What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xudong Pan
Google Scholar
ORCID:
0000-0003-1394-0395
10
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Neural Dehydration: Effective Erasure of Black-box Watermarks from DNNs with Limited Data.
Yifan Lu
Wenxuan Li
Mi Zhang
Xudong Pan
Min Yang
2024
conf/sp
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting.
Huming Qiu
Junjie Sun
Mi Zhang
Xudong Pan
Min Yang
2023
conf/uss
Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks.
Qifan Xiao
Xudong Pan
Yifan Lu
Mi Zhang
Jiarun Dai
Min Yang
2023
conf/uss
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation.
Yifan Yan
Xudong Pan
Mi Zhang
Min Yang
2022
conf/uss
Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis.
Xudong Pan
Mi Zhang
Yifan Yan
Jiaming Zhu
Zhemin Yang
2022
conf/uss
Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.
Xudong Pan
Mi Zhang
Beina Sheng
Jiaming Zhu
Min Yang
2021
conf/esorics
TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural Networks.
Xudong Pan
Mi Zhang
Yifan Lu
Min Yang
2021
conf/acsac
Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains.
Xudong Pan
Mi Zhang
Yifan Yan
Min Yang
2020
conf/uss
Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent.
Xudong Pan
Mi Zhang
Duocai Wu
Qifan Xiao
Shouling Ji
Min Yang
2020
conf/sp
Privacy Risks of General-Purpose Language Models.
Xudong Pan
Mi Zhang
Shouling Ji
Min Yang
Coauthors
Beina Sheng
(1)
Duocai Wu
(1)
Huming Qiu
(1)
Jiaming Zhu
(2)
Jiarun Dai
(1)
Junjie Sun
(1)
Mi Zhang
(10)
Min Yang
(9)
Qifan Xiao
(2)
Shouling Ji
(2)
Wenxuan Li
(1)
Xudong Pan
(10)
Yifan Lu
(3)
Yifan Yan
(3)
Zhemin Yang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to