Shaofeng Li

Orcid: 0000-0002-1491-4319

Affiliations:
  • Southeast University (SEU), Nanjing, China
  • Peng Cheng Laboratory, Shenzhen, China
  • Shanghai Jiao Tong University, Department of Computer Science and Engineering, Shanghai, China


According to our database1, Shaofeng Li authored at least 34 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
BadTime: An Effective Backdoor Attack on Multivariate Long-Term Time Series Forecasting.
CoRR, August, 2025

Depth Gives a False Sense of Privacy: LLM Internal States Inversion.
CoRR, July, 2025

Intriguing Frequency Interpretation of Adversarial Robustness for CNNs and ViTs.
CoRR, June, 2025

The Gradient Puppeteer: Adversarial Domination in Gradient Leakage Attacks through Model Poisoning.
CoRR, February, 2025

Model Inversion in Split Learning for Personalized LLMs: New Insights from Information Bottleneck Theory.
CoRR, January, 2025

The Philosopher's Stone: Trojaning Plugins of Large Language Models.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
Backdoor Attacks against Learning-Based Algorithms
Wireless Networks, Springer, ISBN: 978-3-031-57388-0, 2024

Seeing is not always believing: The Space of Harmless Perturbations.
CoRR, 2024

Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2024

Inferring Activities and Profiles of Users Based on Trajectory Leakage in Mobile Ad Network.
Proceedings of the 20th International Conference on Mobility, Sensing and Networking, 2024

Digital Twin-Assisted Adaptive Preloading for Short Video Streaming.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network.
IEEE Trans. Veh. Technol., August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

Unleashing Cheapfakes through Trojan Plugins of Large Language Models.
CoRR, 2023

Digital Twin-Assisted Adaptive Preloading for Short Video Streaming.
CoRR, 2023

Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Split Federated Learning: Speed up Model Training in Resource-Limited Wireless Networks.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Cluster-HSFL: A Cluster-Based Hybrid Split and Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Privacy Computing with Right to Be Forgotten in Trusted Execution Environment.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Deep Learning Backdoors.
Security and Artificial Intelligence, 2022

Backdoors Against Natural Language Processing: A Review.
IEEE Secur. Priv., 2022

Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.
IEEE Trans. Dependable Secur. Comput., 2021

Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications.
IEEE Internet Things J., 2021

Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks.
CoRR, 2021

BatFL: Backdoor Detection on Federated Learning in e-Health.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Hidden Backdoors in Human-Centric Language Models.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Deep Learning Backdoors.
CoRR, 2020

2019
Invisible Backdoor Attacks Against Deep Neural Networks.
CoRR, 2019


  Loading...