Leo Yu ZHANG
Deakin University
H-index: 28
Oceania-Australia
Top articles of Leo Yu ZHANG
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability | Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P’24) | Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li | 2024 |
Fluent: Round-efficient Secure Aggregation for Private Federated Learning | arXiv preprint arXiv:2403.06143 | Xincheng Li Jianting Ning Geong Sen Poh Leo Yu Zhang Xinchun Yin | 2024/3/10 |
An Explainable Intellectual Property Protection Method for Deep Neural Networks based on Intrinsic Features | IEEE Transactions on Artificial Intelligence | Mingfu Xue Xin Wang Yinghao Wu Shifeng Ni Leo Yu Zhang | 2024/4/16 |
Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models | IEEE Transactions on Dependable and Secure Computing | Zeming Yao Hangtao Zhang Yicheng Guo Xin Tian Wei Peng | 2024/2/26 |
FairCMS: Cloud Media Sharing With Fair Copyright Protection | IEEE Transactions on Computational Social Systems | Xiangli Xiao Yushu Zhang Leo Yu Zhang Zhongyun Hua Zhe Liu | 2024/3/27 |
Conditional Backdoor Attack via JPEG Compression | Proceedings of the AAAI Conference on Artificial Intelligence | Qiuyu Duan Zhongyun Hua Qing Liao Yushu Zhang Leo Yu Zhang | 2024/3/24 |
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning | IEEE Transactions on Information Forensics and Security | Jianrong Lu Shengshan Hu Wei Wan Minghui Li Leo Yu Zhang | 2024/1/31 |
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud | Computer Standards & Interfaces | Zesen Hou Jianting Ning Xinyi Huang Shengmin Xu Leo Yu Zhang | 2024/8/1 |
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples | arXiv preprint arXiv:2403.10801 | Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang | 2024/3/16 |
Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks | arXiv preprint arXiv:2401.16687 | Lulu Xue Shengshan Hu Ruizhi Zhao Leo Yu Zhang Shengqing Hu | 2024/1/30 |
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics | Xiaoxing Mo Yechao Zhang Leo Yu Zhang Wei Luo Nan Sun | 2024/2/1 | |
MISA: Unveiling the Vulnerabilities in Split Federated Learning | Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li | 2024/4/14 | |
Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation | Proceedings of the AAAI Conference on Artificial Intelligence | Di Mi Yanjun Zhang Leo Yu Zhang Shengshan Hu Qi Zhong | 2024/3/24 |
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness | IJCAI (arXiv:2404.11357) | Hangtao Zhang Shengshan Hu Yichen Wang Leo Yu Zhang Ziqi Zhou | 2024/4/17 |
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display | Lin Li Chao Chen Lei Pan Leo Yu Zhang Jun Zhang | 2023/10/16 | |
AGRAMPLIFIER: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification | IEEE Transactions on Information Forensics and Security | Zirui Gong Liyue Shen Yanjun Zhang Leo Yu Zhang Jingwei Wang | 2023/11/16 |
Masked Language Model Based Textual Adversarial Example Detection | Xiaomei Zhang Zhaoxi Zhang Qi Zhong Xufei Zheng Yanjun Zhang | 2023/7/10 | |
Probabilistic Matrix Factorization Recommendation Approach for Integrating Multiple Information Sources | IEEE Transactions on Systems, Man, and Cybernetics: Systems | Jiangzhou Deng Xun Ran Yong Wang Leo Yu Zhang Junpeng Guo | 2023/6/12 |
LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks | Mengyao Ma Yanjun Zhang Pathum Chamikara Mahawaga Arachchige Leo Yu Zhang Mohan Baruwal Chhetri | 2023/7/10 | |
Corrupting Unbounded Unlearnable Datasets with Pixel-based Image Transformations | Xianlong Wang Shengshan Hu Minghui Li Zhifei Yu Ziqi Zhou | 2023/10/13 |