Anli Yan

Orcid: 0000-0002-2854-2931

According to our database1, Anli Yan authored at least 25 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bag of tricks for backdoor learning.
Wirel. Networks, November, 2024

Defenses to Membership Inference Attacks: A Survey.
ACM Comput. Surv., April, 2024

MTL-Leak: Privacy Risk Assessment in Multi-Task Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark.
CoRR, 2024

Explanation-Guided Adversarial Example Attacks.
Big Data Res., 2024

In-Context Learning with Differentially Private Text Sanitization in Large Language Models.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

2023
Explanation-based data-free model extraction attacks.
World Wide Web (WWW), September, 2023

Holistic Implicit Factor Evaluation of Model Extraction Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Explanation leaks: Explanation-guided model extraction attacks.
Inf. Sci., 2023

GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification.
CoRR, 2023

Zeroth-Order Gradient Approximation Based DaST for Black-Box Adversarial Attacks.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

2022
Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough.
Inf. Sci., 2022

Towards explainable model extraction attacks.
Int. J. Intell. Syst., 2022

DPCL: Contrastive representation learning with differential privacy.
Int. J. Intell. Syst., 2022

Kernel-based adversarial attacks and defenses on support vector classification.
Digit. Commun. Networks, 2022

Explanation-Guided Minimum Adversarial Attack.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Towards Differentially Private Contrastive Learning.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Detect Adversarial Examples by Using Feature Autoencoder.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Effective detection of mobile malware behavior based on explainable deep neural network.
Neurocomputing, 2021

Querying little is enough: Model inversion attack via latent information.
Int. J. Intell. Syst., 2021

IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

2020
Towards Privacy-Preserving Aggregated Prediction from SPDZ.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

2018
Neural Network Rule Extraction for Real Time Traffic Behavior Identification.
Proceedings of the 2018 International Conference on Security, 2018

TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline.
Proceedings of the 2018 International Conference on Security, 2018


  Loading...