Yang Zhang
Yang Zhang
Faculty at CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Cited by
Cited by
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
A Salem, Y Zhang, M Humbert, P Berrang, M Fritz, M Backes
Annual Network and Distributed System Security Symposium (NDSS), 2019
"Go eat a bat, Chang!": On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19
F Tahmasbi, L Schild, C Ling, J Blackburn, G Stringhini, Y Zhang, ...
The Web Conference (WWW), 2021
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
J Jinyuan, A Salem, M Backes, Y Zhang, NZ Gong
ACM SIGSAC Conference on Computer and Communications Security (CCS), 259-274, 2019
A New Access Control Scheme for Facebook-style Social Networks
J Pang, Y Zhang
Computers & Security 54, 44-59, 2015
walk2friends: Inferring Social Links from Mobility Profiles
M Backes, M Humbert, J Pang, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 1943-1957, 2017
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
A Salem, A Bhattacharya, M Backes, M Fritz, Y Zhang
USENIX Security Symposium, 1291-1308, 2020
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service
L Hanzlik, Y Zhang, K Grosse, A Salem, M Augustin, M Backes, M Fritz
arXiv preprint arXiv:1808.00590, 2018
GAN-Leaks: A Taxonomy of Membership Inference Attacks against GANs
D Chen, N Yu, Y Zhang, M Fritz
ACM SIGSAC Conference on Computer and Communications Security (CCS), 343-362, 2020
Distance and Friendship: A Distance-based Model for Link Prediction in Social Networks
Y Zhang, J Pang
Asia-Pacific Web Conference (Apweb), 55-66, 2015
Inferring Friendship from Check-in Data of Location-based Social Networks
R Cheng, J Pang, Y Zhang
IEEE/ACM International Conference on Advances in Social Networks Analysis …, 2015
DeepCity: A Feature Learning Framework for Mining Location Check-ins
J Pang, Y Zhang
International AAAI Conference on Web and Social Media (ICWSM), 652-655, 2017
Dynamic backdoor attacks against machine learning models
A Salem, R Wen, M Backes, S Ma, Y Zhang
arXiv preprint arXiv:2003.03675, 2020
Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
D Chu, J Großschädl, Z Liu, V Müller, Y Zhang
ACM Workshop on Asia Public-key Cryptography (AsiaPKC), 39-44, 2013
Fairwalk: Towards Fair Graph Embedding
T Rahman, B Surma, M Backes, Y Zhang
International Joint Conference on Artificial Intelligence (IJCAI), 3289-3295, 2019
How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN
Z Li, C Hu, Y Zhang, S Guo
Annual Computer Security Applications Conference (ACSAC), 126-137, 2019
Efficient Prime-Field Arithmetic for Elliptic Curve Cryptography on Wireless Sensor Nodes
Y Zhang, J Großschädl
International Conference on Computer Science and Network Technology (ICCSNT …, 2011
Tagvisor: A Privacy Advisor for Sharing Hashtags
Y Zhang, M Humbert, T Rahman, CT Li, J Pang, M Backes
The Web Conference (WWW), 287-296, 2018
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
I Hagestedt, Y Zhang, M Humbert, P Berrang, H Tang, XF Wang, ...
Annual Network and Distributed System Security Symposium (NDSS), 2019
Exploring Communities for Effective Location Predication
J Pang, Y Zhang
International Conference on World Wide Web (WWW), 87-88, 2015
Location Prediction: Communities Speak Louder than Friends
J Pang, Y Zhang
ACM Conference on Online Social Networks (COSN), 161-171, 2015
The system can't perform the operation now. Try again later.
Articles 1–20