Follow
Zheng Li
Zheng Li
CISPA Helmholtz Center for Information Security.
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
Membership Leakage in Label-Only Exposures
Z Li, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2021
267*2021
How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN
Z Li, C Hu, Y Zhang, S Guo
Annual Computer Security Applications Conference (ACSAC), 2019
1792019
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models
Z Sha, Z Li, N Yu, Y Zhang
arXiv preprint arXiv:2210.06998, 2022
972022
Membership Inference Attacks Against Text-to-image Generation Models
Y Wu, N Yu, Z Li, M Backes, Y Zhang
arXiv preprint arXiv:2210.00968, 2022
502022
Notable: Transferable backdoor attacks against prompt-based nlp models
K Mei, Z Li, Z Wang, Y Zhang, S Ma
arXiv preprint arXiv:2305.17826, 2023
292023
Data Poisoning Attacks Against Multimodal Encoders
Z Yang, X He, Z Li, M Backes, M Humbert, P Berrang, Y Zhang
International Conference on Machine Learning, 39299-39313, 2023
282023
Auditing Membership Leakages of Multi-Exit Networks
Z Li, Y Liu, X He, N Yu, M Backes, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022
262022
Membership-doctor: Comprehensive assessment of membership inference against machine learning models
X He, Z Li, W Xu, C Cornelius, Y Zhang
arXiv preprint arXiv:2208.10445, 2022
202022
Watermarking diffusion model
Y Liu, Z Li, M Backes, Y Shen, Y Zhang
arXiv preprint arXiv:2305.12502, 2023
172023
UnGANable: Defending Against GAN-based Face Manipulation
Z Li, N Yu, A Salem, M Backes, M Fritz, Y Zhang
USENIX Security Symposium, 2023
162023
Backdoor Attacks Against Dataset Distillation
Y Liu, Z Li, M Backes, Y Shen, Y Zhang
Annual Network and Distributed System Security Symposium (NDSS), 2023
162023
Generative watermarking against unauthorized subject-driven image synthesis
Y Ma, Z Zhao, X He, Z Li, M Backes, Y Zhang
arXiv preprint arXiv:2306.07754, 2023
142023
Backdoor attacks in the supply chain of masked image modeling
X Shen, X He, Z Li, Y Shen, M Backes, Y Zhang
82022
DeepKeyStego: Protecting Communication by Key-dependent Steganography with Deep Networks
Z Li, G Han, S Guo, C Hu
IEEE International Conference on High Performance Computing and …, 2019
42019
FuzzGAN: A generation-based fuzzing framework for testing deep neural networks
G Han, Z Li, P Tang, C Hu, S Guo
2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th …, 2022
22022
Detection and Attribution of Models Trained on Generated Data
G Han, A Salem, Z Li, S Guo, M Backes, Y Zhang
ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and …, 2024
12024
SeqMIA: Sequential-Metric Based Membership Inference Attack
H Li, Z Li, S Wu, C Hu, Y Ye, M Zhang, D Feng, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2024
2024
Inside the Black Box: Detecting Data Leakage in Pre-trained Language Encoders
Y Xin, Z Li, N Yu, D Chen, M Fritz, M Backes, Y Zhang
European Conference on Artificial Intelligence (ECAI), 2024
2024
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
B Zhang, Z Li, Z Yang, X He, M Backes, M Fritz, Y Zhang
USENIX Security Symposium, 2024
2024
A Comprehensive Study of Privacy Risks in Curriculum Learning
JQ Chen, X He, Z Li, Y Zhang, Z Li
arXiv preprint arXiv:2310.10124, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20