What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jinyuan Jia
Google Scholar
ORCID:
0000-0002-9785-7769
31
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks.
Yupei Liu
Yuqi Jia
Jinyuan Jia
Dawn Song
Neil Zhenqiang Gong
2025
conf/uss
Provably Robust Multi-bit Watermarking for AI-generated Text.
Wenjie Qu
Wengrui Zheng
Tianyang Tao
Dong Yin
Yanze Jiang
Zhihua Tian
Wei Zou
Jinyuan Jia
Jiaheng Zhang
2025
conf/uss
Evaluating LLM-based Personal Information Extraction and Countermeasures.
Yupei Liu
Yuqi Jia
Jinyuan Jia
Neil Zhenqiang Gong
2025
conf/uss
TracLLM: A Generic Framework for Attributing Long Context LLMs.
Yanting Wang
Wei Zou
Runpeng Geng
Jinyuan Jia
2025
conf/uss
PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models.
Wei Zou
Runpeng Geng
Binghui Wang
Jinyuan Jia
2024
conf/ccs
Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses.
Yuxin Yang
Qiang Li
Jinyuan Jia
Yuan Hong
Binghui Wang
2024
conf/uss
ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning.
Zhangchen Xu
Fengqing Jiang
Luyao Niu
Jinyuan Jia
Bo Li
Radha Poovendran
2024
conf/uss
Formalizing and Benchmarking Prompt Injection Attacks and Defenses.
Yupei Liu
Yuqi Jia
Runpeng Geng
Jinyuan Jia
Neil Zhenqiang Gong
2024
conf/sp
Pre-trained Encoders in Self-Supervised Learning Improve Secure and Privacy-preserving Supervised Learning.
Hongbin Liu
Wenjie Qu
Jinyuan Jia
Neil Zhenqiang Gong
2024
conf/sp
FCert: Certifiably Robust Few-Shot Classification in the Era of Foundation Models.
Yanting Wang
Wei Zou
Jinyuan Jia
2024
conf/asiaccs
Poster: Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning.
Zhangchen Xu
Fengqing Jiang
Luyao Niu
Jinyuan Jia
Radha Poovendran
2024
conf/asiaccs
POSTER: Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications.
Fengqing Jiang
Zhangchen Xu
Luyao Niu
Boxin Wang
Jinyuan Jia
Bo Li
Radha Poovendran
2024
conf/ndss
TextGuard: Provable Defense against Backdoor Attacks on Text Classification.
Hengzhi Pei
Jinyuan Jia
Wenbo Guo
Bo Li
Dawn Song
2023
conf/uss
PORE: Provably Robust Recommender Systems against Data Poisoning Attacks.
Jinyuan Jia
Yupei Liu
Yuepeng Hu
Neil Zhenqiang Gong
2023
conf/sp
FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information.
Xiaoyu Cao
Jinyuan Jia
Zaixi Zhang
Neil Zhenqiang Gong
2023
conf/ndss
REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service.
Wenjie Qu
Jinyuan Jia
Neil Zhenqiang Gong
2022
journals/tifs
FLCert: Provably Secure Federated Learning Against Poisoning Attacks.
Xiaoyu Cao
Zaixi Zhang
Jinyuan Jia
Neil Zhenqiang Gong
2022
conf/ccs
StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning.
Yupei Liu
Jinyuan Jia
Hongbin Liu
Neil Zhenqiang Gong
2022
conf/uss
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.
Yongji Wu
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
2022
conf/uss
PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning.
Hongbin Liu
Jinyuan Jia
Neil Zhenqiang Gong
2022
conf/sp
BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.
Jinyuan Jia
Yupei Liu
Neil Zhenqiang Gong
2021
conf/ccs
EncoderMI: Membership Inference against Pre-trained Encoders in Contrastive Learning.
Hongbin Liu
Jinyuan Jia
Wenjie Qu
Neil Zhenqiang Gong
2021
conf/uss
Stealing Links from Graph Neural Networks.
Xinlei He
Jinyuan Jia
Michael Backes
Neil Zhenqiang Gong
Yang Zhang
2021
conf/uss
Data Poisoning Attacks to Local Differential Privacy Protocols.
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
2021
conf/asiaccs
Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes.
Jinyuan Jia
Binghui Wang
Neil Zhenqiang Gong
2021
conf/asiaccs
IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary.
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
2020
conf/uss
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.
Minghong Fang
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
2019
conf/ccs
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
Jinyuan Jia
Ahmed Salem
Michael Backes
Yang Zhang
Neil Zhenqiang Gong
2019
conf/ndss
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation.
Binghui Wang
Jinyuan Jia
Neil Zhenqiang Gong
2018
conf/uss
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.
Jinyuan Jia
Neil Zhenqiang Gong
2017
conf/dsn
Random Walk Based Fake Account Detection in Online Social Networks.
Jinyuan Jia
Binghui Wang
Neil Zhenqiang Gong
Coauthors
Ahmed Salem
(1)
Binghui Wang
(5)
Bo Li
(3)
Boxin Wang
(1)
Dawn Song
(2)
Dong Yin
(1)
Fengqing Jiang
(3)
Hengzhi Pei
(1)
Hongbin Liu
(4)
Jiaheng Zhang
(1)
Jinyuan Jia
(31)
Luyao Niu
(3)
Michael Backes
(2)
Minghong Fang
(1)
Neil Zhenqiang Gong
(22)
Qiang Li
(1)
Radha Poovendran
(3)
Runpeng Geng
(3)
Tianyang Tao
(1)
Wei Zou
(4)
Wenbo Guo
(1)
Wengrui Zheng
(1)
Wenjie Qu
(4)
Xiaoyu Cao
(6)
Xinlei He
(1)
Yang Zhang
(2)
Yanting Wang
(2)
Yanze Jiang
(1)
Yongji Wu
(1)
Yuan Hong
(1)
Yuepeng Hu
(1)
Yupei Liu
(6)
Yuqi Jia
(3)
Yuxin Yang
(1)
Zaixi Zhang
(2)
Zhangchen Xu
(3)
Zhihua Tian
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to