2024
Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data. Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha Larson, Stjepan Picek. Arxiv. [pdf]
2023
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks. Marco Arazzi*, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu.
A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification. Gorka Abad*, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti. [pdf]
2024
POST: A Framework for Privacy of Soft-prompt Transfer. Xun Wang, Jing Xu, Franziska Boenisch, Michael Backes, Adam Dziedzic. ICML 2024 Next Generation of AI Safety Workshop, 2024. [pdf]
2023
Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks. Jing Xu*, Stjepan Picek. CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, November 2023. [pdf]
Watermarking Graph Neural Networks based on Backdoor Attacks. Jing Xu*, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek. 8th IEEE European Symposium on Security and Privacy (EuroS&P), 2023. [pdf]
Rethinking the Trigger-injecting Position in Graph Backdoor Attack. Jing Xu*, Gorka Abad, Stjepan Picek. International Joint Conference on Neural Networks (IJCNN), 2023. [pdf]
2022
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. Jing Xu*, Rui Wang, Kaitai Liang, Stjepan Picek. Annual Computer Security Applications Conference (ACSAC), pages 684–698, Austin, TX, USA, December 5-9, 2022. [pdf]
On Exploring Backdoor Attacks in Federated Graph Neural Networks. Jing Xu*, Stefanos Koffas, Stjepan PIcek. Learning from Authoritative Security Experiment Results (LASER) Workshop, Austin, TX, USA, December 6, 2022.
Clean-label Backdoor Attack on Graph Neural Networks. Jing Xu*, Stjepan Picek. CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, November 2022, pages 3491–3493. [pdf]
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. Mauro Conti, Jiaxin Li*, Stjepan Picek, Jing Xu. AISec'22: Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, November 2022, pages 1–12. [pdf]
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers. Stefanos Koffas*, Jing Xu, Mauro Conti, Stjepan Picek. WiseML '22: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, May 2022, pages 57–62. [pdf]
2021
Explainability-based backdoor attacks against graph neural networks. Jing Xu*, Minhui(Jason) Xue, Stjepan Picek. WiseML '21: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, June 2021, pages 31–36. [pdf]
2017
Coin Recognition Method Based on SIFT Algorithm. Jing Xu*, Gongliu Yang, Yuanyuan Liu, Jingjia Zhong. 4th International Conference on Information Science and Control Engineering (ICISCE), Changsha, China, July 21-23, 2017. [pdf]
Initial alignment of strapdown inertial navigation system with the aid of Doppler velocity log. Jingjia Zhong*, Gongliu Yang, Yuanyuan Liu, Jing Xu. 4th International Conference on Information Science and Control Engineering (ICISCE), Changsha, China, July 21-23, 2017. [pdf]
2023
Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks. Jing Xu*, Stefanos Koffas, Stjepan Picek. Digital Threats: Research and Practice (DTRAP).
2021
A multi-sensor information fusion method based on factor graph for integrated navigation system. Jing Xu*, Gongliu Yang, Yiding Sun, Stjepan Picek. IEEE Access, 14 January 2021, pages 12044 - 12054. [pdf]
2023
A Systematic Evaluation of Backdoor Attacks in Various Domains. Jing Xu*, Stefanos Koffas, Behrad Tajalli, Jing Xu, Mauro Conti and Stjepan Picek*. Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Use Cases and Emerging Challenges, 2023, pages 519 - 552. [pdf]