Publications [Google Scholar] [dblp] (*: equal contribution)

  • CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling
    Kaiyuan Zhang, Siyuan Cheng, Guangyu Shen, Bruno Ribeiro, Shengwei An, Pin-Yu Chen, Xiangyu Zhang, Ninghui Li
    Proceedings of the 32nd Network and Distributed System Security Symposium (NDSS 2025)
    [paper] [code] [website]
  • BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target
    Guangyu Shen*, Siyuan Cheng*, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Hanxi Guo, Lu Yan, Xiaolong Jin, Shengwei An, Shiqing Ma, Xiangyu Zhang
    Proceedings of the 46th IEEE Symposiums on Security and Privacy (S&P 2025)
    [paper (coming soon)]
  • Source Code Foundation Models are Transferable Binary Analysis Knowledge Bases
    Zian Su, Xiangzhe Xu, Ziyang Huang, Kaiyuan Zhang, Xiangyu Zhang
    Proceedings of the Thirty-Eighth Annual Conference on Neural Information Processing Systems (NeurIPS 2024)
    [paper] [code]
  • BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens
    Hanxi Guo, Siyuan Cheng, Xiaolong Jin, Zhuo Zhang, Kaiyuan Zhang, Guanhong Tao, Guangyu Shen, Xiangyu Zhang
    Proceedings of the Thirty-Eighth Annual Conference on Neural Information Processing Systems (NeurIPS 2024)
    [paper (coming soon)] [code]
  • UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening
    Siyuan Cheng*, Guangyu Shen*, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Hanxi Guo, Shiqing Ma, Xiangyu Zhang
    The 18th European Conference on Computer Vision (ECCV 2024)
    [paper] [code]
  • Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion
    Shengwei An*, Lu Yan*, Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Xiangyu Zhang
    Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024)
    [paper] [code]
  • LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
    Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang
    IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2024)
    [paper] [code]
  • Exploring the Orthogonality and Linearity of Backdoor Attacks
    Kaiyuan Zhang*, Siyuan Cheng*, Guangyu Shen, Guanhong Tao, Shengwei An, Anuran Makur, Shiqing Ma, Xiangyu Zhang
    Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P 2024)
    [paper] [code] [slides] [video] [poster] [website]
  • ODSCAN: Backdoor Scanning for Object Detection Models
    Siyuan Cheng*, Guangyu Shen*, Guanhong Tao, Kaiyuan Zhang, Zhuo Zhang, Shengwei An, Xiangzhe Xu, Yingqi Liu, Shiqing Ma, Xiangyu Zhang
    Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P 2024)
    [paper] [code]
  • Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift
    Shengwei An, Sheng-Yen Chou, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Guangyu Shen, Siyuan Cheng, Shiqing Ma, Pin-Yu Chen, Tsung-Yi Ho, Xiangyu Zhang
    Proceedings of the 38th Annual AAAI Conference on Artificial Intelligence (AAAI 2024)
    [paper] [code]
  • ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP
    Lu Yan, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Xuan Chen, Guangyu Shen, Xiangyu Zhang
    Proceedings of the Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS 2023)
    [paper]
  • Django: Detecting Trojans in Object Detection Models via Gaussian Focus Calibration
    Guangyu Shen*, Siyuan Cheng*, Guanhong Tao, Kaiyuan Zhang, Yingqi Liu, Shengwei An, Shiqing Ma, Xiangyu Zhang
    Proceedings of the Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS 2023)
    [paper] [code]
  • Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract
    Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang
    Proceedings of the 32nd USENIX Security Symposium (USENIX Security 2023)
    [paper]
  • ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes
    Shengwei An, Yuan Yao, Qiuling Xu, Shiqing Ma, Guanhong Tao, Siyuan Cheng, Kaiyuan Zhang, Yingqi Liu, Guangyu Shen, Ian Kelk, Xiangyu Zhang
    Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P 2023)
    [paper] [code]
  • Detecting Backdoors in Pre-trained Encoders
    Shiwei Feng, Guanhong Tao, Siyuan Cheng, Guangyu Shen, Xiangzhe Xu, Yingqi Liu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang
    Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition 2023 (CVPR 2023)
    [paper] [code]
  • FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
    Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-Yu Chen, Shiqing Ma, Xiangyu Zhang
    Proceedings of the Eleventh International Conference on Learning Representations (ICLR 2023)
    ECCV 2022 Workshop on Adversarial Robustness in the Real World (AROW 2022), Best Paper Award 🏆
    [paper] [code] [slides] [media coverage]
  • BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
    Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang
    Proceedings of the 30th Network and Distributed System Security Symposium (NDSS 2023)
    [paper] [code]
  • DRGraph: An Efficient Graph Layout Algorithm for Large-scale Graphs by Dimensionality Reduction
    Minfeng Zhu, Wei Chen, Yuanzhe Hu, Yuxuan Hou, Liangjun Liu, Kaiyuan Zhang
    IEEE Transactions on Visualization and Computer Graphics (TVCG 2021)
    [paper] [code]
  • Enhancing statistical charts: toward better data visualization and analysis
    Xiaonan Luo, Yuan Yuan, Kaiyuan Zhang, Jiazhi Xia, Zhiguang Zhou, Liang Chang, Tianlong Gu
    Journal of Visualization (JOV 2019)
    [paper]