Name
Affiliation
Papers
SHOULING JI
Zhejiang Univ, Georgia Tech, Hangzhou, Zhejiang, Peoples R China
55
Collaborators
Citations 
PageRank 
199
83
20.52
Referers 
Referees 
References 
355
481
173
Search Limit
100481
Title
Citations
PageRank
Year
Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs00.342022
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution00.342022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings00.342022
Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction50.432021
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols00.342021
V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing20.412021
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks00.342021
HIERARCHICAL SIMILARITY LEARNING FOR LANGUAGE-BASED PRODUCT IMAGE RETRIEVAL00.342021
Detecting adversarial samples with graph-guided testing00.342021
Adversarial Examples versus Cloud-Based Detectors: A Black-Box Empirical Study20.452021
ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks00.342021
Backdoor Pre-trained Models Can Transfer to All20.412021
A Practical Black-Box Attack On Source Code Authorship Identification Classifiers00.342021
Smart Contract Vulnerability Detection - From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion.00.342021
Trojaning Language Models for Fun and Profit10.392021
Deep Dual Consecutive Network for Human Pose Estimation10.352021
IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware10.362021
PROCESS: Privacy-Preserving On-Chain Certificate Status Service00.342021
Multi-level Alignment Network for Domain Adaptive Cross-modal Retrieval10.352021
OB-WSPES: A Uniform Evaluation System for Obfuscation-Based Web Search Privacy00.342021
Aggregated Multi-Gans For Controlled 3d Human Motion Prediction00.342021
Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths00.342021
AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy00.342021
CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels00.342021
Turbo: Fraud Detection In Deposit-Free Leasing Service Via Real-Time Behavior Network Mining00.342021
MULTI-ORDER ADVERSARIAL REPRESENTATION LEARNING FOR COMPOSED QUERY IMAGE RETRIEVAL00.342021
Dynamic Group-Oriented Provable Data Possession in the Cloud30.412021
Fast-RCM: Fast Tree-Based Unsupervised Rare-Class Mining00.342021
ENHANCING MODEL ROBUSTNESS BY INCORPORATING ADVERSARIAL KNOWLEDGE INTO SEMANTIC REPRESENTATION00.342021
THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-based IoT Network10.342020
Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack00.342020
Asgldp: Collecting And Generating Decentralized Attributed Graphs With Local Differential Privacy00.342020
De-Health: All Your Online Health Information Are Belong To Us00.342020
Text Captcha Is Dead? A Large Scale Deployment and Empirical Study20.452020
Adversarial Examples Detection Through The Sensitivity In Space Mappings00.342020
Fast and parameter-light rare behavior detection in maritime trajectories00.342020
Fine-Grained Fashion Similarity Learning By Attribute-Specific Embedding Network10.352020
Fighting Against Deepfake: Patch&Pair Convolutional Neural Networks (PPCNN)10.372020
Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving with Big Data Support in Smart Home Environment20.362019
Video Big Data Retrieval Over Media Cloud: A Context-aware Online Learning Approach00.342019
DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model70.442019
TextBugger: Generating Adversarial Text Against Real-world Applications.220.722019
Privacy-preserving Online Task Allocation in Edge-Computing-Enabled Massive Crowdsensing50.402019
CATS: Cross-Platform E-Commerce Fraud Detection20.362019
Efficient Global String Kernel with Random Features: Beyond Counting Substructures00.342019
Mopt: Optimized Mutation Scheduling For Fuzzers00.342019
Adversarial Examples versus Cloud-based Detectors: A Black-box Empirical Study.00.342019
Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization.00.342018
Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs.30.662018
DPPG: A Dynamic Password Policy Generation System.40.392018
  • 1
  • 2