{CommanderSong}: a systematic approach for practical adversarial voice recognition X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ... 27th USENIX security symposium (USENIX security 18), 49-64, 2018 | 294 | 2018 |
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 213 | 2019 |
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang 29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020 | 174 | 2020 |
Using sonar for liveness detection to protect smart speakers against remote attackers Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ... Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020 | 40 | 2020 |
Holographic SAR tomography image reconstruction by combination of adaptive imaging and sparse Bayesian inference Q Bao, Y Lin, W Hong, W Shen, Y Zhao, X Peng IEEE Geoscience and Remote Sensing Letters 14 (8), 1248-1252, 2017 | 33 | 2017 |
Adaptive imaging of anisotropic target based on circular‐SAR Y Zhao, Y Lin, W Hong, L Yu Electronics Letters 52 (16), 1406-1408, 2016 | 28 | 2016 |
A robustness-assured white-box watermark in neural networks P Lv, P Li, S Zhang, K Chen, R Liang, H Ma, Y Zhao, Y Li IEEE Transactions on Dependable and Secure Computing 20 (6), 5214-5229, 2023 | 25 | 2023 |
Practical adversarial attack against object detector Y Zhao, H Zhu, Q Shen, R Liang, K Chen, S Zhang arXiv preprint arXiv:1812.10217 3, 2018 | 20 | 2018 |
Ai-lancet: Locating error-inducing neurons to optimize neural networks Y Zhao, H Zhu, K Chen, S Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 17 | 2021 |
A survey of audiovisual deepfake detection techniques R Liang, M Li, K Chen Journal of Cyber Security 5 (2), 1-17, 2020 | 15 | 2020 |
Analysis of azimuthal variations using multi-aperture polarimetric entropy with circular SAR images F Xue, Y Lin, W Hong, Q Yin, B Zhang, W Shen, Y Zhao Remote Sensing 10 (1), 123, 2018 | 13 | 2018 |
HufuNet: embedding the left piece as watermark and keeping the right piece for ownership verification in deep neural networks P Lv, P Li, S Zhang, K Chen, R Liang, Y Zhao, Y Li arXiv preprint arXiv:2103.13628, 2021 | 8 | 2021 |
NeuralSanitizer: Detecting Backdoors in Neural Networks H Zhu, Y Zhao, S Zhang, K Chen IEEE Transactions on Information Forensics and Security, 2024 | 2 | 2024 |
{AE-Morpher}: Improve Physical Robustness of Adversarial Objects against {LiDAR-based} Detectors via Object Reconstruction S Zhu, Y Zhao, K Chen, B Wang, H Ma 33rd USENIX Security Symposium (USENIX Security 24), 7339-7356, 2024 | 2 | 2024 |
LLM Factoscope: Uncovering LLMs’ Factual Discernment through Measuring Inner States J He, Y Gong, Z Lin, Y Zhao, K Chen Findings of the Association for Computational Linguistics ACL 2024, 10218-10230, 2024 | 1 | 2024 |
UMA: Facilitating Backdoor Scanning via Unlearning-Based Model Ablation Y Zhao, C Li, K Chen Proceedings of the AAAI Conference on Artificial Intelligence 38 (19), 21823 …, 2024 | 1 | 2024 |
LLM Polygraph: Uncovering LLMs' Factual Discernment through Intermediate Data Analysis J He, Y Gong, K Chen, Z Lin, C Wei, Y Zhao arXiv preprint arXiv:2312.16374, 2023 | 1 | 2023 |
I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors Z Lin, Y Zhao, K Chen, J He arXiv preprint arXiv:2406.10285, 2024 | | 2024 |
Seeing isn't Believing: Practical Adversarial Attack Against Object Detectors Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen arXiv preprint arXiv:1812.10217, 2018 | | 2018 |