Chang Liu
Chang Liu
Quant Researcher, Citadel Securities
Verified email at - Homepage
Cited by
Cited by
Delving into transferable adversarial examples and black-box attacks
Y Liu, X Chen, C Liu, D Song
arXiv preprint arXiv:1611.02770, 2016
Targeted backdoor attacks on deep learning systems using data poisoning
X Chen, C Liu, B Li, K Lu, D Song
arXiv preprint arXiv:1712.05526, 2017
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning
M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li
2018 IEEE Symposium on Security and Privacy (SP), 19-35, 2018
The secret sharer: Evaluating and testing unintended memorization in neural networks
N Carlini, C Liu, Ú Erlingsson, J Kos, D Song
28th USENIX Security Symposium (USENIX Security 19), 267-284, 2019
Neural network-based graph embedding for cross-platform binary code similarity detection
X Xu, C Liu, Q Feng, H Yin, L Song, D Song
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
ObliVM: A Programming Framework for Secure Computation
C Liu, XS Wang, K Nayak, Y Huang, E Shi
IEEE Symposium on Security and Privacy (S & P), 2015
Sqlnet: Generating structured queries from natural language without reinforcement learning
X Xu, C Liu, D Song
arXiv preprint arXiv:1711.04436, 2017
Oblivious data structures
XS Wang, K Nayak, C Liu, THH Chan, E Shi, E Stefanov, Y Huang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
The secret sharer: Measuring unintended neural network memorization & extracting secrets
N Carlini, C Liu, J Kos, Ú Erlingsson, D Song
arXiv preprint arXiv:1802.08232 5, 2018
Tree-to-tree neural networks for program translation
X Chen, C Liu, D Song
Advances in neural information processing systems 31, 2018
Ghostrider: A hardware-software system for memory trace oblivious computation
C Liu, A Harris, M Maas, M Hicks, M Tiwari, E Shi
ACM SIGPLAN Notices 50 (4), 87-101, 2015
Automating efficient RAM-model secure computation
C Liu, Y Huang, E Shi, J Katz, M Hicks
2014 IEEE Symposium on Security and Privacy, 623-638, 2014
Curriculum adversarial training
QZ Cai, M Du, C Liu, D Song
arXiv preprint arXiv:1805.04807, 2018
Execution-guided neural program synthesis
X Chen, C Liu, D Song
International Conference on Learning Representations, 2018
Robust linear regression against training data poisoning
C Liu, B Li, Y Vorobeychik, A Oprea
Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017
Latent attention for if-then program synthesis
C Liu, X Chen, EC Shin, M Chen, D Song
Advances in Neural Information Processing Systems 29, 2016
Memory trace oblivious program execution
C Liu, M Hicks, E Shi
2013 IEEE 26th Computer Security Foundations Symposium, 51-65, 2013
Spotting Code Optimizations in {Data-Parallel} Pipelines through {PeriSCOPE}
Z Guo, X Fan, R Chen, J Zhang, H Zhou, S McDirmid, C Liu, W Lin, J Zhou, ...
10th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2012
Lifelong anomaly detection through unlearning
M Du, Z Chen, C Liu, R Oak, D Song
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Large Scale Fuzzy pD * Reasoning Using MapReduce
C Liu, G Qi, H Wang, Y Yu
International Semantic Web Conference, 405-420, 2011
The system can't perform the operation now. Try again later.
Articles 1–20