Qiben Yan
Michigan State University
H-index: 26
North America-United States
Top articles of Qiben Yan
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Privacy-Preserving Diffusion Model Using Homomorphic Encryption | arXiv preprint arXiv:2403.05794 | Yaojian Chen Qiben Yan | 2024/3/9 |
Vsmask: Defending against voice synthesis attack via real-time predictive perturbation | Yuanda Wang Hanqing Guo Guangjing Wang Bocheng Chen Qiben Yan | 2023/5/29 | |
Jailbreaker in jail: Moving target defense for large language models | Bocheng Chen Advait Paliwal Qiben Yan | 2023/11/26 | |
Masterkey: Practical backdoor attack against speaker verification systems | Hanqing Guo Xun Chen Junfeng Guo Li Xiao Qiben Yan | 2023/10/2 | |
A comprehensive survey on pretrained foundation models: A history from bert to chatgpt | arXiv preprint arXiv:2302.09419 | Lichao Sun Ce Zhou Qian Li Chen Li Jun Yu Yixin Liu | 2023/2/18 |
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders | Yuhui Zhu Zhenxiang Chen Qiben Yan Shanshan Wang Alberto Giaretta | 2023/5/28 | |
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems | Guangjing Wang Ce Zhou Yuanda Wang Bocheng Chen Hanqing Guo | 2023/11/20 | |
DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning | Bocheng Chen Nikolay Ivanov Guangjing Wang Qiben Yan | 2023/9/11 | |
FacER: Contrastive Attention based Expression Recognition via Smartphone Earpiece Speaker | Guangjing Wang Qiben Yan Shane Patrarungrong Juexing Wang Huacheng Zeng | 2023/5/17 | |
Security Defense For Smart Contracts: A Comprehensive Survey | Nikolay Ivanov Chenning Li Qiben Yan Zhiyuan Sun Zhichao Cao | 2023/2/14 | |
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification | IEEE Transactions on Information Forensics and Security | Yuewang He Xiangui Kang Qiben Yan Enping Li | 2023/10/30 |
Security threat mitigation for smart contracts: A comprehensive survey | Nikolay Ivanov Chenning Li Qiben Yan Zhiyuan Sun Zhichao Cao | 2023/7/17 | |
ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems | arXiv preprint arXiv:2305.08037 | Ce Zhou Qiben Yan Zhiyuan Yu Eshan Dixit Ning Zhang | 2023/5/14 |
TxT: Real-time transaction encapsulation for Ethereum smart contracts | IEEE Transactions on Information Forensics and Security | Nikolay Ivanov Qiben Yan Anurag Kompalli | 2023/1/13 |
Federated threat detection for smart home iot rules | Guangjing Wang Qiben Yan | 2023/6/25 | |
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection | Hanqing Guo Guangjing Wang Yuanda Wang Bocheng Chen Qiben Yan | 2023/10/16 | |
Motif-level anomaly detection in dynamic graphs | IEEE Transactions on Information Forensics and Security | Zirui Yuan Minglai Shao Qiben Yan | 2023/5/3 |
Graph learning for interactive threat detection in heterogeneous smart home rule data | Proceedings of the ACM on Management of Data | Guangjing Wang Nikolay Ivanov Bocheng Chen Qi Wang ThanhVu Nguyen | 2023/5/30 |
Understanding multi-turn toxic behaviors in open-domain chatbots | Bocheng Chen Guangjing Wang Hanqing Guo Yuanda Wang Qiben Yan | 2023/10/16 | |
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems? | arXiv preprint arXiv:2312.06010 | Yuanda Wang Qiben Yan Nikolay Ivanov Xun Chen | 2023/12/10 |