2024
MVSF-AB: Accurate Antibody-Antigen Binding Affinity Prediction via Multi-view Sequence Feature Learning
Minghui Li, Yao Shi, Shengqing Hu, Shengshan Hu, Peijin Guo, Wei Wan, Leo Yu Zhang, Shirui Pan, Jizhou Li, Lichao Sun, Xiaoli Lan
Bioinformatics, 2024
ViDTA: Enhanced Drug-Target Affinity Prediction via Virtual Graph Nodes and Attention-based Feature Fusion
Minghui Li, Zikang Guo, Yang Wu, Peijin Guo, Yao Shi, Shengshan Hu, Wei Wan, Shengqing Hu
Proceedings of the 18th Annual Conference on Bioinformatics and Biomedicine (BIBM 2024)
Transferable Adversarial Facial Images for Privacy Protection
Minghui Li, Jiangxiong Wang, Hao Zhang, Ziqi Zhou, Shengshan Hu, Xiaobing Pei
Proceedings of the 32nd ACM International Conference on Multimedia(ACM MM 2024)
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
Xianlong Wang, Minghui Li, Wei Liu, Hangtao Zhang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Hai Jin
Proceedings of the 38th Annual Conference on Neural Information Processing Systems (NeurIPS 2024)
DarkSAM: Fooling Segment Anything Model to Segment Nothing
Ziqi Zhou, Yufei Song, Minghui Li, Shengshan Hu, Xianlong Wang, Leo Yu Zhang, Dezhong Yao, Hai Jin
Proceedings of the 38th Annual Conference on Neural Information Processing Systems (NeurIPS 2024)
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning
Jianrong Lu; Shengshan Hu; Wei Wan; Minghui Li; Leo Yu Zhang; Lulu Xue; Hai Jin
IEEE Transactions on Information Forensics and Security (TIFS 2024)
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan, Hai Jin
Proceedings of the 29th European Symposium on Research in Computer Security (ESORICS 2024)
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness
Hangtao Zhang, Shengshan Hu, Yichen Wang, Leo Yu Zhang, Ziqi Zhou, Xianlong Wang, Yanjun Zhang, Chao Chen
Proceedings of the 33rd International Joint Conference on Artificial Intelligence (IJCAI 2024)
DarkFed: A Data-Free Backdoor Attack in Federated Learning
Minghui Li, Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Leo Yu Zhang, Yichen Wang
Proceedings of the 33rd International Joint Conference on Artificial Intelligence (IJCAI 2024)
PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds
Xianlong Wang, Minghui Li, Peng Xu, Wei Liu, Leo Yu Zhang, Shengshan Hu, Yanjun Zhang
Proceedings of the 29th European Symposium on Research in Computer Security (ESORICS 2024)
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin
Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P 2024)
Revisiting Gradient Pruning: A Dual Realization for Defending Against Gradient Attacks
Lulu Xue, Shengshan Hu, Ruizhi Zhao, Leo Yu Zhang, Shengqing Hu, Lichao Sun, Dezhong Yao
Proceedings of the 38th AAAI Conference on Artificial Intelligence (AAAI 2024)
Enhancing Generalization Robustness of Federated Learning in Highly Heterogeneous Environments
Wei Wan, Shengshan Hu, Jianrong Lu, Minghui Li, Ziqi Zhou, Hai Jin
SCIENTIA SINICA Informationis (2024)
Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification
Longling Zhang, Lyqi Liu, Dan Meng, Jun Wang, Shengshan Hu
Proceedings of the 49th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2024)
MISA: Unveiling The Vulnerabilities in Split Federated Learning
Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin
Proceedings of the 49th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2024)
2023
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
Wei Wan, Shengshan Hu, Minghui Li, Jianrong Lu, Longling Zhang, Leo Yu Zhang, Hai Jin
Proceedings of the 31th ACM International Conference on Multimedia (ACM MM 2023)
PointCRT: Detecting Backdoor in 3D Point Cloud via Corruption Robustness
Shengshan Hu, Wei Liu, Minghui Li, Yechao Zhang, Xiaogeng Liu, Xianlong Wang, Leo Yu Zhang
Proceedings of the 31th ACM International Conference on Multimedia (ACM MM 2023)
AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning
Ziqi Zhou, Shengshan Hu, Minghui Li, Hangtao Zhang, Yechao Zhang, Hai Jin
Proceedings of the 31th ACM International Conference on Multimedia (ACM MM 2023)
Downstream-agnostic Adversarial Examples
Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin
Proceedings of the International Conference on Computer Vision (ICCV 2023)
Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples
Qiufan Ji, Lin Wang, Shengshan Hu, Lichao Sun, Cong Shi, Yingying Chen
Proceedings of the International Conference on Computer Vision (ICCV 2023)
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning
Hangtao Zhang, Zeming Yao, Leo Yu Zhang, Shengshan Hu, Chao Chen, Alan Liew, Zhetao Li
Proceedings of the 32nd International Joint Conference on Artificial Intelligence (IJCAI 2023)
Voice Guard: Protecting Voice Privacy with Strong and Imperceptible Adversarial Perturbation in the Time Domain
Jingyang Li, Dengpan Ye, Long Tang, Chuanxi Chen, Shengshan Hu
Proceedings of the 32nd International Joint Conference on Artificial Intelligence (IJCAI 2023)
Masked Lanquage Model Based Textual Adversarial Example Detection
Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang
Proceedings of the ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2023)
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Xiaogeng Liu, Minghui Li, Haoyu Wang, Shengshan Hu, Dengpan Ye, Hai Jin, Libing Wu, Chaowei Xiao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2023)
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou, Minghui Li, Leo Yu Zhang, Hai Jin, Lichao Sun
Proceedings of the 37th AAAI Conference on Artificial Intelligence (AAAI 2023) (Oral Presentation)
2022
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting
Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang
Proceedings of IEEE International Conference on Multimedia & Expo (ICME 2022)
Towards Privacy-Preserving Neural Architecture Search
Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss
Proceedings of 27th IEEE Symposium on Computers and Communications (ISCC 2022)
Evaluating Membership Inference Through Adversarial Robustness
Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Bilal Hussain Abbasi, Shengshan Hu
The Computer Journal (2022)
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints
Minghui Li, Wei Wan, Jianrong Lu, Shengshan Hu, Junyu Shi, Leo Yu Zhang, Man Zhou, Yifeng Zheng
Proceedings of the 18th International Conference on Mobility, Sensing and Networking (MSN 2022)
Towards efficient data-centric robust machine learning with noise-based augmentation
Xiaogeng Liu, Haoyu Wang, Yechao Zhang, Fangzhou Wu, Shengshan Hu
Proceedings of AAAI 2022 Workshop on Adversarial Machine Learning and Beyond (AAAI-W 2022)
Challenges and approaches for mitigating byzantine attacks in federated learning
Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang
Proceedings of IEEE Trustcom (Trustcom 2022)
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan He, Hai Jin
Proceedings of the 30th ACM International Conference on Multimedia (ACM MM 2022)
Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection
Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang, Hai Jin, Yuanyuan He
Proceedings of the 31st International Joint Conference on Artificial Intelligence (IJCAI 2022) (Long Oral Presentation, 3%)
Protecting Facial Privacy : Generating Adversarial Identity Masks via Style-robust Makeup Transfer
Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Yu Zhang, Hai Jin, Libing Wu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2022)
2020
Shielding collaborative learning: Mitigating poisoning attacks through client-side detection
Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo, Pengfei Hu
IEEE Transactions on Dependable and Secure Computing (TDSC 2020)
Optimizing privacy-preserving outsourced convolutional neural network predictions
Minghui Li, Sherman SM Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang
IEEE Transactions on Dependable and Secure Computing (TDSC 2020)
BOSSA: A decentralized system for proofs of data retrievability and replication
Dian Chen, Haobo Yuan, Shengshan Hu, Qian Wang, Cong Wang
IEEE Transactions on Parallel and Distributed Systems (TPDS 2020)
2019
Hidden voice commands: Attacks and defenses on the VCS of autonomous driving cars
Man Zhou, Zhan Qin, Xiu Lin, Shengshan Hu, Qian Wang, Kui Ren
IEEE Wireless Communications (2019)
Adversarial examples for automatic speech recognition: Attacks and countermeasures
Shengshan Hu, Xingcan Shang, Zhan Qin, Minghui Li, Qian Wang, Cong Wang
IEEE Communications Magazine (2019)
Augmenting encrypted search: A decentralized service realization with enforced execution
Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Zhibo Wang, Dengpan Ye
IEEE Transactions on Dependable and Secure Computing (TDSC 2019)
2018
Outsourced biometric identification with privacy
Shengshan Hu, Minghui Li, Qian Wang, Sherman SM Chow, Minxin Du
IEEE Transactions on information forensics and security (TIFS 2018)
Inprivate digging: Enabling tree-based distributed data mining with differential privacy
Lingchen Zhao, Lihao Ni, Shengshan Hu, Yaniiao Chen, Pan Zhou, Fu Xiao, Libing Wu
IEEE Conference on Computer Communications (INFOCOM 2018)
Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization
Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, Kui Ren
IEEE Conference on Computer Communications (INFOCOM 2018)
2016
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data
Qian Wang, Shengshan Hu, Kui Ren, Jingjun Wang, Zhibo Wang, Minxin Du
The 35th Annual IEEE International Conference on Computer Communications (INFOCOM 2016)
Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data
Shengshan Hu, Qian Wang, Jingjun Wang, Zhan Qin, Kui Ren
IEEE Transactions on Image Processing (2016)
SecHOG: Privacy-preserving outsourcing computation of histogram of oriented gradients in the cloud
Qian Wang, Jingjun Wang, Shengshan Hu, Qin Zou, Kui Ren
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (2016)
Secure surfing: Privacy-preserving speeded-up robust feature extractor
Qian Wang, Shengshan Hu, Jingjun Wang, Kui Ren
IEEE 36th International Conference on Distributed Computing Systems (ICDCS 2016)
Securing fast learning! ridge regression over encrypted big data
Shengshan Hu, Qian Wang, Jingjun Wang, Sherman SM Chow, Qin Zou
IEEE Trustcom (Trustcom 2016) (Best Paper Award)