Leo Yu Zhang
Orcid: 0000-0001-9330-2662
According to our database1,
Leo Yu Zhang
authored at least 142 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Comput. Soc. Syst., October, 2024
An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features.
IEEE Trans. Artif. Intell., September, 2024
Guest Editorial AI-Empowered Internet of Things for Data-Driven Psychophysiological Computing and Patient Monitoring.
IEEE J. Biomed. Health Informatics, May, 2024
IEEE Trans. Ind. Informatics, March, 2024
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Matrix factorization recommender based on adaptive Gaussian differential privacy for implicit feedback.
Inf. Process. Manag., 2024
IEEE Internet Things J., 2024
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud.
Comput. Stand. Interfaces, 2024
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness.
CoRR, 2024
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
DERD: Data-free Adversarial Robustness Distillation through Self-adversarial Teacher Group.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness in the Physical World.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
ECLIPSE: Expunging Clean-Label Indiscriminate Poisons via Sparse Diffusion Purification.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Providing prediction reliability through deep neural networks for recommender systems.
Comput. Ind. Eng., November, 2023
Probabilistic Matrix Factorization Recommendation Approach for Integrating Multiple Information Sources.
IEEE Trans. Syst. Man Cybern. Syst., October, 2023
An improved matrix factorization with local differential privacy based on piecewise mechanism for recommendation systems.
Expert Syst. Appl., April, 2023
IEEE Trans. Ind. Electron., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cybern., 2023
IEEE Trans. Cloud Comput., 2023
Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations.
CoRR, 2023
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models.
CoRR, 2023
Why Does Little Robustness Help? Understanding Adversarial Transferability From Surrogate Training.
CoRR, 2023
Algorithms, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models against Adversarial Examples.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Low-Cost and Confidential ECG Acquisition Framework Using Compressed Sensing and Chaotic Systems for Wireless Body Area Network.
IEEE J. Biomed. Health Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
A collaborative filtering algorithm based on item labels and Hellinger distance for sparse data.
J. Inf. Sci., 2022
Inf. Sci., 2022
A differentially private matrix factorization based on vector perturbation for recommender system.
Neurocomputing, 2022
CoRR, 2022
Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption.
Complex., 2022
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges.
IEEE Access, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Proceedings of the Neural Information Processing - 29th International Conference, 2022
Proceedings of the Neural Information Processing - 29th International Conference, 2022
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds.
IEEE Trans. Big Data, 2021
Secur. Commun. Networks, 2021
Neural Comput. Appl., 2021
An effective and efficient fuzzy approach for managing natural noise in recommender systems.
Inf. Sci., 2021
A new item similarity based on α-divergence for collaborative filtering in sparse data.
Expert Syst. Appl., 2021
CoRR, 2021
CoRR, 2021
CoRR, 2021
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2020
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020
A genetic algorithm for constructing bijective substitution boxes with high nonlinearity.
Inf. Sci., 2020
IEEE Internet Things J., 2020
Int. J. Bifurc. Chaos, 2020
Concurr. Comput. Pract. Exp., 2020
Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
A New Interval Preference Model and Corresponding Fuzzy Similarity Measure for Collaborative Filtering.
Proceedings of the 6th IEEE International Conference on Big Data Computing Service and Applications, 2020
Proceedings of the Applications and Techniques in Information Security, 2020
2019
IEEE Trans. Ind. Informatics, 2019
Inf. Sci., 2019
Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security.
IEEE Internet Things J., 2019
Compressed sensing for electrocardiogram acquisition in wireless body sensor network: A comparative analysis.
Int. J. Distributed Sens. Networks, 2019
Concurr. Comput. Pract. Exp., 2019
IEEE Commun. Surv. Tutorials, 2019
IEEE Commun. Surv. Tutorials, 2019
Fast detection of maximal exact matches via fixed sampling of query K-mers and Bloom filtering of index K-mers.
Bioinform., 2019
2018
IEEE Trans. Cybern., 2018
Secur. Commun. Networks, 2018
Inf. Sci., 2018
Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things.
IEEE Internet Things J., 2018
2017
IEEE Internet Things J., 2017
Int. J. Bifurc. Chaos, 2017
Appl. Soft Comput., 2017
Cryptanalysis of Optical Ciphers Integrating Double Random Phase Encoding With Permutation.
IEEE Access, 2017
2016
Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher.
Multim. Tools Appl., 2016
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
Int. J. Bifurc. Chaos, 2016
2015
Signal Process. Image Commun., 2015
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.
CoRR, 2015
Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Joint quantization and diffusion for compressed sensing measurements of natural images.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
2014
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem.
Signal Process. Image Commun., 2014
Commun. Nonlinear Sci. Numer. Simul., 2014
2013
Breaking a Chaotic Image Encryption Algorithm Based on Modulo Addition and XOR Operation.
Int. J. Bifurc. Chaos, 2013
Breaking an image compression and encryption scheme based on Chinese Remainder Theorem.
CoRR, 2013
2012
J. Syst. Softw., 2012