What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Minhui Xue
Google Scholar
ORCID:
0000-0002-9172-4252
58
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Decaf: Data Distribution Decompose Attack Against Federated Learning.
Zhiyang Dai
Yansong Gao
Chunyi Zhou
Anmin Fu
Zhi Zhang
Minhui Xue
Yifeng Zheng
Yuqing Zhang
2025
journals/tifs
TruVRF: Toward Triple-Granularity Verification on Machine Unlearning.
Chunyi Zhou
Yansong Gao
Anmin Fu
Kai Chen
Zhi Zhang
Minhui Xue
Zhiyang Dai
Shouling Ji
Yuqing Zhang
2025
journals/tifs
QUEEN: Query Unlearning Against Model Extraction.
Huajie Chen
Tianqing Zhu
Lefeng Zhang
Bo Liu
Derui Wang
Wanlei Zhou
Minhui Xue
2025
journals/tifs
TrapNet: Model Inversion Defense via Trapdoor.
Wanlun Ma
Derui Wang
Yiliao Song
Minhui Xue
Sheng Wen
Zhengdao Li
Yang Xiang
2025
conf/sp
Modifier Unlocked: Jailbreaking Text-to-Image Models Through Prompts.
Shuofeng Liu
Mengyao Ma
Minhui Xue
Guangdong Bai
2025
conf/sp
Edge Unlearning is Not "on Edge"! an Adaptive Exact Unlearning System on Resource-Constrained Devices.
Xiaoyu Xia
Ziqi Wang
Ruoxi Sun
Bowen Liu
Ibrahim Khalil
Minhui Xue
2025
conf/sp
Codebreaker: Dynamic Extraction Attacks on Code Language Models.
Changzhou Han
Zehang Deng
Wanlun Ma
Xiaogang Zhu
Minhui Xue
Tianqing Zhu
Sheng Wen
Yang Xiang
2025
conf/ndss
Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!
Yansong Gao
Huaibing Peng
Hua Ma
Zhi Zhang
Shuo Wang
Rayne Holland
Anmin Fu
Minhui Xue
Derek Abbott
2025
conf/ndss
Provably Unlearnable Data Examples.
Derui Wang
Minhui Xue
Bo Li
Seyit Camtepe
Liming Zhu
2025
conf/ndss
Reinforcement Unlearning.
Dayong Ye
Tianqing Zhu
Congcong Zhu
Derui Wang
Kun Gao
Zewei Shi
Sheng Shen
Wanlei Zhou
Minhui Xue
2025
conf/ndss
GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization.
Haotian Zhu
Shuchao Pang
Zhigang Lu
Yongbin Zhou
Minhui Xue
2025
conf/ndss
The Philosopher's Stone: Trojaning Plugins of Large Language Models.
Tian Dong
Minhui Xue
Guoxing Chen
Rayne Holland
Yan Meng
Shaofeng Li
Zhen Liu
Haojin Zhu
2025
conf/uss
Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models.
Dayong Ye
Tianqing Zhu
Feng He
Bo Liu
Minhui Xue
Wanlei Zhou
2025
conf/uss
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization.
Derui Wang
Kristen Moore
Diksha Goel
Minjune Kim
Gang Li
Yang Li
Robin Doss
Minhui Xue
Bo Li
Seyit Camtepe
Liming Zhu
2025
conf/uss
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems.
Weifei Jin
Yuxin Cao
Junjie Su
Derui Wang
Yedi Zhang
Minhui Xue
Jie Hao
Jin Song Dong
Yixian Yang
2024
journals/tifs
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
Yinshan Li
Hua Ma
Zhi Zhang
Yansong Gao
Alsharif Abuadbba
Minhui Xue
Anmin Fu
Yifeng Zheng
Said F. Al-Sarawi
Derek Abbott
2024
conf/ccs
LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis.
Bo Li
Wenyuan Xu
Jieshan Chen
Yang Zhang
Minhui Xue
Shuo Wang
Guangdong Bai
Xingliang Yuan
2024
conf/ccs
Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense.
Hua Ma
Shang Wang
Yansong Gao
Zhi Zhang
Huming Qiu
Minhui Xue
Alsharif Abuadbba
Anmin Fu
Surya Nepal
Derek Abbott
2024
conf/uss
dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis.
Haichen Wang
Shuchao Pang
Zhigang Lu
Yihang Rao
Yongbin Zhou
Minhui Xue
2024
conf/uss
DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts.
Shuo Wang
Hongsheng Hu
Jiamin Chang
Benjamin Zi Hao Zhao
Qi Alfred Chen
Minhui Xue
2024
conf/uss
Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial Approximation.
Shuofeng Liu
Zihan Wang
Minhui Xue
Long Wang
Yuanchao Zhang
Guangdong Bai
2024
conf/uss
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection.
Shaofeng Li
Xinyu Wang
Minhui Xue
Haojin Zhu
Zhi Zhang
Yansong Gao
Wen Wu
Xuemin (Sherman) Shen
2024
conf/sp
CORELOCKER: Neuron-level Usage Control.
Zihan Wang
Zhongkui Ma
Xinguo Feng
Ruoxi Sun
Hu Wang
Minhui Xue
Guangdong Bai
2024
conf/sp
Bounded and Unbiased Composite Differential Privacy.
Kai Zhang
Yanjun Zhang
Ruoxi Sun
Pei-Wei Tsai
Muneeb Ul Hassan
Xin Yuan
Minhui Xue
Jinjun Chen
2024
conf/sp
LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs.
Shuo Wang
Hongsheng Hu
Jiamin Chang
Benjamin Zi Hao Zhao
Minhui Xue
2024
conf/sp
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model.
Yuxin Cao
Jinghao Li
Xi Xiao
Derui Wang
Minhui Xue
Hao Ge
Wei Liu
Guangwu Hu
2024
conf/sp
DeepTheft: Stealing DNN Model Architectures through Power Side Channel.
Yansong Gao
Huming Qiu
Zhi Zhang
Binghui Wang
Hua Ma
Alsharif Abuadbba
Minhui Xue
Anmin Fu
Surya Nepal
2024
conf/sp
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning.
Hongsheng Hu
Shuo Wang
Tian Dong
Minhui Xue
2024
conf/sp
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification.
Bang Wu
Xingliang Yuan
Shuo Wang
Qi Li
Minhui Xue
Shirui Pan
2024
conf/ndss
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection.
Kunpeng Zhang
Xiaogang Zhu
Xi Xiao
Minhui Xue
Chao Zhang
Sheng Wen
2024
conf/ndss
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services.
Hongsheng Hu
Shuo Wang
Jiamin Chang
Haonan Zhong
Ruoxi Sun
Shuang Hao
Haojin Zhu
Minhui Xue
2024
conf/ndss
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks.
Bang Wu
He Zhang
Xiangwen Yang
Shuo Wang
Minhui Xue
Shirui Pan
Xingliang Yuan
2023
conf/uss
Detecting Union Type Confusion in Component Object Model.
Yuxing Zhang
Xiaogang Zhu
Daojing He
Minhui Xue
Shouling Ji
Mohammad Sayad Haghighi
Sheng Wen
Zhiniang Peng
2023
conf/sp
StyleFool: Fooling Video Classification Systems via Style Transfer.
Yuxin Cao
Xi Xiao
Ruoxi Sun
Derui Wang
Minhui Xue
Sheng Wen
2023
conf/sp
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models.
Shuo Wang
Sharif Abuadbba
Sidharth Agarwal
Kristen Moore
Ruoxi Sun
Minhui Xue
Surya Nepal
Seyit Camtepe
Salil S. Kanhere
2023
conf/asiaccs
POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning Models.
Zhibo Jin
Zhiyu Zhu
Hongsheng Hu
Minhui Xue
Huaming Chen
2023
conf/ndss
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning.
Shuo Wang
Mahathir Almashor
Alsharif Abuadbba
Ruoxi Sun
Minhui Xue
Calvin Wang
Raj Gaire
Surya Nepal
Seyit Camtepe
2023
conf/ndss
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices.
Wanlun Ma
Derui Wang
Ruoxi Sun
Minhui Xue
Sheng Wen
Yang Xiang
2023
conf/ndss
RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
Tian Dong
Shaofeng Li
Guoxing Chen
Minhui Xue
Haojin Zhu
Zhen Liu
2023
conf/ndss
PPA: Preference Profiling Attack Against Federated Learning.
Chunyi Zhou
Yansong Gao
Anmin Fu
Kai Chen
Zhiyang Dai
Zhi Zhang
Minhui Xue
Yuqing Zhang
2022
journals/tifs
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems.
Bao Gia Doan
Minhui Xue
Shiqing Ma
Ehsan Abbasnejad
Damith C. Ranasinghe
2021
journals/tifs
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models.
Jialin Wen
Benjamin Zi Hao Zhao
Minhui Xue
Alina Oprea
Haifeng Qian
2021
journals/popets
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Yuantian Miao
Minhui Xue
Chao Chen
Lei Pan
Jun Zhang
Benjamin Zi Hao Zhao
Dali Kaafar
Yang Xiang
2021
conf/ccs
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference.
Xiaotao Feng
Ruoxi Sun
Xiaogang Zhu
Minhui Xue
Sheng Wen
Dongxi Liu
Surya Nepal
Yang Xiang
2021
conf/ccs
Dissecting Click Fraud Autonomy in the Wild.
Tong Zhu
Yan Meng
Haotian Hu
Xiaokuan Zhang
Minhui Xue
Haojin Zhu
2021
conf/ccs
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic.
Suibin Sun
Le Yu
Xiaokuan Zhang
Minhui Xue
Ren Zhou
Haojin Zhu
Shuang Hao
Xiaodong Lin
2021
conf/ccs
TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing.
Aoting Hu
Renjie Xie
Zhigang Lu
Aiqun Hu
Minhui Xue
2021
conf/ccs
Hidden Backdoors in Human-Centric Language Models.
Shaofeng Li
Hui Liu
Tian Dong
Benjamin Zi Hao Zhao
Minhui Xue
Haojin Zhu
Jialiang Lu
2021
conf/acisp
Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models.
Liuqiao Chen
Hu Wang
Benjamin Zi Hao Zhao
Minhui Xue
Haifeng Qian
2020
conf/uss
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Zhushou Tang
Ke Tang
Minhui Xue
Yuan Tian
Sen Chen
Muhammad Ikram
Tielei Wang
Haojin Zhu
2020
conf/acisp
PALOR: Poisoning Attacks Against Logistic Regression.
Jialin Wen
Benjamin Zi Hao Zhao
Minhui Xue
Haifeng Qian
2019
journals/compsec
Securing android applications via edge assistant third-party library detection.
Zhushou Tang
Minhui Xue
Guozhu Meng
Chengguo Ying
Yugeng Liu
Jianan He
Haojin Zhu
Yang Liu
2019
conf/sp
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.
Matthew Joslin
Neng Li
Shuang Hao
Minhui Xue
Haojin Zhu
2018
journals/compsec
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Sen Chen
Minhui Xue
Lingling Fan
Shuang Hao
Lihua Xu
Haojin Zhu
Bo Li
2018
conf/ndss
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Haizhong Zheng
Minhui Xue
Hao Lu
Shuang Hao
Haojin Zhu
Xiaohui Liang
Keith W. Ross
2016
journals/popets
The Right to be Forgotten in the Media: A Data-Driven Study.
Minhui Xue
Gabriel Magno
Evandro Cunha
Virgílio A. F. Almeida
Keith W. Ross
2016
conf/ccs
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware.
Sen Chen
Minhui Xue
Zhushou Tang
Lihua Xu
Haojin Zhu
2016
conf/ccs
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning.
Lingling Fan
Minhui Xue
Sen Chen
Lihua Xu
Haojin Zhu
Coauthors
Aiqun Hu
(1)
Alina Oprea
(1)
Alsharif Abuadbba
(4)
Anmin Fu
(7)
Aoting Hu
(1)
Bang Wu
(2)
Bao Gia Doan
(1)
Benjamin Zi Hao Zhao
(7)
Binghui Wang
(1)
Bo Li
(4)
Bo Liu
(2)
Bowen Liu
(1)
Calvin Wang
(1)
Changzhou Han
(1)
Chao Chen
(1)
Chao Zhang
(1)
Chengguo Ying
(1)
Chunyi Zhou
(3)
Congcong Zhu
(1)
Dali Kaafar
(1)
Damith C. Ranasinghe
(1)
Daojing He
(1)
Dayong Ye
(2)
Derek Abbott
(3)
Derui Wang
(9)
Diksha Goel
(1)
Dongxi Liu
(1)
Ehsan Abbasnejad
(1)
Evandro Cunha
(1)
Feng He
(1)
Gabriel Magno
(1)
Gang Li
(1)
Guangdong Bai
(4)
Guangwu Hu
(1)
Guoxing Chen
(2)
Guozhu Meng
(1)
Haichen Wang
(1)
Haifeng Qian
(3)
Haizhong Zheng
(1)
Hao Ge
(1)
Hao Lu
(1)
Haojin Zhu
(14)
Haonan Zhong
(1)
Haotian Hu
(1)
Haotian Zhu
(1)
He Zhang
(1)
Hongsheng Hu
(5)
Hu Wang
(2)
Hua Ma
(4)
Huaibing Peng
(1)
Huajie Chen
(1)
Huaming Chen
(1)
Hui Liu
(1)
Huming Qiu
(2)
Ibrahim Khalil
(1)
Jialiang Lu
(1)
Jialin Wen
(2)
Jiamin Chang
(3)
Jianan He
(1)
Jie Hao
(1)
Jieshan Chen
(1)
Jin Song Dong
(1)
Jinghao Li
(1)
Jinjun Chen
(1)
Jun Zhang
(1)
Junjie Su
(1)
Kai Chen
(2)
Kai Zhang
(1)
Ke Tang
(1)
Keith W. Ross
(2)
Kristen Moore
(2)
Kun Gao
(1)
Kunpeng Zhang
(1)
Le Yu
(1)
Lefeng Zhang
(1)
Lei Pan
(1)
Lihua Xu
(3)
Liming Zhu
(2)
Lingling Fan
(2)
Liuqiao Chen
(1)
Long Wang
(1)
Mahathir Almashor
(1)
Matthew Joslin
(1)
Mengyao Ma
(1)
Minhui Xue
(58)
Minjune Kim
(1)
Mohammad Sayad Haghighi
(1)
Muhammad Ikram
(1)
Muneeb Ul Hassan
(1)
Neng Li
(1)
Pei-Wei Tsai
(1)
Qi Alfred Chen
(1)
Qi Li
(1)
Raj Gaire
(1)
Rayne Holland
(2)
Ren Zhou
(1)
Renjie Xie
(1)
Robin Doss
(1)
Ruoxi Sun
(9)
Said F. Al-Sarawi
(1)
Salil S. Kanhere
(1)
Sen Chen
(4)
Seyit Camtepe
(4)
Shang Wang
(1)
Shaofeng Li
(4)
Sharif Abuadbba
(1)
Sheng Shen
(1)
Sheng Wen
(7)
Shiqing Ma
(1)
Shirui Pan
(2)
Shouling Ji
(2)
Shuang Hao
(5)
Shuchao Pang
(2)
Shuo Wang
(10)
Shuofeng Liu
(2)
Sidharth Agarwal
(1)
Suibin Sun
(1)
Surya Nepal
(5)
Tian Dong
(4)
Tianqing Zhu
(4)
Tielei Wang
(1)
Tong Zhu
(1)
Virgílio A. F. Almeida
(1)
Wanlei Zhou
(3)
Wanlun Ma
(3)
Wei Liu
(1)
Weifei Jin
(1)
Wen Wu
(1)
Wenyuan Xu
(1)
Xi Xiao
(3)
Xiangwen Yang
(1)
Xiaodong Lin
(1)
Xiaogang Zhu
(4)
Xiaohui Liang
(1)
Xiaokuan Zhang
(2)
Xiaotao Feng
(1)
Xiaoyu Xia
(1)
Xin Yuan
(1)
Xingliang Yuan
(3)
Xinguo Feng
(1)
Xinyu Wang
(1)
Xuemin (Sherman) Shen
(1)
Yan Meng
(2)
Yang Li
(1)
Yang Liu
(1)
Yang Xiang
(5)
Yang Zhang
(1)
Yanjun Zhang
(1)
Yansong Gao
(8)
Yedi Zhang
(1)
Yifeng Zheng
(2)
Yihang Rao
(1)
Yiliao Song
(1)
Yinshan Li
(1)
Yixian Yang
(1)
Yongbin Zhou
(2)
Yuan Tian
(1)
Yuanchao Zhang
(1)
Yuantian Miao
(1)
Yugeng Liu
(1)
Yuqing Zhang
(3)
Yuxin Cao
(3)
Yuxing Zhang
(1)
Zehang Deng
(1)
Zewei Shi
(1)
Zhen Liu
(2)
Zhengdao Li
(1)
Zhi Zhang
(8)
Zhibo Jin
(1)
Zhigang Lu
(3)
Zhiniang Peng
(1)
Zhiyang Dai
(3)
Zhiyu Zhu
(1)
Zhongkui Ma
(1)
Zhushou Tang
(3)
Zihan Wang
(2)
Ziqi Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to