Selected Publication List
Full publications can be found HERE or HERE.
Journal Articles
Wang, X, Mo, L, Guo, L, Lu, Z, Liu, Z & Xue, M, 2025, ‘Online streaming sampling publication method over sliding windows with differential privacy’, IEEE Transactions on Dependable and Secure Computing (TDSC), early access.
(Top-2 Journal in Computer Security)
Guo, L, Jia, C, Liao, K, Lu, Z & Xue, M, 2025, ‘Near-optimal algorithms for instance-level constrained k-center clustering’, IEEE Transactions on Neural Networks and Learning Systems (TNNLS), vol. 36, issue 10, pp. 18844-18858.
(CORE-A*)
Pang, S^, Rao, Y^, Lu, Z, Wang, H, Zhou, Y & Xue, M, 2025, ‘PriDM: effective and universal private data recovery via diffusion model’, IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 22, issue 4, pp. 3259-3274.
(Top-2 Journal in Computer Security, ^: Equal contribution)
Hu, A, Lu, Z, Xie, R & Xue, M, 2024, ‘VeriDIP: verify ownership of deep neural networks through privacy leakage fingerprints’, IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 21, issue 4, pp. 2568-2584.
(Top-2 Journal in Computer Security)
Lu, Z, Asghar, HJ, Kaafar, MA, Webb, D & Dickinson, P, 2022, ‘A differentially private framework for deep learning with convexified loss functions’, IEEE Transactions on Information Forensics and Security (TIFS), vol. 17, pp. 2151-2165.
(Top-2 Journal in Computer Security)
Conference Papers
Jia, C, Guo, L, Liao, K, Lu, Z, Chen, C & Xue, M, 2026, ‘Approximation algorithm for constrained k-center clustering: a local search approach’, In Proceedings of the 40th AAAI Conference on Artificial Intelligence (AAAI-2026), AAAI, Singapore, pp. accepted.
(Top-2 Conference in Artificial Intelligence)
Jia, C, Wu, W, Guo, L, Lu, Z, Chen, C & Ong, K-L, 2026, ‘Optimized algorithms for text clustering with LLM-generated constraints’, In Proceedings of the 40th Annual AAAI Conference on Artificial Intelligence (AAAI-2026), AAAI, Singapore, pp. accepted.
(Top-2 Conference in Artificial Intelligence)
Xia, J@, Zhu, H@, Pang, S^, Lu, Z^, Li, B, Zhou, Y & Xue, M, 2025, ‘One head to rule them all: amplifying LVLM safety through a single critical attention head’, In Proceedings of the 39th Annual Conference on Neural Information Processing Systems (NeurIPS-2025), Curran Associates, San Diego, USA, pp. accepted.
(Top-3 Conference in Machine Learning, @: Co-first author, ^: Co-second author)
Zhu, H, Pang, S^, Lu, Z^, Zhou, Y & Xue, M, 2025, ‘GAP-Diff: protecting JPEG-compressed images from diffusion-based facial customization’, In Proceedings of the 32nd Annual Network and Distributed System Security Symposium (NDSS-2025), The Internet Society, San Diego, USA, pp. open access.
(Big-4 Conference in Computer Security, ^: Equal contribution)
Wang, H, Pang, S^, Lu, Z^, Rao, Y, Zhou, Y & Xue, M, 2024, ‘dp-promise: differentially private diffusion probabilistic models for image synthesis’, In Proceedings of the 33rd Usenix Security Symposium (Usenix Security-2024), Usenix, Philadelphia, USA, pp. 1063-1080.
(Big-4 Conference in Computer Security, ^: Equal contribution)
|