Follow
Jie Shi
Jie Shi
Security Expert in Huawei Singapore Research Centre
Verified email at huawei.com - Homepage
Title
Cited by
Cited by
Year
Backdoor pre-trained models can transfer to all
L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang
arXiv preprint arXiv:2111.00197, 2021
812021
Authorized keyword search on encrypted data
J Shi, J Lai, Y Li, RH Deng, J Weng
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
792014
BDPL: A boundary differentially private layer against machine learning model extraction attacks
H Zheng, Q Ye, H Hu, C Fang, J Shi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
532019
Causality-based neural network repair
B Sun, J Sun, LH Pham, J Shi
Proceedings of the 44th International Conference on Software Engineering …, 2022
392022
SecTTS: A secure track & trace system for RFID-enabled supply chains
J Shi, Y Li, W He, D Sim
Computers in Industry, 2012
382012
A fine-grained access control model for relational databases
J Shi, H Zhu
Journal of Zhejiang University-Science C 11 (8), 575-586, 2010
322010
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang
CCS 21 (2021), 15-19, 2021
272021
Constructing plausible innocuous pseudo queries to protect user query intention
Z Wu, J Shi, C Lu, E Chen, G Xu, G Li, S Xie, SY Philip
Information Sciences 325, 215-226, 2015
262015
SecDS: a secure EPC discovery service system in EPCglobal network
J Shi, D Sim, Y Li, R Deng
Proceedings of the second ACM conference on Data and Application Security …, 2012
262012
Online event detection in synchrophasor data with graph signal processing
J Shi, B Foggo, X Kong, Y Cheng, N Yu, K Yamashita
2020 IEEE International conference on communications, control, and computing …, 2020
252020
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation
H Zheng, Q Ye, H Hu, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing, 2020
242020
Privkvm*: Revisiting key-value statistics estimation with local differential privacy
Q Ye, H Hu, X Meng, H Zheng, K Huang, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing, 2021
232021
A Secure and Efficient Discovery Service System in EPCglobal Network
J Shi, Y Li, RH Deng
Computers & Security, 2012
192012
Batch clone detection in RFID-enabled supply chain
J Shi, SM Kywe, Y Li
2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014
182014
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs
J Shi, H Zhu, G Fu, T Jiang
Computer and Information Science, 2009. ICIS 2009. Eighth IEEE/ACIS …, 2009
172009
Evaluation of Different Electronic Product Code Discovery Service Models
SM Kywe, J Shi, Y Li, R Kailash
Advances in Internet of Things 2 (2), 37-46, 2012
142012
Unified authentication for heterogeneous networks
H Wang, L Li, X Kang, J Shi
US Patent 10,849,191, 2020
122020
Fine grained transaction log for data recovery in database systems
G Fu, H Zhu, Y Feng, Y Zhu, J Shi, M Chen, X Wang
2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 123-131, 2008
112008
Smartphones based vehicle access
Y Yanjiang, Z Wei, CK Chu, J Shi
US Patent 11,258,598, 2022
102022
Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
X Zhang, C Fang, J Shi
arXiv preprint arXiv:2104.05921, 2021
102021
The system can't perform the operation now. Try again later.
Articles 1–20