default search action
Yue Zhao 0018
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- affiliation: University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
Other persons with the same name
- Yue Zhao — disambiguation page
- Yue Zhao 0001 — Delft University of Technology, The Netherlands
- Yue Zhao 0002 — INSA de Lyon, France
- Yue Zhao 0003 — Brunel University London, UK
- Yue Zhao 0004 — Harbin Institute of Technology, School of Astronautics, Harbin, China
- Yue Zhao 0005 — Yunnan University, Institute of Mathematics and Statistics, Kunming, China
- Yue Zhao 0006 — Chinese University of Hong Kong, Department of Information Engineering, CUHK-SenseTime Joint Lab, Hong Kong (and 1 more)
- Yue Zhao 0007 — Stony Brook University, Department of Electrical and Computer Engineering, Stony Brook, NY, USA (and 3 more)
- Yue Zhao 0008 — University of Central Florida, Department of Mathematics, Orlando, FL, USA (and 1 more)
- Yue Zhao 0009 — Qufu Normal University, School of Software, Qufu, China
- Yue Zhao 0010 — Xidian University, State Key Laboratory of Integrated Services Networks, Xidian, China
- Yue Zhao 0011 — North Carolina State University, Department of Computer Science, Raleigh, NC, USA (and 1 more)
- Yue Zhao 0012 — Chongqing University of Posts and Telecommunications, School of Communication and Information Engineering, Chongqing, China
- Yue Zhao 0013 — Minzu University of China, School of Information Engineering, Beijing, China
- Yue Zhao 0014 — Shanghai University, School of Computer Engineering and Science, Shanghai, China (and 2 more)
- Yue Zhao 0015 — Southwest Jiaotong University, Provincial Key Lab of Information Coding and Transmission, Chengdu, China
- Yue Zhao 0016 — University of Southern California, CA, USA (and 2 more)
- Yue Zhao 0017 — University of Arkansas, Department of Electrical Engineering, Fayetteville, AR, USA (and 1 more)
- Yue Zhao 0019 — National University of Defense Technology, Science and Technology on Information Systems Engineering Laboratory, Changsha, China
- Yue Zhao 0020 — Beijing Forestry University, School of Technology, Beijing, China (and 1 more)
- Yue Zhao 0021 — Chinese Academy of Sciences, Academy of Mathematics and Systems Science, State Key Laboratory of Scientific and Engineering Computing, Beijing, China
- Yue Zhao 0022 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, Beijing, China
- Yue Zhao 0023 — Northwestern Polytechnical University, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Hong Zhu, Yue Zhao, Shengzhi Zhang, Kai Chen:
NeuralSanitizer: Detecting Backdoors in Neural Networks. IEEE Trans. Inf. Forensics Secur. 19: 4970-4985 (2024) - [c7]Yue Zhao, Congyi Li, Kai Chen:
UMA: Facilitating Backdoor Scanning via Unlearning-Based Model Ablation. AAAI 2024: 21823-21831 - [c6]Jinwen He, Yujia Gong, Zijin Lin, Cheng'an Wei, Yue Zhao, Kai Chen:
LLM Factoscope: Uncovering LLMs' Factual Discernment through Measuring Inner States. ACL (Findings) 2024: 10218-10230 - [c5]Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, Cheng'an Wei:
AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction. USENIX Security Symposium 2024 - [i5]Zijin Lin, Yue Zhao, Kai Chen, Jinwen He:
I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors. CoRR abs/2406.10285 (2024) - 2023
- [j2]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Hualong Ma, Yue Zhao, Yingjiu Li:
A Robustness-Assured White-Box Watermark in Neural Networks. IEEE Trans. Dependable Secur. Comput. 20(6): 5214-5229 (2023) - [i4]Jinwen He, Yujia Gong, Kai Chen, Zijin Lin, Cheng'an Wei, Yue Zhao:
LLM Factoscope: Uncovering LLMs' Factual Discernment through Inner States Analysis. CoRR abs/2312.16374 (2023) - 2021
- [c4]Yue Zhao, Hong Zhu, Kai Chen, Shengzhi Zhang:
AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks. CCS 2021: 141-158 - [i3]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Yue Zhao, Yingjiu Li:
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks. CoRR abs/2103.13628 (2021) - 2020
- [j1]Yeonjoon Lee, Yue Zhao, Jiutian Zeng, Kwangwuk Lee, Nan Zhang, Faysal Hossain Shezan, Yuan Tian, Kai Chen, XiaoFeng Wang:
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(1): 16:1-16:28 (2020) - [c3]Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang:
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. USENIX Security Symposium 2020: 2667-2684
2010 – 2019
- 2019
- [c2]Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Shengzhi Zhang, Kai Chen:
Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors. CCS 2019: 1989-2004 - 2018
- [c1]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. USENIX Security Symposium 2018: 49-64 - [i2]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. CoRR abs/1801.08535 (2018) - [i1]Yue Zhao, Hong Zhu, Qintao Shen, Ruigang Liang, Kai Chen, Shengzhi Zhang:
Practical Adversarial Attack Against Object Detector. CoRR abs/1812.10217 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 21:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint