Подписаться
Yuankai Zhang
Yuankai Zhang
Research Scientist, Facebook
Подтвержден адрес электронной почты в домене fb.com - Главная страница
Название
Процитировано
Процитировано
Год
Hidden Voice Commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th USENIX Security Symposium (Security 16), 2016
7562016
Cocaine noodles: exploiting the gap between human and machine speech recognition
T Vaidya, Y Zhang, M Sherr, C Shields
9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015
2462015
Dispersing Asymmetric DDoS Attacks with SplitStack
A Chen, A Sriraman, T Vaidya, Y Zhang, A Haeberlen, BT Loo, LTX Phan, ...
ACM Workshop on Hot Topics in Networks (HotNets 16), 2016
242016
Privacy-preserving Network Provenance
Y Zhang, A O’Neill, M Sherr, W Zhou
Proceedings of the VLDB Endowment 10 (11), 1550 - 1561, 2017
142017
Dedos: Defusing dos with dispersion oriented software
HM Demoulin, T Vaidya, I Pedisich, B DiMaiolo, J Qian, C Shah, Y Zhang, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
132018
A demonstration of the dedos platform for defusing asymmetric ddos attacks in data centers
HM Demoulin, T Vaidya, I Pedisich, N Sultana, B Wang, J Qian, Y Zhang, ...
Proceedings of the SIGCOMM Posters and Demos, 71-73, 2017
42017
Hidden voice commands In 25th USENIX Security Symposium (USENIX Security 16)
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
Austin, TX, 1-20, 2016
32016
Optimizing and Debugging Distributed Systems with Declarative Languages
Y Zhang
Georgetown University, 2019
2019
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–8