default search action
Mingfu Xue
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Mingfu Xue, Shifeng Ni, Yinghao Wu, Yushu Zhang, Weiqiang Liu:
Imperceptible and multi-channel backdoor attack. Appl. Intell. 54(11-12): 1099-1116 (2024) - [j33]Mingfu Xue, Jinlong Fu, Zhiyuan Li, Shifeng Ni, Heyi Wu, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
A Reinforcement Learning-Based ELF Adversarial Malicious Sample Generation Method. IEEE J. Emerg. Sel. Topics Circuits Syst. 14(4): 743-757 (2024) - [j32]Mingfu Xue, Xin Wang, Yinghao Wu, Shifeng Ni, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features. IEEE Trans. Artif. Intell. 5(9): 4649-4659 (2024) - [j31]Mingfu Xue, Yinghao Wu, Shifeng Ni, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger. IEEE Trans. Ind. Informatics 20(3): 5004-5013 (2024) - [j30]Yushu Zhang, Zhibin Fu, Shuren Qi, Mingfu Xue, Xiaochun Cao, Yong Xiang:
PS-Net: A Learning Strategy for Accurately Exposing the Professional Photoshop Inpainting. IEEE Trans. Neural Networks Learn. Syst. 35(10): 13874-13886 (2024) - [j29]Mingfu Xue, Yinghao Wu, Leo Yu Zhang, Dujuan Gu, Yushu Zhang, Weiqiang Liu:
SSAT: Active Authorization Control and User's Fingerprint Tracking Framework for DNN IP Protection. ACM Trans. Multim. Comput. Commun. Appl. 20(10): 324:1-324:24 (2024) - [j28]Yushu Zhang, Jiahao Zhu, Mingfu Xue, Xinpeng Zhang, Xiaochun Cao:
Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion. IEEE Trans. Vis. Comput. Graph. 30(8): 5299-5312 (2024) - [c17]Yifan Shang, Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection. ACM TUR-C 2024 - [c16]Linji Zhang, Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
An Imperceptible and Owner-unique Watermarking Method for Graph Neural Networks. ACM TUR-C 2024 - 2023
- [j27]Mingfu Xue, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples. Appl. Intell. 53(6): 7298-7309 (2023) - [j26]Mingfu Xue, Xin Wang, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Compression-resistant backdoor attack against deep neural networks. Appl. Intell. 53(17): 20402-20417 (2023) - [j25]Mingfu Xue, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang, Jian Wang, Weiqiang Liu:
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. IET Comput. Digit. Tech. 17(3-4): 111-126 (2023) - [j24]Mingfu Xue, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detecting backdoor in deep neural networks via intentional adversarial perturbations. Inf. Sci. 634: 564-577 (2023) - [j23]Yushu Zhang, Zhibin Fu, Shuren Qi, Mingfu Xue, Zhongyun Hua, Yong Xiang:
Localization of Inpainting Forgery With Feature Enhancement Network. IEEE Trans. Big Data 9(3): 936-948 (2023) - [j22]Mingfu Xue, Chengxiang Yuan, Can He, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Zhe Liu, Weiqiang Liu:
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks. IEEE Trans. Emerg. Top. Comput. 11(1): 153-169 (2023) - [j21]Mingfu Xue, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. IEEE Trans. Emerg. Top. Comput. 11(3): 664-678 (2023) - [j20]Yushu Zhang, Qing Tan, Shuren Qi, Mingfu Xue:
PRNU-based Image Forgery Localization with Deep Multi-scale Fusion. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 67:1-67:20 (2023) - [j19]Yushu Zhang, Nuo Chen, Shuren Qi, Mingfu Xue, Zhongyun Hua:
Detection of Recolored Image by Texture Features in Chrominance Components. ACM Trans. Multim. Comput. Commun. Appl. 19(3): 121:1-121:23 (2023) - [i18]Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models. CoRR abs/2310.09822 (2023) - 2022
- [j18]Mingfu Xue, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication. Appl. Intell. 52(14): 16497-16511 (2022) - [j17]Mingfu Xue, Can He, Yinghao Wu, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
PTB: Robust physical backdoor attacks against deep neural networks in real world. Comput. Secur. 118: 102726 (2022) - [j16]Mingfu Xue, Yushu Zhang, Jian Wang, Weiqiang Liu:
Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations. IEEE Trans. Artif. Intell. 3(6): 908-923 (2022) - [j15]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models. IEEE Trans. Dependable Secur. Comput. 19(3): 1562-1578 (2022) - [c15]Yinghao Wu, Mingfu Xue, Dujuan Gu, Yushu Zhang, Weiqiang Liu:
Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks. AICAS 2022: 316-319 - [c14]Qing Tan, Shuren Qi, Yushu Zhang, Mingfu Xue:
PRNU-based Image Forgery Localization With Convolutional Neural Network. MMSP 2022: 1-6 - [i17]Mingfu Xue, Xin Wang, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Compression-Resistant Backdoor Attack against Deep Neural Networks. CoRR abs/2201.00672 (2022) - [i16]Mingfu Xue, Shifeng Ni, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks. CoRR abs/2201.13164 (2022) - [i15]Yushu Zhang, Nuo Chen, Shuren Qi, Mingfu Xue, Xiaochun Cao:
Detecting Recolored Image by Spatial Correlation. CoRR abs/2204.10973 (2022) - [i14]Yushu Zhang, Jiahao Zhu, Mingfu Xue, Xinpeng Zhang, Xiaochun Cao:
Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion. CoRR abs/2209.08884 (2022) - [i13]Mingfu Xue, Xin Wang, Yinghao Wu, Shifeng Ni, Yushu Zhang, Weiqiang Liu:
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features. CoRR abs/2210.07481 (2022) - 2021
- [j14]Mingfu Xue, Chengxiang Yuan, Can He, Jian Wang, Weiqiang Liu:
NaturalAE: Natural and robust physical adversarial examples for object detectors. J. Inf. Secur. Appl. 57: 102694 (2021) - [j13]Mingfu Xue, Shichang Sun, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
SocialGuard: An adversarial example based privacy-preserving technique for social images. J. Inf. Secur. Appl. 63: 102993 (2021) - [j12]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems. Peer-to-Peer Netw. Appl. 14(3): 1458-1474 (2021) - [c13]Mingfu Xue, Jian Wang, Weiqiang Liu:
DNN Intellectual Property Protection: Taxonomy, Attacks and Evaluations (Invited Paper). ACM Great Lakes Symposium on VLSI 2021: 455-460 - [c12]Shichang Sun, Haoqi Wang, Mingfu Xue, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks. ISC 2021: 341-357 - [c11]Mingfu Xue, Can He, Shichang Sun, Jian Wang, Weiqiang Liu:
Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. TrustCom 2021: 620-626 - [i12]Mingfu Xue, Shichang Sun, Can He, Yushu Zhang, Jian Wang, Weiqiang Liu:
ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples. CoRR abs/2103.01527 (2021) - [i11]Mingfu Xue, Can He, Shichang Sun, Jian Wang, Weiqiang Liu:
Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. CoRR abs/2104.07395 (2021) - [i10]Shichang Sun, Mingfu Xue, Jian Wang, Weiqiang Liu:
Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images. CoRR abs/2104.09203 (2021) - [i9]Mingfu Xue, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. CoRR abs/2105.13697 (2021) - [i8]Mingfu Xue, Yinghao Wu, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations. CoRR abs/2105.14259 (2021) - [i7]Haoqi Wang, Mingfu Xue, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and remove watermark in deep neural networks via generative adversarial networks. CoRR abs/2106.08104 (2021) - [i6]Mingfu Xue, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Protect the Intellectual Property of Dataset against Unauthorized Use. CoRR abs/2109.07921 (2021) - 2020
- [j11]Mingfu Xue, Chengxiang Yuan, Heyi Wu, Yushu Zhang, Weiqiang Liu:
Machine Learning Security: Threats, Countermeasures, and Evaluations. IEEE Access 8: 74720-74742 (2020) - [j10]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system. Comput. Secur. 99: 102046 (2020) - [j9]Mingfu Xue, Chongyan Gu, Weiqiang Liu, Shichao Yu, Máire O'Neill:
Ten years of hardware Trojans: a survey from the attacker's perspective. IET Comput. Digit. Tech. 14(6): 231-246 (2020) - [j8]Mingfu Xue, Chengxiang Yuan, Jian Wang, Weiqiang Liu:
DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots. Secur. Commun. Networks 2020: 5890820:1-5890820:15 (2020) - [c10]Can He, Mingfu Xue, Jian Wang, Weiqiang Liu:
Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems. ACM TUR-C 2020: 231-235 - [c9]Mingfu Xue, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique. TrustCom 2020: 975-982 - [i5]Mingfu Xue, Shichang Sun, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images. CoRR abs/2011.13560 (2020) - [i4]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations. CoRR abs/2011.13564 (2020) - [i3]Mingfu Xue, Chengxiang Yuan, Can He, Jian Wang, Weiqiang Liu:
Robust and Natural Physical Adversarial Examples for Object Detectors. CoRR abs/2011.13692 (2020) - [i2]Mingfu Xue, Chengxiang Yuan, Can He, Zhiyu Wu, Yushu Zhang, Zhe Liu, Weiqiang Liu:
Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks. CoRR abs/2011.13696 (2020) - [i1]Mingfu Xue, Can He, Zhiyu Wu, Jian Wang, Zhe Liu, Weiqiang Liu:
3D Invisible Cloak. CoRR abs/2011.13705 (2020)
2010 – 2019
- 2019
- [j7]Mingfu Xue, Rongzhen Bian, Weiqiang Liu, Jian Wang:
Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method. IEEE Access 7: 5124-5140 (2019) - [j6]Mingfu Xue, Rongzhen Bian, Jian Wang, Weiqiang Liu:
Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs. IET Comput. Digit. Tech. 13(4): 348-359 (2019) - [j5]Mingfu Xue, Chengxiang Yuan, Zhe Liu, Jian Wang:
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations. Secur. Commun. Networks 2019: 9795621:1-9795621:18 (2019) - [c8]Chengxiang Yuan, Mingfu Xue, Lingling Zhang, Heyi Wu:
Robustness Analysis on Natural Language Processing Based AI Q&A Robots. MLICOM 2019: 695-711 - 2018
- [c7]Rongzhen Bian, Mingfu Xue, Jian Wang:
A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis. ICCCS (4) 2018: 634-646 - [c6]Mingfu Xue, Rongzhen Bian, Jian Wang, Weiqiang Liu:
A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models. TrustCom/BigDataSE 2018: 1452-1457 - [c5]Rongzhen Bian, Mingfu Xue, Jian Wang:
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique. TrustCom/BigDataSE 2018: 1458-1463 - 2017
- [j4]Yueping Yang, Jian Wang, Mingfu Xue:
面向敏感值的层次化多源数据融合隐私保护 (Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value). 计算机科学 44(9): 156-161 (2017) - 2016
- [c4]Mingfu Xue, Jian Wang, Aiqun Hu:
An enhanced classification-based golden chips-free hardware Trojan detection technique. AsianHOST 2016: 1-6 - [c3]Junchao Luan, Jian Wang, Mingfu Xue:
Automated Vulnerability Modeling and Verification for Penetration Testing Using Petri Nets. ICCCS (2) 2016: 71-82 - 2015
- [c2]Mingfu Xue, Jian Wang, Youdong Wang, Aiqun Hu:
Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme. ICCCS 2015: 14-24 - 2014
- [j3]Mingfu Xue, Wei Liu, Aiqun Hu, Youdong Wang:
Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique. IEICE Trans. Inf. Syst. 97-D(3): 606-609 (2014) - [j2]Yi Huang, Aiqun Hu, Yongming Huang, Shengdong Xie, Delai Zhu, Mingfu Xue:
An Integer Time Delay Estimation Algorithm Based on Zadoff-Chu Sequence in OFDM Systems. IEEE Trans. Veh. Technol. 63(6): 2941-2947 (2014) - 2013
- [c1]Mingfu Xue, Aiqun Hu, Yi Huang, Guyue Li:
Monte Carlo Based Test Pattern Generation for Hardware Trojan Detection. DASC 2013: 131-136 - 2012
- [j1]Mingfu Xue, Aiqun Hu, Chunlong He:
Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy. IEICE Trans. Inf. Syst. 95-D(6): 1694-1697 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 01:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint