Shouling Ji

ORCID: 0000-0003-4268-372X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Adversarial Robustness in Machine Learning
  • Advanced Malware Detection Techniques
  • Privacy-Preserving Technologies in Data
  • Energy Efficient Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Topic Modeling
  • Mobile Ad Hoc Networks
  • Software Engineering Research
  • Software Testing and Debugging Techniques
  • Privacy, Security, and Data Protection
  • Security and Verification in Computing
  • Spam and Phishing Detection
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Graph Neural Networks
  • Cryptography and Data Security
  • User Authentication and Security Systems
  • Data Quality and Management
  • Natural Language Processing Techniques
  • Generative Adversarial Networks and Image Synthesis
  • Digital and Cyber Forensics
  • Cooperative Communication and Network Coding
  • Explainable Artificial Intelligence (XAI)
  • Wireless Networks and Protocols
  • Face recognition and analysis

Zhejiang University
2016-2025

Zhejiang University of Science and Technology
2016-2025

Georgia Institute of Technology
2013-2024

Sanya Central Hospital
2024

Pennsylvania State University
2022

National University of Defense Technology
2022

Ningbo University
2022

Binzhou University
2022

Alibaba Group (China)
2018-2021

Atlanta Technical College
2018

Deep Learning-based Text Understanding (DLTU) is the backbone technique behind various applications, including question answering, machine translation, and text classification.Despite its tremendous popularity, security vulnerabilities of DLTU are still largely unknown, which highly concerning given increasing use in security-sensitive applications such as sentiment analysis toxic content detection.In this paper, we show that inherently vulnerable to adversarial attacks, maliciously crafted...

10.14722/ndss.2019.23138 preprint EN 2019-01-01

This paper attacks the challenging problem of zero-example video retrieval. In such a retrieval paradigm, an end user searches for unlabeled videos by ad-hoc queries described in natural language text with no visual example provided. Given as sequences frames and words, effective sequence-to-sequence cross-modal matching is required. The majority existing methods are concept based, extracting relevant concepts from accordingly establishing associations between two modalities. contrast, this...

10.1109/cvpr.2019.00957 preprint EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2019-06-01

Traffic flow prediction plays an important role in ITS (Intelligent Transportation System). This task is challenging due to the complex spatial and temporal correlations (e.g., constraints of road network law dynamic change with time). Existing work tried solve this problem by exploiting a variety spatiotemporal models. However, we observe that more semantic pair-wise among possibly distant roads are also critical for traffic prediction. To jointly model spatial, temporal, various global...

10.1109/tits.2020.2983763 article EN publisher-specific-oa IEEE Transactions on Intelligent Transportation Systems 2020-05-21

Many of today's machine learning (ML) systems are built by reusing an array of, often pre-trained, primitive models, each fulfilling distinct functionality (e.g., feature extraction). The increasing use models significantly simplifies and expedites the development cycles ML systems. Yet, because most such contributed maintained untrusted sources, their lack standardization or regulation entails profound security implications, about which little is known thus far. In this paper, we...

10.1145/3243734.3243757 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

Multi-frame human pose estimation in complicated situations is challenging. Although state-of-the-art joints detectors have demonstrated remarkable results for static images, their performances come short when we apply these models to video sequences. Prevalent shortcomings include the failure handle motion blur, defocus, or occlusions, arising from inability capturing temporal dependency among frames. On other hand, directly employing conventional recurrent neural networks incurs empirical...

10.1109/cvpr46437.2021.00059 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2021-06-01

Deep learning (DL) models are inherently vulnerable to adversarial examples - maliciously crafted inputs trigger target DL misbehave which significantly hinders the application of in security-sensitive domains. Intensive research on has led an arms race between adversaries and defenders. Such plethora emerging attacks defenses raise many questions: Which more evasive, preprocessing-proof, or transferable? effective, utility-preserving, general? Are ensembles multiple robust than individuals?...

10.1109/sp.2019.00023 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2019-05-01

In recent years, real-world attacks against PKI take place frequently. For example, malicious domains' certificates issued by compromised CAs are widespread, and revoked still trusted clients. spite of a lot research to improve the security SSL/TLS connections, there some problems unsolved. On one hand, although log-based schemes provided certificate audit service quickly detect CAs' misbehavior, data consistency log servers ignored. other checking is neglected due incomplete, insecure...

10.1109/infocom.2018.8486344 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

Nowadays, many computer and communication systems generate graph data. Graph data span different domains, ranging from online social network networks like Facebook to epidemiological used study the spread of infectious diseases. are shared regularly for purposes including academic research business collaborations. Since may be sensitive, owners often use various anonymization techniques that compromise resulting utility anonymized To make matters worse, there several state-of-the-art...

10.1109/comst.2016.2633620 article EN IEEE Communications Surveys & Tutorials 2016-12-01

Recently, a new paradigm of building general-purpose language models (e.g., Google's Bert and OpenAI's GPT-2) in Natural Language Processing (NLP) for text feature extraction, standard procedure NLP systems that converts texts to vectors (i.e., embeddings) downstream modeling, has arisen starts find its application various tasks real world search engine [6]). To obtain embeddings, these have highly complicated architectures with millions learnable parameters are usually pretrained on...

10.1109/sp40000.2020.00095 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2020-05-01

In this paper, we study the quantification, practice, and implications of structural data (e.g., social data, mobility traces) De-Anonymization (DA). First, address several open problems in DA by quantifying perfect (1-ε)-perfect DA}, where ε is error tolerated a scheme. To best our knowledge, first work on under general model, which closes gap between practice theory. Second, conduct large-scale de-anonymizability 26 real world datasets, including Social Networks (SNs), Collaborations...

10.1145/2660267.2660278 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

Despite their immense popularity, deep learning-based acoustic systems are inherently vulnerable to adversarial attacks, wherein maliciously crafted audios trigger target misbehave. In this paper, we present SirenAttack, a new class of attacks generate audios. Compared with existing SirenAttack highlights set significant features: (i) versatile -- it is able deceive range end-to-end under both white-box and black-box settings; (ii) effective that can be recognized as specific phrases by...

10.1145/3320269.3384733 article EN 2020-10-05

With the explosive development of information technology, vulnerabilities have become one major threats to computer security. Most with similar patterns can be detected effectively by static analysis methods. However, some vulnerable and non-vulnerable code is hardly distinguishable, resulting in low detection accuracy. In this paper, we define accurate identification as a fine-grained vulnerability problem. We propose VulSniper which designed detect more effectively. VulSniper, attention...

10.24963/ijcai.2019/648 article EN 2019-07-28

Recent years have witnessed the emergence of a new paradigm building natural language processing (NLP) systems: general-purpose, pre-trained models (LMs) are composed with simple downstream and fine-tuned for variety NLP tasks. This shift significantly simplifies system development cycles. However, as many LMs provided by untrusted third parties, their lack standardization or regulation entails profound security implications, which largely unexplored. To bridge this gap, work studies threats...

10.1109/eurosp51992.2021.00022 article EN 2021-09-01

Despite their tremendous success in a range of domains, deep learning systems are inherently susceptible to two types manipulations: adversarial inputs -- maliciously crafted samples that deceive target neural network (DNN) models, and poisoned models adversely forged DNNs misbehave on pre-defined inputs. While prior work has intensively studied the attack vectors parallel, there is still lack understanding about fundamental connections: what dynamic interactions between vectors?...

10.1145/3372297.3417253 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

Smart contracts hold digital coins worth billions of dollars, their security issues have drawn extensive attention in the past years. Towards smart contract vulnerability detection, conventional methods heavily rely on fixed expert rules, leading to low accuracy and poor scalability. Recent deep learning approaches alleviate this issue but fail encode useful knowledge. In paper, we explore combining with patterns an explainable fashion. Specifically, develop automatic tools extract from...

10.24963/ijcai.2021/379 article EN 2021-08-01

Abstract The low viability during gastrointestinal transit and poor mucoadhesion considerably limits the effectiveness of Ligilactobacillus salivarius Li01 (Li01) in regulating gut microbiota alleviating inflammatory bowel disease (IBD). In this study, a delivery system was designed through layer-by-layer (LbL) encapsulating single Li01cell with chitosan alginate. layers were strengthened by cross-linking to form firm mucoadhesive shell (~10 nm thickness) covering bacterial cell. LbL...

10.1038/s41522-021-00228-1 article EN cc-by npj Biofilms and Microbiomes 2021-07-09

Predicting human motion from historical pose sequence is crucial for a machine to succeed in intelligent interactions with humans. One aspect that has been obviated so far, the fact how we represent skeletal critical impact on prediction results. Yet there no effort investigates across different representation schemes. We conduct an indepth study various representations focus their effects task. Moreover, recent approaches build upon off-the-shelf RNN units prediction. These process input...

10.1109/tpami.2021.3139918 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2022-01-04

Federated learning (FL) has emerged as a privacy-aware collaborative paradigm where participants jointly train powerful model without sharing their private data. One desirable property for FL is the implementation of <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">right to be forgotten (RTBF)</i> , i.e., leaving participant right request deletion its data from global model. However, xmlns:xlink="http://www.w3.org/1999/xlink">unlearning itself...

10.1109/tdsc.2024.3382321 article EN IEEE Transactions on Dependable and Secure Computing 2024-01-01

As the first defensive layer that attacks would hit, web application firewall (WAF) plays an indispensable role in defending against malicious like SQL injection (SQLi). With development of cloud computing, WAF-as-a-service, as one kind Security-as-a-service, has been proposed to facilitate deployment, configuration, and update WAFs cloud. Despite its tremendous popularity, security vulnerabilities WAF-as-a-service are still largely unknown, which is highly concerning given massive usage. In...

10.1109/tifs.2024.3350911 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

Providing explanations for deep neural network (DNN) models is crucial their use in security-sensitive domains. A plethora of interpretation have been proposed to help users understand the inner workings DNNs: how does a DNN arrive at specific decision given input? The improved interpretability believed offer sense security by involving human decision-making process. Yet, due its data-driven nature, itself potentially susceptible malicious manipulations, about which little known thus far....

10.48550/arxiv.1812.00891 preprint EN other-oa arXiv (Cornell University) 2018-01-01

In this paper, we consider the problem of multiparty deep learning (MDL), wherein autonomous data owners jointly train accurate neural network models without sharing their private data. We design, implement, and evaluate ∝MDL, a new MDL paradigm built upon three primitives: asynchronous optimization, lightweight homomorphic encryption, threshold secret sharing. Compared with prior work, ∝MDL departs in significant ways: a) besides providing explicit privacy guarantee, it retains desirable...

10.1109/icdcs.2017.215 article EN 2017-06-01
Coming Soon ...