Dynamic Backdoor Attacks Against Machine Learning Models A Salem, R Wen, M Backes, S Ma, Y Zhang IEEE European Symposium on Security and Privacy (EuroS&P), 2020 | 349 | 2020 |
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models Y Liu, R Wen, X He, A Salem, Z Zhang, M Backes, E De Cristofaro, M Fritz, ... USENIX Security Symposium, 2021 | 161 | 2021 |
Node-Level Membership Inference Attacks Against Graph Neural Networks X He, R Wen, Y Wu, M Backes, Y Shen, Y Zhang arXiv preprint arXiv:2102.05429, 2021 | 124 | 2021 |
Instruction backdoor attacks against customized {LLMs} R Zhang, H Li, R Wen, W Jiang, Y Zhang, M Backes, Y Shen, Y Zhang 33rd USENIX Security Symposium (USENIX Security 24), 1849-1866, 2024 | 33* | 2024 |
Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning? R Wen, Z Zhao, Z Liu, M Backes, T Wang, Y Zhang The Eleventh International Conference on Learning Representations, 2023 | 25 | 2023 |
Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models M Zhang, N Yu, R Wen, M Backes, Y Zhang IEEE Winter Conference on Applications of Computer Vision (WACV), 2024 | 17 | 2024 |
LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction R Wen, Y Yu, X Xie, Y Zhang Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 15 | 2020 |
Dataset and lessons learned from the 2024 satml llm capture-the-flag competition E Debenedetti, J Rando, D Paleka, S Florin, D Albastroiu, N Cohen, ... Advances in Neural Information Processing Systems 37, 36914-36937, 2024 | 12 | 2024 |
Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning R Wen, T Wang, M Backes, Y Zhang, A Salem arXiv preprint arXiv:2310.11397, 2023 | 8 | 2023 |
Quantifying Privacy Risks of Prompts in Visual Prompt Learning Y Wu, R Wen, M Backes, P Berrang, M Humbert, Y Shen, Y Zhang USENIX Security Symposium, 2024 | 7 | 2024 |
Membership inference attacks against in-context learning R Wen, Z Li, M Backes, Y Zhang Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 6 | 2024 |
Games and Beyond: Analyzing the Bullet Chats of Esports Livestreaming Y Jiang, X Shen, R Wen, Z Sha, J Chu, Y Liu, M Backes, Y Zhang Proceedings of the International AAAI Conference on Web and Social Media 18 …, 2024 | 3 | 2024 |
Efficient Data-Free Model Stealing with Label Diversity Y Liu, R Wen, M Backes, Y Zhang arXiv preprint arXiv:2404.00108, 2024 | 3 | 2024 |
Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm? R Wen, M Backes, Y Zhang arXiv preprint arXiv:2409.03741, 2024 | 1 | 2024 |
Peering Behind the Shield: Guardrail Identification in Large Language Models Z Yang, Y Wu, R Wen, M Backes, Y Zhang arXiv preprint arXiv:2502.01241, 2025 | | 2025 |