C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Fnu Suya
ORCID
Publication Activity (10 Years)
Years Active: 2017-2023
Publications (10 Years): 17
Top Topics
Countermeasures
Watermarking Scheme
Graph Data
Black Boxes
Top Venues
CoRR
IEEE Symposium on Security and Privacy
CPS-IoT Week Workshops
USENIX Security Symposium
</>
Publications
</>
Yulong Tian
,
Fnu Suya
,
Anshuman Suri
,
Fengyuan Xu
,
David Evans
Manipulating Transfer Learning for Property Inference.
CVPR
(2023)
Fnu Suya
,
Xiao Zhang
,
Yuan Tian
,
David Evans
When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
CoRR
(2023)
Fnu Suya
,
Xiao Zhang
,
Yuan Tian
,
David Evans
What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?
NeurIPS
(2023)
Aaron Kinfe
,
Chijung Jung
,
Kai Lin
,
Marshall Clyburn
,
Fnu Suya
HackWrt: Network Traffic-Based Eavesdropping of Handwriting.
CPS-IoT Week Workshops
(2023)
Fnu Suya
,
Anshuman Suri
,
Tingwei Zhang
,
Jingtao Hong
,
Yuan Tian
,
David Evans
SoK: Pitfalls in Evaluating Black-Box Attacks.
CoRR
(2023)
Evan Rose
,
Fnu Suya
,
David Evans
Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks.
CoRR
(2023)
Yulong Tian
,
Fnu Suya
,
Anshuman Suri
,
Fengyuan Xu
,
David Evans
Manipulating Transfer Learning for Property Inference.
CoRR
(2023)
Yulong Tian
,
Fnu Suya
,
Fengyuan Xu
,
David Evans
Stealthy Backdoors as Compression Artifacts.
IEEE Trans. Inf. Forensics Secur.
17 (2022)
Yulong Tian
,
Fnu Suya
,
Fengyuan Xu
,
David Evans
Stealthy Backdoors as Compression Artifacts.
CoRR
(2021)
Fnu Suya
,
Saeed Mahloujifar
,
Anshuman Suri
,
David Evans
,
Yuan Tian
Model-Targeted Poisoning Attacks with Provable Convergence.
ICML
(2021)
Jihong Wang
,
Minnan Luo
,
Fnu Suya
,
Jundong Li
,
Zijiang Yang
,
Qinghua Zheng
Scalable Attack on Graph Data by Injecting Vicious Nodes.
CoRR
(2020)
Fnu Suya
,
Jianfeng Chi
,
David Evans
,
Yuan Tian
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries.
USENIX Security Symposium
(2020)
Fnu Suya
,
Saeed Mahloujifar
,
David Evans
,
Yuan Tian
Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds.
CoRR
(2020)
Jihong Wang
,
Minnan Luo
,
Fnu Suya
,
Jundong Li
,
Zijiang Yang
,
Qinghua Zheng
Scalable attack on graph data by injecting vicious nodes.
Data Min. Knowl. Discov.
34 (5) (2020)
Yi Chen
,
Mingming Zha
,
Nan Zhang
,
Dandan Xu
,
Qianqian Zhao
,
Xuan Feng
,
Kan Yuan
,
Fnu Suya
,
Yuan Tian
,
Kai Chen
,
XiaoFeng Wang
,
Wei Zou
Demystifying Hidden Privacy Settings in Mobile Apps.
IEEE Symposium on Security and Privacy
(2019)
Fnu Suya
,
Jianfeng Chi
,
David Evans
,
Yuan Tian
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries.
CoRR
(2019)
Fnu Suya
,
Yuan Tian
,
David Evans
,
Paolo Papotti
Query-limited Black-box Attacks to Classifiers.
CoRR
(2017)