Shaofeng Li

Orcid: 0000-0003-4240-3855

According to our database1, Shaofeng Li authored at least 31 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Seeing is not always believing: The Space of Harmless Perturbations.
CoRR, 2024

2023
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network.
IEEE Trans. Veh. Technol., August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

Unleashing Cheapfakes through Trojan Plugins of Large Language Models.
CoRR, 2023

Digital Twin-Assisted Adaptive Preloading for Short Video Streaming.
CoRR, 2023

Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Development, Planning and Control of an Autonomous Mobile Manipulator for Power Substation Live-Maintaining.
Proceedings of the IEEE International Conference on Development and Learning, 2023

Split Federated Learning: Speed up Model Training in Resource-Limited Wireless Networks.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Cluster-HSFL: A Cluster-Based Hybrid Split and Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Privacy Computing with Right to Be Forgotten in Trusted Execution Environment.
Proceedings of the IEEE Global Communications Conference, 2023

A Task Scheduling Algorithm for Micro-cloud Platform Based on Task Real-time.
Proceedings of the 2nd International Conference on Networks, 2023

2022
Deep Learning Backdoors.
Security and Artificial Intelligence, 2022

Backdoors Against Natural Language Processing: A Review.
IEEE Secur. Priv., 2022

Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
HCache: A Hash-based Hybrid Caching Model for Real-Time Streaming Data Analytics.
IEEE Trans. Serv. Comput., 2021

Memory State Verification Based on Inductive and Deductive Reasoning.
IEEE Trans. Reliab., 2021

Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.
IEEE Trans. Dependable Secur. Comput., 2021

Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications.
IEEE Internet Things J., 2021

Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks.
CoRR, 2021

BatFL: Backdoor Detection on Federated Learning in e-Health.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Hidden Backdoors in Human-Centric Language Models.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Deep Learning Backdoors.
CoRR, 2020

2019
Invisible Backdoor Attacks Against Deep Neural Networks.
CoRR, 2019

A Formal Modeling and Verification Framework for Flash Translation Layer Algorithms.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2019

2016
A Semantic-Based Approach to Building Auxiliary System for Screen-Based Reading.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2010
Exploiting rich features for Chinese named entity recognition.
Proceedings of the 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2010

2009
CRF-based Active Learning for Chinese Named Entity Recognition.
Proceedings of the IEEE International Conference on Systems, 2009


  Loading...