default search action
Ruigang Liang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Ying Cao, Runze Zhang, Ruigang Liang, Kai Chen:
Evaluating the Effectiveness of Decompilers. ISSTA 2024: 491-502 - [c11]Peiwei Hu, Ruigang Liang, Kai Chen:
DeGPT: Optimizing Decompiler Output with LLM. NDSS 2024 - [c10]Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng:
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning. NDSS 2024 - [c9]Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang:
MEA-Defender: A Robust Watermark against Model Extraction Attack. SP 2024: 2515-2533 - [i9]Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang:
MEA-Defender: A Robust Watermark against Model Extraction Attack. CoRR abs/2401.15239 (2024) - 2023
- [j4]Zhixiu Guo, Ruigang Liang, Guozhu Meng, Kai Chen:
SkillSim: voice apps similarity detection. Cybersecur. 6(1): 13 (2023) - [j3]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Hualong Ma, Yue Zhao, Yingjiu Li:
A Robustness-Assured White-Box Watermark in Neural Networks. IEEE Trans. Dependable Secur. Comput. 20(6): 5214-5229 (2023) - [c8]Chang Yue, Peizhuo Lv, Ruigang Liang, Kai Chen:
Invisible Backdoor Attacks Using Data Poisoning in Frequency Domain. ECAI 2023: 2954-2961 - [c7]Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang:
DBIA: Data-Free Backdoor Attack Against Transformer Networks. ICME 2023: 2819-2824 - [c6]Weiqiang Jiang, Zhongyuan Guo, Ruigang Liang:
Using ensemble models to detect deepfake images of human faces. MICML 2023: 31-35 - [c5]Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang:
AURC: Detecting Errors in Program Code and Documentation. USENIX Security Symposium 2023: 1415-1432 - [c4]Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen:
A Data-free Backdoor Injection Approach in Neural Networks. USENIX Security Symposium 2023: 2671-2688 - [i8]Ying Cao, Ruigang Liang, Kai Chen, Peiwei Hu:
Boosting Neural Networks to Decompile Optimized Binaries. CoRR abs/2301.00969 (2023) - 2022
- [c3]Ying Cao, Ruigang Liang, Kai Chen, Peiwei Hu:
Boosting Neural Networks to Decompile Optimized Binaries. ACSAC 2022: 508-518 - [i7]Chang Yue, Peizhuo Lv, Ruigang Liang, Kai Chen:
Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain. CoRR abs/2207.04209 (2022) - [i6]Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng:
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning. CoRR abs/2209.03563 (2022) - [i5]Pan Li, Peizhuo Lv, Shenchen Zhu, Ruigang Liang, Kai Chen:
A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information. CoRR abs/2210.08956 (2022) - 2021
- [j2]Ruigang Liang, Ying Cao, Peiwei Hu, Kai Chen:
Neutron: an attention-based neural decompiler. Cybersecur. 4(1): 5 (2021) - [j1]Yuhang Zhao, Ruigang Liang, Xiang Chen, Jing Zou:
Evaluation indicators for open-source software: a review. Cybersecur. 4(1): 20 (2021) - [i4]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Yue Zhao, Yingjiu Li:
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks. CoRR abs/2103.13628 (2021) - [i3]Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang:
DBIA: Data-free Backdoor Injection Attack against Transformer Networks. CoRR abs/2111.11870 (2021) - [i2]Ruigang Liang, Ying Cao, Peiwei Hu, Jinwen He, Kai Chen:
Semantics-Recovering Decompilation through Neural Machine Translation. CoRR abs/2112.15491 (2021) - 2020
- [c2]Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen:
FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning. USENIX Security Symposium 2020: 2255-2269
2010 – 2019
- 2019
- [c1]Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Shengzhi Zhang, Kai Chen:
Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors. CCS 2019: 1989-2004 - 2018
- [i1]Yue Zhao, Hong Zhu, Qintao Shen, Ruigang Liang, Kai Chen, Shengzhi Zhang:
Practical Adversarial Attack Against Object Detector. CoRR abs/1812.10217 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint