Neural network inversion in adversarial setting via background knowledge alignment Z Yang, J Zhang, EC Chang, Z Liang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 237 | 2019 |
Defending model inversion and membership inference attacks via prediction purification Z Yang, B Shao, B Xuan, EC Chang, F Zhang arXiv preprint arXiv:2005.03915, 2020 | 97 | 2020 |
Adversarial neural network inversion via auxiliary knowledge alignment Z Yang, EC Chang, Z Liang arXiv preprint arXiv:1902.08552, 2019 | 67 | 2019 |
Effectiveness of distillation attack and countermeasure on neural network watermarking Z Yang, H Dang, EC Chang arXiv preprint arXiv:1906.06046, 2019 | 46 | 2019 |
MsDroid: Identifying Malicious Snippets for Android Malware Detection Y He, Y Liu, L Wu, Z Yang, K Ren, Z Qin IEEE Transactions on Dependable and Secure Computing 20 (3), 2025-2039, 2022 | 29 | 2022 |
From homogeneous to heterogeneous: Leveraging deep learning based power analysis across devices F Zhang, B Shao, G Xu, B Yang, Z Yang, Z Qin, K Ren 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020 | 28 | 2020 |
Automated identification of sensitive data from implicit user specification Z Yang, Z Liang Cybersecurity 1 (1), 13, 2018 | 17 | 2018 |
Purifier: Defending data inference attacks via transforming confidence scores Z Yang, L Wang, D Yang, J Wan, Z Zhao, EC Chang, F Zhang, K Ren Proceedings of the AAAI Conference on Artificial Intelligence 37 (9), 10871 …, 2023 | 12 | 2023 |
SAGE: steering the adversarial generation of examples with accelerations Z Zhao, Z Li, F Zhang, Z Yang, S Luo, T Li, R Zhang, K Ren IEEE Transactions on Information Forensics and Security 18, 789-803, 2023 | 12 | 2023 |
Automated Identification of Sensitive Data via Flexible User Requirements Z Yang, Z Liang Security and Privacy in Communication Networks: 14th International …, 2018 | 6 | 2018 |
Unveiling privacy vulnerabilities: Investigating the role of structure in graph data H Yuan, J Xu, C Wang, Z Yang, C Wang, K Yin, Y Yang Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and …, 2024 | 5 | 2024 |
Bounceattack: A query-efficient decision-based adversarial attack by bouncing into the wild J Wan, J Fu, L Wang, Z Yang 2024 IEEE Symposium on Security and Privacy (SP), 1270-1286, 2024 | 4 | 2024 |
Towards Fair Graph Federated Learning via Incentive Mechanisms C Pan, J Xu, Y Yu, Z Yang, Q Wu, C Wang, L Chen, Y Yang Proceedings of the AAAI Conference on Artificial Intelligence 38 (13), 14499 …, 2024 | 4 | 2024 |
Fidelity: A property of deep neural networks to measure the trustworthiness of prediction results Z Yang Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 3 | 2019 |
Property Existence Inference against Generative Models L Wang, J Wang, J Wan, L Long, Z Yang, Z Qin, ZJUHG Scientific, ... | 3 | |
Fidelity: Towards measuring the trustworthiness of neural network classification Z Yang 2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019 | 2 | 2019 |
APIBeh: Learning Behavior Inclination of APIs for Malware Classification L Cui, Y Zhu, J Yin, Z Hao, W Wang, P Liu, Z Yang, X Yun 2024 IEEE 35th International Symposium on Software Reliability Engineering …, 2024 | | 2024 |
Joint-Motion Mutual Learning for Pose Estimation in Video S Wu, H Chen, Y Yin, S Hu, R Feng, Y Jiao, Z Yang, Z Liu Proceedings of the 32nd ACM International Conference on Multimedia, 8962-8971, 2024 | | 2024 |
MaskDroid: Robust Android Malware Detection with Masked Graph Representations J Zheng, J Liu, A Zhang, J Zeng, Z Yang, Z Liang, TS Chua Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024 | | 2024 |
Securing Web Inputs Using Parallel Session Attachments Z Yang, R Xu, Q Lin, S Wu, J Mao, Z Liang International Conference on Security and Privacy in Communication Systems …, 2023 | | 2023 |