Æȷοì
Yue Zhao
Yue Zhao
University of Chinese Academy of Sciences
iie.ac.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
{CommanderSong}: A systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th USENIX security symposium (USENIX security 18), 49-64, 2018
2732018
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC conference on computer and communications ¡¦, 2019
1722019
{Devil¡¯s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020
1412020
Using sonar for liveness detection to protect smart speakers against remote attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous ¡¦, 2020
312020
Holographic SAR tomography image reconstruction by combination of adaptive imaging and sparse Bayesian inference
Q Bao, Y Lin, W Hong, W Shen, Y Zhao, X Peng
IEEE Geoscience and Remote Sensing Letters 14 (8), 1248-1252, 2017
312017
Adaptive imaging of anisotropic target based on circular‐SAR
Y Zhao, Y Lin, W Hong, L Yu
Electronics Letters 52 (16), 1406-1408, 2016
252016
Practical adversarial attack against object detector
Y Zhao, H Zhu, Q Shen, R Liang, K Chen, S Zhang
arXiv preprint arXiv:1812.10217 3, 2018
202018
A survey of audiovisual deepfake detection techniques
R Liang, M Li, K Chen
Journal of Cyber Security 5 (2), 1-17, 2020
142020
Ai-lancet: Locating error-inducing neurons to optimize neural networks
Y Zhao, H Zhu, K Chen, S Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications ¡¦, 2021
132021
Analysis of azimuthal variations using multi-aperture polarimetric entropy with circular SAR images
F Xue, Y Lin, W Hong, Q Yin, B Zhang, W Shen, Y Zhao
Remote Sensing 10 (1), 123, 2018
122018
A robustness-assured white-box watermark in neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, H Ma, Y Zhao, Y Li
IEEE Transactions on Dependable and Secure Computing, 2023
102023
HufuNet: embedding the left piece as watermark and keeping the right piece for ownership verification in deep neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, Y Zhao, Y Li
arXiv preprint arXiv:2103.13628, 2021
62021
UMA: Facilitating Backdoor Scanning via Unlearning-Based Model Ablation
Y Zhao, C Li, K Chen
Proceedings of the AAAI Conference on Artificial Intelligence 38 (19), 21823 ¡¦, 2024
2024
LLM Polygraph: Uncovering LLMs' Factual Discernment through Intermediate Data Analysis
J He, Y Gong, K Chen, Z Lin, C Wei, Y Zhao
arXiv preprint arXiv:2312.16374, 2023
2023
Seeing isn't Believing: Practical Adversarial Attack Against Object Detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
arXiv preprint arXiv:1812.10217, 2018
2018
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–15