CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples. H Yu, K Yang, T Zhang, YY Tsai, TY Ho, Y Jin NDSS 38, 102, 2020 | 167 | 2020 |
Adversarial examples against the deep learning based network intrusion detection systems K Yang, J Liu, C Zhang, Y Fang MILCOM 2018-2018 ieee military communications conference (MILCOM), 559-564, 2018 | 139 | 2018 |
Robust adversarial objects against deep learning models T Tsai, K Yang, TY Ho, Y Jin Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 954-962, 2020 | 114 | 2020 |
Deepem: Deep neural networks model recovery through em side-channel information leakage H Yu, H Ma, K Yang, Y Zhao, Y Jin 2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020 | 103 | 2020 |
Robust roadside physical adversarial attack against deep learning in lidar perception modules K Yang, T Tsai, H Yu, M Panoff, TY Ho, Y Jin Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 26 | 2021 |
Beyond digital domain: Fooling deep learning based recognition system in physical world K Yang, T Tsai, H Yu, TY Ho, Y Jin Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 1088-1095, 2020 | 26 | 2020 |
On sensor security in the era of IoT and CPS M Panoff, RG Dutta, Y Hu, K Yang, Y Jin SN Computer Science 2 (1), 51, 2021 | 17 | 2021 |
Llm4sechw: Leveraging domain-specific large language model for hardware debugging W Fu, K Yang, RG Dutta, X Guo, G Qu 2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2023 | 16 | 2023 |
Practical private information retrieval supporting keyword search in the cloud M Yu, K Yang, L Wei, J Sun 2014 Sixth International Conference on Wireless Communications and Signal …, 2014 | 9 | 2014 |
Hardware phi-1.5 b: A large language model encodes hardware domain specific knowledge W Fu, S Li, Y Zhao, H Ma, R Dutta, X Zhang, K Yang, Y Jin, X Guo 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC), 349-354, 2024 | 8 | 2024 |
Noise2Clean: cross-device side-channel traces denoising with unsupervised deep learning H Yu, M Wang, X Song, H Shan, H Qiu, J Wang, K Yang Electronics 12 (4), 1054, 2023 | 3 | 2023 |
Dual-leak: Deep unsupervised active learning for cross-device profiled side-channel leakage analysis H Yu, S Wang, H Shan, M Panoff, M Lee, K Yang, Y Jin 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2023 | 2 | 2023 |
Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms W Fu, H Yu, O Arias, K Yang, Y Jin, T Yavuz, X Guo Proceedings of the Great Lakes Symposium on VLSI 2022, 481-486, 2022 | 2 | 2022 |
Energy-efficient underwater acoustic communication based on Dyna-Q with an adaptive action space C Fan, Z Wang, K Yang Physical Communication 61, 102218, 2023 | 1 | 2023 |
3d-adv: Black-box adversarial attacks against deep learning models through 3d sensors K Yang, XY Lin, Y Sun, TY Ho, Y Jin 2021 58th ACM/IEEE Design Automation Conference (DAC), 547-552, 2021 | 1 | 2021 |
Economic costs of multi-sever private information retrieval in cloud computing K Yang, C Zhang, N Yu 2015 International Conference on Cloud Computing and Big Data (CCBD), 373-376, 2015 | 1 | 2015 |
A Generalize Hardware Debugging Approach for Large Language Models Semi-Syntectic Datasets W Fu, S Li, Y Zhao, K Yang, X Zhang, Y Jin, X Guo Authorea Preprints, 2024 | | 2024 |