Ee-Chien Chang
National University of Singapore
H-index: 38
Asia-Singapore
Top articles of Ee-Chien Chang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Object Detectors in the Open Environment: Challenges, Solutions, and Outlook | Siyuan Liang Wei Wang Ruoyu Chen Aishan Liu Boxi Wu | 2024/3/24 | |
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers | arXiv preprint arXiv:2403.05448 | Zhiang Li Daisuke Mashima Wen Shei Ong Ertem Esiner Zbigniew Kalbarczyk | 2024/3/8 |
Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs | arXiv preprint arXiv:2402.14872 | Xiaoxia Li Siyuan Liang Jiyi Zhang Han Fang Aishan Liu | 2024/2/21 |
VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models | arXiv preprint arXiv:2402.13851 | Jiawei Liang Siyuan Liang Man Luo Aishan Liu Dongchen Han | 2024/2/21 |
Domain Bridge: Generative model-based domain forensic for black-box models | arXiv preprint arXiv:2402.04640 | Jiyi Zhang Han Fang Ee-Chien Chang | 2024/2/7 |
Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning | arXiv preprint arXiv:2403.16257 | Siyuan Liang Kuanrong Liu Jiajun Gong Jiawei Liang Yuan Xun | 2024/3/24 |
Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions | Proceedings of the AAAI conference on artificial intelligence | Han Fang Yupeng Qiu Kejiang Chen Jiyi Zhang Weiming Zhang | 2023/6/26 |
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers | Jiyi Zhang Han Fang Wesley Joon-Wie Tann Ke Xu Chengfang Fang | 2023/7/10 | |
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication | Jianli Bai Xiangfu Song Xiaowu Zhang Qifan Wang Shujie Cui | 2023/12/4 | |
Secret-Shared Shuffle with Malicious Security | Cryptology ePrint Archive | Xiangfu Song Dong Yin Jianli Bai Changyu Dong Ee-Chien Chang | 2023 |
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks | arXiv preprint arXiv:2306.01400 | Jiyi Zhang Han Fang Ee-Chien Chang | 2023/6/2 |
An open-source framework for publishing/subscribing IEC 61850 R-GOOSE and R-SV | SoftwareX | Suhail SM Hussain Chen Yaohao Muhammad M Roomi Daisuke Mashima Ee-Chien Chang | 2023/7/1 |
Badclip: Dual-embedding guided backdoor attack on multimodal contrastive learning | arXiv preprint arXiv:2311.12075 | Siyuan Liang Mingli Zhu Aishan Liu Baoyuan Wu Xiaochun Cao | 2023/11/20 |
Tracing the origin of adversarial attack for forensic investigation and deterrence | Han Fang Jiyi Zhang Yupeng Qiu Jiayang Liu Ke Xu | 2023 | |
Reducing Paging and Exit Overheads in Intel SGX for Oblivious Conjunctive Keyword Search | IEEE Transactions on Computers | Qin Jiang Saiyu Qi Xu Yang Yong Qi Jianfeng Wang | 2023/6/1 |
Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training | Daisuke Mashima Muhammad M Roomi Bennet Ng Zbigniew Kalberczyk SM Suhail Hussain | 2023/6/27 | |
Improving Adversarial Transferability by Stable Diffusion | arXiv preprint arXiv:2311.11017 | Jiayang Liu Siyu Zhu Siyuan Liang Jie Zhang Han Fang | 2023/11/18 |
Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation | arXiv preprint arXiv:2305.05869 | Jiyi Zhang Han Fang Hwee Kuan Lee Ee-Chien Chang | 2023/5/10 |
Poisoning Online Learning Filters by Shifting on the Move | Wesley Joon-Wie Tann Ee-Chien Chang | 2023/6/27 | |
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness | Han Fang Kejiang Chen Yupeng Qiu Jiayang Liu Ke Xu | 2023/10/26 |