Suivre
Yi Zeng
Yi Zeng
PhD Candidate, Virginia Tech
Adresse e-mail validée de vt.edu - Page d'accueil
Titre
Citée par
Citée par
Année
: A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework
Y Zeng, H Gu, W Wei, Y Guo
IEEE Access 7, 45182-45190, 2019
2332019
Deepsweep: An evaluation framework for mitigating DNN backdoor attacks using data augmentation
H Qiu, Y Zeng, S Guo, T Zhang, M Qiu, B Thuraisingham
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
186*2021
Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective
Y Zeng, W Park, ZM Mao, R Jia
International Conference on Computer Vision (ICCV), 2021, 2021
1702021
Adversarial Unlearning of Backdoors via Implicit Hypergradient
Y Zeng, S Chen, W Park, ZM Mao, M Jin, R Jia
The Tenth International Conference on Learning Representations (ICLR 2022), 2021
1192021
Fine-tuning aligned language models compromises safety, even when users do not intend to!
X Qi, Y Zeng, T Xie, PY Chen, R Jia, P Mittal, P Henderson
The Twelfth International Conference on Learning Representations (ICLR 2024 …, 2024
972024
Narcissus: A practical clean-label backdoor attack with limited information
Y Zeng, M Pan, HA Just, L Lyu, M Qiu, R Jia
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2023
912023
DeepVCM: A deep learning based intrusion detection method in VANET
Y Zeng, M Qiu, D Zhu, Z Xue, J Xiong, M Liu
2019 IEEE 5th intl conference on big data security on cloud (BigDataSecurity …, 2019
632019
Senior2local: A machine learning based intrusion detection method for vanets
Y Zeng, M Qiu, Z Ming, M Liu
Smart Computing and Communication: Third International Conference, SmartCom …, 2018
532018
A data augmentation-based defense method against adversarial attacks in neural networks
Y Zeng, H Qiu, G Memmi, M Qiu
Algorithms and Architectures for Parallel Processing: 20th International …, 2020
522020
Cater: Intellectual property protection on text generation apis via conditional watermarks
X He, Q Xu, Y Zeng, L Lyu, F Wu, J Li, R Jia
Advances in Neural Information Processing Systems 35, 5431-5445, 2022
502022
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models
S Guo, T Zhang, H Qiu, Y Zeng, T Xiang, Y Liu
International Joint Conference on Artificial Intelligence (IJCAI), 2021, 2021
48*2021
An efficient preprocessing-based approach to mitigate advanced adversarial attacks
H Qiu, Y Zeng, Q Zheng, S Guo, T Zhang, H Li
IEEE Transactions on Computers 73 (3), 645-655, 2021
35*2021
How johnny can persuade llms to jailbreak them: Rethinking persuasion to challenge ai safety by humanizing llms
Y Zeng, H Lin, J Zhang, D Yang, R Jia, W Shi
arXiv preprint arXiv:2401.06373, 2024
272024
META-SIFT: How to Sift Out a Clean Data Subset in the Presence of Data Poisoning?
Y Zeng, M Pan, H Jahagirdar, M Jin, L Lyu, R Jia
USENIX Security Symposium, 2023, 2023
21*2023
Test: an end-to-end network traffic classification system with spatio-temporal features extraction
Y Zeng, Z Qi, W Chen, Y Huang
2019 IEEE International Conference on Smart Cloud (SmartCloud), 131-136, 2019
21*2019
LAVA: Data Valuation without Pre-Specified Learning Algorithms
HA Just, F Kang, JT Wang, Y Zeng, M Ko, M Jin, R Jia
The Eleventh International Conference on Learning Representations (ICLR 2023), 2023
202023
Fencebox: A platform for defeating adversarial examples with data augmentation techniques
H Qiu, Y Zeng, T Zhang, Y Jiang, M Qiu
arXiv preprint arXiv:2012.01701, 2020
152020
ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms
M Pan, Y Zeng, L Lyu, X Lin, R Jia
USENIX Security Symposium, 2023, 2023
142023
A unified framework for task-driven data quality management
T Wang, Y Zeng, M Jin, R Jia
arXiv preprint arXiv:2106.05484, 2021
122021
Using adversarial examples to bypass deep learning based url detection system
W Chen, Y Zeng, M Qiu
2019 IEEE International Conference on Smart Cloud (SmartCloud), 128-130, 2019
102019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20