关注
Jiameng Pu
Jiameng Pu
在 vt.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
{T-Miner}: A generative approach to defend against trojan attacks on {DNN-based} text classification
A Azizi, IA Tahmid, A Waheed, N Mangaokar, J Pu, M Javed, CK Reddy, ...
30th USENIX Security Symposium (USENIX Security 21), 2255-2272, 2021
722021
Throwing darts in the dark? detecting bots with limited data using neural data augmentation
STK Jan, Q Hao, T Hu, J Pu, S Oswal, G Wang, B Viswanath
2020 IEEE symposium on security and privacy (SP), 1190-1206, 2020
592020
Deepfake videos in the wild: Analysis and detection
J Pu, N Mangaokar, L Kelly, P Bhattacharya, K Sundaram, M Javed, ...
Proceedings of the Web Conference 2021, 981-992, 2021
422021
Deepfake text detection: Limitations and opportunities
J Pu, Z Sarwar, SM Abdullah, A Rehman, Y Kim, P Bhattacharya, M Javed, ...
2023 IEEE Symposium on Security and Privacy (SP), 1613-1630, 2023
332023
Jekyll: Attacking medical image diagnostics using deep generative models
N Mangaokar, J Pu, P Bhattacharya, CK Reddy, B Viswanath
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 139-157, 2020
282020
Noisescope: Detecting deepfake images in a blind setting
J Pu, N Mangaokar, B Wang, CK Reddy, B Viswanath
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
262020
Multiview clustering based on robust and regularized matrix approximation
J Pu, Q Zhang, L Zhang, B Du, J You
2016 23rd International Conference on Pattern Recognition (ICPR), 2550-2555, 2016
132016
Defending Against Misuse of Synthetic Media: Characterizing Real-world Challenges and Building Robust Defenses
J Pu
Virginia Tech, 2022
2022
Tan, Te Juin Lester 175 Tang, Haixu 521 Towa, Patrick 405 Treharne, Helen 425
J Koschel, E Koutsoupias, B Kreuter, R Küsters, X Lan, A Lehmann, ...
系统目前无法执行此操作,请稍后再试。
文章 1–9