关注
Honggang Yu
Honggang Yu
Ph.D. Student, Electrical & Computer Eng., University of Florida
在 ufl.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples
H Yu, K Yang, T Zhang, YY Tsai, TY Ho, Y Jin
ISOC Network and Distributed System Security Symposium (NDSS), 2020
1532020
Deepem: Deep neural networks model recovery through em side-channel information leakage
H Yu, H Ma, K Yang, Y Zhao, Y Jin
IEEE International Symposium on Hardware Oriented Security and Trust (HOST …, 2020
952020
Cross-device profiled side-channel attacks using meta-transfer learning
H Yu, H Shan, M Panoff, Y Jin
ACM/IEEE Design Automation Conference (DAC), 703-708, 2021
282021
Robust roadside physical adversarial attack against deep learning in lidar perception modules
K Yang, T Tsai, H Yu, M Panoff, TY Ho, Y Jin
Proceedings of the ACM Asia Conference on Computer and Communications …, 2021
222021
Beyond digital domain: Fooling deep learning based recognition system in physical world
K Yang, T Tsai, H Yu, TY Ho, Y Jin
Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 1088-1095, 2020
222020
A review and comparison of ai-enhanced side channel analysis
M Panoff, H Yu, H Shan, Y Jin
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-20, 2022
192022
Audio adversarial examples generation with recurrent neural networks
KH Chang, PH Huang, H Yu, Y Jin, TC Wang
Asia and South Pacific Design Automation Conference (ASP-DAC), 488-493, 2020
172020
Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis
H Yu, S Wang, H Shan, M Panoff, M Lee, K Yang, Y Jin
IEEE International Symposium on Hardware Oriented Security and Trust (HOST …, 2023
22023
Generation of black-box audio adversarial examples based on gradient approximation and autoencoders
PH Huang, H Yu, M Panoff, TC Wang
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-19, 2022
22022
Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms
W Fu, H Yu, O Arias, K Yang, Y Jin, T Yavuz, X Guo
Proceedings of the Great Lakes Symposium on VLSI, 481-486, 2022
12022
A Privacy Leakage Issue in Qi-Compatible Cellphone Wireless Charging by Stray Magnetic Field Sniffing
Y Yang, Z Zhan, H Yu, Q Huang, S Wang
IEEE Applied Power Electronics Conference (APEC), 1-8, 2024
2024
Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers
H Yu, S Zeng, T Zhang, IC Lin, Y Jin
arXiv preprint arXiv:2109.10770, 2021
2021
Deep Learning Application Attacks through Feature Manipulations
H Yu, K Yang, Y Jin
Government Microcircuit Applications and Critical Technology Conference …, 2019
2019
CloudLeak: DNN Model Extractions from Commercial MLaaS Platforms
Y Jin, TY Ho, H Yu
Black Hat USA, 0
系统目前无法执行此操作,请稍后再试。
文章 1–14