Follow
Yunhan Jia
Yunhan Jia
Verified email at umich.edu - Homepage
Title
Cited by
Cited by
Year
Explainable machine learning in deployment
U Bhatt, A Xiang, S Sharma, A Weller, A Taly, Y Jia, J Ghosh, R Puri, ...
Proceedings of the 2020 conference on fairness, accountability, and …, 2020
6732020
ContexloT: Towards providing contextual integrity to appified IoT platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
ndss 2 (2), 2-2, 2017
4112017
Dirty road can attack: Security of deep learning based automated lane centering under {Physical-World} attack
T Sato, J Shen, N Wang, Y Jia, X Lin, QA Chen
30th USENIX security symposium (USENIX Security 21), 3309-3326, 2021
1162021
Enhancing cross-task black-box transferability of adversarial examples with dispersion reduction
Y Lu, Y Jia, J Wang, B Li, W Chai, L Carin, S Velipasalar
Proceedings of the IEEE/CVF conference on Computer Vision and Pattern …, 2020
762020
Trafficnet: An open naturalistic driving scenario library
D Zhao, Y Guo, YJ Jia
2017 IEEE 20th International Conference on Intelligent Transportation …, 2017
712017
The misuse of android unix domain sockets and security implications
Y Shao, J Ott, YJ Jia, Z Qian, ZM Mao
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
472016
Static detection of packet injection vulnerabilities: A case for identifying attacker-controlled implicit information leaks
QA Chen, Z Qian, YJ Jia, Y Shao, ZM Mao
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
462015
Fooling detection alone is not enough: First adversarial attack against multiple object tracking
Y Jia, Y Lu, J Shen, QA Chen, Z Zhong, T Wei
arXiv preprint arXiv:1905.11026, 2019
382019
Open doors for bob and mallory: Open port usage in android apps and security implications
YJ Jia, QA Chen, Y Lin, C Kong, ZM Mao
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 190-203, 2017
382017
Dissecting VOD services for cellular: performance, root causes and best practices
S Xu, S Sen, ZM Mao, Y Jia
Proceedings of the 2017 Internet Measurement Conference, 220-234, 2017
332017
Performance characterization and call reliability diagnosis support for voice over lte
YJ Jia, QA Chen, ZM Mao, J Hui, K Sontinei, A Yoon, S Kwong, K Lau
Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015
252015
Hold tight and never let go: Security of deep learning based automated lane centering under physical-world attack
T Sato, J Shen, N Wang, YJ Jia, X Lin, QA Chen
arXiv preprint arXiv:2009.06701 2, 2020
212020
Security of deep learning based lane keeping system under physical-world adversarial attack
T Sato, J Shen, N Wang, YJ Jia, X Lin, QA Chen
arXiv preprint arXiv:2003.01782, 2020
172020
Machine learning-based troubleshooting of VoLTE calls
J Hui, Y Jia, Y Guo, A Yoon, A Tran, K Sontineni, ZM Mao
US Patent 10,339,456, 2019
152019
Towards practical lottery ticket hypothesis for adversarial training
B Li, S Wang, Y Jia, Y Lu, Z Zhong, L Carin, S Jana
arXiv preprint arXiv:2003.05733, 2020
142020
Pathway-based data interruption detection
J Hui, Y Jia, S Satpathy, K Lau, K Sontineni, SKS Kwong
US Patent 9,843,948, 2017
132017
Mapping global mobile performance trends with Mobilyzer and MobiPerf
S Rosen, H Yao, A Nikravesh, Y Jia, D Choffnes, ZM Mao
Proceedings of the 12th annual international conference on Mobile systems …, 2014
122014
Perception deception: Physical adversarial attack challenges and tactics for dnn-based object detection
Z Zhong, W Xu, Y Jia, T Wei
Black Hat Europe, 2018
102018
Enhancing cross-task transferability of adversarial examples with dispersion reduction
Y Jia, Y Lu, S Velipasalar, Z Zhong, T Wei
arXiv preprint arXiv:1905.03333, 2019
92019
Towards secure and safe appified automated vehicles
YJ Jia, D Zhao, QA Chen, ZM Mao
2017 IEEE Intelligent Vehicles Symposium (IV), 705-711, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20