Volgen
Zhiyuan Yu
Zhiyuan Yu
Geverifieerd e-mailadres voor wustl.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Day-ahead Coordinated Scheduling of Hydro and Wind Power Generation System Considering Uncertainties
Y Li, T Zhao, C Liu, Y Zhao, Z Yu, K Li, L Wu
IEEE Transactions on Industry Applications 55 (3), 2368-2377, 2019
292019
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Z Yu, Z Kaplan, Q Yan, N Zhang
IEEE Communications Surveys & Tutorials 23 (3), 1879-1919, 2021
272021
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples
H Liu, Z Yu, Y Vorobeychik, N Zhang
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023, 2023
132023
CodeIPPrompt: Intellectual Property Infringement Assessment of Code Language Models
Z Yu, Y Wu, N Zhang, C Wang, Y Vorobeychik, C Xiao
40th International Conference on Machine Learning (ICML) 2023, 2023
112023
When Evil Calls: Targeted Adversarial Voice over IP Network
H Liu, Z Yu, M Zha, X Wang, W Yeoh, Y Vorobeychik, N Zhang
2022 ACM Conference on Computer and Communications Security (CCS), 2022
102022
SMACK: Semantically Meaningful Adversarial Audio Attack
Z Yu, Y Chang, N Zhang, C Xiao
32nd USENIX Security Symposium (USENIX Security 23), 2023
72023
PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference
A Li*, M Sudvarg*, H Liu, Z Yu, C Gill, N Zhang
2022 IEEE Real-Time Systems Symposium (RTSS), 2022
72022
Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack
H Liu, Y Wu, Z Yu, N Zhang
2024 IEEE Symposium on Security and Privacy (SP), 120-120, 2024
42024
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis
Z Yu, S Zhai, N Zhang
2023 ACM Conference on Computer and Communications Security (CCS), 2023
42023
HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions
Z Yu, Z Li, Y Chang, S Fong, J Liu, N Zhang
2022 ACM Conference on Computer and Communications Security (CCS), 2022
42022
PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens
H Zhu, Z Yu, W Cao, N Zhang, X Zhang
2022 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2022
32022
ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems
C Zhou, Q Yan, Z Yu, E Dixit, N Zhang, H Zeng, AS Ghanhdari
arXiv preprint arXiv:2305.08037, 2023
22023
Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory
W Yan, H Zhu, Z Yu, F Tehranipoor, J Chandy, N Zhang, X Zhang
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
22020
Don’t Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models
Z Yu, X Liu, S Liang, Z Cameron, C Xiao, N Zhang
33rd USENIX Security Symposium (USENIX Security 24), 2024
12024
Towards Automated Computational Auditing of mHealth Security and Privacy Regulations
B Tung*, Z Yu*, N Zhang
2021 ACM Conference on Computer and Communications Security (CCS), 2021
12021
Automatic and Universal Prompt Injection Attacks against Large Language Models
X Liu, Z Yu, Y Zhang, N Zhang, C Xiao
arXiv preprint arXiv:2403.04957, 2024
2024
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography
Z Yu, Y Chang, S Zhai, N Deily, T Ju, XF Wang, U Jammalamadaka, ...
32nd USENIX Security Symposium (USENIX Security 23), 2023
2023
Poster: Intellectual Property Infringement Assessment of Code Language Models
Z Yu, Y Wu, N Zhang, C Wang, Y Vorobeychik, C Xiao
44th IEEE Symposium on Security and Privacy (IEEE S&P) 2023, 2023
2023
Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference
A Li, M Sudvarg, H Liu, Z Yu, C Gill, N Zhang
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–19