Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/uss/0002TSAXLYW023
%A Zhang, Zhuo
%A Tao, Guanhong
%A Shen, Guangyu
%A An, Shengwei
%A Xu, Qiuling
%A Liu, Yingqi
%A Ye, Yapeng
%A Wu, Yaoxuan
%A Zhang, Xiangyu
%B USENIX Security Symposium
%D 2023
%E Calandrino, Joseph A.
%E Troncoso, Carmela
%I USENIX Association
%K dblp
%P 2365-2382
%T PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.
%U http://dblp.uni-trier.de/db/conf/uss/uss2023.html#0002TSAXLYW023
@inproceedings{conf/uss/0002TSAXLYW023,
added-at = {2023-10-18T00:00:00.000+0200},
author = {Zhang, Zhuo and Tao, Guanhong and Shen, Guangyu and An, Shengwei and Xu, Qiuling and Liu, Yingqi and Ye, Yapeng and Wu, Yaoxuan and Zhang, Xiangyu},
biburl = {https://www.bibsonomy.org/bibtex/2c69874a7c65c93e20b4a0fba7a3133f0/dblp},
booktitle = {USENIX Security Symposium},
crossref = {conf/uss/2023},
editor = {Calandrino, Joseph A. and Troncoso, Carmela},
ee = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-zhuo-pelican},
interhash = {6e19540cf4ace475de0d6645d0b32a53},
intrahash = {c69874a7c65c93e20b4a0fba7a3133f0},
keywords = {dblp},
pages = {2365-2382},
publisher = {USENIX Association},
timestamp = {2024-04-09T15:39:57.000+0200},
title = {PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.},
url = {http://dblp.uni-trier.de/db/conf/uss/uss2023.html#0002TSAXLYW023},
year = 2023
}