Xinlei He
Xinlei He
CISPA Helmholtz Center for Information Security
Verified email at - Homepage
Cited by
Cited by
DeepScan: Exploiting deep learning for malicious account detection in location-based social networks
Q Gong, Y Chen, X He, Z Zhuang, T Wang, H Huang, X Wang, X Fu
IEEE Communications Magazine 56 (11), 21-27, 2018
Stealing Links from Graph Neural Networks
X He, J Jia, M Backes, NZ Gong, Y Zhang
USENIX Security Symposium, 2021
Node-level membership inference attacks against graph neural networks
X He, R Wen, Y Wu, M Backes, Y Shen, Y Zhang
arXiv preprint arXiv:2102.05429, 2021
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models
Y Liu, R Wen, X He, A Salem, Z Zhang, M Backes, E De Cristofaro, M Fritz, ...
USENIX Security Symposium, 2021
Quantifying and Mitigating Privacy Risks of Contrastive Learning
X He, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2021
DatingSec: Detecting malicious accounts in dating apps using a content-based attention network
X He, Q Gong, Y Chen, Y Zhang, X Wang, X Fu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2193-2208, 2021
Model Stealing Attacks Against Inductive Graph Neural Networks
Y Shen, X He, Y Han, Y Zhang
IEEE Symposium on Security and Privacy, 2021
Deep learning-based malicious account detection in the momo social network
J Wang, X He, Q Gong, Y Chen, T Wang, X Wang
2018 27th International Conference on Computer Communication and Networks …, 2018
Cross-site prediction on social influence for cold-start users in online social networks
Q Gong, Y Chen, X He, Y Xiao, P Hui, X Wang, X Fu
ACM Transactions on the Web (TWEB) 15 (2), 1-23, 2021
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions
Q Xie, Q Gong, X He, Y Chen, X Wang, H Zheng, B Zhao
IEEE Transactions on Mobile Computing, 2021
LBSLAB: a user data collection system in mobile environments
Q Gong, X He, Q Xie, S Lin, G She, R Fang, R Han, Y Chen, Y Xiao, X Fu, ...
Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018
Understanding the behavioral differences between American and German users: A data-driven study
C Yang, Y Chen, Q Gong, X He, Y Xiao, Y Huang, X Fu
Big Data Mining and Analytics 1 (4), 284-296, 2018
Identification of Influential Users in Emerging Online Social Networks Using Cross-site Linking
Q Gong, Y Chen, X He, F Li, Y Xiao, P Hui, X Wang, X Fu
CCF Conference on Computer Supported Cooperative Work and Social Computing …, 2018
Auditing Membership Leakages of Multi-Exit Networks
Z Li, Y Liu, X He, N Yu, M Backes, Y Zhang
CCS 2022, 2022
Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning
X He, H Liu, NZ Gong, Y Zhang
arXiv preprint arXiv:2207.12535, 2022
On Xing Tian and the Perseverance of Anti-China Sentiment Online
X Shen, X He, M Backes, J Blackburn, S Zannettou, Y Zhang
Proceedings of the International AAAI Conference on Web and Social Media 16 …, 2022
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
T Cong, X He, Y Zhang
arXiv preprint arXiv:2201.11692, 2022
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Z Sha, X He, N Yu, M Backes, Y Zhang
arXiv preprint arXiv:2201.07513, 2022
M Chen, J Yang, L Hu, MS Hossain, G Muhammad, Q Gong, Y Chen, ...
IEEE Communications Magazine, 2, 2018
The system can't perform the operation now. Try again later.
Articles 1–19