Search Results for author: Zhou Li

Found 7 papers, 2 papers with code

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

no code implementations5 Jan 2018 Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiao-Feng Wang, Kehuan Zhang

In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.

Cryptography and Security

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks

no code implementations31 Aug 2019 Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang

However, in the meantime, such a fast-growing technology has also introduced new privacy issues, which need to be better understood and measured.

Cryptography and Security

Maestro: A Gamified Platform for Teaching AI Robustness

no code implementations14 Jun 2023 Margarita Geleta, Jiacen Xu, Manikanta Loya, Junlin Wang, Sameer Singh, Zhou Li, Sergio Gago-Masague

We assessed Maestro's influence on students' engagement, motivation, and learning success in robust AI.

Active Learning

A Comprehensive Study of Privacy Risks in Curriculum Learning

no code implementations16 Oct 2023 Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li

Training a machine learning model with data following a meaningful order, i. e., from easy to hard, has been proven to be effective in accelerating the training process and achieving better model performance.

Attribute Inference Attack +3

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

no code implementations2 Mar 2024 Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li

Large language models (LLMs) have demonstrated impressive results on natural language tasks, and security researchers are beginning to employ them in both offensive and defensive systems.

Computer Security Language Modelling +1

Cannot find the paper you are looking for? You can Submit a new open access paper.