Selected Publication List
Full publications can be found HERE.
Journal Articles
Hu, A, Lu, Z, Xie, R & Xue, M, 2024, ‘VeriDIP: verify ownership of deep neural networks through privacy leakage fingerprints’, IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 21, issue 4, pp. 2568-2584.
(Top-3 Journal in Computer Security)
Jia, C, Guo, L^, Liao, K^ & Lu, Z^, 2023, ‘Efficient algorithm for the k-means problem with must-link and cannot-link constraints’, Tsinghua Science and Technology, vol. 28, issue 6, pp. 1050-1062.
(SJR Q1, ^: Equal contribution)
Lu, Z, Asghar, HJ, Kaafar, MA, Webb, D & Dickinson, P, 2022, ‘A differentially private framework for deep learning with convexified loss functions’, IEEE Transactions on Information Forensics and Security (TIFS), vol. 17, pp. 2151-2165.
(Top-3 Journal in Computer Security)
Conference Papers
Wang, H, Pang, S^, Lu, Z^, Rao, Y, Zhou, Y & Xue, M, 2024, ‘dp-promise: differentially private diffusion probabilistic models for image synthesis’, In Proceedings of the 33rd Usenix Security Symposium (Usenix Security-24), Usenix, Philadelphia, USA, pp. TBA.
(Big-4 Conference in Computer Security, ^: Equal contribution)
Guo, L^, Jia, C^, Liao, K^, Lu, Z^ & Xue, M^, 2024, ‘Efficient constrained k-center clustering with background knowledge’, In Proceedings of the 38th AAAI Conference on Artificial Intelligence (AAAI-24), AAAI, Vancouver, Canada, pp. 20709-20717.
(Top-2 Conference in Artificial Intelligence, ^: Equal contribution)
Hu, A, Xie, R, Lu, Z, Hu, A & Xue, M, 2021, ‘TableGAN-MCA: evaluating membership collisions of GAN-synthesized tabular data releasing’, In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS-2021), ACM, Seoul, South Korea, pp. 2096-2112.
(Big-4 Conference in Computer Security)
|