Kang Liu
Cited by
Cited by
Fine-pruning: Defending against backdooring attacks on deep neural networks
K Liu, B Dolan-Gavitt, S Garg
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
Badnets: Evaluating backdooring attacks on deep neural networks
T Gu, K Liu, B Dolan-Gavitt, S Garg
IEEE Access 7, 47230-47244, 2019
NNoculation: Catching BadNets in the wild
AK Veldanda, K Liu, B Tan, P Krishnamurthy, F Khorrami, R Karri, ...
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
Building robust machine learning systems: Current progress, research challenges, and opportunities
JJ Zhang, K Liu, F Khalid, MA Hanif, S Rehman, T Theocharides, A Artussi, ...
Proceedings of the 56th Annual Design Automation Conference 2019, 1-4, 2019
An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks
J Ren, Y Zhang, K Liu
International Journal of Distributed Sensor Networks 9 (4), 834245, 2013
Adversarial perturbation attacks on ML-based CAD: A case study on CNN-based lithographic hotspot detection
K Liu, H Yang, Y Ma, B Tan, B Yu, EFY Young, R Karri, S Garg
ACM Transactions on Design Automation of Electronic Systems (TODAES) 25 (5 …, 2020
Poisoning the (data) well in ML-based CAD: A case study of hiding lithographic hotspots
K Liu, B Tan, R Karri, S Garg
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 306-309, 2020
Secret key generation using physical channels with imperfect CSI
S Primak, K Liu, X Wang
2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), 1-5, 2014
Attacking a cnn-based layout hotspot detector using group gradient method
H Yang, S Zhang, K Liu, S Liu, B Tan, R Karri, S Garg, B Yu, EFY Young
Proceedings of the 26th Asia and South Pacific Design Automation Conference …, 2021
Bias busters: Robustifying dl-based lithographic hotspot detectors against backdooring attacks
K Liu, B Tan, GR Reddy, S Garg, Y Makris, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
Multiple k-hop clusters based routing scheme to preserve source-location privacy in WSNs
J Ren, Y Zhang, K Liu
Journal of Central South University 21 (8), 3155-3168, 2014
Lack of robustness of lidar-based deep learning systems to small adversarial perturbations
N Patel, K Liu, P Krishnamurthy, S Garg, F Khorrami
ISR 2018; 50th International Symposium on Robotics, 1-7, 2018
On secret key generation from multiple observations of wireless channels
K Liu, S Primak, X Wang
2014 IEEE International Conference on Communication Systems, 147-151, 2014
Subverting Privacy-Preserving GANs: Hiding Secrets in Sanitized Images
K Liu, B Tan, S Garg
Proceedings of the AAAI Conference on Artificial Intelligence 35 (17), 14849 …, 2021
Robust Computing for Machine Learning-Based Systems
MA Hanif, F Khalid, RVW Putra, MT Teimoori, F Kriebel, J Zhang, K Liu, ...
Dependable Embedded Systems, 479-503, 2021
Training data poisoning in ml-cad: Backdooring dl-based lithographic hotspot detectors
K Liu, B Tan, R Karri, S Garg
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
On enhancements of physical layer secret key generation and its application in wireless communication systems
K Liu
The University of Western Ontario (Canada), 2015
Denial-of-Service Attacks on Learned Image Compression
K Liu, D Wu, Y Wang, D Feng, B Tan, S Garg
arXiv preprint arXiv:2205.13253, 2022
Can We Trust Machine Learning for Electronic Design Automation?
K Liu, JJ Zhang, B Tan, D Feng
2021 IEEE 34th International System-on-Chip Conference (SOCC), 135-140, 2021
Understanding and Mitigating the Impact of Backdooring Attacks on Deep Neural Networks
K Liu
New York University Tandon School of Engineering, 2021
The system can't perform the operation now. Try again later.
Articles 1–20