Follow
Ziqi Yang
Ziqi Yang
Assistant Professor, Zhejiang University
Verified email at zju.edu.cn - Homepage
Title
Cited by
Cited by
Year
Neural network inversion in adversarial setting via background knowledge alignment
Z Yang, J Zhang, EC Chang, Z Liang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2372019
Defending model inversion and membership inference attacks via prediction purification
Z Yang, B Shao, B Xuan, EC Chang, F Zhang
arXiv preprint arXiv:2005.03915, 2020
972020
Adversarial neural network inversion via auxiliary knowledge alignment
Z Yang, EC Chang, Z Liang
arXiv preprint arXiv:1902.08552, 2019
672019
Effectiveness of distillation attack and countermeasure on neural network watermarking
Z Yang, H Dang, EC Chang
arXiv preprint arXiv:1906.06046, 2019
462019
MsDroid: Identifying Malicious Snippets for Android Malware Detection
Y He, Y Liu, L Wu, Z Yang, K Ren, Z Qin
IEEE Transactions on Dependable and Secure Computing 20 (3), 2025-2039, 2022
292022
From homogeneous to heterogeneous: Leveraging deep learning based power analysis across devices
F Zhang, B Shao, G Xu, B Yang, Z Yang, Z Qin, K Ren
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
282020
Automated identification of sensitive data from implicit user specification
Z Yang, Z Liang
Cybersecurity 1 (1), 13, 2018
172018
Purifier: Defending data inference attacks via transforming confidence scores
Z Yang, L Wang, D Yang, J Wan, Z Zhao, EC Chang, F Zhang, K Ren
Proceedings of the AAAI Conference on Artificial Intelligence 37 (9), 10871 …, 2023
122023
SAGE: steering the adversarial generation of examples with accelerations
Z Zhao, Z Li, F Zhang, Z Yang, S Luo, T Li, R Zhang, K Ren
IEEE Transactions on Information Forensics and Security 18, 789-803, 2023
122023
Automated Identification of Sensitive Data via Flexible User Requirements
Z Yang, Z Liang
Security and Privacy in Communication Networks: 14th International …, 2018
62018
Unveiling privacy vulnerabilities: Investigating the role of structure in graph data
H Yuan, J Xu, C Wang, Z Yang, C Wang, K Yin, Y Yang
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and …, 2024
52024
Bounceattack: A query-efficient decision-based adversarial attack by bouncing into the wild
J Wan, J Fu, L Wang, Z Yang
2024 IEEE Symposium on Security and Privacy (SP), 1270-1286, 2024
42024
Towards Fair Graph Federated Learning via Incentive Mechanisms
C Pan, J Xu, Y Yu, Z Yang, Q Wu, C Wang, L Chen, Y Yang
Proceedings of the AAAI Conference on Artificial Intelligence 38 (13), 14499 …, 2024
42024
Fidelity: A property of deep neural networks to measure the trustworthiness of prediction results
Z Yang
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
32019
Property Existence Inference against Generative Models
L Wang, J Wang, J Wan, L Long, Z Yang, Z Qin, ZJUHG Scientific, ...
3
Fidelity: Towards measuring the trustworthiness of neural network classification
Z Yang
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
22019
APIBeh: Learning Behavior Inclination of APIs for Malware Classification
L Cui, Y Zhu, J Yin, Z Hao, W Wang, P Liu, Z Yang, X Yun
2024 IEEE 35th International Symposium on Software Reliability Engineering …, 2024
2024
Joint-Motion Mutual Learning for Pose Estimation in Video
S Wu, H Chen, Y Yin, S Hu, R Feng, Y Jiao, Z Yang, Z Liu
Proceedings of the 32nd ACM International Conference on Multimedia, 8962-8971, 2024
2024
MaskDroid: Robust Android Malware Detection with Masked Graph Representations
J Zheng, J Liu, A Zhang, J Zeng, Z Yang, Z Liang, TS Chua
Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024
2024
Securing Web Inputs Using Parallel Session Attachments
Z Yang, R Xu, Q Lin, S Wu, J Mao, Z Liang
International Conference on Security and Privacy in Communication Systems …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20