Follow
Shawn Shan
Shawn Shan
Verified email at uchicago.edu - Homepage
Title
Cited by
Cited by
Year
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE symposium on security and privacy (SP), 707-723, 2019
15432019
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao
USENIX Security Symposium (USENIX Security 2020), 2020
3052020
Glaze: Protecting artists from style mimicry by text-to-image models
S Shan, J Cryan, E Wenger, H Zheng, R Hanocka, BY Zhao
USENIX Security Symposium (USENIX Security 2023), 2023
1602023
Gotta Catch’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2020
103*2020
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
H Li, S Shan, E Wenger, J Zhang, H Zheng, BY Zhao
USENIX Security Symposium (USENIX Security 2022), 2022
95*2022
Piracy Resistant Watermarks for Deep Neural Networks
H Li, E Wenger, S Shan, BY Zhao, H Zheng
arXiv preprint arXiv:1910.01226, 2019
74*2019
Oh, the Places You’ve Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing
B Weinshel, M Wei, M Mondal, E Choi, S Shan, C Dolin, ML Mazurek, ...
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019
702019
Unpacking perceptions of data-driven inferences underlying online targeting and personalization
C Dolin, B Weinshel, S Shan, CM Hahn, E Choi, ML Mazurek, B Ur
Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018
662018
Patch-based defenses against web fingerprinting attacks
S Shan, AN Bhagoji, H Zheng, BY Zhao
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
55*2021
Deep Entity Classification: Abusive Account Detection for Online Social Networks
T Xu, G Goossen, HK Cevahir, S Khodeir, Y Jin, F Li, S Shan, S Patel, ...
USENIX Security Symposium (USENIX Security 2020), 2021
542021
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks
S Shan, AN Bhagoji, H Zheng, BY Zhao
USENIX Security Symposium (USENIX Security 2022), 2022
472022
Nightshade: Prompt-specific poisoning attacks on text-to-image generative models
S Shan, W Ding, J Passananti, S Wu, H Zheng, BY Zhao
IEEE Symposium on Security and Privacy, 2024
42*2024
SoK: Anti-Facial Recognition Technology
E Wenger, S Shan, H Zheng, BY Zhao
IEEE Symposium on Security and Privacy (SP), 2023
172023
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models
S Shan, W Ding, E Wenger, H Zheng, BY Zhao
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022
112022
Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?
AYJ Ha, J Passananti, R Bhaskar, S Shan, R Southen, H Zheng, BY Zhao
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2024
62024
Disrupting Style Mimicry Attacks on Video Imagery
J Passananti, S Wu, S Shan, H Zheng, BY Zhao
arXiv preprint arXiv:2405.06865, 2024
12024
Understanding Implosion in Text-to-Image Generative Models
W Ding, CY Li, S Shan, BY Zhao, H Zheng
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–17