CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples H Yu, K Yang, T Zhang, YY Tsai, TY Ho, Y Jin ISOC Network and Distributed System Security Symposium (NDSS), 2020 | 153 | 2020 |
Deepem: Deep neural networks model recovery through em side-channel information leakage H Yu, H Ma, K Yang, Y Zhao, Y Jin IEEE International Symposium on Hardware Oriented Security and Trust (HOST …, 2020 | 95 | 2020 |
Cross-device profiled side-channel attacks using meta-transfer learning H Yu, H Shan, M Panoff, Y Jin ACM/IEEE Design Automation Conference (DAC), 703-708, 2021 | 28 | 2021 |
Robust roadside physical adversarial attack against deep learning in lidar perception modules K Yang, T Tsai, H Yu, M Panoff, TY Ho, Y Jin Proceedings of the ACM Asia Conference on Computer and Communications …, 2021 | 22 | 2021 |
Beyond digital domain: Fooling deep learning based recognition system in physical world K Yang, T Tsai, H Yu, TY Ho, Y Jin Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 1088-1095, 2020 | 22 | 2020 |
A review and comparison of ai-enhanced side channel analysis M Panoff, H Yu, H Shan, Y Jin ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-20, 2022 | 19 | 2022 |
Audio adversarial examples generation with recurrent neural networks KH Chang, PH Huang, H Yu, Y Jin, TC Wang Asia and South Pacific Design Automation Conference (ASP-DAC), 488-493, 2020 | 17 | 2020 |
Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis H Yu, S Wang, H Shan, M Panoff, M Lee, K Yang, Y Jin IEEE International Symposium on Hardware Oriented Security and Trust (HOST …, 2023 | 2 | 2023 |
Generation of black-box audio adversarial examples based on gradient approximation and autoencoders PH Huang, H Yu, M Panoff, TC Wang ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-19, 2022 | 2 | 2022 |
Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms W Fu, H Yu, O Arias, K Yang, Y Jin, T Yavuz, X Guo Proceedings of the Great Lakes Symposium on VLSI, 481-486, 2022 | 1 | 2022 |
A Privacy Leakage Issue in Qi-Compatible Cellphone Wireless Charging by Stray Magnetic Field Sniffing Y Yang, Z Zhan, H Yu, Q Huang, S Wang IEEE Applied Power Electronics Conference (APEC), 1-8, 2024 | | 2024 |
Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers H Yu, S Zeng, T Zhang, IC Lin, Y Jin arXiv preprint arXiv:2109.10770, 2021 | | 2021 |
Deep Learning Application Attacks through Feature Manipulations H Yu, K Yang, Y Jin Government Microcircuit Applications and Critical Technology Conference …, 2019 | | 2019 |
CloudLeak: DNN Model Extractions from Commercial MLaaS Platforms Y Jin, TY Ho, H Yu Black Hat USA, 0 | | |