Posts by Collection

portfolio

publications

Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models

Published in In the proceedings of Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Use Google Scholar for full citation

Recommended citation: Jiawei Liu, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu, "Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models." In the proceedings of Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022.

Seeing the Forest for the Trees: Understanding Security Hazards in the \(3GPP\) Ecosystem through Intelligent Analysis on Change Requests

Published in In the proceedings of 31st USENIX Security Symposium (USENIX Security 22), 2022

Use Google Scholar for full citation

Recommended citation: Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao, "Seeing the Forest for the Trees: Understanding Security Hazards in the $$3GPP$$ Ecosystem through Intelligent Analysis on Change Requests." In the proceedings of 31st USENIX Security Symposium (USENIX Security 22), 2022.

Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models

Published in In the proceedings of 2022 IEEE Symposium on Security and Privacy (SP), 2022

Use Google Scholar for full citation

Recommended citation: Di Tang, Rui Zhu, Siyuan Tang, XiaoFeng Wang, Haixu Tang, "Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models." In the proceedings of 2022 IEEE Symposium on Security and Privacy (SP), 2022.

Gradient Shaping: Enhancing Backdoor Attack against Reverse Engineering

Published in In the proceedings of Network and Distributed Systems Security (NDSS) Symposium 2024, 2023

Use Google Scholar for full citation

Recommended citation: Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, XiaoFeng Wang, Haixu Tang, "Gradient Shaping: Enhancing Backdoor Attack against Reverse Engineering." In the proceedings of Network and Distributed Systems Security (NDSS) Symposium 2024, 2023.

\(HOMESPY\): The Invisible Sniffer of Infrared Remote Control of Smart \(TVs\)

Published in In the proceedings of 32nd USENIX Security Symposium (USENIX Security 23), 2023

Use Google Scholar for full citation

Recommended citation: Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang, "$$HOMESPY$$: The Invisible Sniffer of Infrared Remote Control of Smart $$TVs$$." In the proceedings of 32nd USENIX Security Symposium (USENIX Security 23), 2023.

Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning

Published in In the proceedings of 32th USENIX Security Symposium (USENIX Security 23), 2023

Use Google Scholar for full citation

Recommended citation: Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu, "Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning." In the proceedings of 32th USENIX Security Symposium (USENIX Security 23), 2023.

Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples

Published in In the proceedings of 33th USENIX Security Symposium (USENIX Security 24), 2024

Use Google Scholar for full citation

Recommended citation: Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li, "Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples." In the proceedings of 33th USENIX Security Symposium (USENIX Security 24), 2024.

Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection

Published in In the proceedings of 33th USENIX Security Symposium (USENIX Security 24), 2024

Use Google Scholar for full citation

Recommended citation: Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang, "Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection." In the proceedings of 33th USENIX Security Symposium (USENIX Security 24), 2024.

talks

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.