Bo Li

If you made any changes in Pure these will be visible here soon.

Research Output

2020

Learning salient seeds refer to the manifold ranking and background-prior strategy

Chou, Y. C., Nien, Y. W., Chen, Y. C., Li, B. & Lee, J. S., Mar 1 2020, In : Multimedia Tools and Applications. 79, 9-10, p. 5859-5879 21 p.

Research output: Contribution to journalArticle

Towards efficient data valuation based on the Shapley value

Jia, R., Dao, D., Wang, B., Hubis, F. A., Hynes, N., Gurel, N. M., Li, B., Zhang, C., Song, D. & Spanos, C., 2020.

Research output: Contribution to conferencePaper

To warn or not to warn: Online signaling in audit games

Yan, C., Xu, H., Vorobeychik, Y., Li, B., Fabbri, D. & Malin, B. A., Apr 2020, Proceedings - 2020 IEEE 36th International Conference on Data Engineering, ICDE 2020. IEEE Computer Society, p. 481-492 12 p. 9101660. (Proceedings - International Conference on Data Engineering; vol. 2020-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

AdvIT: Adversarial frames identifier based on temporal consistency in videos

Xiao, C., Deng, R., Li, B., Lee, T., Edwards, B., Yi, J., Song, D., Liu, M. & Molloy, I., Oct 2019, Proceedings - 2019 International Conference on Computer Vision, ICCV 2019. Institute of Electrical and Electronics Engineers Inc., p. 3967-3976 10 p. 9010733. (Proceedings of the IEEE International Conference on Computer Vision; vol. 2019-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Characterizing audio adversarial examples using temporal dependency

Yang, Z., Chen, P. Y., Li, B. & Song, D., Jan 1 2019.

Research output: Contribution to conferencePaper

Database audit workload prioritization via game theory

Yan, C., Li, B., Vorobeychik, Y., Laszka, A., Fabbri, D. & Malin, B., Jun 10 2019, In : ACM Transactions on Privacy and Security. 22, 3, 17.

Research output: Contribution to journalArticle

DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems

Ma, L., Juefei-Xu, F., Xue, M., Li, B., Li, L., Liu, Y. & Zhao, J., Mar 15 2019, SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering. Shihab, E., Lo, D. & Wang, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 614-618 5 p. 8668044. (SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Deephunter: A coverage-guided fuzz testing framework for deep neural networks

Xie, X., Ma, L., Juefei-Xu, F., Xue, M., Chen, H., Liu, Y., Zhao, J., Li, B., Yin, J. & See, S., Jul 10 2019, ISSTA 2019 - Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. Zhang, D. & Moller, A. (eds.). Association for Computing Machinery, Inc, p. 158-168 11 p. (ISSTA 2019 - Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

DEEPSEC: A uniform platform for security analysis of deep learning model

Ling, X., Ji, S., Zou, J., Wang, J., Wu, C., Li, B. & Wang, T., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 673-690 18 p. 8835375. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Generating 3D adversarial point clouds

Xiang, C., Qi, C. R. & Li, B., Jun 2019, Proceedings - 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2019. IEEE Computer Society, p. 9128-9136 9 p. 8953645. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition; vol. 2019-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

How you act tells a lot: Privacy-leaking attack on deep reinforcement learning

Pan, X., Li, B., Wang, W., Yi, J., Zhang, X. & Song, D., 2019, 18th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2019. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 368-376 9 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Improving robustness of ML classifiers against realizable evasion attacks using conserved features

Tong, L., Li, B., Zhang, N., Hajaj, C., Xiao, C. & Vorobeychik, Y., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 285-302 18 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MeshAdv: Adversarial meshes for visual recognition

Xiao, C., Yang, D., Li, B., Deng, J. & Liu, M., Jun 2019, Proceedings - 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2019. IEEE Computer Society, p. 6891-6900 10 p. 8953197. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition; vol. 2019-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Performing co-membership attacks against deep generative models

Liu, K. S., Xiao, C., Li, B. & Gao, J., Nov 2019, Proceedings - 19th IEEE International Conference on Data Mining, ICDM 2019. Wang, J., Shim, K. & Wu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 459-467 9 p. 8970995. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2019-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Robustra: Training provable robust neural networks over reference adversarial space

Li, L., Zhong, Z., Li, B. & Xie, T., Jan 1 2019, Proceedings of the 28th International Joint Conference on Artificial Intelligence, IJCAI 2019. Kraus, S. (ed.). International Joint Conferences on Artificial Intelligence, p. 4711-4717 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2019-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A joint optimization approach for personalized recommendation diversification

Wang, X., Qi, J., Ramamohanarao, K., Sun, Y., Li, B. & Zhang, R., Jan 1 2018, Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings. Webb, G. I., Phung, D., Ganji, M., Rashidi, L., Tseng, V. S. & Ho, B. (eds.). Springer-Verlag Berlin Heidelberg, p. 597-609 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10939 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach

Chen, S., Xue, M., Fan, L., Hao, S., Xu, L., Zhu, H. & Li, B., Mar 2018, In : Computers and Security. 73, p. 326-344 19 p.

Research output: Contribution to journalArticle

Black-box attacks on deep neural networks via gradient estimation

Bhagoji, A. N., He, W., Li, B. & Song, D., Jan 1 2018.

Research output: Contribution to conferencePaper

Characterizing adversarial examples based on spatial consistency information for semantic segmentation

Xiao, C., Deng, R., Li, B., Yu, F., Liu, M. & Song, D., Jan 1 2018, Computer Vision – ECCV 2018 - 15th European Conference, 2018, Proceedings. Hebert, M., Ferrari, V., Sminchisescu, C. & Weiss, Y. (eds.). Springer-Verlag Berlin Heidelberg, p. 220-237 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11214 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Characterizing adversarial subspaces using local intrinsic dimensionality

Ma, X., Li, B., Wang, Y., Erfani, S. M., Wijewickrema, S., Schoenebeck, G., Song, D., Houle, M. E. & Bailey, J., Jan 1 2018.

Research output: Contribution to conferencePaper

Decision boundary analysis of adversarial examples

He, W., Li, B. & Song, D., Jan 1 2018.

Research output: Contribution to conferencePaper

DeepGauge: Multi-granularity testing criteria for deep learning systems

Ma, L., Juefei-Xu, F., Zhang, F., Sun, J., Xue, M., Li, B., Chen, C., Su, T., Li, L., Liu, Y., Zhao, J. & Wang, Y., Sep 3 2018, ASE 2018 - Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. Kastner, C., Huchard, M. & Fraser, G. (eds.). Association for Computing Machinery, Inc, p. 120-131 12 p. (ASE 2018 - Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DeepMutation: Mutation Testing of Deep Learning Systems

Ma, L., Zhang, F., Sun, J., Xue, M., Li, B., Juefei-Xu, F., Xie, C., Li, L., Liu, Y., Zhao, J. & Wang, Y., Nov 16 2018, Proceedings - 29th IEEE International Symposium on Software Reliability Engineering, ISSRE 2018. Ghosh, S., Cukic, B., Poston, R., Natella, R. & Laranjeiro, N. (eds.). IEEE Computer Society, p. 100-111 12 p. 8539073. (Proceedings - International Symposium on Software Reliability Engineering, ISSRE; vol. 2018-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Efficient task specific data valuation for nearest neighbor algorithms

Jia, R., Dao, D., Wang, B., Hubis, F. A., Gurel, N. M., Li, B., Zhang, C., Spanos, C. & Song, D., 2018, In : Proceedings of the VLDB Endowment. 12, 11, p. 1610-1623 14 p.

Research output: Contribution to journalConference article

Evasion-robust classification on binary domains

Li, B. & Vorobeychik, Y., Jul 2018, In : ACM Transactions on Knowledge Discovery from Data. 12, 4, a50.

Research output: Contribution to journalArticle

Generating adversarial examples with adversarial networks

Xiao, C., Li, B., Zhu, J. Y., He, W., Liu, M. & Song, D., 2018, Proceedings of the 27th International Joint Conference on Artificial Intelligence, IJCAI 2018. Lang, J. (ed.). International Joint Conferences on Artificial Intelligence, p. 3905-3911 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2018-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Get your workload in order: Game theoretic prioritization of database auditing

Yan, C., Li, B., Vorobeychik, Y., Laszka, A., Fabbri, D. & Malin, B., Oct 24 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1308-1311 4 p. 8509357. (Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning

Jagielski, M., Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C. & Li, B., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 19-35 17 p. 8418594. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Orthogonal weight normalization: Solution to optimization over multiple dependent stiefel manifolds in deep neural networks

Huang, L., Liu, X., Lang, B., Yu, A. W., Wang, Y. & Li, B., 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI Press, p. 3271-3278 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Poisoning Attacks on Data-Driven Utility Learning in Games

Jia, R., Konstantakopoulos, I. C., Li, B. & Spanos, C., Aug 9 2018, 2018 Annual American Control Conference, ACC 2018. Institute of Electrical and Electronics Engineers Inc., p. 5774-5780 7 p. 8431872. (Proceedings of the American Control Conference; vol. 2018-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Practical black-box attacks on deep neural networks using efficient query mechanisms

Bhagoji, A. N., He, W., Li, B. & Song, D., Jan 1 2018, Computer Vision – ECCV 2018 - 15th European Conference, 2018, Proceedings. Hebert, M., Ferrari, V., Sminchisescu, C. & Weiss, Y. (eds.). Springer-Verlag Berlin Heidelberg, p. 158-174 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11216 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spatially transformed adversarial examples

Xiao, C., Zhu, J. Y., Li, B., He, W., Liu, M. & Song, D., Jan 1 2018.

Research output: Contribution to conferencePaper

Superlinear Convergence of Randomized Block Lanczos Algorithm

Yuan, Q., Gu, M. & Li, B., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 1404-1409 6 p. 8595002. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Automated QoS-oriented cloud resource optimization using containers

Sun, Y., White, J., Li, B., Walker, M. & Turner, H., Mar 1 2017, In : Automated Software Engineering. 24, 1, p. 101-137 37 p.

Research output: Contribution to journalArticle

Engineering agreement: The naming game with asymmetric and heterogeneous agents

Gao, J., Li, B., Schoenebeck, G. & Yu, F. Y., Jan 1 2017, p. 537-543. 7 p.

Research output: Contribution to conferencePaper

Large-scale identification of malicious singleton files

Li, B., Roundy, K., Gates, C. & Vorobeychik, Y., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 227-238 12 p. (CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Oblivious transfer system for information concealing and recovery in cloud computing

Lee, J. S., Li, B. & Huang, B. R., Jan 1 2017, In : Journal of Internet Technology. 18, 1, p. 55-63 9 p.

Research output: Contribution to journalArticle

Robust linear regression against training data poisoning

Liu, C., Li, B., Vorobeychik, Y. & Oprea, A., Nov 3 2017, AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 91-102 12 p. (AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalable Iterative Classification for Sanitizing Large-Scale Datasets

Li, B., Vorobeychik, Y., Li, M. & Malin, B., Mar 1 2017, In : IEEE Transactions on Knowledge and Data Engineering. 29, 3, p. 698-711 14 p., 7742323.

Research output: Contribution to journalArticle

SMP: Scalable multicast protocol for granting authority in heterogeneous networks

Wei, K. J., Lee, J. S. & Li, B., Jan 1 2017, In : International Journal of Network Security. 19, 1, p. 60-71 12 p.

Research output: Contribution to journalArticle

2016

Behavioral experiments in email filter evasion

Ke, L., Li, B. & Vorobeychik, Y., Jan 1 2016, 30th AAAI Conference on Artificial Intelligence, AAAI 2016. AAAI Press, p. 827-833 7 p. (30th AAAI Conference on Artificial Intelligence, AAAI 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data poisoning attacks on factorization-based collaborative filtering

Li, B., Wang, Y., Singh, A. & Vorobeychik, Y., Jan 1 2016, In : Advances in Neural Information Processing Systems. p. 1893-1901 9 p.

Research output: Contribution to journalConference article

Iterative classification for sanitizing large-scale datasets

Li, B., Vorobeychik, Y., Li, M. & Malin, B., Jan 5 2016, Proceedings - 15th IEEE International Conference on Data Mining, ICDM 2015. Aggarwal, C., Zhou, Z-H., Tuzhilin, A., Xiong, H. & Wu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 841-846 6 p. 7373399. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2016-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning Clinical Workflows to Identify Subgroups of Heart Failure Patients

Yan, C., Chen, Y., Li, B., Liebovitz, D. & Malin, B., Jan 1 2016, In : AMIA ... Annual Symposium proceedings. AMIA Symposium. 2016, p. 1248-1257 10 p.

Research output: Contribution to journalArticle

Optimizing annotation resources for natural language de-identification via a game theoretic framework

Li, M., Carrell, D., Aberdeen, J., Hirschman, L., Kirby, J., Li, B., Vorobeychik, Y. & Malin, B. A., Jun 1 2016, In : Journal of Biomedical Informatics. 61, p. 97-109 13 p.

Research output: Contribution to journalArticle

Renovating Contaminative Image Archives Based on Patch Propagation and Adaptive Confidence Collation

Lee, J. S., Wen, K. R. & Li, B., May 2016, In : IEEE Transactions on Circuits and Systems for Video Technology. 26, 5, p. 1004-1011 8 p., 7102728.

Research output: Contribution to journalArticle

Secure Learning and Mining in Adversarial Environments [Extended Abstract]

Li, B., Jan 29 2016, Proceedings - 15th IEEE International Conference on Data Mining Workshop, ICDMW 2015. Wu, X., Tuzhilin, A., Xiong, H., Dy, J. G., Aggarwal, C., Zhou, Z-H. & Cui, P. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1538-1539 2 p. 7395856. (Proceedings - 15th IEEE International Conference on Data Mining Workshop, ICDMW 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

Scalable optimization of randomized operational decisions in adversarial classification settings

Li, B. & Vorobeychik, Y., Jan 1 2015, In : Journal of Machine Learning Research. 38, p. 599-607 9 p.

Research output: Contribution to journalConference article

2014

Feature cross-substitution in adversarial classification

Li, B. & Vorobeychik, Y., Jan 1 2014, In : Advances in Neural Information Processing Systems. 3, January, p. 2087-2095 9 p.

Research output: Contribution to journalConference article

On study design in neuroimaging heritability analyses

Koran, M. E., Li, B., Jahanshad, N., Thornton-Wells, T. A., Glahn, D. C., Thompson, P. M., Blangero, J., Nichols, T. E., Kochunov, P. & Landman, B. A., Jan 1 2014, Medical Imaging 2014: Image Processing. SPIE, 90342P. (Progress in Biomedical Optics and Imaging - Proceedings of SPIE; vol. 9034).

Research output: Chapter in Book/Report/Conference proceedingConference contribution