Follow
Yue Zhao
Yue Zhao
University of Chinese Academy of Sciences
Verified email at iie.ac.cn
Title
Cited by
Cited by
Year
{CommanderSong}: a systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th USENIX security symposium (USENIX security 18), 49-64, 2018
2942018
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
2132019
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020
1742020
Using sonar for liveness detection to protect smart speakers against remote attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
402020
Holographic SAR tomography image reconstruction by combination of adaptive imaging and sparse Bayesian inference
Q Bao, Y Lin, W Hong, W Shen, Y Zhao, X Peng
IEEE Geoscience and Remote Sensing Letters 14 (8), 1248-1252, 2017
332017
Adaptive imaging of anisotropic target based on circular‐SAR
Y Zhao, Y Lin, W Hong, L Yu
Electronics Letters 52 (16), 1406-1408, 2016
282016
A robustness-assured white-box watermark in neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, H Ma, Y Zhao, Y Li
IEEE Transactions on Dependable and Secure Computing 20 (6), 5214-5229, 2023
252023
Practical adversarial attack against object detector
Y Zhao, H Zhu, Q Shen, R Liang, K Chen, S Zhang
arXiv preprint arXiv:1812.10217 3, 2018
202018
Ai-lancet: Locating error-inducing neurons to optimize neural networks
Y Zhao, H Zhu, K Chen, S Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
172021
A survey of audiovisual deepfake detection techniques
R Liang, M Li, K Chen
Journal of Cyber Security 5 (2), 1-17, 2020
152020
Analysis of azimuthal variations using multi-aperture polarimetric entropy with circular SAR images
F Xue, Y Lin, W Hong, Q Yin, B Zhang, W Shen, Y Zhao
Remote Sensing 10 (1), 123, 2018
132018
HufuNet: embedding the left piece as watermark and keeping the right piece for ownership verification in deep neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, Y Zhao, Y Li
arXiv preprint arXiv:2103.13628, 2021
82021
NeuralSanitizer: Detecting Backdoors in Neural Networks
H Zhu, Y Zhao, S Zhang, K Chen
IEEE Transactions on Information Forensics and Security, 2024
22024
{AE-Morpher}: Improve Physical Robustness of Adversarial Objects against {LiDAR-based} Detectors via Object Reconstruction
S Zhu, Y Zhao, K Chen, B Wang, H Ma
33rd USENIX Security Symposium (USENIX Security 24), 7339-7356, 2024
22024
LLM Factoscope: Uncovering LLMs’ Factual Discernment through Measuring Inner States
J He, Y Gong, Z Lin, Y Zhao, K Chen
Findings of the Association for Computational Linguistics ACL 2024, 10218-10230, 2024
12024
UMA: Facilitating Backdoor Scanning via Unlearning-Based Model Ablation
Y Zhao, C Li, K Chen
Proceedings of the AAAI Conference on Artificial Intelligence 38 (19), 21823 …, 2024
12024
LLM Polygraph: Uncovering LLMs' Factual Discernment through Intermediate Data Analysis
J He, Y Gong, K Chen, Z Lin, C Wei, Y Zhao
arXiv preprint arXiv:2312.16374, 2023
12023
I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors
Z Lin, Y Zhao, K Chen, J He
arXiv preprint arXiv:2406.10285, 2024
2024
Seeing isn't Believing: Practical Adversarial Attack Against Object Detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
arXiv preprint arXiv:1812.10217, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–19