Shouling Ji
Shouling Ji
Zhejiang University & Georgia Institute of Technology
Verified email at - Homepage
Cited by
Cited by
Textbugger: Generating adversarial text against real-world applications
J Li, S Ji, T Du, B Li, T Wang
arXiv preprint arXiv:1812.05271, 2018
Structural data de-anonymization: Quantification, practice, and implications
S Ji, W Li, M Srivatsa, R Beyah
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization
S Ji, W Li, P Mittal, X Hu, R Beyah
24th {USENIX} Security Symposium ({USENIX} Security 15), 303-318, 2015
Dual encoding for zero-example video retrieval
J Dong, X Li, C Xu, S Ji, Y He, G Yang, X Wang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
S Ji, W Li, NZ Gong, P Mittal, RA Beyah
NDSS, 2015
Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey
S Ji, P Mittal, R Beyah
IEEE Communications Surveys & Tutorials 19 (2), 1305-1326, 2016
Certchain: Public and efficient certificate audit based on blockchain for tls connections
J Chen, S Yao, Q Yuan, K He, S Ji, R Du
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2060-2068, 2018
Optimal distributed data collection for asynchronous cognitive radio networks
Z Cai, S Ji, J He, AG Bourgeois
2012 IEEE 32nd international conference on distributed computing systems …, 2012
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
Z Liu, H Seo, J Großschädl, H Kim
IEEE Transactions on Information Forensics and Security 11 (7), 1385-1397, 2015
Structure based data de-anonymization of social networks and mobility traces
S Ji, W Li, M Srivatsa, JS He, R Beyah
International Conference on Information Security, 237-254, 2014
Model-reuse attacks on deep learning systems
Y Ji, X Zhang, S Ji, X Luo, T Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Differentially private releasing via deep generative model (technical report)
X Zhang, S Ji, T Wang
arXiv preprint arXiv:1801.01594, 2018
Deepsec: A uniform platform for security analysis of deep learning model
X Ling, S Ji, J Zou, J Wang, C Wu, B Li, T Wang
2019 IEEE Symposium on Security and Privacy (SP), 673-690, 2019
Constructing load-balanced data aggregation trees in probabilistic wireless sensor networks
J He, S Ji, Y Pan, Y Li
IEEE Transactions on Parallel and Distributed Systems 25 (7), 1681-1690, 2013
Snapshot and continuous data collection in probabilistic wireless sensor networks
S Ji, R Beyah, Z Cai
IEEE Transactions on Mobile Computing 13 (3), 626-637, 2013
Capacity of dual-radio multi-channel wireless sensor networks for continuous data collection
S Ji, Y Li, X Jia
2011 Proceedings IEEE INFOCOM, 1062-1070, 2011
Approximation algorithms for load-balanced virtual backbone construction in wireless sensor networks
JS He, S Ji, Y Pan, Z Cai
Theoretical Computer Science 507, 2-16, 2013
Distributed data collection in large-scale asynchronous wireless sensor networks under the generalized physical interference model
S Ji, Z Cai
IEEE/ACM Transactions on Networking 21 (4), 1270-1283, 2012
Distributed data collection and its capacity in asynchronous wireless sensor networks
S Ji, Z Cai
2012 Proceedings IEEE INFOCOM, 2113-2121, 2012
Distributed and asynchronous data collection in cognitive radio networks with fairness consideration
Z Cai, S Ji, J He, L Wei, AG Bourgeois
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2020-2029, 2013
The system can't perform the operation now. Try again later.
Articles 1–20