Search Results for author: Jingqiang Lin

Found 2 papers, 0 papers with code

Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems

no code implementations31 May 2022 Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo

In this paper, we present the first large-scale study on the stealthiness of adversarial samples used in the attacks against deep learning.

Benchmarking

Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices

no code implementations19 Jun 2017 Chen Cao, Le Guan, Peng Liu, Neng Gao, Jingqiang Lin, Ji Xiang

In particular, at a negotiated time slot, a customer is required to reboot the compromised device, then a "white" Mirai operated by the manufacturer breaks into the clean-state IoT devices immediately.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.