What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Bo Li
Google Scholar
31
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Provably Unlearnable Data Examples.
Derui Wang
Minhui Xue
Bo Li
Seyit Camtepe
Liming Zhu
2025
conf/uss
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization.
Derui Wang
Kristen Moore
Diksha Goel
Minjune Kim
Gang Li
Yang Li
Robin Doss
Minhui Xue
Bo Li
Seyit Camtepe
Liming Zhu
2024
conf/ccs
LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis.
Bo Li
Wenyuan Xu
Jieshan Chen
Yang Zhang
Minhui Xue
Shuo Wang
Guangdong Bai
Xingliang Yuan
2024
conf/ccs
KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data.
Andy Zhou
Xiaojun Xu
Ramesh Raghunathan
Alok Lal
Xinze Guan
Bin Yu
Bo Li
2024
conf/uss
ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning.
Zhangchen Xu
Fengqing Jiang
Luyao Niu
Jinyuan Jia
Bo Li
Radha Poovendran
2024
conf/sp
SoK: Privacy-Preserving Data Synthesis.
Yuzheng Hu
Fan Wu
Qinbin Li
Yunhui Long
Gonzalo Munilla Garrido
Chang Ge
Bolin Ding
David A. Forsyth
Bo Li
Dawn Song
2024
conf/asiaccs
POSTER: Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors.
Dinuka Sahabandu
Xiaojun Xu
Arezoo Rajabi
Luyao Niu
Bhaskar Ramasubramanian
Bo Li
Radha Poovendran
2024
conf/asiaccs
POSTER: Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications.
Fengqing Jiang
Zhangchen Xu
Luyao Niu
Boxin Wang
Jinyuan Jia
Bo Li
Radha Poovendran
2024
conf/ndss
TextGuard: Provable Defense against Backdoor Attacks on Text Classification.
Hengzhi Pei
Jinyuan Jia
Wenbo Guo
Bo Li
Dawn Song
2023
journals/istr
Constructing gene features for robust 3D mesh zero-watermarking.
Jung-San Lee
Ying-Chin Chen
Chit-Jie Chew
Wei-Che Hung
Yun-Yi Fan
Bo Li
2023
conf/ccs
Unraveling the Connections between Privacy and Certified Robustness in Federated Learning Against Poisoning Attacks.
Chulin Xie
Yunhui Long
Pin-Yu Chen
Qinbin Li
Sanmi Koyejo
Bo Li
2023
conf/uss
DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing.
Jiawei Zhang
Zhongzhu Chen
Huan Zhang
Chaowei Xiao
Bo Li
2023
conf/uss
How to Cover up Anomalous Accesses to Electronic Health Records.
Xiaojun Xu
Qingying Hao
Zhuolin Yang
Bo Li
David M. Liebovitz
Gang Wang
Carl A. Gunter
2023
conf/sp
SoK: Certified Robustness for Deep Neural Networks.
Linyi Li
Tao Xie
Bo Li
2023
conf/sp
RAB: Provable Robustness Against Backdoor Attacks.
Maurice Weber
Xiaojun Xu
Bojan Karlas
Ce Zhang
Bo Li
2022
conf/sp
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models.
Jialuo Chen
Jingyi Wang
Tinglan Peng
Youcheng Sun
Peng Cheng
Shouling Ji
Xingjun Ma
Bo Li
Dawn Song
2022
conf/sp
LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis.
Fan Wu
Yunhui Long
Ce Zhang
Bo Li
2021
conf/ccs
TSS: Transformation-Specific Smoothing for Robustness Certification.
Linyi Li
Maurice Weber
Xiaojun Xu
Luka Rimanic
Bhavya Kailkhura
Tao Xie
Ce Zhang
Bo Li
2021
conf/ccs
DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation.
Boxin Wang
Fan Wu
Yunhui Long
Luka Rimanic
Ce Zhang
Bo Li
2021
conf/sp
Detecting AI Trojans Using Meta Neural Analysis.
Xiaojun Xu
Qi Wang
Huichen Li
Nikita Borisov
Carl A. Gunter
Bo Li
2021
conf/sp
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.
Yulong Cao
Ningfei Wang
Chaowei Xiao
Dawei Yang
Jin Fang
Ruigang Yang
Qi Alfred Chen
Mingyan Liu
Bo Li
2021
conf/asiaccs
REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data.
Xinyun Chen
Wenxiao Wang
Chris Bender
Yiming Ding
Ruoxi Jia
Bo Li
Dawn Song
2020
conf/ccs
Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks.
Shawn Shan
Emily Wenger
Bolun Wang
Bo Li
Haitao Zheng
Ben Y. Zhao
2020
conf/sp
Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.
Zhenkai Zhang
Zihao Zhan
Daniel Balasubramanian
Bo Li
Péter Völgyesi
Xenofon D. Koutsoukos
2019
conf/uss
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
Liang Tong
Bo Li
Chen Hajaj
Chaowei Xiao
Ning Zhang
Yevgeniy Vorobeychik
2019
conf/sp
DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model.
Xiang Ling
Shouling Ji
Jiaxu Zou
Jiannan Wang
Chunming Wu
Bo Li
Ting Wang
2019
conf/ndss
TextBugger: Generating Adversarial Text Against Real-world Applications.
Jinfeng Li
Shouling Ji
Tianyu Du
Bo Li
Ting Wang
2018
journals/compsec
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Sen Chen
Minhui Xue
Lingling Fan
Shuang Hao
Lihua Xu
Haojin Zhu
Bo Li
2018
conf/uss
From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild.
Chaowei Xiao
Armin Sarabi
Yang Liu
Bo Li
Mingyan Liu
Tudor Dumitras
2018
conf/sp
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
Matthew Jagielski
Alina Oprea
Battista Biggio
Chang Liu
Cristina Nita-Rotaru
Bo Li
2017
conf/ccs
Robust Linear Regression Against Training Data Poisoning.
Chang Liu
Bo Li
Yevgeniy Vorobeychik
Alina Oprea
Coauthors
Alina Oprea
(2)
Alok Lal
(1)
Andy Zhou
(1)
Arezoo Rajabi
(1)
Armin Sarabi
(1)
Battista Biggio
(1)
Ben Y. Zhao
(1)
Bhaskar Ramasubramanian
(1)
Bhavya Kailkhura
(1)
Bin Yu
(1)
Bo Li
(31)
Bojan Karlas
(1)
Bolin Ding
(1)
Bolun Wang
(1)
Boxin Wang
(2)
Carl A. Gunter
(2)
Ce Zhang
(4)
Chang Ge
(1)
Chang Liu
(2)
Chaowei Xiao
(4)
Chen Hajaj
(1)
Chit-Jie Chew
(1)
Chris Bender
(1)
Chulin Xie
(1)
Chunming Wu
(1)
Cristina Nita-Rotaru
(1)
Daniel Balasubramanian
(1)
David A. Forsyth
(1)
David M. Liebovitz
(1)
Dawei Yang
(1)
Dawn Song
(4)
Derui Wang
(2)
Diksha Goel
(1)
Dinuka Sahabandu
(1)
Emily Wenger
(1)
Fan Wu
(3)
Fengqing Jiang
(2)
Gang Li
(1)
Gang Wang
(1)
Gonzalo Munilla Garrido
(1)
Guangdong Bai
(1)
Haitao Zheng
(1)
Haojin Zhu
(1)
Hengzhi Pei
(1)
Huan Zhang
(1)
Huichen Li
(1)
Jialuo Chen
(1)
Jiannan Wang
(1)
Jiawei Zhang
(1)
Jiaxu Zou
(1)
Jieshan Chen
(1)
Jin Fang
(1)
Jinfeng Li
(1)
Jingyi Wang
(1)
Jinyuan Jia
(3)
Jung-San Lee
(1)
Kristen Moore
(1)
Liang Tong
(1)
Lihua Xu
(1)
Liming Zhu
(2)
Lingling Fan
(1)
Linyi Li
(2)
Luka Rimanic
(2)
Luyao Niu
(3)
Matthew Jagielski
(1)
Maurice Weber
(2)
Mingyan Liu
(2)
Minhui Xue
(4)
Minjune Kim
(1)
Nikita Borisov
(1)
Ning Zhang
(1)
Ningfei Wang
(1)
Peng Cheng
(1)
Péter Völgyesi
(1)
Pin-Yu Chen
(1)
Qi Alfred Chen
(1)
Qi Wang
(1)
Qinbin Li
(2)
Qingying Hao
(1)
Radha Poovendran
(3)
Ramesh Raghunathan
(1)
Robin Doss
(1)
Ruigang Yang
(1)
Ruoxi Jia
(1)
Sanmi Koyejo
(1)
Sen Chen
(1)
Seyit Camtepe
(2)
Shawn Shan
(1)
Shouling Ji
(3)
Shuang Hao
(1)
Shuo Wang
(1)
Tao Xie
(2)
Tianyu Du
(1)
Ting Wang
(2)
Tinglan Peng
(1)
Tudor Dumitras
(1)
Wei-Che Hung
(1)
Wenbo Guo
(1)
Wenxiao Wang
(1)
Wenyuan Xu
(1)
Xenofon D. Koutsoukos
(1)
Xiang Ling
(1)
Xiaojun Xu
(6)
Xingjun Ma
(1)
Xingliang Yuan
(1)
Xinyun Chen
(1)
Xinze Guan
(1)
Yang Li
(1)
Yang Liu
(1)
Yang Zhang
(1)
Yevgeniy Vorobeychik
(2)
Yiming Ding
(1)
Ying-Chin Chen
(1)
Youcheng Sun
(1)
Yulong Cao
(1)
Yun-Yi Fan
(1)
Yunhui Long
(4)
Yuzheng Hu
(1)
Zhangchen Xu
(2)
Zhenkai Zhang
(1)
Zhongzhu Chen
(1)
Zhuolin Yang
(1)
Zihao Zhan
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to