Zheng Li
Zheng Li
CISPA Helmholtz Center for Information Security.
Verified email at - Homepage
Cited by
Cited by
Membership Leakage in Label-Only Exposures
Z Li, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2021
How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN
Z Li, C Hu, Y Zhang, S Guo
Annual Computer Security Applications Conference (ACSAC), 2019
Auditing Membership Leakages of Multi-Exit Networks
Z Li, Y Liu, X He, N Yu, M Backes, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022
Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models
X He, Z Li, W Xu, C Cornelius, Y Zhang
arXiv preprint arXiv:2208.10445, 2022
Membership Inference Attacks Against Text-to-image Generation Models
Y Wu, N Yu, Z Li, M Backes, Y Zhang
arXiv preprint arXiv:2210.00968, 2022
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models
Z Sha, Z Li, N Yu, Y Zhang
arXiv preprint arXiv:2210.06998, 2022
UnGANable: Defending Against GAN-based Face Manipulation
Z Li, N Yu, A Salem, M Backes, M Fritz, Y Zhang
USENIX Security Symposium, 2023
Backdoor Attacks in the Supply Chain of Masked Image Modeling
X Shen, X He, Z Li, Y Shen, M Backes, Y Zhang
arXiv preprint arXiv:2210.01632, 2022
Backdoor Attacks Against Dataset Distillation
Y Liu, Z Li, M Backes, Y Shen, Y Zhang
arXiv preprint arXiv:2301.01197, 2023
Data Poisoning Attacks Against Multimodal Encoders
Z Yang, X He, Z Li, M Backes, M Humbert, P Berrang, Y Zhang
arXiv preprint arXiv:2209.15266, 2022
DeepKeyStego: Protecting Communication by Key-dependent Steganography with Deep Networks
Z Li, G Han, S Guo, C Hu
IEEE International Conference on High Performance Computing and …, 2019
The system can't perform the operation now. Try again later.
Articles 1–11