Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, Ting Wang. "TextBugger: Generating Adversarial Text Against Real-world Applications". (NDSS 2019)
Xiang Ling, Shouling Ji, Jiaxu Zou, Jiannan Wang, Chunming Wu, Bo Li, Ting Wang. "DeepSec: A Uniform Platform for Security Analysis of Deep Learning Models". (Oakland, 2019)
Arjun Nitin Bhagoji, Warren He, Bo Li, Dawn Song. "Exploring the Space of Black-box Attacks on Deep Neural Networks". (ECCV, 2018)
Chaowei Xiao, Duizhi Deng, Bo Li, Fisher Yu, Jinfeng Yi, Mingyan Liu and Dawn Song. "Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation". (ECCV, 2018)
Lei Ma, Felix Juefei-Xu, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Chunyang Chen, Ting Su, Li Li, Yang Liu, Jianjun Zhao, and Yadong Wang. "DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems". (ASE, 2018) [Distinguished Paper Award]
Chaowei Xiao, Armin Sarabi, Yang Liu, Bo Li, Mingyan Liu, Tudor Dumitras. " From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild". (USENIX Security, 2018)
Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song. " Generating Adversarial Examples with Adversarial Networks". (IJCAI, 2018)
Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li. "Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning". (Oakland, 2018)
Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, Dawn Song. "Robust Physical-World Attacks on Deep Learning Visual Classification". (CVPR, 2018)
Press: IEEE Spectrum, Yahoo News, Wired, Engagdet, Telegraph, Car and Driver, CNET, Digital Trends, SCMagazine, Schneier on Security, Ars Technica, Fortune
Xingjun Ma, Bo Li, Yisen Wang, Sarah M. Erfani, Sudanthi Wijewickrema, Grant Schoenebeck , Dawn Song, Michael E. Houle, and James Bailey. " Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality". (ICLR, 2018, oral presentation)).
Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, and Dawn Song. " Spatially Transformed Adversarial Examples". (ICLR, 2018) Type your paragraph here.
Warren He, Bo Li and Dawn Song. " Decision Boundary Analysis of Adversarial Examples". (ICLR, 2018)
Xiaojie Wang, Jianzhong Qi, Ramamohanarao Kotagiri, Yu Sun, Bo Li, and Rui Zhang. "A Joint Optimization Approach for Personalized Recommendation Diversification". (PAKDD, 2018)
Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley Malin. " Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing". (ICDE, 2018)
Ruoxi Jia, Ioannis Konstantakopoulos, Bo Li, Dawn Song, Costas J. Spanos. " Poisoning Attacks on Data-Driven Utility Learning in Games". (ACC, 2018)
Qingrong Chen, Minhui Xue, Chong Xiang, Bo Li, Haizhong Zheng, and Haojin Zhu. "Do We Need Original Data for Training? Toward Designing Privacy-Preserving Machine Learning". (DLSRF, 2017, Research Forum Award)).
Lei Huang, Xianglong Liu, Bo Lang, Adams Wei Yu, Bo Li. "Orthogonal Weight Normalization: Solution to Optimization over Multiple Dependent Stiefel Manifolds in Deep Neural Networks". (AAAI, 2017)
Chang Liu, Bo Li, Yevgeniy Vorobeychik, and Alina Oprea. "Robust Linear Regression Against Training Data Poisoning". (AISec, 2017, Best paper award).
B. Li, K. Roundy, C. Gates and Y. Vorobeychik. “Large-scale identification of malicious singleton files”. In ACM Conference on Data and Application Security and Privacy (CODASPY). Arizona, USA, 2017.
J. Gao, B. Li, G. Schoenebeck and F. Yu. "Engineering Agreement: The Naming Game with Asymmetric and Heterogeneous Agents," In Proceedings of the 30th International Conference on Artificial Intelligence (AAAI). San Francisco, USA, 2017.
B. Li, Y. Wang, A. Singh, Y. Vorobeychik, “Data poisoning attacks on factorization-based collaborative filtering,” In Proc. of the Neural Information Processing Systems (NIPS). Barcelona, Spain, 2016.
C. Yan, B. Li, Y. Chen, D. Liebovitz, and B. Malin, “Learning clinical workflows to identify subgroups of heart failure patients”, In Proc. Of the American Medical Informatics Association Annual Fall Symposium (AMIA), Chicago, USA, 2016.
B. Li, Y. Vorobeychik, M. Li, and B. Malin, “Iterative classification for sanitizing large-scale datasets,” In Proc. of the IEEE International Conference on Data Mining (ICDM). Atlantic City, NJ, USA, 2015.
B. Li, “Secure learning and mining in adversarial environments,” In Proc. of the IEEE International Conference on Data Mining (ICDM) Phd forum. Atlantic City, NJ, USA, 2015.
L. Ke, B. Li , Y. Vorobeychik, “Behavioral Experiments in Email Filter Evasion” In Proc. of the 30th International Conference on Artificial Intelligence (AAAI). Phoenix, AZ, USA, 2016.
B. Li and Y. Vorobeychik, “Scalable Optimization of Randomized Operational Decisions in Adversarial Classification Settings,” in Proc. of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS). San Diego, CA, USA, 2015.
B. Li and Y. Vorobeychik, “Feature corss-substitution in adversarial classification,” In Proc. of the Neural Information Processing Systems (NIPS). Quebec, Canada, 2014.
Y. Vorobeychik and B. Li, “Optimal randomized classification in adversarial settings,” In Proc. of the International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). Paris, France, 2014.
Y. H. Wang, J. S. Lee, B. Li, “A Hybrid Illumination Refinement Technique based on Double Niblack Thresholds”, In Proc. of the International Conference on Communication and Information Systems (ICCIS). Roma, Italy, 2015.
J. S. Lee, K. J. Wei, B. R. Huang, and B. Li, “Note on an anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics,” In Proc. of the Cryptography and Information Security Conference (CISC), Kaohsiung, Taiwan, 2015.
M. E. Koran, B. Li, N. Jahanshad, T. A. Thornton-Wells, D. C. Glahn, P. M. Thompson, J. Blangero, T. E. Nichols, P. Kochunov, and B. A. Landman. “The impact of family structure and common environment on heritability estimation for neuroimaging genetics studies using SOLAR”, In Proc. of the International Imaging Genetics Conference (GC). Irvine, CA, USA, 2014.
M. E. Koran, B. Li, N. Jahanshad, T. A. Thornton-Wells, D. C. Glahn, P. M. Thompson, J. Blangero, T. E. Nichols, P. Kochunov, and B. A. Landman. “Neuroimaging Genetics Study Design: A Comparison of the OpenMX and SOLAR Software Packages for Estimating Heritability of Neuroimaging Traits”. In Proc. of the International Imaging Genetics Conference (GC). Irvine, CA, USA, 2014.
M. E. Koran, B. Li, N. Jahanshad, T. A. Thornton-Wells, D. C. Glahn, P. M. Thompson, J. Blangero, T. E. Nichols, P. Kochunov, and B. A. Landman. “On study design in neuroimaging heritability analyses.” In Proc. of the SPIE Medical Imaging Conference. San Diego (SPIE), CA, USA, 2014.
Z. Xu, B. Li, S. Panda, A. J. Asman, K. L. Merkle, P. L. Shanahan, R. G. Abramson, and B. A. Landman. “Shape-Constrained Multi-Atlas Segmentation of Spleen in CT.” In Proc. of the SPIE Medical Imaging Conference. San Diego (SPIE), CA, USA, 2014.
J. S. Lee, K. J. Wei, and B. Li, “On the security of two ECC-based authentication mechanisms for confirming authorization,” In Proc. of the Cryptography- 20 years of Cryptography in Taiwan, McGraw-Hill International Enterprises, LLC., Taiwan, 2014.
Q. Lin, Z. Xu, B. Li, R. Baucom, B. Poulose, B. A. Landman, and R. E. Bodenheimer. “Immersive Virtual Reality for Visualization of Abdominal CT.” In Proc. of the SPIE Medical Imaging Conference. Orlando (SPIE), FL, USA, 2013.
B. Li, S. Panda, Z. Xu, A. J. Asman, P. L. Shanahan, R. G. Abramson, and B. A. Landman. “Regression forest region recognition enhances multi-atlas spleen labeling”. In Proc. of the Medical Image Computing and Computer Assisted Intervention (MICCAI). Nagoya, Japan, 2013.
B. Li, P. Volgyesi, and A. Ledeczi: “Rapid Prototyping of Image Processing Workflows on Massively Parallel Architectures”, In Proc. of Intelligent Solutions in Embedded Systems (WISES), Carinthia, Austria, 2012.
J. S. Lee, B. Li , and H. Y. Tsai. “An Effective Preprocessor for Enhancing Edge Detection in Speckle Images,” In Proc. of the 8th International Conference on Information Science and Digital Content Technology (ICIDT), Jeju, Korea, 2012.
F. P. Lin, B. Li and J. S. Lee. "A neoteric progressive scheme for visual secret sharing," In the Proc. of the First National Conference on Web Intelligence and Applications (CWIA). Kaohsiung, Taiwan, 2011.
B. Li, and J. S. Lee. “A wally watermarking scheme with blind extraction based on structured encoding system,” In Proc. of International Conference on 2nd World Congress on Computer Science and Information Engineering (CSIE), Changchun, China, 2011.
B. Li, J. S. Lee, and C. C. Chang. “Providing Anonymous Channels and Mutual Authentication in GSM,” In Proc. of International Conference on the Fourth International Conference on Genetic and Evolutionary Computing (WCECS), Shenzhen, China, 2010.
J. S. Lee, B. Li and Y. C. Chou. “A Brand-new Mobile Value-added Service: M-Check,” In Proc. of International Conference on Networked Computing, Advanced Information Management and Digital Content and Multimedia Technologies (AICIT), Seoul, Korea, 2009.
B. Li, Y. Vorobeychik, "Evasion-Robust Classification on Binary Domains," ACM Transactions on Knowledge Discovery from Data (TKDD), February. 2018.
S. Chen, M. Xue, L. Fan, S. Hao, L. Xu, H. Zhu, and B. Li, "Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach," Elsevier Computers & Security, 2017.
B. Li, Y. Vorobeychik, M. Li, B. Malin, "Scalable Iterative Classification for Sanitizing Large-Scale Datasets," IEEE Transactions on Knowledge and Data Engineering (TKDE), Oct. 2016.
J. S. Lee, B. Li, and B. R. Huang, “Oblivious Transfer System for Information Concealing and Recovery in Cloud Computing,” Journal of Internet Technology, vol. 20, pp. 132-145, March 2015.
J. S. Lee, K. R. Wen, and B. Li, “Renovating Contaminative Image Archives based on Patch Propagation and Adaptive Confidence Collation” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, pp. 112-134, April 2015.
M. Li, D. Carrell, J. Aberdeen, L. Hirschman, B. Li, Y.Vorobeychik, and B.Malin, “Optimizing Annotation Resources for Natural Language De-identification via a Game Theoretic Framework,” Journal of Biomedical Informatics, vol. 30, pp.142-179, October 2015
J. S. Lee, and B. Li, "Self-recognized Watermarking Technique with Resistance to Large Scale Cropping," IEEE Multimedia, vol. 21, pp. 60-73, March 2014.
J. S. Lee, W. C. Kao, and B. Li, “Aryabhata Remainder Theorem-Based Non-Iterative Electronic Lottery Mechanism with Robustness,” IET Information Security, vol. 7, pp. 172-182, May 2013.
J. S. Lee, and B. Li, “Note on ‘Authentication protocol using an identifier in an ad hoc network environment’,” Mathematical and Computer Modeling, vol. 57, pp. 1572-1575, July 2013.
B. Li, F. Bryan, and B. A. Landman, “Next Generation of the JAVA Image Science Toolkit (JIST) Visualization and Validation”. InSight Journal, vol. 12, pp. 23-34, February 2012.
C. C. Yang, K. J. Wei, B. Li and J. S. Lee, "HORME: Hierarchical-Object-Relational Medical management for Electronic record," Security and Communication Networks, vol. 17, pp. 53-65, November 2012.
C. C. Chang, B. Li and J. S. Lee, “Secret Sharing Using Visual Cryptography,” Journal of Electronic Science and Technology, vol. 8, pp. 289-299, June 2010.
B. Li and J. S. Lee, “A Cryptographic Alternative for Preserving PHI in Compliance with HIPAA Privacy/Security Regulations,” Journal of Computers, vol. 21, pp. 27-36, March 2010.
If your dreams do not scare you, they are not big enough. -- Ellen Johnson Sirleaf