNN Architectures via Hardware Cache Side Channels.
IEEE Trans. Circuits Syst. Video Technol., 2022

Byzantine-Resilient Decentralized Stochastic Gradient Descent.
IEEE Trans. Circuits Syst. Video Technol., 2022

Topology-Aware Differential Privacy for Decentralized Image Classification.
IEEE Trans. Circuits Syst. Video Technol., 2022

DPG-Net: Densely progressive-growing network for point cloud completion.
Neurocomputing, 2022

CTpoint: A novel local and global features extractor for point cloud.
Neurocomputing, 2022

Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption.
CoRR, 2022

CompleteDT: Point Cloud Completion with Dense Augment Inference Transformers.
CoRR, 2022

Threats to Pre-trained Language Models: Survey and Taxonomy.
CoRR, 2022

Triggerless Backdoor Attack for NLP Tasks with Clean Labels.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

Text's Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

A Blockchain-Based Mutual Authentication Protocol for Smart Home.
Proceedings of the Information Security - 25th International Conference, 2022

NASPY: Automated Extraction of Automated Machine Learning Models.
Proceedings of the Tenth International Conference on Learning Representations, 2022

BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models.
Proceedings of the Tenth International Conference on Learning Representations, 2022

2021
Onboard Real-Time Dense Reconstruction in Large Terrain Scene Using Embedded UAV Platform.
Remote. Sens., 2021

Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey.
CoRR, 2021

Protecting Your NLG Models with Semantic and Robust Watermarks.
CoRR, 2021

CT-block: a novel local and global features extractor for point cloud.
CoRR, 2021

Triggerless Backdoor Attack for NLP Tasks with Clean Labels.
CoRR, 2021

A Stealthy and Robust Fingerprinting Scheme for Generative Models.
CoRR, 2021

PEEL: A Provable Removal Attack on Deep Hiding.
CoRR, 2021

When NAS Meets Watermarking: Ownership Verification of DNN Models via Cache Side Channels.
CoRR, 2021

Local Black-box Adversarial Attacks: A Query Efficient Approach.
CoRR, 2021

PRNet: A Progressive Recovery Network for Revealing Perceptually Encrypted Images.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Privacy-Preserving Collaborative Learning With Automatic Transformation Search.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Temporal Watermarks for Deep Reinforcement Learning Models.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

Stealing Deep Reinforcement Learning Models for Fun and Profit.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Blind Night-Time Image Quality Assessment: Subjective and Objective Approaches.
IEEE Trans. Multim., 2020

PEID: A Perceptually Encrypted Image Database for Visual Security Evaluation.
IEEE Trans. Inf. Forensics Secur., 2020

Visual Security Evaluation of Perceptually Encrypted Images Based on Image Importance.
IEEE Trans. Circuits Syst. Video Technol., 2020

SensIR: Towards privacy-sensitive image retrieval in the cloud.
Signal Process. Image Commun., 2020

The Hidden Vulnerability of Watermarking for Deep Neural Networks.
CoRR, 2020

Differentially Private Decentralized Learning.
CoRR, 2020

vCBIR: A Verifiable Search Engine for Content-Based Image Retrieval.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

2019
Towards efficient privacy-preserving face recognition in the cloud.
Signal Process., 2019

ImageProof: Enabling Authentication for Large-Scale Image Retrieval.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

2018
Efficient biometric identity-based encryption.
Inf. Sci., 2018

2017
Image quality assessment based on multiscale fuzzy gradient similarity deviation.
Soft Comput., 2017

Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding.
Int. J. Bifurc. Chaos, 2017

2016
Perceptual Visual Security Index Based on Edge and Texture Similarities.
IEEE Trans. Inf. Forensics Secur., 2016

Processing secure, verifiable and efficient SQL over outsourced database.
Inf. Sci., 2016


  Loading...