Selected Publication (Full Publication)---By Year, By Type

SELECTED CONFERENCE PAPERS

  1. Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, and Raheem Beyah, MINER: A Hybrid Data-Driven Approach for REST API Fuzzing, USENIX Security 2023.
  2. Qingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, and Kangjie Lu, Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs, ACM CCS 2022. [PDF] [Github]
  3. Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, and Ting Wang, ''Is your explanation stable?'': A Robustness Evaluation Framework for Feature Attribution, ACM CCS 2022. [PDF] [Github]
  4. Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, and Ting Wang, Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era, USENIX Security 2022. [PDF] [Slides]
  5. Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, and Ting Wang, On the Security Risks of AutoML, USENIX Security 2022. [PDF]
  6. Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, and Ting Wang, Label Inference Attacks Against Vertical Federated Learning, USENIX Security 2022. [PDF] [Slides] [Github]
  7. Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, and Ting Wang, Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings, IEEE S&P 2022. [PDF] [Slides] [Github]
  8. Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, and Dawn Song, Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models, IEEE S&P 2022. [PDF]
  9. Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, and Reheem Beyah, EMS: History-Driven Mutation for Coverage-based Fuzzing, NDSS 2022. [PDF] [Slides] [Github]
  10. Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, and Raheem Beyah, SLIME: Program-sensitive Energy Allocation for Fuzzing, ISSTA 2022. [PDF] [Slides] [Github]
  11. Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, and Raheem Beyah, A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware, ISSTA 2022. [PDF] [Slides] [Github]
  12. Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, and Ting Wang, TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors, Euro S&P 2022. [PDF] [Github]
  13. Xiang Ling, Lingfei Wu, Wei Deng, Sheng Zhang, Zhenqing Qu, Jiangyu Zhang, Tengfei Ma, Bin Wang, Chunming Wu, and Shouling Ji, MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection, IEEE INFOCOM 2022. [PDF]
  14. Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, and Jinyin Chen, NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification, ICSE 2022.
  15. Tieming Chen, Chengyu Dong, Mingqi Lv, Qijie Song, Haiwen Liu, Tiantian Zhu, Kang Xu, Ling Chen, and Shouling Ji, APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.
  16. Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, and Ting Wang, Backdoor Pre-trained Models Can Transfer to All, ACM CCS 2021. [PDF] [Slides]
  17. Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, and Qinming He, Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths, ACM CCS 2021. [PDF] [Slides]
  18. Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, and Yanjun Wu, CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels, ACM CCS 2021. [PDF] [Slides]
  19. Gaoning Pan, Xingwei Lin, Xuhong Zhang, Yongkang Jia, Shouling Ji, Chunming Wu, Xinlei Ying, Jiashui Wang, and Yanjun Wu, V-SHUTTLE: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing, ACM CCS 2021. [PDF] [Slides]
    * Best Paper Award
  20. Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, and Jiming Chen, AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy, ACM CCS 2021. [PDF] [Slides]
  21. Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, and Ting Wang, Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks, ACM CCS 2021. [PDF] [Slides]
  22. Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, and Raheem Beyah, MPInspector: A Systematic and Automatic Approach for Evaluating the Security of Iot Messaging Protocols, USENIX Security 2021. [PDF] [Slides]
  23. Zhaohan Xi, Ren Pang, Shouling Ji, and Ting Wang, Graph Backdoor, USENIX Security 2021. [PDF] [Slides] [Github]
  24. Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang, UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers, USENIX Security 2021. [PDF] [Slides] [Github]
  25. Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, and Raheem Beyah, iFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware, ASE 2021. [PDF] [Slides]
  26. Zhenguang Liu, Peng Qian, Xiang Wang, Lei Zhu, Qinming He, and Shouling Ji, Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion, IJCAI 2021.
  27. Zhenguang Liu, Haoming Chen, Runyang Feng, Shuang Wu, Shouling Ji, Bailin Yang, and Xun Wang, Deep Dual Consecutive Network for Human Pose Estimation, CVPR 2021.
  28. Sihao Hu, Xuhong Zhang, Junfeng Zhou, Shouling Ji, Jiaqi Yuan, Zhao Li, Zhipeng Wang, Qi Chen, Qinming He, and Liming Fang, Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining, ICDE 2021. [PDF]
  29. Zhenguang Liu, Kedi Lyu, Shuang Wu, Haipeng Chen, Yanbin Hao, and Shouling Ji, Aggregated Multi-GANs for Controlled 3D Human Motion Prediction, AAAI 2021. [PDF]
  30. Xinyang Zhang, Pang Ren, Shouling Ji, Fenglong Ma, and Ting Wang, i-Algebra: Towards Interactive Interpretability of Deep Neural Networks, AAAI 2021. [PDF]
  31. Hanlu Wu, Tengfei Ma, Lingfei Wu, Tariro Manyumwa and Shouling Ji, Unsupervised Reference-Free Summary Quality Evaluation via Contrastive Learning, EMNLP 2020. [PDF]
  32. Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, Raheem Beyah, Understanding the Security Risks of Docker Hub, ESORICS 2020. [PDF]
  33. Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo and Ting Wang, AdvMind: Inferring Adversary Intent of Black-Box Attacks, KDD 2020. [PDF]
  34. Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah, and Ting Wang, Text Captcha Is Dead? A Large Scale Deployment and Empirical Study, ACM CCS 2020. [PDF]
  35. Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, and Ting Wang, A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models, ACM CCS 2020. [PDF]
  36. Xudong Pan, Mi Zhang, Shouling Ji, and Min Yang, Privacy Risks of General-Purpose Language Models, IEEE S&P (Oakland) 2020. [PDF]
  37. Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, and Min Yang, Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent, USENIX Security 2020. [PDF]
  38. Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang, TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation, USENIX Security 2020. [PDF]
  39. Xinyang Zhang, Ningfei Wang, Shouling Ji, Hua Shen, Ting Wang, Interpretable Deep Learning under Fire, USENIX Security 2020. [PDF] arXiv:1812.00891
  40. Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah, SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems, ASIACCS 2020. [PDF]
  41. Zhao Li, Chenyi Lei, Pengcheng Zou, Donghui Ding, Shichang Hu, Zehong Hu, Shouling Ji and Jianliang Gao, Attention with Long-term Interval-Based Gated Recurrent Units for Modeling Sequential User Behaviors, DASFAA 2020. [PDF]
  42. Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li, Raheem Beyah, and Ting Wang, De-Health: All Your Online Health Information Are Belong to Us, ICDE 2020. [PDF] arXiv:1902.00717
  43. Zhe Ma, Jianfeng Dong, Yao Zhang, Zhongzi Long, Yuan He, Hui Xue and Shouling Ji, Fine-Grained Fashion Similarity Learning by Attribute-Specific Embedding Network, AAAI 2020. [PDF]
  44. Xu Duan, Jingzheng Wu, Shouling Ji, Zhiqing Rui , Tianyue Luo , Mutian Yang and Yanjun Wu, VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities, IJCAI 2019. [PDF] (Acceptance ratio: 850/4752 = 17.9%)
  45. Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song and Raheem Beyah, MOpt: Optimized Mutation Scheduling for Fuzzers, USENIX Security 2019. [PDF] [Github]
  46. Lingfei Wu, Ian En-Hsu Yen, Siyu Huo, Liang Zhao, Kun Xu, Liang Ma, Shouling Ji and Charu Aggarwal, Efficient Global String Kernel with Random Features: Beyond Counting Substructures, KDD 2019. [PDF]
  47. Jianfeng Dong, Xirong Li, Chaoxi Xu, Shouling Ji, Yuan He, Gang Yang and Xun Wang, Dual Encoding for Zero-Example Video Retrieval, CVPR 2019. [PDF]
  48. Chenyi Lei, Zhao Li and Shouling Ji, TiSSA: A Time Slice Self-Attention Approach for Modeling Sequential User Behaviors, WWW 2019. [PDF]
  49. Haiqin Weng, Shouling Ji, Fuzheng Duan, Zhao Li, Jianhai Chen, Qinming He and Ting Wang, CATS: Cross-Platform E-commerce Fraud Detection, ICDE 2019. [PDF]
  50. Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu, A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers, IEEE INFOCOM 2019. [PDF] (Acceptance ratio: 288/1464=19.7%)
  51. Xiang Ling, Shouling Ji, Jiaxu Zou, Jiannan Wang, Chunming Wu, Bo Li and Ting Wang, DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Models, IEEE S&P (Oakland) 2019. [PDF]
  52. Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, and Ting Wang, TextBugger: Generating Adversarial Text Against Real-world Applications, NDSS 2019. [PDF] (Acceptance ratio: 89/521 = 17.08%)
  53. 纪守领, 李进锋, 杜天宇, 李博, 机器学习模型可解释性方法、应用与安全研究综述, 计算机研究与发展, 2019. [PDF]
  54. Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, and Ting Wang, Model-Reuse Attacks on Learning Systems, ACM CCS 2018. [PDF]
  55. Haiqin Weng, Zhao Li, Shouling Ji, Chen Chu, Haifeng Lu, Tianyu Du, and Qinming He, Online E-Commerce Fraud: A Large-scale Detection and Analysis, ICDE 2018. [PDF]
  56. Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang, and Raheem Beyah, Quantifying Graph Anonymity, Utility, and De-anonymity, IEEE INFOCOM 2018. [PDF]
  57. Jing Chen, Shixiong Yao, Quan Yuan, Kun He, Shouling Ji, and Ruiying Du, CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections, IEEE INFOCOM 2018. [PDF]
  58. Mutian Yang, Jingzheng Wu, Shouling Ji, Tianyue Luo, and Yanjun Wu, Pre-Patch: Find Hidden Threats in Open Software based on Machine Learning Method, SCF 2018. [PDF]
    * Best Paper Award
  59. Ningfei Wang, Shouling Ji and Ting Wang, Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization, AISec 2018. [PDF]
    * Best Paper Award
  60. Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He and Raheem Beyah, Towards Evaluating the Security of Image CAPTCHA in the Wild, AISec 2018. [PDF]
  61. Jingzheng Wu, Tianyue Luo, Shouling Ji, Mei Liu, and Mutian Yang, LaChouTi: Kernel Vulnerability Responding Framework for the Fragmented Android Devices, FSE/ESEC 2017. [PDF]
  62. Xinyang Zhang, Shouling Ji, HuiWang and Ting Wang, Private, yet Practical, Multiparty Deep Learning, ICDCS 2017. [PDF] (Acceptance ratio: 90/531 = 16.95%)
  63. Jingzheng Wu, Shen Liu, Shouling Ji, Mutian Yang, Yanjun Wu, Yongji Wang and Tianyue Luo, Exception Beyond Exception: Crashing Android System by Trapping in "Uncaught Exception", ICSE 2017. [PDF]
  64. Shouling Ji, Shukun Yang, Anupam Das, Xin Hu, and Raheem Beyah, Password Correlation: Quantification, Evaluation and Application, IEEE INFOCOM 2017. [PDF] (Acceptance ratio: 292/1,395 = 20.9%)
  65. Yushan Liu, Shouling Ji, and Prateek Mittal, SmartWalk: Enhancing Social Network Security via Adaptive Random Walks, ACM CCS 2016. [PDF] (Acceptance ratio: 137/831 = 16.5%)
  66. Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, and Teryl Taylor, BotMeter: A Nimble Navigator for DGA-Botnet Landscape, ICDCS 2016. [PDF] (Acceptance ratio: 68/386 = 17.6%)
  67. Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, and Raheem Beyah, On the Relative De-anonymizability of Graph Data: Quantification and Evaluation, IEEE INFOCOM 2016. [PDF] (Acceptance ratio: 300/1,644 = 18.25%)
    * IEEE INFOCOM 2016 Best-in-Session Presentation Award
  68. Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-han Lee, and Raheem Beyah, PARS: A Uniform and Open-source Password Analysis and Research System, ACSAC 2015. (Acceptance ratio: 47/193 = 24.4%)
    * PARS Project
    * The IISP Demo Day Spring'16 Finalist
  69. Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem Beyah, SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization, USENIX Security 2015. (Acceptance ratio: 67/426 = 15.7%)
  70. Shouling Ji, Zhipeng Cai, Meng Han, and Raheem Beyah, Primary Social Behavior based Joint Routing and Scheduling for Cognitive Radio Networks, IEEE SECON 2015. (Acceptance ratio: 55/194 = 28%)
  71. Shouling Ji, Zhipeng Cai, Jing (Selena) He, and Raheem Beyah, Whitespace Analysis and Virtual Backbone Construction in Cognitive Radio Networks: A Social Networking Perspective, IEEE SECON 2015. (Acceptance ratio: 55/194 = 28%)
  72. Shouling Ji, Weiqing Li, Neil Z. Gong, Prateek Mittal, and Raheem Beyah, On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge, NDSS 2015. San Diego, California, USA, February 8-11, 2015. (Acceptance ratio: 50/305 = 16.4%)
  73. Shouling Ji, Weiqing Li, M. Srivatsa, and Raheem Beyah, Structural Data De-anonymization: Quantification, Practice, and Implications, ACM CCS 2014. Scottsdale, Arizona, USA, November 3-7, 2014. (Acceptance ratio: 114/585 = 19.5%)
  74. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah, Structure based Data De-anonymization of Social Networks and Mobility Traces, ISC 2014. Hong Kong, October 12-14, 2014. (Acceptance ratio: 20/106 = 18.9%)
  75. Jing (Selena) He, Shouling Ji, Raheem Beyah, and Zhipeng Cai, Minimum-sized Influential Node Set Selection for Social Networks under the Independent Cascade Model, ACM MOBIHOC 2014. Philadelphia, PA, USA, August 11-14, 2014. (Acceptance ratio: 40/211 = 18.9%)
  76. Mingyuan Yan, Shouling Ji, Meng Han, Yingshu Li, and Zhipeng Cai, Data Aggregation Scheduling in Wireless Networks with Cognitive Radio Networks, IEEE SECON 2014. Singapore, June 30-July 3, 2014. (Acceptance ratio: 68/235 = 28.9%)
  77. Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai, Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks, IEEE MASS 2013. Hangzhou, China, October 14-16, 2013. (Acceptance ratio: 55/186 = 29.6%)
  78. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks, IEEE SECON 2013. New Orleans, USA, June 24-27, 2013. (Acceptance ratio: 51/280 = 18.2%)
  79. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks, IEEE MSN 2012. Chengdu, China, December 14-16, 2012.
    * Best Paper Award
  80. Zhipeng Cai, Shouling Ji, Jing (Selena) He, and Anu G. Bourgeois, Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks, ICDCS 2012. Macau, China, June 18-21, 2012. (Acceptance ratio: 71/515 = 13.8%)
  81. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks, IEEE INFOCOM 2012. Orlando, Florida USA, March 25-30, 2012. (Acceptance ratio: 278/1547 = 18%)
  82. Shouling Ji and Zhipeng Cai, Distributed Data Collection and Its Capacity in Asynchronous Wireless Sensor Networks, IEEE INFOCOM 2012. Orlando, Florida USA, March 25-30, 2012. (Acceptance ratio: 278/1547 = 18%)
  83. Shouling Ji, Raheem Beyah, Yingshu Li, Continuous Data Collection Capacity of Wireless Sensor Networks Under Physical Interference Model, IEEE MASS 2011. Valencia, Spain, October 17-22, 2011.(Acceptance ratio: 49/256 = 19.1%)
  84. Shouling Ji, Yingshu Li, and Xiaohua Jia, Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection, IEEE INFOCOM 2011. Shanghai, China, April 10-15, 2011. (Acceptance ratio: 291/1823 = 16%)

SELECTED JOURNALS

  1. Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, and Ting Wang, Your Labels Are Selling You Out: Relation Leaks in Vertical Federated Learning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.
  2. 纪守领, 王琴应, 陈安莹, 赵彬彬, 叶童, 张旭鸿, 吴敬征, 李昀, 尹建伟, 武延军, 开源软件供应链安全研究综述, 软件学报, 2022. [PDF]
  3. Rui Wang, Zhihua Wei, Haoran Duan, Shouling Ji, Yang Long, and Zhen Hong, EfficientTDNN: Efficient Architecture Search for Speaker Recognition, IEEE Transactions on Audio, Speech, and Language Processing (TASLP), 2022. [PDF]
  4. Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, and Raheem Beyah, Fraud-agents Detection in Online Microfinance: A Large-scale Empirical Study, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.
  5. Zhenguang Liu, Shuang Wu, Shuyuan Jin, Shouling Ji, Qi Liu, Shijian Lu, and Li Cheng, Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction, IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022.
  6. Yiming Wu, Qianjun Liu, Xiaojing Liao, Shouling Ji, Peng Wang, Xiaofeng Wang, Chunming Wu, and Zhao Li, Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.
  7. Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, and Ting Wang, Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications, IEEE Transactions on Dependable and Secure Computing (TDSC), 2021. [PDF]
  8. Jianfeng Dong, Zhe Ma, Xiaofeng Mao, Xun Yang, Yuan He, Richang Hong, and Shouling Ji, Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning, IEEE Transactions on Image Processing (TIP), 2021. [Slides]
  9. Shuiguang Deng, Yishan Chen, Gong Chen, Shouling Ji, Jianwei Yin, and Albert Y. Zomaya, Incentive-driven Proactive Application Deployment and Pricing on Distributed Edges, IEEE Transactions on Mobile Computing (TMC), 2021.
  10. Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu Bourgeois, and Raheem Beyah, This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems, IEEE Transactions on Dependable and Secure Computing (TDSC), 2021.
  11. Qianjun Liu, Shouling Ji, Changchang Liu, and Chunming Wu, A Practical Black-box Attack on Source Code Authorship Identification Classifiers, IEEE Transactions on Information Forensics & Security (TIFS), 2021. [PDF]
  12. Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, and Ting Wang, Adversarial CAPTCHAs, IEEE Transactions on Cybernetics (TCYB), 2021. [PDF]
  13. 纪守领, 杜天宇, 邓水光, 程鹏, 时杰, 杨珉, 李博, 深度学习模型鲁棒性研究综述, 计算机学报, 2021. [PDF]
  14. Binbin Zhao, Shouling Ji, Wei-han Lee, Changting Lin, Haiqin Weng, Jingzheng Wu, Pan Zhou, Liming Fang and Raheem Beyah, A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices, IEEE Transactions on Dependable and Secure Computing (TDSC), 2020. [PDF]
  15. 李旭嵘,纪守领,吴春明,刘振广,邓水光,程鹏,杨珉,孔祥维, 深度伪造与检测技术综述, 软件学报, 2020. [PDF]
  16. Yuwei Li, Shouling Ji, Chenyang Lyu, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu, and Raheem Beyah, V-Fuzz: Vulnerability Prediction Assisted Evolutionary Fuzzing for Binary Programs, IEEE Transactions on Cybernetics, 2020. [PDF] [Slides] (IF: 11.079)
  17. Mingqi Lv, Zhaoxiong Hong, Ling Chen, Tieming Chen, Tiantian Zhu and Shouling Ji, Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction, IEEE Transactions on Intelligent Transportation Systems (TITS), 2020. [PDF]
  18. Jianhai Chen, Deshi Ye, Zhenguang Liu, Shouling Ji, Qinming He, and Yang Xiang, A Truthful and Near-optimal Mechanism for Colocation Emergency Demand Response, IEEE Transactions on Mobile Computing (TMC), 2020. [PDF]
  19. Chengkun Wei, Shouling Ji, Changchang Liu, Wenzhi Chen, Ting Wang, AsgLDP: Collecting and Generating Decentralized Attributed Graphs with Local Differential Privacy, IEEE Transactions on Information Forensics & Security (TIFS), 2020. [PDF]
  20. Liming Fang, Hongwei Zhu, Boqing Lv, Zhe Liu, Weizhi Meng, Yu Yu, Shouling Ji, and Zehong Cao, HandiText: Handwriting Recognition based on Dynamic Characteristics with Incremental LSTM, ACM Transactions on Data Science (TDS), 2020.
  21. 纪守领, 杜天宇, 李进锋, 沈超, 李博, 机器学习模型安全与隐私研究综述, 软件学报, 2020. [PDF]
  22. Chengkun Wei, Qinchen Gu, Shouling Ji, Wenzhi Chen, Zonghui Wang, Raheem Beyah, OB-WSPES: A Uniform Evaluation System for Obfuscation-based Web Search Privacy, IEEE Transactions on Dependable and Secure Computing (TDSC), 2019. [PDF] GitHub
  23. 陈宇飞, 沈超, 王骞, 李琦, 王聪, 纪守领, 李康, 管晓宏, 人工智能系统安全与隐私风险, 计算机研究与发展, 2019. [PDF]
  24. Xurong Li, Shouling Ji, Meng Han, Juntao Ji, Zhenyu Ren, Yushan Liu, and Chunming Wu, Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study, IEEE Transactions on Dependable and Secure Computing (TDSC), 2019. [PDF] arXiv:1901.01223
  25. Zhenyu Wen, Tao Lin, Renyu Yang, Shouling Ji, Rajiv Ranjan, Alexander Romanovsky, Changting Lin, and Jie Xu, GA-Par: Dependable Microservice Orchestration Framework for Geo-Distributed Clouds, IEEE Transactions on Parallel and Distributed Systems (TPDS), 2019. [PDF]
  26. Kun He, Jing Chen, Quan Yuan, Shouling Ji, Debiao He, and Ruiying Du, Dynamic Group-Oriented Provable Data Possession in the Cloud, IEEE Transactions on Dependable and Secure Computing (TDSC), 2019. [PDF]
  27. Haiqin Weng, Shouling Ji, Changchang Liu, Ting Wang, Qinming He, Fast-RCM: Fast Tree based Unsupersived Rare Class Mining, IEEE Transactions on Cybernetics, 2019. [PDF] (IF: 10.387)
  28. Xuhong Zhang, Jun Wang, Shouling Ji, Jiangling Yin, Rui Wang, Xiaobo Zhou and Changjun Jiang, An I/O Efficient Distributed Approximation Framework Using Cluster Sampling, IEEE Transactions on Parallel and Distributed Systems (TPDS), 2019. [PDF]
  29. Zhen Hong, Rui Wang, Shouling Ji, and Raheem Beyah, Attacker Location Evaluation-based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems, IEEE Transactions on Information Forensics & Security (TIFS), 2018. [PDF]
  30. Xiang Ling, Shouling Ji, and Kui Ren, Adversarial Example Attacks and Defenses of Deep Learning Systems, Communications of the CCF Vol. 14, No. 6, pp. 11 - 16, June, 2018. [PDF] 面向深度学习系统的对抗样本攻击与防御 (in Chinese)
  31. Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, and Raheem Beyah, Fingerprinting for Cyber Physical System Security: Device Physics Matters Too, IEEE Security & Privacy. [PDF] 2017
  32. Shukun Yang, Shouling Ji, and Raheem Beyah, DPPG: A Dynamic Password Policy Generation System, IEEE Transactions on Information Forensics & Security (TIFS). [PDF] 2017
  33. Shouling Ji, Weiqing Li, Prateek Mittal, and Raheem Beyah, De-SAG: On the De-anonymization of Structure-Attribute Graph Data, IEEE Transactions on Dependable and Secure Computing (TDSC). [PDF] 2017
  34. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah, General Graph Data De-anonymization: From Mobility Traces to Social Networks, ACM Transactions on Information and System Security (TISSEC). [PDF] 2016
  35. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah, Structural Data De-anonymization: Theory and Practice, IEEE/ACM Transactions on Networking (ToN). [PDF] 2016
  36. Shouling Ji, Weiqing Li, Neil Gong, Prateek Mittal, and Raheem Beyah, Seed based De-anonymizability Quantification of Social Networks, IEEE Transactions on Information Forensics & Security (TIFS). 2015.
  37. Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, and Raheem Beyah, Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords, IEEE Transactions on Dependable and Secure Computing (TDSC). 2015.
  38. Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai, Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks, IEEE Transactions on Mobile Computing (TMC). 2015.
  39. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Broadcast Scheduling with Latency and Redundancy Analysis for Cognitive Radio Networks, IEEE Transactions on Vehicular Technology (TVT). 2014.
  40. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks, IEEE Transactions on Mobile Computing (TMC). Vol. 13, No. 3, pp(s): 626-637, 2014.
  41. Meng Han, Mingyuan Yan, Jinbao Li, Shouling Ji, and Yingshu Li, Neighborhood-based Uncertainty Generation in Social Networks, Journal of Combinatorial Optimization (JCO). Vol. 28, pp(s): 561-576, 2014.
  42. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems (TPDS). Vol. 25, No. 7, pp(s): 1681-1690, 2014.
  43. Zhipeng Cai, Shouling Ji, Jing (Selena) He, Lin Wei, and Anu G. Bourgeois, Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration, IEEE Transactions on Parallel and Distributed Systems (TPDS). Vol. 25, No. 8, pp(s): 2020-2029, 2014.
  44. Jing (Selena) He, Shouling Ji, Yi Pan, and Zhipeng Cai, Approximation Algorithms for Load-Balanced Virtual Backbone Construction in Wireless Sensor Networks, Theoretical Computer Science (TCS). Vol. 507, pp(s): 2-16, October 2013.
  45. Shouling Ji and Zhipeng Cai, Distributed Data Collection in Large-Scale Asynchronous Wireless Sensor Networks under the Generalized Physical Interference Model, IEEE/ACM Transactions on Networking (ToN). Vol. 21, No. 4, pp(s): 1270-1283, August 2013.
  46. Shouling Ji, Jing (Selena) He, A. Selcuk Uluagac, Raheem Beyah, and Yingshu Li, Cell-based Snapshot and Continuous Data Collection in Wireless Sensor Networks, ACM Transactions on Sensor Networks (TOSN). Vol. 9, No. 4, July 2013.
  47. Shouling Ji, A. Selcuk Uluagac, Raheem Beyah, Zhipeng Cai, Practical Unicast and Convergecast Scheduling Schemes for Cognitive Radio Networks, Journal of Combinatorial Optimization (JCO). Vol. 26, No. 1, pp(s): 161-177, 2013.
  48. Shouling Ji, Jing (Selena) He, Yi Pan, and Yingshu Li, Continuous Data Aggregation and Capacity in Probabilistic Wireless Sensor Netwroks, Journal of Parallel and Distributed Computing (JPDC). Vol. 73, No. 6, pp(s): 729-745, 2013.
  49. Shouling Ji, Zhipeng Cai, Yingshu Li, and Xiaohua Jia, Continuous Data Collection Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems (TPDS). Vol. 23, No. 10, pp(s): 1844-1855, October 2012.

SURVEYS

  1. Shouling Ji, Prateek Mittal, and Raheem Beyah, Graph Data Anonymization, De-anonymization Attacks, and De-anonymizability Quantification: A Survey, IEEE Communications Surveys & Tutorials (COMST), 2016. [PDF] (Impact Factor = 22.973)

POSTERS

  1. Weiqing Li, Shouling Ji, and Raheem Beyah, ShareSafe: the Complete Collection of Tools for Graph Data Privacy Analysis, ACSAC 2015. poster session.
  2. Shukun Yang, Shouling Ji, Xin Hu, and Raheem Beyah, Effectiveness and Soundness of Commercial Password Strength Meters, NDSS 2015. San Diego, California, USA, February 8-11, 2015.
  3. Shouling Ji, Shukun Yang, Weiqing Li, Xiaojing Liao, Xin Hu, and Raheem Beyah, Password Cracking: A Large-Scale Empirical Study, USENIX Security 2014. poster session, San Diego, CA, USA, August 20-22, 2014.
  4. Shouling Ji, Weiqing Li, Jing (Selena) He, Mudhakar Srivatsa, and Raheem Beyah, Optimization based Data De-anonymization, IEEE S&P 2014. poster session, San Jose, California, USA, May 18-21, 2014.
  5. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, and Raheem Beyah, De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information, NDSS 2014. Poster Session, San Diego, California, USA, February 23-26, 2014.
  6. Shouling Ji, Mingyuan Yan, Yueming Duan, Jing (Selena) He, Raheem Beyah, and Zhipeng Cai, Broadcast Scheduling for Cognitive Radio Networks, IEEE INFOCOM 2013. Demo/Poster Session, Turin, Italy, April 14-19, 2013.

DISSERTATION

  1. Shouling Ji, EVALUATING THE SECURITY OF ANONYMIZED BIG GRAPH/STRUCTURAL DATA (2015), Georgia Institute of Technology.
  2. Shouling Ji, DATA COLLECTION AND CAPACITY ANALYSIS IN LARGE-SCALE WIRELESS SENSOR NETWORKS, (2013). Computer Science Dissertations . Paper 76.

BOOK CHAPTERS

  1. Shouling Ji, Jing (Selena) He, and Zhipeng Cai, “ Data Gathering in Wireless Sensor Networks”, The Art of Wireless Sensor Networks Volume 1: Fundamentals, (Signals and Communications Technology Series), edited by Habib M. Ammari, Springer, January, 2014.
  2. Shouling Ji, Jing (Selena) He, and Yingshu Li, Optimizing Data Collection Capacity of Wireless Sensor Networks, Handbook of Combinatorial Optimization, 2nd Edition (edited by P. Pardalos, D.-Z. Du, and R. Graham), Springer, 2012.
  3. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Reliable Minimum Connected Dominating Sets for Topology Control in Probabilistic Wireless Sensor Networks, Scalable Computing: Theory and Practice (edited by S. U. Khan, L. Wang, and A. Y. Zomaya), John Wiley & Sons, 2012.