Xinjing Liu

Orcid: 0000-0003-0159-0594

According to our database1, Xinjing Liu authored at least 14 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
S-Teapot: Swift and Efficient Defense Against Patch-Based Backdoor Attack.
IEEE Trans. Dependable Secur. Comput., 2025

MarkErase: Defeating Entangled Watermarks in Model Extraction Attacks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2025

L-HAWK: A Controllable Physical Adversarial Patch Against a Long-Distance Target.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

SafeLead: Detecting and Excluding Random STS Attack in UWB Ranging System.
Proceedings of the IEEE INFOCOM 2025, 2025

Multimodal Aspect-Based Sentiment Analysis under Conditional Relation.
Proceedings of the 31st International Conference on Computational Linguistics, 2025

2024
Model Stealing Detection for IoT Services Based on Multidimensional Features.
IEEE Internet Things J., December, 2024

RPAU: Fooling the Eyes of UAVs via Physical Adversarial Patches.
IEEE Trans. Intell. Transp. Syst., March, 2024

Mitigate noisy data for smart IoT via GAN based machine unlearning.
Sci. China Inf. Sci., 2024

Need for Speed: Taming Backdoor Attacks with Speed and Precision.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Updates Leakage Attack Against Private Graph Split Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024

2023
DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer.
IEEE Trans. Dependable Secur. Comput., 2023

Sniffer: A Novel Model Type Detection System against Machine-Learning-as-a-Service Platforms.
Proc. VLDB Endow., 2023

2022
SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection.
Proceedings of the Computer Security - ESORICS 2022, 2022

2011
A matching-improved reparation method for incomplete fingerprint.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011


  Loading...