Bo Li

20092019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Learning systems Engineering & Materials Science
Classifiers Engineering & Materials Science
Non-Small Cell Lung Carcinoma Medicine & Life Sciences
Testing Engineering & Materials Science
Experiments Engineering & Materials Science
Communication Engineering & Materials Science
Authentication Engineering & Materials Science
Data privacy Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2009 2019

Characterizing audio adversarial examples using temporal dependency

Yang, Z., Chen, P. Y., Li, B. & Song, D., Jan 1 2019.

Research output: Contribution to conferencePaper

Speech recognition
Neural networks
neural network
Experiments
threat

Database audit workload prioritization via game theory

Yan, C., Li, B., Vorobeychik, Y., Laszka, A., Fabbri, D. & Malin, B., Jun 10 2019, In : ACM Transactions on Privacy and Security. 22, 3, 17.

Research output: Contribution to journalArticle

Game theory
Data privacy
Linear programming
Computational complexity

DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems

Ma, L., Juefei-Xu, F., Xue, M., Li, B., Li, L., Liu, Y. & Zhao, J., Mar 15 2019, SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering. Shihab, E., Lo, D. & Wang, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 614-618 5 p. 8668044. (SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Testing
Deep learning

Deephunter: A coverage-guided fuzz testing framework for deep neural networks

Xie, X., Ma, L., Juefei-Xu, F., Xue, M., Chen, H., Liu, Y., Zhao, J., Li, B., Yin, J. & See, S., Jul 10 2019, ISSTA 2019 - Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. Zhang, D. & Moller, A. (eds.). Association for Computing Machinery, Inc, p. 158-168 11 p. (ISSTA 2019 - Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Seed
Testing
Defects
Deep neural networks
Accidents

DEEPSEC: A uniform platform for security analysis of deep learning model

Ling, X., Ji, S., Zou, J., Wang, J., Wu, C., Li, B. & Wang, T., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 673-690 18 p. 8835375. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Deep learning