Neural network inversion in adversarial setting via background knowledge alignment Z Yang, J Zhang, EC Chang, Z Liang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 195 | 2019 |
Defending model inversion and membership inference attacks via prediction purification Z Yang, B Shao, B Xuan, EC Chang, F Zhang arXiv preprint arXiv:2005.03915, 2020 | 84 | 2020 |
Adversarial neural network inversion via auxiliary knowledge alignment Z Yang, EC Chang, Z Liang arXiv preprint arXiv:1902.08552, 2019 | 59 | 2019 |
Effectiveness of distillation attack and countermeasure on neural network watermarking Z Yang, H Dang, EC Chang arXiv preprint arXiv:1906.06046, 2019 | 38 | 2019 |
From homogeneous to heterogeneous: Leveraging deep learning based power analysis across devices F Zhang, B Shao, G Xu, B Yang, Z Yang, Z Qin, K Ren 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020 | 21 | 2020 |
Msdroid: Identifying malicious snippets for android malware detection Y He, Y Liu, L Wu, Z Yang, K Ren, Z Qin IEEE Transactions on Dependable and Secure Computing, 2022 | 19 | 2022 |
Automated identification of sensitive data from implicit user specification Z Yang, Z Liang Cybersecurity 1 (1), 13, 2018 | 14 | 2018 |
SAGE: steering the adversarial generation of examples with accelerations Z Zhao, Z Li, F Zhang, Z Yang, S Luo, T Li, R Zhang, K Ren IEEE Transactions on Information Forensics and Security 18, 789-803, 2023 | 7 | 2023 |
Purifier: defending data inference attacks via transforming confidence scores Z Yang, L Wang, D Yang, J Wan, Z Zhao, EC Chang, F Zhang, K Ren Proceedings of the AAAI Conference on Artificial Intelligence 37 (9), 10871 …, 2023 | 6 | 2023 |
Automated Identification of Sensitive Data via Flexible User Requirements Z Yang, Z Liang Security and Privacy in Communication Networks: 14th International …, 2018 | 4 | 2018 |
Fidelity: A property of deep neural networks to measure the trustworthiness of prediction results Z Yang Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 3 | 2019 |
Fidelity: Towards measuring the trustworthiness of neural network classification Z Yang 2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019 | 2 | 2019 |
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wild J Wan, J Fu, L Wang, Z Yang 2024 IEEE Symposium on Security and Privacy (SP), 68-68, 2023 | 1 | 2023 |
Towards Fair Graph Federated Learning via Incentive Mechanisms C Pan, J Xu, Y Yu, Z Yang, Q Wu, C Wang, L Chen, Y Yang Proceedings of the AAAI Conference on Artificial Intelligence 38 (13), 14499 …, 2024 | | 2024 |
Android Malware Detection Based on Structural Features of the Function Call Graph. Electronics 2021, 10, 186 Y Yang, X Du, Z Yang, X Liu s Note: MDPI stays neu-tral with regard to jurisdictional clai-ms in …, 2021 | | 2021 |