Bo Li

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2020

To warn or not to warn: Online signaling in audit games

Yan, C., Xu, H., Vorobeychik, Y., Li, B., Fabbri, D. & Malin, B. A., Apr 2020, Proceedings - 2020 IEEE 36th International Conference on Data Engineering, ICDE 2020. IEEE Computer Society, p. 481-492 12 p. 9101660. (Proceedings - International Conference on Data Engineering; vol. 2020-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

AdvIT: Adversarial frames identifier based on temporal consistency in videos

Xiao, C., Deng, R., Li, B., Lee, T., Edwards, B., Yi, J., Song, D., Liu, M. & Molloy, I., Oct 2019, Proceedings - 2019 International Conference on Computer Vision, ICCV 2019. Institute of Electrical and Electronics Engineers Inc., p. 3967-3976 10 p. 9010733. (Proceedings of the IEEE International Conference on Computer Vision; vol. 2019-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems

Ma, L., Juefei-Xu, F., Xue, M., Li, B., Li, L., Liu, Y. & Zhao, J., Mar 15 2019, SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering. Shihab, E., Lo, D. & Wang, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 614-618 5 p. 8668044. (SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Deephunter: A coverage-guided fuzz testing framework for deep neural networks

Xie, X., Ma, L., Juefei-Xu, F., Xue, M., Chen, H., Liu, Y., Zhao, J., Li, B., Yin, J. & See, S., Jul 10 2019, ISSTA 2019 - Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. Zhang, D. & Moller, A. (eds.). Association for Computing Machinery, Inc, p. 158-168 11 p. (ISSTA 2019 - Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

DEEPSEC: A uniform platform for security analysis of deep learning model

Ling, X., Ji, S., Zou, J., Wang, J., Wu, C., Li, B. & Wang, T., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 673-690 18 p. 8835375. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Generating 3D adversarial point clouds

Xiang, C., Qi, C. R. & Li, B., Jun 2019, Proceedings - 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2019. IEEE Computer Society, p. 9128-9136 9 p. 8953645. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition; vol. 2019-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

How you act tells a lot: Privacy-leaking attack on deep reinforcement learning

Pan, X., Li, B., Wang, W., Yi, J., Zhang, X. & Song, D., 2019, 18th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2019. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 368-376 9 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Improving robustness of ML classifiers against realizable evasion attacks using conserved features

Tong, L., Li, B., Zhang, N., Hajaj, C., Xiao, C. & Vorobeychik, Y., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 285-302 18 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MeshAdv: Adversarial meshes for visual recognition

Xiao, C., Yang, D., Li, B., Deng, J. & Liu, M., Jun 2019, Proceedings - 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2019. IEEE Computer Society, p. 6891-6900 10 p. 8953197. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition; vol. 2019-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Performing co-membership attacks against deep generative models

Liu, K. S., Xiao, C., Li, B. & Gao, J., Nov 2019, Proceedings - 19th IEEE International Conference on Data Mining, ICDM 2019. Wang, J., Shim, K. & Wu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 459-467 9 p. 8970995. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2019-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Robustra: Training provable robust neural networks over reference adversarial space

Li, L., Zhong, Z., Li, B. & Xie, T., Jan 1 2019, Proceedings of the 28th International Joint Conference on Artificial Intelligence, IJCAI 2019. Kraus, S. (ed.). International Joint Conferences on Artificial Intelligence, p. 4711-4717 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2019-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A joint optimization approach for personalized recommendation diversification

Wang, X., Qi, J., Ramamohanarao, K., Sun, Y., Li, B. & Zhang, R., Jan 1 2018, Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings. Webb, G. I., Phung, D., Ganji, M., Rashidi, L., Tseng, V. S. & Ho, B. (eds.). Springer-Verlag Berlin Heidelberg, p. 597-609 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10939 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Characterizing adversarial examples based on spatial consistency information for semantic segmentation

Xiao, C., Deng, R., Li, B., Yu, F., Liu, M. & Song, D., Jan 1 2018, Computer Vision – ECCV 2018 - 15th European Conference, 2018, Proceedings. Hebert, M., Ferrari, V., Sminchisescu, C. & Weiss, Y. (eds.). Springer-Verlag Berlin Heidelberg, p. 220-237 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11214 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DeepGauge: Multi-granularity testing criteria for deep learning systems

Ma, L., Juefei-Xu, F., Zhang, F., Sun, J., Xue, M., Li, B., Chen, C., Su, T., Li, L., Liu, Y., Zhao, J. & Wang, Y., Sep 3 2018, ASE 2018 - Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. Kastner, C., Huchard, M. & Fraser, G. (eds.). Association for Computing Machinery, Inc, p. 120-131 12 p. (ASE 2018 - Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DeepMutation: Mutation Testing of Deep Learning Systems

Ma, L., Zhang, F., Sun, J., Xue, M., Li, B., Juefei-Xu, F., Xie, C., Li, L., Liu, Y., Zhao, J. & Wang, Y., Nov 16 2018, Proceedings - 29th IEEE International Symposium on Software Reliability Engineering, ISSRE 2018. Ghosh, S., Cukic, B., Poston, R., Natella, R. & Laranjeiro, N. (eds.). IEEE Computer Society, p. 100-111 12 p. 8539073. (Proceedings - International Symposium on Software Reliability Engineering, ISSRE; vol. 2018-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Generating adversarial examples with adversarial networks

Xiao, C., Li, B., Zhu, J. Y., He, W., Liu, M. & Song, D., 2018, Proceedings of the 27th International Joint Conference on Artificial Intelligence, IJCAI 2018. Lang, J. (ed.). International Joint Conferences on Artificial Intelligence, p. 3905-3911 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2018-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Get your workload in order: Game theoretic prioritization of database auditing

Yan, C., Li, B., Vorobeychik, Y., Laszka, A., Fabbri, D. & Malin, B., Oct 24 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1308-1311 4 p. 8509357. (Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning

Jagielski, M., Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C. & Li, B., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 19-35 17 p. 8418594. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Orthogonal weight normalization: Solution to optimization over multiple dependent stiefel manifolds in deep neural networks

Huang, L., Liu, X., Lang, B., Yu, A. W., Wang, Y. & Li, B., 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI Press, p. 3271-3278 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Poisoning Attacks on Data-Driven Utility Learning in Games

Jia, R., Konstantakopoulos, I. C., Li, B. & Spanos, C., Aug 9 2018, 2018 Annual American Control Conference, ACC 2018. Institute of Electrical and Electronics Engineers Inc., p. 5774-5780 7 p. 8431872. (Proceedings of the American Control Conference; vol. 2018-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Practical black-box attacks on deep neural networks using efficient query mechanisms

Bhagoji, A. N., He, W., Li, B. & Song, D., Jan 1 2018, Computer Vision – ECCV 2018 - 15th European Conference, 2018, Proceedings. Hebert, M., Ferrari, V., Sminchisescu, C. & Weiss, Y. (eds.). Springer-Verlag Berlin Heidelberg, p. 158-174 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11216 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Superlinear Convergence of Randomized Block Lanczos Algorithm

Yuan, Q., Gu, M. & Li, B., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 1404-1409 6 p. 8595002. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Large-scale identification of malicious singleton files

Li, B., Roundy, K., Gates, C. & Vorobeychik, Y., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 227-238 12 p. (CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Robust linear regression against training data poisoning

Liu, C., Li, B., Vorobeychik, Y. & Oprea, A., Nov 3 2017, AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 91-102 12 p. (AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Behavioral experiments in email filter evasion

Ke, L., Li, B. & Vorobeychik, Y., Jan 1 2016, 30th AAAI Conference on Artificial Intelligence, AAAI 2016. AAAI Press, p. 827-833 7 p. (30th AAAI Conference on Artificial Intelligence, AAAI 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Iterative classification for sanitizing large-scale datasets

Li, B., Vorobeychik, Y., Li, M. & Malin, B., Jan 5 2016, Proceedings - 15th IEEE International Conference on Data Mining, ICDM 2015. Aggarwal, C., Zhou, Z-H., Tuzhilin, A., Xiong, H. & Wu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 841-846 6 p. 7373399. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2016-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure Learning and Mining in Adversarial Environments [Extended Abstract]

Li, B., Jan 29 2016, Proceedings - 15th IEEE International Conference on Data Mining Workshop, ICDMW 2015. Wu, X., Tuzhilin, A., Xiong, H., Dy, J. G., Aggarwal, C., Zhou, Z-H. & Cui, P. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1538-1539 2 p. 7395856. (Proceedings - 15th IEEE International Conference on Data Mining Workshop, ICDMW 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

On study design in neuroimaging heritability analyses

Koran, M. E., Li, B., Jahanshad, N., Thornton-Wells, T. A., Glahn, D. C., Thompson, P. M., Blangero, J., Nichols, T. E., Kochunov, P. & Landman, B. A., Jan 1 2014, Medical Imaging 2014: Image Processing. SPIE, 90342P. (Progress in Biomedical Optics and Imaging - Proceedings of SPIE; vol. 9034).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Optimal randomized classification in adversarial settings

Vorobeychik, Y. & Li, B., Jan 1 2014, 13th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2014. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), Vol. 1. p. 485-492 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shape-constrained multi-atlas segmentation of spleen in CT

Xu, Z., Li, B., Panda, S., Asman, A. J., Merkle, K. L., Shanahan, P. L., Abramson, R. G. & Landman, B. A., Jan 1 2014, Medical Imaging 2014: Image Processing. SPIE, 903446. (Progress in Biomedical Optics and Imaging - Proceedings of SPIE; vol. 9034).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Immersive virtual reality for visualization of abdominal CT

Lin, Q., Xu, Z., Li, B., Baucom, R., Poulose, B., Landman, B. A. & Bodenheimer, R. E., Jun 14 2013, Medical Imaging 2013: Image Perception, Observer Performance, and Technology Assessment. 867317. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 8673).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

An effective preprocessor for enhancing edge detection in speckle images

Lee, J. S., Li, B. & Tsai, H. Y., Oct 8 2012, Proceedings - ICIDT 2012, 8th International Conference on Information Science and Digital Content Technology. Vol. 3. p. 546-550 5 p. 6269333

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rapid prototyping of image processing workflows on massively parallel architectures

Li, B., Sallai, J., Völgyesi, P. & Lédeczi, Á., Oct 16 2012, WISES 2012 - Proceedings, Workshop on Intelligent Solutions in Embedded Systems. p. 15-20 6 p. 6273598. (WISES 2012 - Proceedings, Workshop on Intelligent Solutions in Embedded Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

Providing anonymous channels and mutual authentication for mobile communications

Li, B., Chang, C. C. & Lee, J. S., Dec 1 2010, Proceedings - 4th International Conference on Genetic and Evolutionary Computing, ICGEC 2010. p. 618-621 4 p. 5715508. (Proceedings - 4th International Conference on Genetic and Evolutionary Computing, ICGEC 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

A brand-new mobile value-added service: M-check

Lee, J. S., Li, B. & Chou, Y. C., Dec 1 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 2050-2055 6 p. 5331611. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution