Shiqing Ma
Rutgers, The State University of New Jersey
H-index: 29
North America-United States
Top articles of Shiqing Ma
Merlin: Multi-tier Optimization of eBPF Code for Performance and Compactness
2024/4/27
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
arXiv preprint arXiv:2403.17188
2024/3/25
Elijah: Eliminating backdoors injected in diffusion models via distribution shift
Proceedings of the AAAI Conference on Artificial Intelligence
2024/3/24
SoK: Challenges and Opportunities in Federated Unlearning
2024/3/4
Shiqing Ma
H-Index: 17
Amir Houmansadr
H-Index: 28
Where did i come from? origin attribution of ai-generated images
Advances in Neural Information Processing Systems
2024/2/13
Django: Detecting trojans in object detection models via gaussian focus calibration
Advances in Neural Information Processing Systems
2024/2/13
ODSCAN: Backdoor Scanning for Object Detection Models
2024/2/1
CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement
2023/7/12
Juan Zhai
H-Index: 7
Shiqing Ma
H-Index: 17
Chao Shen
H-Index: 9
Yufei Chen
H-Index: 9
Shiwei Wang
H-Index: 2
How to detect unauthorized data usages in text-to-image diffusion models
arXiv preprint arXiv:2307.03108
2023/7/6
Alteration-free and model-agnostic origin attribution of generated images
arXiv preprint arXiv:2305.18439
2023/5/29
NOTABLE: Transferable backdoor attacks against prompt-based NLP models
arXiv preprint arXiv:2305.17826
2023/5/28
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes
2023/5/21
Unicorn: A unified backdoor trigger inversion framework
arXiv preprint arXiv:2304.02786
2023/4/5
Gradient shaping: Enhancing backdoor attack against reverse engineering
arXiv preprint arXiv:2301.12318
2023/1/29
Rui Zhu
H-Index: 3
Guanhong Tao
H-Index: 7
Shiqing Ma
H-Index: 17
Xiaofeng Wang
H-Index: 14
Haixu Tang
H-Index: 37
Beagle: Forensics of deep learning backdoor attack for better defense
arXiv preprint arXiv:2301.06241
2023/1/16
虚假数字人脸内容生成与检测技术
计算机学报
2023
{KENKU}: Towards Efficient and Stealthy Black-box Adversarial Attacks against {ASR} Systems
2023
{AIRTAG}: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts
2023
The case for learned provenance graph storage systems
2023
Detecting backdoors in pre-trained encoders
2023