Haolin Yuan

According to our database1, Haolin Yuan authored at least 13 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SneakyPrompt: Jailbreaking Text-to-image Generative Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

PFEDEDIT: Personalized Federated Learning via Automated Model Editing.
Proceedings of the Computer Vision - ECCV 2024, 2024

PLeak: Prompt Leaking Attacks against Large Language Model Applications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
SneakyPrompt: Evaluating Robustness of Text-to-image Generative Models' Safety Filters.
CoRR, 2023

PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation.
Proceedings of the 32nd USENIX Security Symposium, 2023

ImageAlly: A Human-AI Hybrid Approach to Support Blind People in Detecting and Redacting Private Image Content.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

EdgeMixup: Embarrassingly Simple Data Alteration to Improve Lyme Disease Lesion Segmentation and Diagnosis Fairness.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

Fortifying Federated Learning against Membership Inference Attacks via Client-level Input Perturbation.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
EdgeMixup: Improving Fairness for Skin Disease Classification and Segmentation.
CoRR, 2022

Addressing Heterogeneity in Federated Learning via Distributional Transformation.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Practical Blind Membership Inference Attack via Differential Comparisons.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2019
A High Performance Memory Key-Value Database Based on Redis.
J. Comput., 2019


  Loading...