Follow
Chang Liu
Chang Liu
Alibaba DAMO Academy
Verified email at alibaba-inc.com - Homepage
Title
Cited by
Cited by
Year
Delving into transferable adversarial examples and black-box attacks
Y Liu, X Chen, C Liu, D Song
arXiv preprint arXiv:1611.02770, 2016
20572016
Targeted backdoor attacks on deep learning systems using data poisoning
X Chen, C Liu, B Li, K Lu, D Song
arXiv preprint arXiv:1712.05526, 2017
19382017
The secret sharer: Evaluating and testing unintended memorization in neural networks
N Carlini, C Liu, Ś Erlingsson, J Kos, D Song
28th USENIX security symposium (USENIX security 19), 267-284, 2019
11812019
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning
M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li
2018 IEEE symposium on security and privacy (SP), 19-35, 2018
10072018
Neural network-based graph embedding for cross-platform binary code similarity detection
X Xu, C Liu, Q Feng, H Yin, L Song, D Song
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
7372017
ObliVM: A Programming Framework for Secure Computation
C Liu, XS Wang, K Nayak, Y Huang, E Shi
IEEE Symposium on Security and Privacy (S & P), 2015
4542015
Sqlnet: Generating structured queries from natural language without reinforcement learning
X Xu, C Liu, D Song
arXiv preprint arXiv:1711.04436, 2017
4372017
Tree-to-tree neural networks for program translation
X Chen, C Liu, D Song
Advances in neural information processing systems 31, 2018
3092018
Oblivious data structures
XS Wang, K Nayak, C Liu, THH Chan, E Shi, E Stefanov, Y Huang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2702014
The secret sharer: Measuring unintended neural network memorization & extracting secrets
N Carlini, C Liu, J Kos, Ś Erlingsson, D Song
arXiv preprint arXiv:1802.08232 5, 2018
2272018
Ghostrider: A hardware-software system for memory trace oblivious computation
C Liu, A Harris, M Maas, M Hicks, M Tiwari, E Shi
ACM SIGPLAN Notices 50 (4), 87-101, 2015
2062015
Curriculum adversarial training
QZ Cai, M Du, C Liu, D Song
arXiv preprint arXiv:1805.04807, 2018
1932018
Execution-guided neural program synthesis
X Chen, C Liu, D Song
International Conference on Learning Representations, 2018
1582018
Lifelong anomaly detection through unlearning
M Du, Z Chen, C Liu, R Oak, D Song
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1482019
Deepsniffer: A dnn model extraction framework based on learning architectural hints
X Hu, L Liang, S Li, L Deng, P Zuo, Y Ji, X Xie, Y Ding, C Liu, T Sherwood, ...
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
1442020
Automating efficient RAM-model secure computation
C Liu, Y Huang, E Shi, J Katz, M Hicks
2014 IEEE Symposium on Security and Privacy, 623-638, 2014
1402014
Robust linear regression against training data poisoning
C Liu, B Li, Y Vorobeychik, A Oprea
Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017
1262017
Latent attention for if-then program synthesis
C Liu, X Chen, EC Shin, M Chen, D Song
Advances in Neural Information Processing Systems 29, 2016
1072016
Memory trace oblivious program execution
C Liu, M Hicks, E Shi
2013 IEEE 26th Computer Security Foundations Symposium, 51-65, 2013
882013
Fooling vision and language models despite localization and attention mechanism
X Xu, X Chen, C Liu, A Rohrbach, T Darrell, D Song
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
852018
The system can't perform the operation now. Try again later.
Articles 1–20