Deqiang Li

ORCID: 0000-0003-3456-902X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Adversarial Robustness in Machine Learning
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Image Retrieval and Classification Techniques
  • Anomaly Detection Techniques and Applications
  • Face and Expression Recognition
  • Image and Signal Denoising Methods
  • Neural Networks and Applications
  • Advanced Graph Neural Networks
  • Advanced Image and Video Retrieval Techniques
  • Video Surveillance and Tracking Methods
  • Blind Source Separation Techniques
  • Security and Verification in Computing
  • Image and Video Stabilization
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Image Fusion Techniques
  • Biometric Identification and Security
  • Topic Modeling
  • Advanced Research in Science and Engineering
  • Advanced Computational Techniques and Applications
  • Remote-Sensing Image Classification
  • Human Pose and Action Recognition
  • Control Systems and Identification
  • Image and Object Detection Techniques
  • Simulation and Modeling Applications

Nanjing University of Posts and Telecommunications
2023-2024

Xinjiang Agricultural University
2024

University of Colorado Colorado Springs
2023

Nanjing Institute of Technology
2023

Nanjing University of Science and Technology
2017-2021

University of Alberta
2013

Chinese Academy of Sciences
2005-2011

Shenyang Institute of Automation
2005-2011

Malware remains a big threat to cyber security, calling for machine learning based malware detection. While promising, such detectors are known be vulnerable evasion attacks. Ensemble typically facilitates countermeasures, while attackers can leverage this technique improve attack effectiveness as well. This motivates us investigate which kind of robustness the ensemble defense or achieve, particularly when they combat with each other. We thus propose new approach, named mixture attacks, by...

10.1109/tifs.2020.3003571 article EN IEEE Transactions on Information Forensics and Security 2020-01-01

Machine learning-based malware detection is known to be vulnerable adversarial evasion attacks. The state-of-the-art that there are no effective defenses against these As a response the classification challenge organized by MIT Lincoln Lab and associated with AAAI-19 Workshop on Artificial Intelligence for Cyber Security (AICS'2019), we propose six guiding principles enhance robustness of deep neural networks. Some have been scattered in literature, but others introduced this paper first...

10.1109/tnse.2021.3051354 article EN publisher-specific-oa IEEE Transactions on Network Science and Engineering 2021-01-01

Machine Learning (ML) techniques can facilitate the automation of malicious software (malware for short) detection, but suffer from evasion attacks.Many studies counter such attacks in heuristic manners, lacking theoretical guarantees and defense effectiveness.In this paper, we propose a new adversarial training framework, termed Principled Adversarial Malware Detection (PAD), which offers convergence robust optimization methods.PAD lays on learnable convex measurement that quantifies...

10.1109/tdsc.2023.3265665 article EN IEEE Transactions on Dependable and Secure Computing 2023-04-07

10.1016/j.patcog.2013.07.019 article EN Pattern Recognition 2013-08-08

The Internet of Things (IoT) has grown rapidly due to artificial intelligence driven edge computing. While enabling many new functions, computing devices expand the vulnerability surface and have become target malware attacks. Moreover, attackers used advanced techniques evade defenses by transforming their into functionality-preserving variants. We systematically analyze such evasion attacks conduct a large-scale empirical study in this paper evaluate impact on security. More specifically,...

10.26599/tst.2023.9010005 article EN Tsinghua Science & Technology 2023-08-21

Adversarial machine learning in the context of image processing and related applications has received a large amount attention. However, adversarial learning, especially deep malware detection much less attention despite its apparent importance. In this paper, we present framework for enhancing robustness Deep Neural Networks (DNNs) against samples, dubbed Hashing Transformation Networks} (HashTran-DNN). The core idea is to use hash functions with certain locality-preserving property...

10.48550/arxiv.1809.06498 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Malware continues to be a major cyber threat, despite the tremendous effort that has been made combat them. The number of malware in wild steadily increases over time, meaning we must resort automated defense techniques. This naturally calls for machine learning based detection. However, is known vulnerable adversarial evasion attacks manipulate small features make classifiers wrongly recognize sample as benign one. state-of-the-art there are no effective countermeasures against these...

10.48550/arxiv.1812.08108 preprint EN other-oa arXiv (Cornell University) 2018-01-01

The deep learning approach to detecting malicious software (malware) is promising but has yet tackle the problem of dataset shift, namely that joint distribution examples and their labels associated with test set different from training set. This causes degradation models without users' notice. In order alleviate problem, one let a classifier not only predict label on given example also present its uncertainty (or confidence) predicted label, whereby defender can decide whether use or not....

10.1145/3485832.3485916 article EN Annual Computer Security Applications Conference 2021-12-06

Abstract Hydrovoltaic electricity generators (HEGs), which can harvest clean energy from the ubiquitous evaporation of water, have recently attracted significant interest. The utilization renewable porous aerogels in development HEGs enhance their sustainability and performance. Herein, an efficient HEG based on ambient‐dried composite (ADAs) composed nanocellulose carbon nanotubes (CNTs) is presented. abundant carboxyl groups CNTs enable electrostatic complexation with metal ions. This not...

10.1002/adfm.202418823 article EN Advanced Functional Materials 2024-12-13

With the rapid growing of crowdsourcing systems, class labels for supervised learning can be easily obtained from platforms. To deal with problem that crowds are usually noisy due to imperfect reliability non-expert workers, we let multiple workers provide same object. Then, true labeled object estimated through ground truth inference algorithms. The inferred integrated expected high quality. In this paper, propose a novel algorithm based on EM algorithm, which not only infers instances but...

10.1109/iske.2017.8258809 article EN 2021 16th International Conference on Intelligent Systems and Knowledge Engineering (ISKE) 2017-11-01

With the development of artificial intelligence (AI) in field drug design and discovery, learning informative representations molecules is becoming crucial for those AI-driven tasks. In recent years, graph neural networks (GNNs) have emerged as a preferred choice deep architecture been successfully applied to molecular representation (MRL). Up-to-date MRL methods directly apply message passing mechanism on atom-level attributes (i.e., atoms bonds) molecules. However, they neglect latent yet...

10.1155/2023/3756102 article EN cc-by Computational Intelligence and Neuroscience 2023-01-01

Discrete wavelet transform (DWT) is sensitive to the translation/shift of input signals, so its effectiveness could be negatively impacted when we encounter translation among signals. To deal with such drawbacks, this paper proposes redundant DWT(RDWT) based method achieve image registration, invariant feature extraction and face recognition. We select a representative from each person form reference set perform DWT on it. For test face, RDWT compare horizontal vertical details corresponding...

10.1109/icpr.2008.4761070 article EN Proceedings - International Conference on Pattern Recognition/Proceedings/International Conference on Pattern Recognition 2008-12-01

In this paper, we present a novel method, namely SimWalk, to learn latent representations of networks. SimWalk maps nodes continuous vector space which maximizes the likelihood node sequences. We design probability-guided random walk procedure based on relation similarity, encourages sequences preserve context-related neighborhoods. Different with previous work generates rigid sequences, believe that relations in social net­works, especially can guide generate more linguistic sequence....

10.1109/iske.2017.8258804 article EN 2021 16th International Conference on Intelligent Systems and Knowledge Engineering (ISKE) 2017-11-01

The Industrial 5.0 Model integrates enabling technologies such as deep learning, digital twins, and the meta-universe with new development concepts. However, model data security may pose challenges for developing zero-defect production other industrial manufacturing industries. To address this issue, we generate adversarial examples using a one-pixel attack in machine which can fool defect detection classification model. traditional based on Differential Evolution (DE) algorithm has limited...

10.1016/j.jksuci.2023.101689 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2023-08-15

This aiming at improving the lossless compression ratio of hyperspectral image, a three-dimensional LMS (3DLMS) algorithm is first deduced and applied into field image compression. A novel adaptive prediction model based on 3DLMS for proposed optimized by local casual set mean subtraction method. Experimental results AVIRIS images show that can remove both spatial spectral redundancy achieve higher ratios than other state-of-the-art algorithms. The feasibility in signal processing also...

10.1109/cisp.2009.5301597 article EN 2009-10-01

We propose a novel learning algorithm, called Bagging-Adaboost ensemble algorithm with genetic post optimization, for object detection that uses local shape-based feature. The feature is motivated by the scheme use chamfer distance as shape comparison measure. It can be calculated very quickly using look-up table. Random sampling boosting used to select discriminative edge features set from over-complete dictionary of and form an detector. Genetic optimization procedure remove based...

10.1109/icnc.2009.70 article EN 2009-01-01

10.3724/sp.j.1004.2011.00061 article EN ACTA AUTOMATICA SINICA 2011-05-25

We present a learning model for object detection that uses novel local edge features. The features are motivated by the scheme use chamfer distance as shape comparison measure. can be calculated very quickly using look-up table. Adaboost algorithm is used to select discriminative set from an over-complete pool and combine them form detector. To demonstrate our method we trained system detect car in complex natural scenes single model. Experimental results show extremely rapidly objects...

10.1109/icinfa.2009.5204987 article EN International Conference on Information and Automation 2009-06-01
Coming Soon ...