关注
Neil Zhenqiang Gong
Neil Zhenqiang Gong
Assistant Professor, Duke University
在 duke.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
M Fang, X Cao, J Jia, NZ Gong
USENIX Security Symposium, 2020
8462020
Stealing Hyperparameters in Machine Learning
B Wang, NZ Gong
IEEE Symposium on Security and Privacy, 2018
5672018
On the feasibility of internet-scale author identification
A Narayanan, H Paskov, NZ Gong, J Bethencourt, E Stefanov, ECR Shin, ...
IEEE Symposium on Security and Privacy, 2012
3912012
FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping
X Cao, M Fang, J Liu, NZ Gong
ISOC Network and Distributed System Security Symposium (NDSS), 2021
3612021
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
J Jia, A Salem, M Backes, Y Zhang, NZ Gong
ACM Conference on Computer and Communications Security (CCS), 2019
3462019
Joint link prediction and attribute inference using a social-attribute network
NZ Gong, A Talwalkar, L Mackey, L Huang, ECR Shin, E Stefanov, ER Shi, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 5 (2), 27, 2014
319*2014
Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
ACM Internet Measurement Conference (IMC), 2012
2642012
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification
X Cao, NZ Gong
Annual Computer Security Applications Conference (ACSAC), 2017
2362017
SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
NZ Gong, M Frank, P Mittal
IEEE Transactions on Information Forensics and Security 9 (6), 2014
2132014
Poisoning Attacks to Graph-Based Recommender Systems
M Fang, G Yang, NZ Gong, J Liu
Annual Computer Security Applications Conference (ACSAC), 2018
2052018
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
J Jia, NZ Gong
USENIX Security Symposium, 2018
1692018
Backdoor Attacks to Graph Neural Networks
Z Zhang, J Jia, B Wang, NZ Gong
ACM Symposium on Access Control Models and Technologies (SACMAT), 2021
1642021
You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors.
NZ Gong, B Liu
USENIX Security Symposium, 2016
1642016
Influence function based data poisoning attacks to top-n recommender systems
M Fang, NZ Gong, J Liu
Proceedings of The Web Conference, 2020
1412020
Attacking Graph-based Classification via Manipulating the Graph Structure
B Wang, NZ Gong
ACM Conference on Computer and Communications Security (CCS), 2019
1402019
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge
S Ji, W Li, NZ Gong, P Mittal, R Beyah
ISOC Network and Distributed System Security Symposium (NDSS), 2015
139*2015
Random walk based fake account detection in online social networks
J Jia, B Wang, NZ Gong
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017
1332017
Attribute inference attacks in online social networks
NZ Gong, B Liu
ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-30, 2018
1322018
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference
B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong
ACM International Conference on Web Search and Data Mining (WSDM), 2015
1322015
FLCert: Provably Secure Federated Learning against Poisoning Attacks
X Cao, Z Zhang, J Jia, NZ Gong
IEEE Transactions on Information Forensics and Security, 2022
127*2022
系统目前无法执行此操作,请稍后再试。
文章 1–20