Xingshuo Han

ORCID: 0000-0001-9431-5342
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Stochastic Gradient Optimization Techniques
  • Cryptographic Implementations and Security
  • Multimedia Communication and Technology
  • Network Security and Intrusion Detection
  • Bacillus and Francisella bacterial research
  • Internet Traffic Analysis and Secure E-voting
  • Telecommunications and Broadcasting Technologies
  • Ferroelectric and Negative Capacitance Devices
  • Advanced Memory and Neural Computing
  • Security and Verification in Computing
  • Forensic Toxicology and Drug Analysis
  • Autonomous Vehicle Technology and Safety
  • Advanced Frequency and Time Standards
  • Forensic and Genetic Research
  • Advanced Neural Network Applications
  • Digital Media Forensic Detection
  • Power Line Communications and Noise
  • Radiation Effects in Electronics
  • Multimodal Machine Learning Applications
  • Biometric Identification and Security

Nanyang Technological University
2021-2025

Wuhan University of Science and Technology
2024-2025

As an increasingly prevalent technology in intelligent autonomous transportation systems, vehicle platoon has been indicated the ability to significantly reduce fuel consumption as well heighten highway safety and throughput. However, existing efforts rarely focus on protecting data confidentiality authenticity platoons. How ensure secure high-fidelity platoon-level communication is still its infancy. This paper makes first attempt for efficient across Specifically, we present <monospace...

10.1109/tits.2022.3157309 article EN IEEE Transactions on Intelligent Transportation Systems 2022-03-16

Robotic Vehicles (RVs) have gained great popularity over the past few years. Meanwhile, they are also demonstrated to be vulnerable sensor spoofing attacks. Although a wealth of research works presented various attacks, some key questions remain unanswered: these existing complete enough cover all threats? If not, how many attacks not explored, and difficult is it realize them?This paper answers above by comprehensively systematizing knowledge against RVs. Our contributions threefold. (1) We...

10.1109/eurosp57164.2023.00067 article EN 2023-07-01

Multi-objective evolutionary algorithms (MOEAs) are widely used for searching optimal solutions in complex multi-component applications. Traditional MOEAs deep learning (MCDL) systems face challenges enhancing the search efficiency while maintaining diversity. To combat these, this paper proposes $\mu$MOEA, first LLM-empowered adaptive algorithm to detect safety violations MCDL systems. Inspired by context-understanding ability of Large Language Models (LLMs), $\mu$MOEA promotes LLM...

10.48550/arxiv.2501.00829 preprint EN arXiv (Cornell University) 2025-01-01

10.1109/tcad.2025.3541187 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025-01-01

Multi-objective evolutionary algorithms (MOEAs) are widely used for searching optimal solutions in complex multi-component applications. Traditional MOEAs deep learning (MCDL) systems face challenges enhancing the search efficiency while maintaining diversity. To combat these, this paper proposes first LLM-empowered adaptive algorithm to detect safety violations MCDL systems. Inspired by context-understanding ability of Large Language Models (LLMs), our approach promotes LLM comprehend...

10.1609/aaai.v39i19.34303 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

Autonomous Vehicles (AVs) are closely connected in the Cooperative Intelligent Transportation System (C-ITS). They equipped with various sensors and controlled by Driving Systems (ADSs) to provide high-level autonomy. The vehicles exchange different types of real-time data each other, which can help reduce traffic accidents congestion, improve efficiency transportation systems. However, when interacting environment, AVs suffer from a broad attack surface, sensory susceptible anomalies caused...

10.1109/tits.2021.3122906 article EN IEEE Transactions on Intelligent Transportation Systems 2022-01-24

Modern autonomous vehicles adopt state-of-the-art DNN models to interpret the sensor data and perceive environment. However, are vulnerable different types of adversarial attacks, which pose significant risks security safety passengers. One prominent threat is backdoor attack, where adversary can compromise model by poisoning training samples. Although lots effort has been devoted investigation attack conventional computer vision tasks, its practicality applicability driving scenario rarely...

10.1145/3503161.3548171 article EN Proceedings of the 30th ACM International Conference on Multimedia 2022-10-10

10.1109/sp54263.2024.00031 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2024-05-19

In this paper, we address the problem of privacy-preserving federated neural network training with <inline-formula><tex-math notation="LaTeX">$N$</tex-math></inline-formula> users. We present <b>Hercules</b> , an efficient and high-precision framework that can tolerate collusion up to notation="LaTeX">$N-1$</tex-math></inline-formula> follows POSEIDON proposed by Sav et al. (NDSS'21), but makes a qualitative leap in performance following contributions: (i) design novel parallel homomorphic...

10.1109/tdsc.2022.3218793 article EN IEEE Transactions on Dependable and Secure Computing 2022-11-04

In this paper, we study the problem of secure ML inference against a malicious client and semi-trusted server such that only learns output while nothing. This is first formulated by Lehmkuhl <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al.</i> with solution (MUSE, Usenix Security'21), whose performance then substantially improved Chandran 's work (SIMC, USENIX Security'22). However, there still exists nontrivial gap in these efforts...

10.1109/tdsc.2023.3288557 article EN IEEE Transactions on Dependable and Secure Computing 2023-06-23

In this paper, we present <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">VerifyML</i> , the first secure inference framework to check fairness degree of a given Machine learning (ML) model. is generic and immune any obstruction by malicious model holder during verification process. We rely on two-party computation (2 PC) technology implement carefully customize series optimization methods boost its performance for both linear nonlinear layer...

10.1109/tdsc.2023.3290562 article EN IEEE Transactions on Dependable and Secure Computing 2023-06-29

Backdoor attacks against deep neural network (DNN) models have been widely studied. Various attack techniques proposed for different domains and paradigms, e.g., image, point cloud, natural language processing, transfer learning, etc. The most widely-used way to embed a backdoor into DNN model is poison the training data. They usually randomly select samples from benign set poisoning, without considering distinct contribution of each sample effectiveness, making less optimal.A recent work...

10.1109/iccv51070.2023.00443 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2023-10-01

Cloud computing is the widespread acceptance of a promising paradigm offering substantial amount storage and data services on demand. To preserve confidentiality, many cryptosystems have been introduced. However, current solutions are incompatible with resource-constrained end-devices because variety vulnerabilities in terms practicality security. In this paper, we propose practical secure data-sharing system by introducing new design attribute-based encryption verifiable outsourced...

10.1109/tsc.2023.3321314 article EN IEEE Transactions on Services Computing 2023-10-02

Autonomous Vehicles (AVs) are equipped with various sensors and controlled by Driving Systems (ADSs) to provide high-level autonomy. When interacting the environment, AVs suffer from a broad attack surface, sensory data susceptible anomalies caused faults, sensor malfunctions, or attacks, which may jeopardize traffic safety result in serious accidents. Most of current works focus on anomaly detection specific such as GPS spoofing sign attacks. There no scenario-aware for ADSs. In this paper,...

10.1109/ispa-bdcloud-socialcom-sustaincom52081.2021.00119 article EN 2021-09-01

Video anomaly detection (VAD) is an essential but challenging task. Existing prevalent methods focus on analyzing the reconstruction or prediction difference between normal and abnormal patterns through multiple deep features, e.g., optic flow. However, these approaches independently use features to characterize attributes, ignore mutuality among features. Therefore, constructed representation limited indirectly representing from isolated makes network difficult capture high-level causes of...

10.1109/icassp48485.2024.10448319 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

The safety of Autonomous Driving Systems (ADSs) is significantly important for the implementation autonomous vehicles (AVs). Therefore, ADSs must be evaluated thoroughly before their release and deployment to public. How generate diverse safety-critical test scenarios a key task ADS testing. This paper proposes LEADE, an LLM-enhanced scenario generation approach testing, which adopts adaptive evolutionary search scenarios. LEADE leverages LLM's ability in program understanding better...

10.48550/arxiv.2406.10857 preprint EN arXiv (Cornell University) 2024-06-16

Federated Learning (FL) suffers from severe performance degradation due to the data heterogeneity among clients. Some existing work suggests that fundamental reason is can cause local model drift, and therefore proposes calibrate direction of updates solve this problem. Though effective, methods generally take as a whole, which lacks deep understanding how neurons within classification models evolve during training form drift. In paper, we bridge gap by performing an intuitive theoretical...

10.1145/3637528.3672042 article EN Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining 2024-08-24

Physical adversarial patches have emerged as a key attack to cause misclassification of traffic sign recognition (TSR) systems in the real world. However, existing poor stealthiness and all vehicles indiscriminately once deployed. In this paper, we introduce an invisible triggered physical patch (ITPatch) with novel vector, i.e., fluorescent ink, advance state-of-the-art. It applies carefully designed perturbations target sign, attacker can later trigger effect using ultraviolet light,...

10.48550/arxiv.2409.12394 preprint EN arXiv (Cornell University) 2024-09-18

Federated learning (FL) enables the training of deep models on distributed clients to preserve data privacy. However, this paradigm is vulnerable backdoor attacks, where malicious can upload poisoned local embed backdoors into global model, leading attacker-desired predictions. Existing attacks mainly focus FL with independently and identically (IID) scenarios, while real-world are typically non-IID. Current strategies for non-IID suffer from limitations in maintaining effectiveness...

10.48550/arxiv.2411.16167 preprint EN arXiv (Cornell University) 2024-11-25

Fine-tuning is an essential process to improve the performance of Large Language Models (LLMs) in specific domains, with Parameter-Efficient Fine-Tuning (PEFT) gaining popularity due its capacity reduce computational demands through integration low-rank adapters. These lightweight adapters, such as LoRA, can be shared and utilized on open-source platforms. However, adversaries could exploit this mechanism inject backdoors into these resulting malicious behaviors like incorrect or harmful...

10.48550/arxiv.2411.17453 preprint EN arXiv (Cornell University) 2024-11-26

Existing defense approaches against sensor spoofing attacks suffer from the limitations of limited specific attack types, requiring GPU computation, exhibiting considerable detection latency and struggling with interpretability corner cases. We developed PhyScout, a holistic framework to overcome above limitations. Our capitalizes on observation that human drivers can rapidly accurately identify by performing spatio-temporal consistency checks their environment. commence defining generalized...

10.1145/3658644.3670290 article EN cc-by 2024-12-02

In this paper, we study the problem of secure ML inference against a malicious client and semi-trusted server such that only learns output while nothing. This is first formulated by Lehmkuhl \textit{et al.} with solution (MUSE, Usenix Security'21), whose performance then substantially improved Chandran et al.'s work (SIMC, USENIX Security'22). However, there still exists nontrivial gap in these efforts towards practicality, giving challenges overhead reduction acceleration an all-round way....

10.48550/arxiv.2207.04637 preprint EN cc-by arXiv (Cornell University) 2022-01-01

The rapidly expanding number of Internet Things (IoT) devices is generating huge quantities data, but the data privacy and security exposure in IoT devices, especially automatic driving system. Federated learning (FL) a paradigm that addresses privacy, security, access rights, to heterogeneous message issues by integrating global model based on distributed nodes. However, poisoning attacks FL can undermine benefits, destroying model's availability disrupting training. To avoid above issues,...

10.48550/arxiv.2209.06397 preprint EN other-oa arXiv (Cornell University) 2022-01-01
Coming Soon ...