Folgen
Jiyi Zhang
Jiyi Zhang
Bestätigte E-Mail-Adresse bei u.nus.edu
Titel
Zitiert von
Zitiert von
Jahr
Neural network inversion in adversarial setting via background knowledge alignment
Z Yang, J Zhang, EC Chang, Z Liang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
251*2019
De-END: Decoder-driven Watermarking Network
H Fang, Z Jia, Y Qiu, J Zhang, W Zhang, EC Chang
IEEE Transactions on Multimedia, 1-11, 2022
102022
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers
J Zhang, H Fang, WJW Tann, K Xu, C Fang, EC Chang
Proceedings of the 2023 ACM on Asia Conference on Computer and …, 2023
7*2023
Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions
H Fang, Y Qiu, K Chen, J Zhang, W Zhang, EC Chang
Proceedings of the AAAI Conference on Artificial Intelligence 37 (4), 5054-5061, 2023
72023
Flipped-adversarial autoencoders
J Zhang, H Dang, HK Lee, EC Chang
arXiv preprint arXiv:1802.04504, 2018
7*2018
Confusing and Detecting ML Adversarial Attacks with Injected Attractors
J Zhang, EC Chang, HK Lee
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
4*2022
Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation
J Zhang, H Fang, HK Lee, EC Chang
arXiv preprint arXiv:2305.05869, 2023
12023
Tracing the origin of adversarial attack for forensic investigation and deterrence
H Fang, J Zhang, Y Qiu, J Liu, K Xu, C Fang, EC Chang
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
12023
DP: Dataset Protection by Data Poisoning
H Fang, Y Qiu, G Qin, J Zhang, K Chen, W Zhang, EC Chang
IEEE Transactions on Dependable and Secure Computing, 2022
12022
Domain Bridge: Generative model-based domain forensic for black-box models
J Zhang, H Fang, EC Chang
arXiv preprint arXiv:2402.04640, 2024
2024
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
J Zhang, H Fang, EC Chang
arXiv preprint arXiv:2306.01400, 2023
2023
Common Component in Black-Boxes Is Prone to Attacks
J Zhang, WJW Tann, EC Chang, HK Lee
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
2021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–12