关注
kaichen yang
kaichen yang
Michigan Technology University
在 mtu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples.
H Yu, K Yang, T Zhang, YY Tsai, TY Ho, Y Jin
NDSS 38, 102, 2020
1672020
Adversarial examples against the deep learning based network intrusion detection systems
K Yang, J Liu, C Zhang, Y Fang
MILCOM 2018-2018 ieee military communications conference (MILCOM), 559-564, 2018
1392018
Robust adversarial objects against deep learning models
T Tsai, K Yang, TY Ho, Y Jin
Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 954-962, 2020
1142020
Deepem: Deep neural networks model recovery through em side-channel information leakage
H Yu, H Ma, K Yang, Y Zhao, Y Jin
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
1032020
Robust roadside physical adversarial attack against deep learning in lidar perception modules
K Yang, T Tsai, H Yu, M Panoff, TY Ho, Y Jin
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
262021
Beyond digital domain: Fooling deep learning based recognition system in physical world
K Yang, T Tsai, H Yu, TY Ho, Y Jin
Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 1088-1095, 2020
262020
On sensor security in the era of IoT and CPS
M Panoff, RG Dutta, Y Hu, K Yang, Y Jin
SN Computer Science 2 (1), 51, 2021
172021
Llm4sechw: Leveraging domain-specific large language model for hardware debugging
W Fu, K Yang, RG Dutta, X Guo, G Qu
2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2023
162023
Practical private information retrieval supporting keyword search in the cloud
M Yu, K Yang, L Wei, J Sun
2014 Sixth International Conference on Wireless Communications and Signal …, 2014
92014
Hardware phi-1.5 b: A large language model encodes hardware domain specific knowledge
W Fu, S Li, Y Zhao, H Ma, R Dutta, X Zhang, K Yang, Y Jin, X Guo
2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC), 349-354, 2024
82024
Noise2Clean: cross-device side-channel traces denoising with unsupervised deep learning
H Yu, M Wang, X Song, H Shan, H Qiu, J Wang, K Yang
Electronics 12 (4), 1054, 2023
32023
Dual-leak: Deep unsupervised active learning for cross-device profiled side-channel leakage analysis
H Yu, S Wang, H Shan, M Panoff, M Lee, K Yang, Y Jin
2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2023
22023
Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms
W Fu, H Yu, O Arias, K Yang, Y Jin, T Yavuz, X Guo
Proceedings of the Great Lakes Symposium on VLSI 2022, 481-486, 2022
22022
Energy-efficient underwater acoustic communication based on Dyna-Q with an adaptive action space
C Fan, Z Wang, K Yang
Physical Communication 61, 102218, 2023
12023
3d-adv: Black-box adversarial attacks against deep learning models through 3d sensors
K Yang, XY Lin, Y Sun, TY Ho, Y Jin
2021 58th ACM/IEEE Design Automation Conference (DAC), 547-552, 2021
12021
Economic costs of multi-sever private information retrieval in cloud computing
K Yang, C Zhang, N Yu
2015 International Conference on Cloud Computing and Big Data (CCBD), 373-376, 2015
12015
A Generalize Hardware Debugging Approach for Large Language Models Semi-Syntectic Datasets
W Fu, S Li, Y Zhao, K Yang, X Zhang, Y Jin, X Guo
Authorea Preprints, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–17