纪守领
长聘教授
个人简介
纪守领,浙江大学长聘教授/求是特聘教授、博士生导师,可信人工智能研究中心主任,兼任佐治亚理工学院Research Faculty,获美国佐治亚理工学院电子与计算机工程博士学位、佐治亚州立大学计算机科学博士和硕士学位、黑龙江大学计算机科学与技术学士和硕士学位,入选教育部长江学者(2022年度)、高层次科技创新人才(2022年度)、国家青年特聘专家(2017年度)。获网络系统安全四大顶会ACM CCS 2021最佳论文奖等10项最佳/优秀论文奖、GSU杰出研究奖、ELSEVIER高引论文奖、中国国家优秀自费留学生奖、浙江大学“个推”青年创新奖、华为优秀技术成果奖、浙江大学先进工作者等奖励或荣誉称号。 纪守领教授致力于人工智能安全、软件与系统安全、数据驱动安全、大数据分析等领域的研究。先后主持国家重点研发计划项目、国家自然科学基金重点项目、面上项目、浙江省自然科学基金杰青项目、浙江省重点研发计划“网络空间安全”重点专项、CCF-腾讯“犀牛鸟”科研基金、CCF-绿盟“鲲鹏”科研基金、CCF-启明星辰“鸿雁”科研基金、华为科研基金、阿里巴巴科研基金、蚂蚁金服科研基金等多项,作为技术负责人或项目骨干,参加美国NSF项目8项。发表CCF A类论文100余篇,出版英文专编著4部。 招生信息 团队有2025年9月入学硕士名额2名(1学硕1专硕),有意者请将简历发送至sji@zju.edu.cn。研究方向 AI与安全、软件系统安全,有(大模型时代)深度伪造与检测基础者优先。要求 代码、数学、英语强者优先。 * - *- *-*-*-*-*-*-*-*-*-*-*-* 欢迎访问浙江大学NESA Lab 网站 https //nesa.zju.edu.cn! * - *- *-*-*-*-*-*-*-*-*-*-*-*
研究领域
人工智能与安全 数据驱动安全 软件与系统安全 大数据挖掘与分析
近期论文
Please refer to NESA Lab's publication: http://nesa.zju.edu.cn. 2025 Zekun Sun, Zijian Liu, Shouling Ji, Chenhao Lin, and Na Ruan, Pretender: Universal Active Defense against Diffusion Finetuning Attacks, USENIX Security 2025. Lingming Zhang, Binbin Zhao, Jiacheng Xu, Peiyu Liu, Qinge Xie, Yuan Tian, Jianhai Chen, and Shouling Ji, Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation, USENIX Security 2025. Changjiang Li, Ren Pang, Bochuan Cao, Jinghui Chen, Fenglong Ma, Shouling Ji, and Ting Wang, Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models, USENIX Security 2025. Boyu Chang, Binbin Zhao, Qiao Zhang, Peiyu Liu, Yuan Tian, Raheem Beyah, and Shouling Ji, FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization, IEEE S&P 2025. [PDF] [Github] Rui Zeng, Xi Chen, Yuwen Pu, Xuhong Zhang, Tianyu Du, and Shouling Ji, CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models, NDSS 2025. [PDF] [Slides] [Github] Zhenyu Wen, Wanglei Feng, Di Wu, Haozhen Hu, Chang Xu, Bin Qian, Zhen Hong, Cong Wang, and Shouling Ji, FLMarket: Enabling Privacy-preserved Pre-training Data Pricing for Federated Learning, KDD 2025. Linkang Du, Zheng Zhu, Min Chen, Zhou Su, Shouling Ji, Peng Cheng, Jiming Chen, and Zhikun Zhang, ArtistAuditor: Auditing Artist Style Pirate in Text-to-image Generation Models, WWW 2025. Jiahao Chen, Zhou Feng, Rui Zeng, Yuwen Pu, Chunyi Zhou, Yi Jiang, Yuyou Gan, Jinbao Li, and Shouling Ji, Enhancing Adversarial Transferability with Adversarial Weight Tuning, AAAI 2025. Tong Ye, Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji, and Wenhai Wang, Uncovering LLM-Generated Code: A Zero-Shot Synthetic Code Detector via Code Rewriting, AAAI 2025. Xing He, Jiahao Chen, Yuwen Pu, Qingming Li, Chunyi Zhou, Yingcai Wu, Jinbao Li, and Shouling Ji, CAMH: Advancing Model Hijacking Attack in Machine Learning, AAAI 2025. 2024 Mingqi Lv, Hongzhe Gao, Xuebo Qiu, Tieming Chen, Tiantian Zhu, Jinyin Chen, and Shouling Ji, TREC: APT Tactic/Technique Recognition via Few-Shot Provenance Subgraph Learning, ACM CCS 2024. [PDF] Oubo Ma, Yuwen Pu, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, and Shouling Ji, SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems, ACM CCS 2024. [PDF] [Slides] [Github] Dinghao Liu, Zhipeng Lu, Shouling Ji, Kangjie Lu, Jianhai Chen, Zhenguang Liu, Renyi Cai, and Qinming He, Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences, USENIX Security 2024. [PDF] [Slides] Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, and Wenhai Wang, Exploring ChatGPT’s Capabilities on Vulnerability Management, USENIX Security 2024. [PDF] [Slides] Dinghao Liu, Shouling Ji, Kangjie Lu, and Qinming He, Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis, USENIX Security 2024. [PDF] [Slides] Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, and Yanjun Wu, A Wolf in Sheep’s Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild, USENIX Security 2024. Yi Xiang, Xuhong Zhang, Peiyu Liu, Shouling Ji, Xiao Xiao, Hong Liang, Jiacheng Xu, and Wenhai Wang, Critical Code Guided Directed Greybox Fuzzing for Commits, USENIX Security 2024. Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, and Ting Wang, On Defending Contrastive Learning against Backdoor Attacks, USENIX Security 2024. Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, and Raheem Beyah, SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices, IEEE S&P 2024. [PDF] [Slides] [Github] Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, and Ting Wang, Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention, NDSS 2024. [PDF] [Slides] [Github] Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, and Jiming Chen, MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency, NDSS 2024. Linkang Du, Zhikun Zhang, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, and Jiming Chen, ORL-Auditor: Dataset Auditing in Offline Deep Reinforcement Learning, NDSS 2024. [PDF] [Slides] Yang Dai, Oubo Ma, Longfei Zhang, Xingxing Liang, Shengchao Hu, Mengzhu Wang, Shouling Ji, Jincai Huang, and Li Shen, Is Mamba Compatible with Trajectory Optimization in Offline Reinforcement Learning?, NeurIPS 2024. Dazhen Deng, Chuhan Zhang, Huawei Zheng, Yuwen Pu, Shouling Ji, and Yingcai Wu, AdversaFlow: Visual Red Teaming for Large Language Models with Multi-Level Adversarial Flow, IEEE VIS 2024. * Honorable Mention Award Jiashui Wang, Peng Qian, Xilin Huang, Xinlei Ying, Yan Chen, Shouling Ji, Jianhai Chen, Jundong Xie, and Long Liu, Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment, ISSTA 2024. Han Bao, Xuhong Zhang, Qinying Wang, KangMing Liang, Zonghui Wang, Shouling Ji, and Wenzhi Chen, Pluggable Watermarking of Deepfake Models for Deepfake Detection, IJCAI 2024. [PDF] [Github] Zeyu Li, Yuwen Pu, Xuhong Zhang, Yu LI, Jinbao Li, and Shouling Ji, Protecting Object Detection Models from Model Extraction Attack via Feature Space Coverage, IJCAI 2024. [PDF] [Slides] YunRuo Zhang,Lujia Shen,Shanqing Guo, and Shouling Ji, GaLileo: General Linear Relaxation Framework for Tightening Robustness Certification of Transformers, AAAI 2024. Pengyu Qiu, Yuwen Pu, Yongchao Liu, Wenyan Liu, Yun Yue, Xiaowei Zhu, Lichun Li, Jinbao Li, and Shouling Ji, Integer is Enough: When Vertical Federated Learning Meets Rounding, AAAI 2024. [PDF] [Slides] Zhe Ma, Jianfeng Dong, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Zonghui Wang, Sifeng He, Feng Qian, Xiaobo Zhang, and Lei Yang, Let All be Whitened: Multi-Teacher Distillation for Efficient Visual Retrieval, AAAI 2024. [PDF] [Slides] [Github] Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, and Shouling Ji, AdaCCD: Adaptive Semantic Contrasts Discovery based Cross Lingual Adaptation for Code Clone Detection, AAAI 2024. Yaguan Qian, Kecheng Chen, Bin Wang, Zhaoquan Gu, Shouling Ji, Wei Wang, and Yanchun Zhang, Enhancing Transferability of Adversarial Examples through Mixed-Frequency Inputs, IEEE Transactions on Information Forensics & Security (TIFS), 2024. Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, and Chunming Wu, AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service, IEEE Transactions on Information Forensics & Security (TIFS), 2024. Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, and Ting Wang, HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning, IEEE Transactions on Information Forensics & Security (TIFS), 2024. [PDF] Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng, and Jiming Chen, VERIFI: Towards Verifiable Federated Unlearning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024. Jinyin Chen, Haibin Zheng, Tao Liu, Jiawei Liu, Yao Cheng, Xuhong Zhang, and Shouling Ji, EdgePro: Edge Deep Learning Model Protection via Neuron Authorization, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024. Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, and Wenzhi Che, Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024. Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, and Ting Wang, Hijack Vertical Federated Learning Models As One Party, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024. [PDF] Chenghui Shi, Shouling Ji, Xudong Pan, Xuhong Zhang, Mi Zhang, Min Yang, Jun Zhou, Jianwei Yin, and Ting Wang, Towards Practical Backdoor Attacks on Federated Learning Systems, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024. 王琴应, 许嘉诚, 李宇薇, 潘祖烈, 张玉清, 张超, 纪守领, 智能模糊测试综述:问题探索和方法分类, 计算机学报, 2024. [PDF] 2023 Ping He, Yifan Xia, Xuhong Zhang, and Shouling Ji, Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting, ACM CCS 2023. [PDF] [Github] Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, and Zhiniang Peng, Detecting Union Type Confusion in Component Object Model, USENIX Security 2023. [PDF] [Slides] Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, and Ting Wang, On the Security Risks of Knowledge Graph Reasoning, USENIX Security 2023. [PDF] Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, and Raheem Beyah, UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware, USENIX Security 2023. [PDF] Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, and Jianwei Yin, FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases, USENIX Security 2023. [PDF] [Github] Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, and Raheem Beyah, MINER: A Hybrid Data-Driven Approach for REST API Fuzzing, USENIX Security 2023. [PDF] [Github] Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Jingchang Qin, Wenhai Wang, and Wenzhi Chen, How IoT Recycling Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices, IEEE S&P 2023. [PDF] Tianyu Du, Zhaohan Xi, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, and Ting Wang, Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks, NeurIPS 2023. Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, and Ting Wang, An Embarrassingly Simple Backdoor Attack on Self-supervised Learning, ICCV 2023. Ren Pang, Changjiang Li, Zhaohan Xi, Shouling Ji, and Ting Wang, The Dark Side of AutoML: Towards Architectural Backdoor Search, ICLR 2023. Yuanchao Chen, Yuwei Li, Zulie Pan, Yuliang Lu, Juxing Chen, and Shouling Ji, URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing, IEEE Transactions on Information Forensics & Security (TIFS), 2023. Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, and Yanjun Wu, Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art, Computers & Security, 2023. Hui Sun, Tianqing Zhu, Jie Li, Shouling Ji, and Wanlei Zhou, Attribute-based Membership Inference Attacks and Defenses on GANs, IEEE Transactions on Dependable and Secure Computing (TDSC), 2023. Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan, and Peng Lin, G-Fuzz: A Directed Fuzzing Framework for gVisor, IEEE Transactions on Dependable and Secure Computing (TDSC), 2023. [Github] Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, and Reheem Beyah, One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware, IEEE Transactions on Dependable and Secure Computing (TDSC), 2023. 2022 Qingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, and Kangjie Lu, Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs, ACM CCS 2022. [PDF] [Github] Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, and Ting Wang, ''Is your explanation stable?'': A Robustness Evaluation Framework for Feature Attribution, ACM CCS 2022. [PDF] [Github] Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, and Ting Wang, Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era, USENIX Security 2022. [PDF] [Slides] Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, and Ting Wang, On the Security Risks of AutoML, USENIX Security 2022. [PDF] Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, and Ting Wang, Label Inference Attacks Against Vertical Federated Learning, USENIX Security 2022. [PDF] [Slides] [Github] Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, and Ting Wang, Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings, IEEE S&P 2022. [PDF] [Slides] [Github] Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, and Dawn Song, Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models, IEEE S&P 2022. [PDF] Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, and Reheem Beyah, EMS: History-Driven Mutation for Coverage-based Fuzzing, NDSS 2022. [PDF] [Slides] [Github] Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, and Raheem Beyah, SLIME: Program-sensitive Energy Allocation for Fuzzing, ISSTA 2022. [PDF] [Slides] [Github] Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, and Raheem Beyah, A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware, ISSTA 2022. [PDF] [Slides] [Github] Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, and Ting Wang, TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors, Euro S&P 2022. [PDF] [Github] Xiang Ling, Lingfei Wu, Wei Deng, Sheng Zhang, Zhenqing Qu, Jiangyu Zhang, Tengfei Ma, Bin Wang, Chunming Wu, and Shouling Ji, MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection, IEEE INFOCOM 2022. [PDF] Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, and Jinyin Chen, NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification, ICSE 2022. Tieming Chen, Chengyu Dong, Mingqi Lv, Qijie Song, Haiwen Liu, Tiantian Zhu, Kang Xu, Ling Chen, and Shouling Ji, APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022. Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, and Ting Wang, Your Labels Are Selling You Out: Relation Leaks in Vertical Federated Learning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022. 纪守领, 王琴应, 陈安莹, 赵彬彬, 叶童, 张旭鸿, 吴敬征, 李昀, 尹建伟, 武延军, 开源软件供应链安全研究综述, 软件学报, 2022. [PDF] Rui Wang, Zhihua Wei, Haoran Duan, Shouling Ji, Yang Long, and Zhen Hong, EfficientTDNN: Efficient Architecture Search for Speaker Recognition, IEEE Transactions on Audio, Speech, and Language Processing (TASLP), 2022. [PDF] Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, and Raheem Beyah, Fraud-agents Detection in Online Microfinance: A Large-scale Empirical Study, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022. Zhenguang Liu, Shuang Wu, Shuyuan Jin, Shouling Ji, Qi Liu, Shijian Lu, and Li Cheng, Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction, IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022. Yiming Wu, Qianjun Liu, Xiaojing Liao, Shouling Ji, Peng Wang, Xiaofeng Wang, Chunming Wu, and Zhao Li, Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022. 2021 Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, and Ting Wang, Backdoor Pre-trained Models Can Transfer to All, ACM CCS 2021. [PDF] [Slides] Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, and Qinming He, Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths, ACM CCS 2021. [PDF] [Slides] Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, and Yanjun Wu, CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels, ACM CCS 2021. [PDF] [Slides] Gaoning Pan, Xingwei Lin, Xuhong Zhang, Yongkang Jia, Shouling Ji, Chunming Wu, Xinlei Ying, Jiashui Wang, and Yanjun Wu, V-SHUTTLE: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing, ACM CCS 2021. [PDF] [Slides] * Best Paper Award Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, and Jiming Chen, AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy, ACM CCS 2021. [PDF] [Slides] Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, and Ting Wang, Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks, ACM CCS 2021. [PDF] [Slides] Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, and Raheem Beyah, MPInspector: A Systematic and Automatic Approach for Evaluating the Security of Iot Messaging Protocols, USENIX Security 2021. [PDF] [Slides] Zhaohan Xi, Ren Pang, Shouling Ji, and Ting Wang, Graph Backdoor, USENIX Security 2021. [PDF] [Slides] [Github] Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang, UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers, USENIX Security 2021. [PDF] [Slides] [Github] Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, and Raheem Beyah, iFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware, ASE 2021. [PDF] [Slides] Zhenguang Liu, Peng Qian, Xiang Wang, Lei Zhu, Qinming He, and Shouling Ji, Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion, IJCAI 2021. Zhenguang Liu, Haoming Chen, Runyang Feng, Shuang Wu, Shouling Ji, Bailin Yang, and Xun Wang, Deep Dual Consecutive Network for Human Pose Estimation, CVPR 2021. Sihao Hu, Xuhong Zhang, Junfeng Zhou, Shouling Ji, Jiaqi Yuan, Zhao Li, Zhipeng Wang, Qi Chen, Qinming He, and Liming Fang, Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining, ICDE 2021. [PDF] Zhenguang Liu, Kedi Lyu, Shuang Wu, Haipeng Chen, Yanbin Hao, and Shouling Ji, Aggregated Multi-GANs for Controlled 3D Human Motion Prediction, AAAI 2021. [PDF] Xinyang Zhang, Pang Ren, Shouling Ji, Fenglong Ma, and Ting Wang, i-Algebra: Towards Interactive Interpretability of Deep Neural Networks, AAAI 2021. [PDF] Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, and Ting Wang, Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications, IEEE Transactions on Dependable and Secure Computing (TDSC), 2021. [PDF] Jianfeng Dong, Zhe Ma, Xiaofeng Mao, Xun Yang, Yuan He, Richang Hong, and Shouling Ji, Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning, IEEE Transactions on Image Processing (TIP), 2021. [Slides] Shuiguang Deng, Yishan Chen, Gong Chen, Shouling Ji, Jianwei Yin, and Albert Y. Zomaya, Incentive-driven Proactive Application Deployment and Pricing on Distributed Edges, IEEE Transactions on Mobile Computing (TMC), 2021. Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu Bourgeois, and Raheem Beyah, This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems, IEEE Transactions on Dependable and Secure Computing (TDSC), 2021. Qianjun Liu, Shouling Ji, Changchang Liu, and Chunming Wu, A Practical Black-box Attack on Source Code Authorship Identification Classifiers, IEEE Transactions on Information Forensics & Security (TIFS), 2021. [PDF] Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, and Ting Wang, Adversarial CAPTCHAs, IEEE Transactions on Cybernetics (TCYB), 2021. [PDF] 纪守领, 杜天宇, 邓水光, 程鹏, 时杰, 杨珉, 李博, 深度学习模型鲁棒性研究综述, 计算机学报, 2021. [PDF] 2020 Hanlu Wu, Tengfei Ma, Lingfei Wu, Tariro Manyumwa and Shouling Ji, Unsupervised Reference-Free Summary Quality Evaluation via Contrastive Learning, EMNLP 2020. [PDF] Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, Raheem Beyah, Understanding the Security Risks of Docker Hub, ESORICS 2020. [PDF] Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo and Ting Wang, AdvMind: Inferring Adversary Intent of Black-Box Attacks, KDD 2020. [PDF] Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah, and Ting Wang, Text Captcha Is Dead? A Large Scale Deployment and Empirical Study, ACM CCS 2020. [PDF] Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, and Ting Wang, A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models, ACM CCS 2020. [PDF] Xudong Pan, Mi Zhang, Shouling Ji, and Min Yang, Privacy Risks of General-Purpose Language Models, IEEE S&P (Oakland) 2020. [PDF] Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, and Min Yang, Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent, USENIX Security 2020. [PDF] Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang, TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation, USENIX Security 2020. [PDF] Xinyang Zhang, Ningfei Wang, Shouling Ji, Hua Shen, Ting Wang, Interpretable Deep Learning under Fire, USENIX Security 2020. [PDF] arXiv:1812.00891 Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah, SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems, ASIACCS 2020. [PDF] Zhao Li, Chenyi Lei, Pengcheng Zou, Donghui Ding, Shichang Hu, Zehong Hu, Shouling Ji and Jianliang Gao, Attention with Long-term Interval-Based Gated Recurrent Units for Modeling Sequential User Behaviors, DASFAA 2020. [PDF] Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li, Raheem Beyah, and Ting Wang, De-Health: All Your Online Health Information Are Belong to Us, ICDE 2020. [PDF] arXiv:1902.00717 Zhe Ma, Jianfeng Dong, Yao Zhang, Zhongzi Long, Yuan He, Hui Xue and Shouling Ji, Fine-Grained Fashion Similarity Learning by Attribute-Specific Embedding Network, AAAI 2020. [PDF] Binbin Zhao, Shouling Ji, Wei-han Lee, Changting Lin, Haiqin Weng, Jingzheng Wu, Pan Zhou, Liming Fang and Raheem Beyah, A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices, IEEE Transactions on Dependable and Secure Computing (TDSC), 2020. [PDF] 李旭嵘,纪守领,吴春明,刘振广,邓水光,程鹏,杨珉,孔祥维, 深度伪造与检测技术综述, 软件学报, 2020. [PDF] Yuwei Li, Shouling Ji, Chenyang Lyu, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu, and Raheem Beyah, V-Fuzz: Vulnerability Prediction Assisted Evolutionary Fuzzing for Binary Programs, IEEE Transactions on Cybernetics, 2020. [PDF] [Slides] (IF: 11.079) Mingqi Lv, Zhaoxiong Hong, Ling Chen, Tieming Chen, Tiantian Zhu and Shouling Ji, Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction, IEEE Transactions on Intelligent Transportation Systems (TITS), 2020. [PDF] Jianhai Chen, Deshi Ye, Zhenguang Liu, Shouling Ji, Qinming He, and Yang Xiang, A Truthful and Near-optimal Mechanism for Colocation Emergency Demand Response, IEEE Transactions on Mobile Computing (TMC), 2020. [PDF] Chengkun Wei, Shouling Ji, Changchang Liu, Wenzhi Chen, Ting Wang, AsgLDP: Collecting and Generating Decentralized Attributed Graphs with Local Differential Privacy, IEEE Transactions on Information Forensics & Security (TIFS), 2020. [PDF] Liming Fang, Hongwei Zhu, Boqing Lv, Zhe Liu, Weizhi Meng, Yu Yu, Shouling Ji, and Zehong Cao, HandiText: Handwriting Recognition based on Dynamic Characteristics with Incremental LSTM, ACM Transactions on Data Science (TDS), 2020. 纪守领, 杜天宇, 李进锋, 沈超, 李博, 机器学习模型安全与隐私研究综述, 软件学报, 2020. [PDF]