Selected Papers
Note: author names marked with * are students or RAs under my supervision.-
GraphProt: Certified Black-box Shielding against Backdoored Graph Models.
The 34th International Joint Conference on Artificial Intelligence (IJCAI), Montreal, Canada, Aug. 16-22, 2025.
-
Crowdsourced Homophily Ties Based Graph Annotation Via Large Language Model.
ICASSP 2025-2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1-5. IEEE, 2025.
-
HyperTTC: Hypergraph-Empowered Tactic-Specific Traffic Clustering for Atomized APT Detection.
2025 International Conference on Computing, Networking and Communications (ICNC), pp. 318-322. IEEE, 2025.
Best Paper Award
-
Simple yet Effective Gradient-Free Graph Convolutional Networks
International Joint Conference on Neural Networks (IJCNN), Rome, Italy, 30 Jun–5 Jul 2025
-
Robust Graph Contrastive Learning with Information Restoration
IEEE Transactions on Information Forensics and Security (TIFS) , 2025
-
SOPA: Sensitivity-Oriented Poisoning Attack for Self-Supervised Graph Embedding Model via Bilevel Evolutionary Optimization.
IEEE Transactions on Evolutionary Computation, 2025
-
Auth-Graph: GenAI-empowered attribute-masked backdoor for on-demand authorizable graph learning.
Information Fusion(2025), Volume 124, December 2025, 103375.
-
Unleashing the power of indirect attacks against trust prediction via preferential path.
Knowledge and Information Systems 67, no. 5 (2025): 4459-4486.
-
Exploring Graph Neural Backdoors in Vehicular Networks: Fundamentals, Methodologies, Applications, and Future Perspectives.
IEEE Open Journal of Vehicular Technology (2025), Volume:6, pp: 1051 – 1071.
-
Backdoor-empowered regulable privilege authorization for edge-level graph learning in 6G vehicular networks.
IEEE Transactions on Consumer Electronics , 2025
-
Coupled-Space Attacks Against Random-Walk-Based Anomaly Detection
IEEE Transactions on Information Forensics and Security (TIFS) , 2024
-
Spikewhisper: Temporal spike backdoor attacks on federated neuromorphic learning over low-power devices
International Conference on Neural Information Processing, pp. 243-258. Singapore: Springer Nature Singapore, 2024.
-
Continuous optimization for construction of neural network-based prediction intervals
Knowledge-Based Systems, 2024
-
AuditVotes: a Framework towards Deployable Certified Robustness for GNNs
Preliminary version, accepted to ACM CCS'24 as Poster -
Adversarial Analysis of Similarity-Based Sign Prediction
Artificial Intelligence, Elsevier, 2024.
-
From Bi-level to One-level: Structural Poisoning Attacks against Graph-based Anomaly Detection
IEEE Transactions on Neural Networks and Learning Systems (TNNLS) , 2024.
-
Collective Certified Robustness against Graph Injection Attacks
41st International Conference on Machine Learning (ICML), 2024.
arXiv Link -
Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks
IEEE Symposium on Security and Privacy (IEEE S&P), 2024.
arXiv Link -
Crowdsourcing Malware Family Annotation: Joint Class-Determined Tag Extraction and Weakly-Tagged Sample Inference
IEEE Transactions on Network and Service Management, accepted, to appear, 2024.
-
Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks
IEEE Transactions on Information Forensics and Security (TIFS), accepted, to appear, 2024.
-
A principled distance-aware uncertainty quantification approach for enhancing the reliability of physics-informed neural network
Reliability Engineering & System Safety, accepted, to appear, 2024.
-
Uncovering strong ties: a study of indirect sybil attack on signed social network
International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2024.
-
Cost-aware untargeted poisoning attack against graph neural networks
International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2024.
-
Black-Box Attacks against Signed Graph Analysis via Balance Poisoning
International Conference on Computing, Networking and Communications (ICNC), 2024. arXiv Link
-
Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
40th International Conference on Data Engineering (ICDE), 2024. arXiv Link
-
Towards Adversarially Robust Recommendation from Adaptive Fraudster Detection
IEEE Transactions on Information Forensics and Security (TIFS), accepted, to appear, 2023.
-
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification
IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted, to appear, 2023.
-
Hiding from centrality measures: A Stackelberg game perspective
IEEE Transactions on Knowledge and Data Engineering (TKDE), accepted, to appear, 2023.
-
BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection
38th International Conference on Data Engineering (ICDE), 2022. arXiv Link
-
Attacking Similarity-Based Sign Prediction
21st IEEE International Conference on Data Mining Security (ICDM), 2021.
-
Structural Attack against Graph Based Android Malware Detection
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2021.
-
Strategic Evasion of Centrality Measures
International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2021.
-
CASO: Cost-Aware Secure Outsourcing of General Computational Problems
IEEE Transactions on Services Computing, 2021.
-
Blocking Adversarial Influence in Social Networks
11th Conference on Decision and Game Theory for Security (GameSec), 2020.
-
Robust Collective Classification against Structural Attacks
36th Conference on Uncertainty in Artificial Intelligence (UAI), 2020.
-
Computing Equilibria in Binary Networked Public Goods Games
34th AAAI Conference on Artificial Intelligence(AAAI), 2020.
-
Adversarial Robustness of Similarity-Based Link Prediction
19th IEEE International Conference on Data Mining (ICDM), 2019.
One of best papers of ICDM 2019
-
Attacking Similarity-Based Link Prediction in Social Networks
International Conference on Autonomous Agents and Multiagent Systems(AAMAS), 2019.
-
How to Hide one’s Relationships from Link prediction Algorithms
Scientific Reports, 2019, Nature Publishing Group.
-
P-mod: Secure privilege-based multilevel organizational data-sharing in cloud computing
IEEE Transactions on Big Data, 2019.
-
Passbio: Privacy-preserving user-centric biometric authentication
IEEE Transactions on Information Forensics and Security, 2018.
-
Security and Privacy Enhancement for Outsourced Biometric Identification
IEEE Global Communications Conference(GLOBECOM), 2018.
-
Privacy characterization and quantification in data publishing
IEEE Transactions on Knowledge and Data Engineering, 2018.
-
ExpSOS: secure and verifiable outsourcing of exponentiation operations for mobile cloud computing
IEEE Transactions on Information Forensics and Security, 2017.
-
CDMA system design and capacity analysis under disguised jamming
IEEE Transactions on Information Forensics and Security, 2016.
-
Secure fine-grained access control of mobile user data through untrusted cloud
25th International Conference on Computer Communication and Networks(ICCCN), 2016.
-
Secure outsourcing of scalar multiplication on elliptic curves
IEEE International Conference on Communications(ICC), 2016.
-
LinSOS: Secure outsourcing of linear computations based on affine mapping
IEEE International Conference on Communications(ICC), 2016.
-
Robust CDMA receiver design under disguised jamming
IEEE International Conference on Acoustics, Speech and Signal Processing(ICASP), 2016.
-
Security and efficiency trade-offs for cloud computing and storage
IEEE Resilience Week, 2015.
Patents
-
Cost-aware secure outsourcing
US Patent 10,901,693, 2021.