Zheng Li
Zheng Li
CISPA Helmholtz Center for Information Security.
Verified email at - Homepage
Cited by
Cited by
Membership Leakage in Label-Only Exposures
Z Li, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2021
How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN
Z Li, C Hu, Y Zhang, S Guo
Annual Computer Security Applications Conference (ACSAC), 2019
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models
Z Sha, Z Li, N Yu, Y Zhang
arXiv preprint arXiv:2210.06998, 2022
Membership Inference Attacks Against Text-to-image Generation Models
Y Wu, N Yu, Z Li, M Backes, Y Zhang
arXiv preprint arXiv:2210.00968, 2022
NOTABLE: Transferable backdoor attacks against prompt-based NLP models
K Mei, Z Li, Z Wang, Y Zhang, S Ma
arXiv preprint arXiv:2305.17826, 2023
Data Poisoning Attacks Against Multimodal Encoders
Z Yang, X He, Z Li, M Backes, M Humbert, P Berrang, Y Zhang
International Conference on Machine Learning, 39299-39313, 2023
Auditing Membership Leakages of Multi-Exit Networks
Z Li, Y Liu, X He, N Yu, M Backes, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022
Membership-doctor: Comprehensive assessment of membership inference against machine learning models
X He, Z Li, W Xu, C Cornelius, Y Zhang
arXiv preprint arXiv:2208.10445, 2022
UnGANable: Defending Against GAN-based Face Manipulation
Z Li, N Yu, A Salem, M Backes, M Fritz, Y Zhang
USENIX Security Symposium, 2023
Backdoor Attacks Against Dataset Distillation
Y Liu, Z Li, M Backes, Y Shen, Y Zhang
Annual Network and Distributed System Security Symposium (NDSS), 2023
Backdoor attacks in the supply chain of masked image modeling
X Shen, X He, Z Li, Y Shen, M Backes, Y Zhang
DeepKeyStego: Protecting Communication by Key-dependent Steganography with Deep Networks
Z Li, G Han, S Guo, C Hu
IEEE International Conference on High Performance Computing and …, 2019
FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks
G Han, Z Li, P Tang, C Hu, S Guo
2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th …, 2022
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
B Zhang, Z Li, Z Yang, X He, M Backes, M Fritz, Y Zhang
USENIX Security Symposium, 2024
The system can't perform the operation now. Try again later.
Articles 1–14