Follow
Minghui Li
Minghui Li
Verified email at hust.edu.cn
Title
Cited by
Cited by
Year
CReam: A smart contract enabled collusion-resistant e-auction
S Wu, Y Chen, Q Wang, M Li, C Wang, X Luo
IEEE Transactions on Information Forensics and Security 14 (7), 1687-1701, 2018
1012018
Protecting facial privacy: Generating adversarial identity masks via style-robust makeup transfer
S Hu, X Liu, Y Zhang, M Li, LY Zhang, H Jin, L Wu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
672022
Outsourced biometric identification with privacy
S Hu, M Li, Q Wang, SSM Chow, M Du
IEEE Transactions on information forensics and security 13 (10), 2448-2463, 2018
492018
Survive and thrive: A stochastic game for DDoS attacks in bitcoin mining pools
S Wu, Y Chen, M Li, X Luo, Z Liu, L Liu
IEEE/ACM Transactions On Networking 28 (2), 874-887, 2020
462020
Optimizing privacy-preserving outsourced convolutional neural network predictions
M Li, SSM Chow, S Hu, Y Yan, S Chao, Q Wang
IEEE Transactions on Dependable and Secure Computing, 2020
412020
Adversarial examples for automatic speech recognition: Attacks and countermeasures
S Hu, X Shang, Z Qin, M Li, Q Wang, C Wang
IEEE Communications Magazine 57 (10), 120-126, 2019
412019
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum
Y Chen, X Tian, Q Wang, M Li, M Du, Q Li
IEEE Transactions on Mobile Computing 18 (10), 2270-2284, 2018
272018
InstantCryptoGram: Secure image retrieval service
M Li, M Zhang, Q Wang, SSM Chow, M Du, Y Chen, C Lit
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2222-2230, 2018
272018
Advhash: Set-to-set targeted attack on deep hashing with one single adversarial patch
S Hu, Y Zhang, X Liu, LY Zhang, M Li, H Jin
Proceedings of the 29th ACM International Conference on Multimedia, 2335-2343, 2021
262021
Advclip: Downstream-agnostic adversarial examples in multimodal contrastive learning
Z Zhou, S Hu, M Li, H Zhang, Y Zhang, H Jin
Proceedings of the 31st ACM International Conference on Multimedia, 6311-6320, 2023
192023
Detecting backdoors during the inference stage based on corruption robustness consistency
X Liu, M Li, H Wang, S Hu, D Ye, H Jin, L Wu, C Xiao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
162023
SAFE: A general secure and fair auction framework for wireless markets with privacy preservation
Y Chen, X Tian, Q Wang, J Jiang, M Li, Q Zhang
IEEE Transactions on Dependable and Secure Computing 19 (3), 2038-2053, 2020
152020
Secure prediction of neural network in the cloud
M Li, Y Yan, Q Wang, M Du, Z Qin, C Wang
IEEE Network 35 (1), 251-257, 2020
112020
A four-pronged defense against Byzantine attacks in federated learning
W Wan, S Hu, M Li, J Lu, L Zhang, LY Zhang, H Jin
Proceedings of the 31st ACM International Conference on Multimedia, 7394-7402, 2023
72023
Pointcrt: Detecting backdoor in 3d point cloud via corruption robustness
S Hu, W Liu, M Li, Y Zhang, X Liu, X Wang, LY Zhang, J Hou
Proceedings of the 31st ACM International Conference on Multimedia, 666-675, 2023
62023
Pointca: Evaluating the robustness of 3d point cloud completion models against adversarial examples
S Hu, J Zhang, W Liu, J Hou, M Li, LY Zhang, H Jin, L Sun
Proceedings of the AAAI conference on artificial intelligence 37 (1), 872-880, 2023
62023
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Y Zhang, S Hu, LY Zhang, J Shi, M Li, X Liu, H Jin
Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P’24) 2, 2024
52024
Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations
X Wang, S Hu, M Li, Z Yu, Z Zhou, LY Zhang, H Jin
arXiv preprint arXiv:2311.18403, 2023
32023
针对深度学习模型的对抗性攻击与防御
李明慧, 江沛佩, 王骞, 沈超, 李琦
计算机研究与发展 58 (5), 909-926, 2021
32021
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints
M Li, W Wan, J Lu, S Hu, J Shi, LY Zhang, M Zhou, Y Zheng
2022 18th International Conference on Mobility, Sensing and Networking (MSN …, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20