Follow
Chengfang Fang
Chengfang Fang
Principal Researcher, Huawei International
Verified email at huawei.com
Title
Cited by
Cited by
Year
Backdoor pre-trained models can transfer to all
L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang
arXiv preprint arXiv:2111.00197, 2021
1192021
BDPL: A boundary differentially private layer against machine learning model extraction attacks
H Zheng, Q Ye, H Hu, C Fang, J Shi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
652019
Mitigating application layer distributed denial of service attacks via effective trust management
J Yu, C Fang, L Lu, Z Li
IET communications 4 (16), 1952-1962, 2010
612010
ID repetition in Kad
J Yu, C Fang, J Xu, EC Chang, Z Li
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 111-120, 2009
482009
A lightweight mechanism to mitigate application layer DDoS attacks
J Yu, C Fang, L Lu, Z Li
Scalable Information Systems: 4th International ICST Conference, INFOSCALE …, 2009
432009
PrivKVM*: Revisiting key-value statistics estimation with local differential privacy
Q Ye, H Hu, X Meng, H Zheng, K Huang, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing 20 (1), 17-35, 2021
392021
Protecting decision boundary of machine learning model with differentially private perturbation
H Zheng, Q Ye, H Hu, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing 19 (3), 2007-2022, 2020
362020
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang
CCS 21 (2021), 15-19, 2021
342021
3dfed: Adaptive and extensible framework for covert backdoor attack in federated learning
H Li, Q Ye, H Hu, J Li, L Wang, C Fang, J Shi
2023 IEEE Symposium on Security and Privacy (SP), 1893-1907, 2023
312023
An optimization model for aesthetic two-dimensional barcodes
C Fang, C Zhang, EC Chang
MultiMedia Modeling: 20th Anniversary International Conference, MMM 2014 …, 2014
202014
Differential privacy with δ-neighbourhood for spatial and dynamic datasets
C Fang, EC Chang
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
172014
Thief, beware of what get you there: Towards understanding model extraction attack
X Zhang, C Fang, J Shi
arXiv preprint arXiv:2104.05921, 2021
122021
Secure sketch for multiple secrets
C Fang, Q Li, EC Chang
Applied Cryptography and Network Security: 8th International Conference …, 2010
122010
Information leakage in optimal anonymized and diversified data
C Fang, EC Chang
Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008
112008
Securing interactive sessions using mobile device through visual channel and visual inspection
C Fang, EC Chang
Proceedings of the 26th Annual Computer Security Applications Conference, 69-78, 2010
102010
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness
H Fang, K Chen, Y Qiu, J Liu, K Xu, C Fang, W Zhang, EC Chang
Proceedings of the 31st ACM International Conference on Multimedia, 7345-7353, 2023
92023
Quda: Query-limited data-free model extraction
Z Lin, K Xu, C Fang, H Zheng, A Ahmed Jaheezuddin, J Shi
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
92023
A goal-oriented approach for modeling and analyzing attack graph
X Liu, C Fang, D Xiao, H Xu
2010 International Conference on Information Science and Applications, 1-8, 2010
92010
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers
J Zhang, H Fang, WJW Tann, K Xu, C Fang, EC Chang
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
82023
Differential aggregation against general colluding attackers
R Du, Q Ye, Y Fu, H Hu, J Li, C Fang, J Shi
2023 IEEE 39th International Conference on Data Engineering (ICDE), 2180-2193, 2023
82023
The system can't perform the operation now. Try again later.
Articles 1–20