Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 2236–2250https://doi.org/10.1145/3658644.3670392With ChatGPT under the spotlight, utilizing large language models (LLMs) to assist academic writing has drawn a significant amount of debate in the community. In this paper, we aim to present a comprehensive study of the detectability of ChatGPT-...
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 3346–3360https://doi.org/10.1145/3658644.3670382Face recognition systems have been targeted by recent physical adversarial machine learning attacks, which attach or project visible patterns on adversaries' faces to trick backend FR models. While these attacks have demonstrated effectiveness in the ...
- ArticleSeptember 2024
Companion Apps or Backdoors? On the Security of Automotive Companion Apps
AbstractAutomotive companion apps are mobile apps designed to remotely connect with cars to provide features such as diagnostics, logging, navigation, and safety alerts. Specifically, onboard diagnostics (OBD) based mobile applications directly ...
- ArticleSeptember 2024
The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking
AbstractGenerative AI models can produce high-quality images based on text prompts. The generated images often appear indistinguishable from images generated by conventional optical photography devices or created by human artists (i.e., real images). ...
- research-articleOctober 2024
Multi-Layer Dense Attention Decoder for Polyp Segmentation
ICBET '24: Proceedings of the 2024 14th International Conference on Biomedical Engineering and TechnologyPages 115–120https://doi.org/10.1145/3678935.3678955Detecting and segmenting polyps is crucial for expediting the diagnosis of colon cancer. This is a challenging task due to the large variations of polyps in color, texture, and lighting conditions, along with subtle differences between the polyp and its ...
-
- research-articleFebruary 2024
Research on a high-performance domestic intelligent cockpit interaction platform
CECCT '23: Proceedings of the 2023 International Conference on Electronics, Computers and Communication TechnologyPages 60–65https://doi.org/10.1145/3637494.3637505With the continuous development of intelligent and networked processes in the automotive industry, consumers' understanding of cars has gradually changed from a means of transportation to a third space connecting home and office. Due to the scattered ...
- posterNovember 2023
Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3558–3560https://doi.org/10.1145/3576915.3624378Ethics is an important criterion for security research. This work presents the current status and trends that security researchers have taken to address ethical concerns in their studies from a data perspective. In particular, we created a dataset of 3,...
- research-articleAugust 2023
Preassigned-time projective synchronization of delayed fully quaternion-valued discontinuous neural networks with parameter uncertainties
Neural Networks (NENE), Volume 165, Issue CPages 740–754https://doi.org/10.1016/j.neunet.2023.06.017AbstractThis paper concerns with the preassigned-time projective synchronization issue for delayed fully quaternion-valued discontinuous neural networks involving parameter uncertainties through the non-separation method. Above all, based on the existing ...
- short-paperMay 2023
Poster Abstract: SmartAppZoo: a Repository of SmartThings Apps for IoT Benchmarking
IoTDI '23: Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and ImplementationPages 448–449https://doi.org/10.1145/3576842.3589162A well-organized SmartApps dataset provides a valuable resource for researchers to evaluate their work on smart home automation systems. The IoTBench dataset created by Celik et al. 1 is a significant contribution to the IoT research community [1]. ...
- research-articleJanuary 2023
Siamese Graph Learning for Semi-Supervised Age Estimation
IEEE Transactions on Multimedia (TOM), Volume 25Pages 9586–9596https://doi.org/10.1109/TMM.2023.3256065In this paper, we propose a Siamese graph learning (SGL) approach to alleviate aging dataset bias. While numerous semi-supervised algorithms have been successfully applied to classification tasks, most of them assume that both the labeled and unlabeled ...
- research-articleNovember 2022
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 2129–2143https://doi.org/10.1145/3548606.3560678The wide adoption of deep neural networks (DNNs) in real-world applications raises increasing security concerns. Neural Trojans embedded in pre-trained neural networks are a harmful attack against the DNN model supply chain. They generate false outputs ...
- research-articleNovember 2022
Generative Memory-Guided Semantic Reasoning Model for Image Inpainting
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 32, Issue 11Pages 7432–7447https://doi.org/10.1109/TCSVT.2022.3188169The critical challenge of single image inpainting stems from accurate semantic inference via limited information while maintaining image quality. Typical methods for semantic image inpainting train an encoder-decoder network by learning a one-to-one ...
- research-articleOctober 2022
Learning Generalizable Latent Representations for Novel Degradations in Super-Resolution
MM '22: Proceedings of the 30th ACM International Conference on MultimediaPages 1797–1807https://doi.org/10.1145/3503161.3548276Typical methods for blind image super-resolution (SR) focus on dealing with unknown degradations by directly estimating them or learning the degradation representations in a latent space. A potential limitation of these methods is that they assume the ...
- research-articleOctober 2022
Preassigned-Time Synchronization of Delayed Fuzzy Cellular Neural Networks with Discontinuous Activations
Neural Processing Letters (NPLE), Volume 54, Issue 5Pages 4265–4296https://doi.org/10.1007/s11063-022-10808-7AbstractIn this paper, the problem of the preassigned-time synchronization is studied for a class of delayed fuzzy cellular neural networks with discontinuous activations via preassigned-time control. Above all, with the help of the existing classical ...
- ArticleSeptember 2022
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps
AbstractThe growth of IoT apps poses increasing concerns about sensitive data leaks. While privacy policies are required to describe how IoT apps use private user data (i.e., data practice), problems such as missing, inaccurate, and inconsistent policies ...
- ArticleSeptember 2022
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems
AbstractWith the growing popularity of artificial intelligence (AI) and machine learning (ML), a wide spectrum of attacks against deep learning (DL) models have been proposed in the literature. Both the evasion attacks and the poisoning attacks attempt to ...
- research-articleJuly 2022
Interpreting Adversarial Examples and Robustness for Deep Learning-Based Auto-Driving Systems
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 23, Issue 7Pages 9755–9764https://doi.org/10.1109/TITS.2021.3108520Deep learning-based auto-driving systems are vulnerable to adversarial examples attacks which may result in wrong decision making and accidents. An adversarial example can fool the well trained neural networks by adding barely imperceptible perturbations ...
μAFL: non-intrusive feedback-driven fuzzing for microcontroller firmware
ICSE '22: Proceedings of the 44th International Conference on Software EngineeringPages 1–12https://doi.org/10.1145/3510003.3510208Fuzzing is one of the most effective approaches to finding software flaws. However, applying it to microcontroller firmware incurs many challenges. For example, rehosting-based solutions cannot accurately model peripheral behaviors and thus cannot be ...
- research-articleDecember 2021
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency
ACSAC '21: Proceedings of the 37th Annual Computer Security Applications ConferencePages 31–44https://doi.org/10.1145/3485832.3485904In the evasion attacks against deep neural networks (DNN), the attacker generates adversarial instances that are visually indistinguishable from benign samples and sends them to the target DNN to trigger misclassifications. In this paper, we propose a ...
- research-articleNovember 2021
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild
- Bingyu Li,
- Jingqiang Lin,
- Fengjun Li,
- Qiongxiao Wang,
- Wei Wang,
- Qi Li,
- Guangshen Cheng,
- Jiwu Jing,
- Congli Wang
IEEE/ACM Transactions on Networking (TON), Volume 30, Issue 2Pages 749–765https://doi.org/10.1109/TNET.2021.3123507To detect fraudulent TLS server certificates and improve the accountability of certification authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly-visible logs, from which the monitors fetch all certificates and ...