Selected Papers
Note: author names marked with * are students or RAs under my supervision.Working Papers
-
SFR-GNN: Simple and Fast Robust GNNs against Structural Attacks
arXiv Link -
Dual-Space Attacks against Random-Walk-based Anomaly Detection
arXiv Link -
Homophily-Driven Sanitation View for Robust Graph Contrastive Learning
arXiv Link -
Simple yet Effective Gradient-Free Graph Convolutional Networks
arXiv Link
Referred Conference and Journal Papers
-
AuditVotes: a Framework towards Deployable Certified Robustness for GNNs
Preliminary version, accepted to ACM CCS'24 as Poster -
Adversarial Analysis of Similarity-Based Sign Prediction
Artificial Intelligence, Elsevier, 2024.
-
From Bi-level to One-level: Structural Poisoning Attacks against Graph-based Anomaly Detection
IEEE Transactions on Neural Networks and Learning Systems , 2024.
-
Collective Certified Robustness against Graph Injection Attacks
41st International Conference on Machine Learning (ICML), 2024.
arXiv Link -
Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks
IEEE Symposium on Security and Privacy, 2024.
arXiv Link -
Crowdsourcing Malware Family Annotation: Joint Class-Determined Tag Extraction and Weakly-Tagged Sample Inference
IEEE Transactions on Network and Service Management, accepted, to appear, 2024.
-
Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks
IEEE Transactions on Information Forensics and Security, accepted, to appear, 2024.
-
A principled distance-aware uncertainty quantification approach for enhancing the reliability of physics-informed neural network
Reliability Engineering & System Safety, accepted, to appear, 2024.
-
Uncovering strong ties: a study of indirect sybil attack on signed social network
International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2024.
-
Cost-aware untargeted poisoning attack against graph neural networks
International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2024.
-
Black-Box Attacks against Signed Graph Analysis via Balance Poisoning
International Conference on Computing, Networking and Communications (ICNC), 2024. arXiv Link
-
Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
40th International Conference on Data Engineering (ICDE), 2024. arXiv Link
-
Towards Adversarially Robust Recommendation from Adaptive Fraudster Detection
IEEE Transactions on Information Forensics and Security, accepted, to appear, 2023.
-
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification
IEEE Transactions on Knowledge and Data Engineering, accepted, to appear, 2023.
-
Hiding from centrality measures: A Stackelberg game perspective
IEEE Transactions on Knowledge and Data Engineering, accepted, to appear, 2023.
-
BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection
38th International Conference on Data Engineering (ICDE), 2022. arXiv Link
-
Attacking Similarity-Based Sign Prediction
21st IEEE International Conference on Data Mining Security (ICDM), 2021.
-
Structural Attack against Graph Based Android Malware Detection
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2021.
-
Strategic Evasion of Centrality Measures
International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2021.
-
CASO: Cost-Aware Secure Outsourcing of General Computational Problems
IEEE Transactions on Services Computing, 2021.
-
Blocking Adversarial Influence in Social Networks
11th Conference on Decision and Game Theory for Security (GameSec), 2020.
-
Robust Collective Classification against Structural Attacks
36th Conference on Uncertainty in Artificial Intelligence (UAI), 2020.
-
Computing Equilibria in Binary Networked Public Goods Games
34th AAAI Conference on Artificial Intelligence(AAAI), 2020.
-
Adversarial Robustness of Similarity-Based Link Prediction
19th IEEE International Conference on Data Mining (ICDM), 2019.
One of best papers of ICDM 2019
-
Attacking Similarity-Based Link Prediction in Social Networks
International Conference on Autonomous Agents and Multiagent Systems(AAMAS), 2019.
-
How to Hide one’s Relationships from Link prediction Algorithms
Scientific Reports, 2019, Nature Publishing Group.
-
P-mod: Secure privilege-based multilevel organizational data-sharing in cloud computing
IEEE Transactions on Big Data, 2019.
-
Passbio: Privacy-preserving user-centric biometric authentication
IEEE Transactions on Information Forensics and Security, 2018.
-
Security and Privacy Enhancement for Outsourced Biometric Identification
IEEE Global Communications Conference(GLOBECOM), 2018.
-
Privacy characterization and quantification in data publishing
IEEE Transactions on Knowledge and Data Engineering, 2018.
-
ExpSOS: secure and verifiable outsourcing of exponentiation operations for mobile cloud computing
IEEE Transactions on Information Forensics and Security, 2017.
-
CDMA system design and capacity analysis under disguised jamming
IEEE Transactions on Information Forensics and Security, 2016.
-
Secure fine-grained access control of mobile user data through untrusted cloud
25th International Conference on Computer Communication and Networks(ICCCN), 2016.
-
Secure outsourcing of scalar multiplication on elliptic curves
IEEE International Conference on Communications(ICC), 2016.
-
LinSOS: Secure outsourcing of linear computations based on affine mapping
IEEE International Conference on Communications(ICC), 2016.
-
Robust CDMA receiver design under disguised jamming
IEEE International Conference on Acoustics, Speech and Signal Processing(ICASP), 2016.
-
Security and efficiency trade-offs for cloud computing and storage
IEEE Resilience Week, 2015.
Patents
-
Cost-aware secure outsourcing
US Patent 10,901,693, 2021.