Follow
Yue Zhao
Yue Zhao
University of Chinese Academy of Sciences
Verified email at iie.ac.cn
Title
Cited by
Cited by
Year
{CommanderSong}: A systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th USENIX security symposium (USENIX security 18), 49-64, 2018
2712018
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1692019
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020
1382020
Holographic SAR tomography image reconstruction by combination of adaptive imaging and sparse Bayesian inference
Q Bao, Y Lin, W Hong, W Shen, Y Zhao, X Peng
IEEE Geoscience and Remote Sensing Letters 14 (8), 1248-1252, 2017
312017
Using sonar for liveness detection to protect smart speakers against remote attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
282020
Adaptive imaging of anisotropic target based on circular‐SAR
Y Zhao, Y Lin, W Hong, L Yu
Electronics Letters 52 (16), 1406-1408, 2016
252016
Practical adversarial attack against object detector
Y Zhao, H Zhu, Q Shen, R Liang, K Chen, S Zhang
arXiv preprint arXiv:1812.10217 3, 2018
202018
A survey of audiovisual deepfake detection techniques
R Liang, M Li, K Chen
Journal of Cyber Security 5 (2), 1-17, 2020
142020
Ai-lancet: Locating error-inducing neurons to optimize neural networks
Y Zhao, H Zhu, K Chen, S Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
122021
Analysis of azimuthal variations using multi-aperture polarimetric entropy with circular SAR images
F Xue, Y Lin, W Hong, Q Yin, B Zhang, W Shen, Y Zhao
Remote Sensing 10 (1), 123, 2018
122018
A robustness-assured white-box watermark in neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, H Ma, Y Zhao, Y Li
IEEE Transactions on Dependable and Secure Computing, 2023
92023
HufuNet: embedding the left piece as watermark and keeping the right piece for ownership verification in deep neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, Y Zhao, Y Li
arXiv preprint arXiv:2103.13628, 2021
62021
LLM Polygraph: Uncovering LLMs' Factual Discernment through Intermediate Data Analysis
J He, Y Gong, K Chen, Z Lin, C Wei, Y Zhao
arXiv preprint arXiv:2312.16374, 2023
2023
Seeing isn't Believing: Practical Adversarial Attack Against Object Detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
arXiv preprint arXiv:1812.10217, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–14