Shawn Shan
Shawn Shan
Verified email at - Homepage
Cited by
Cited by
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE Symposium on Security and Privacy (SP), 707-723, 2019
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao
USENIX Security Symposium (USENIX Security 2020), 2020
Unpacking perceptions of data-driven inferences underlying online targeting and personalization
C Dolin, B Weinshel, S Shan, CM Hahn, E Choi, ML Mazurek, B Ur
Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018
Gotta Catch’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Piracy Resistant Watermarks for Deep Neural Networks
H Li, E Wenger, S Shan, BY Zhao, H Zheng
arXiv preprint arXiv:1910.01226, 2019
Oh, the Places You’ve Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing
B Weinshel, M Wei, M Mondal, E Choi, S Shan, C Dolin, ML Mazurek, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2019
Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
H Li, S Shan, E Wenger, J Zhang, BY Zheng, Haitao, Zhao
arXiv preprint arXiv:2006.14042, 2020
Penny auctions are predictable: Predicting and profiling user behavior on dealdash
X Zhang, S Shan, S Tang, H Zheng, BY Zhao
Proceedings of the 29th on Hypertext and Social Media, 123-127, 2018
Deep Entity Classification: Abusive Account Detection for Online Social Networks
T Xu, G Goossen, HK Cevahir, S Khodeir, Y Jin, F Li, S Shan, S Patel, ...
A Real-time Defense against Website Fingerprinting Attacks
S Shan, AN Bhagoji, H Zheng, BY Zhao
arXiv preprint arXiv:2102.04291, 2021
The system can't perform the operation now. Try again later.
Articles 1–10