Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li. " Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning". (Oakland, 2018)
Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, Chaowei Xiao, Dawn Song. "Robust Physical-World Attacks on Deep Learning Visual Classification". (CVPR, 2018)
Xingjun Ma, Bo Li, Yisen Wang, Sarah M. Erfani, Sudanthi Wijewickrema, Grant Schoenebeck , Dawn Song, Michael E. Houle, and James Bailey. " Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality". (ICLR, 2018, oral presentation)).
Warren He, Bo Li and Dawn Song. " Decision Boundary Analysis of Adversarial Examples". (ICLR, 2018)
Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, and Dawn Song. " Spatially Transformed Adversarial Examples". (ICLR, 2018)
Xiaojie Wang, Jianzhong Qi, Ramamohanarao Kotagiri, Yu Sun, Bo Li, and Rui Zhang. "A Joint Optimization Approach for Personalized Recommendation Diversification". (PAKDD, 2018)
Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley Malin. " Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing". (ICDE, 2018)
Ruoxi Jia, Ioannis Konstantakopoulos, Bo Li, Dawn Song, Costas J. Spanos. " Poisoning Attacks on Data-Driven Utility Learning in Games". (ACC, 2018)
Qingrong Chen, Minhui Xue, Chong Xiang, Bo Li, Haizhong Zheng, and Haojin Zhu. "Do We Need Original Data for Training? Toward Designing Privacy-Preserving Machine Learning". (DLSRF, 2017, Research Forum Award)).
Lei Huang, Xianglong Liu, Bo Lang, Adams Wei Yu, Bo Li. "Orthogonal Weight Normalization: Solution to Optimization over Multiple Dependent Stiefel Manifolds in Deep Neural Networks". (AAAI, 2017)
Chang Liu, Bo Li, Yevgeniy Vorobeychik, and Alina Oprea. "Robust Linear Regression Against Training Data Poisoning". (AISec, 2017, Best paper award).
Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, Dawn Song (alphabetical order) . "Robust Physical-World Attacks on Machine Learning Models". Preprint (arXiv:1707.08945) , July 2017
Press: IEEE Spectrum, Yahoo News, Wired, Engagdet, Telegraph, Car and Driver, CNET, Digital Trends, SCMagazine, Schneier on Security, Ars Technica, Fortune
B. Li, K. Roundy, C. Gates and Y. Vorobeychik. “Large-scale identification of malicious singleton files”. In ACM Conference on Data and Application Security and Privacy (CODASPY). Arizona, USA, 2017.
J. Gao, B. Li, G. Schoenebeck and F. Yu. "Engineering Agreement: The Naming Game with Asymmetric and Heterogeneous Agents," In Proceedings of the 30th International Conference on Artificial Intelligence (AAAI). San Francisco, USA, 2017.
B. Li, Y. Wang, A. Singh, Y. Vorobeychik, “Data poisoning attacks on factorization-based collaborative filtering,” In Proc. of the Neural Information Processing Systems (NIPS). Barcelona, Spain, 2016.
C. Yan, B. Li, Y. Chen, D. Liebovitz, and B. Malin, “Learning clinical workflows to identify subgroups of heart failure patients”, In Proc. Of the American Medical Informatics Association Annual Fall Symposium (AMIA), Chicago, USA, 2016.
B. Li, Y. Vorobeychik, M. Li, and B. Malin, “Iterative classification for sanitizing large-scale datasets,” In Proc. of the IEEE International Conference on Data Mining (ICDM). Atlantic City, NJ, USA, 2015.
B. Li, “Secure learning and mining in adversarial environments,” In Proc. of the IEEE International Conference on Data Mining (ICDM) Phd forum. Atlantic City, NJ, USA, 2015.
L. Ke, B. Li , Y. Vorobeychik, “Behavioral Experiments in Email Filter Evasion” In Proc. of the 30th International Conference on Artificial Intelligence (AAAI). Phoenix, AZ, USA, 2016.
B. Li and Y. Vorobeychik, “Scalable Optimization of Randomized Operational Decisions in Adversarial Classification Settings,” in Proc. of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS). San Diego, CA, USA, 2015.
B. Li and Y. Vorobeychik, “Feature corss-substitution in adversarial classification,” In Proc. of the Neural Information Processing Systems (NIPS). Quebec, Canada, 2014.
Y. Vorobeychik and B. Li, “Optimal randomized classification in adversarial settings,” In Proc. of the International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). Paris, France, 2014.
Y. H. Wang, J. S. Lee, B. Li, “A Hybrid Illumination Refinement Technique based on Double Niblack Thresholds”, In Proc. of the International Conference on Communication and Information Systems (ICCIS). Roma, Italy, 2015.
J. S. Lee, K. J. Wei, B. R. Huang, and B. Li, “Note on an anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics,” In Proc. of the Cryptography and Information Security Conference (CISC), Kaohsiung, Taiwan, 2015.
M. E. Koran, B. Li, N. Jahanshad, T. A. Thornton-Wells, D. C. Glahn, P. M. Thompson, J. Blangero, T. E. Nichols, P. Kochunov, and B. A. Landman. “The impact of family structure and common environment on heritability estimation for neuroimaging genetics studies using SOLAR”, In Proc. of the International Imaging Genetics Conference (GC). Irvine, CA, USA, 2014.
M. E. Koran, B. Li, N. Jahanshad, T. A. Thornton-Wells, D. C. Glahn, P. M. Thompson, J. Blangero, T. E. Nichols, P. Kochunov, and B. A. Landman. “Neuroimaging Genetics Study Design: A Comparison of the OpenMX and SOLAR Software Packages for Estimating Heritability of Neuroimaging Traits”. In Proc. of the International Imaging Genetics Conference (GC). Irvine, CA, USA, 2014.
M. E. Koran, B. Li, N. Jahanshad, T. A. Thornton-Wells, D. C. Glahn, P. M. Thompson, J. Blangero, T. E. Nichols, P. Kochunov, and B. A. Landman. “On study design in neuroimaging heritability analyses.” In Proc. of the SPIE Medical Imaging Conference. San Diego (SPIE), CA, USA, 2014.
Z. Xu, B. Li, S. Panda, A. J. Asman, K. L. Merkle, P. L. Shanahan, R. G. Abramson, and B. A. Landman. “Shape-Constrained Multi-Atlas Segmentation of Spleen in CT.” In Proc. of the SPIE Medical Imaging Conference. San Diego (SPIE), CA, USA, 2014.
J. S. Lee, K. J. Wei, and B. Li, “On the security of two ECC-based authentication mechanisms for confirming authorization,” In Proc. of the Cryptography- 20 years of Cryptography in Taiwan, McGraw-Hill International Enterprises, LLC., Taiwan, 2014.
Q. Lin, Z. Xu, B. Li, R. Baucom, B. Poulose, B. A. Landman, and R. E. Bodenheimer. “Immersive Virtual Reality for Visualization of Abdominal CT.” In Proc. of the SPIE Medical Imaging Conference. Orlando (SPIE), FL, USA, 2013.
B. Li, S. Panda, Z. Xu, A. J. Asman, P. L. Shanahan, R. G. Abramson, and B. A. Landman. “Regression forest region recognition enhances multi-atlas spleen labeling”. In Proc. of the Medical Image Computing and Computer Assisted Intervention (MICCAI). Nagoya, Japan, 2013.
B. Li, P. Volgyesi, and A. Ledeczi: “Rapid Prototyping of Image Processing Workflows on Massively Parallel Architectures”, In Proc. of Intelligent Solutions in Embedded Systems (WISES), Carinthia, Austria, 2012.
J. S. Lee, B. Li , and H. Y. Tsai. “An Effective Preprocessor for Enhancing Edge Detection in Speckle Images,” In Proc. of the 8th International Conference on Information Science and Digital Content Technology (ICIDT), Jeju, Korea, 2012.
F. P. Lin, B. Li and J. S. Lee. "A neoteric progressive scheme for visual secret sharing," In the Proc. of the First National Conference on Web Intelligence and Applications (CWIA). Kaohsiung, Taiwan, 2011.
B. Li, and J. S. Lee. “A wally watermarking scheme with blind extraction based on structured encoding system,” In Proc. of International Conference on 2nd World Congress on Computer Science and Information Engineering (CSIE), Changchun, China, 2011.
B. Li, J. S. Lee, and C. C. Chang. “Providing Anonymous Channels and Mutual Authentication in GSM,” In Proc. of International Conference on the Fourth International Conference on Genetic and Evolutionary Computing (WCECS), Shenzhen, China, 2010.
J. S. Lee, B. Li and Y. C. Chou. “A Brand-new Mobile Value-added Service: M-Check,” In Proc. of International Conference on Networked Computing, Advanced Information Management and Digital Content and Multimedia Technologies (AICIT), Seoul, Korea, 2009.
B. Li, Y. Vorobeychik, "Evasion-Robust Classification on Binary Domains," ACM Transactions on Knowledge Discovery from Data (TKDD), February. 2018.
S. Chen, M. Xue, L. Fan, S. Hao, L. Xu, H. Zhu, and B. Li, "Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach," Elsevier Computers & Security, 2017.
B. Li, Y. Vorobeychik, M. Li, B. Malin, "Scalable Iterative Classification for Sanitizing Large-Scale Datasets," IEEE Transactions on Knowledge and Data Engineering (TKDE), Oct. 2016.
J. S. Lee, B. Li, and B. R. Huang, “Oblivious Transfer System for Information Concealing and Recovery in Cloud Computing,” Journal of Internet Technology, vol. 20, pp. 132-145, March 2015.
J. S. Lee, K. R. Wen, and B. Li, “Renovating Contaminative Image Archives based on Patch Propagation and Adaptive Confidence Collation” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, pp. 112-134, April 2015.