Leo Yu Zhang

Orcid: 0000-0001-9330-2662

According to our database1, Leo Yu Zhang authored at least 145 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SSAT: Active Authorization Control and User's Fingerprint Tracking Framework for DNN IP Protection.
ACM Trans. Multim. Comput. Commun. Appl., October, 2024

FairCMS: Cloud Media Sharing With Fair Copyright Protection.
IEEE Trans. Comput. Soc. Syst., October, 2024

An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features.
IEEE Trans. Artif. Intell., September, 2024

Guest Editorial AI-Empowered Internet of Things for Data-Driven Psychophysiological Computing and Patient Monitoring.
IEEE J. Biomed. Health Informatics, May, 2024

Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger.
IEEE Trans. Ind. Informatics, March, 2024

Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification.
IEEE Trans. Inf. Forensics Secur., 2024

Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models.
IEEE Trans. Dependable Secur. Comput., 2024

PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data.
IEEE Trans. Dependable Secur. Comput., 2024

Matrix factorization recommender based on adaptive Gaussian differential privacy for implicit feedback.
Inf. Process. Manag., 2024

Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing.
IEEE Internet Things J., 2024

Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud.
Comput. Stand. Interfaces, 2024

BadRobot: Jailbreaking LLM-based Embodied AI in the Physical World.
CoRR, 2024

Memorization in deep learning: A survey.
CoRR, 2024

Large Language Model Watermark Stealing With Mixed Integer Programming.
CoRR, 2024

Algorithmic Fairness: A Tolerance Perspective.
CoRR, 2024

Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness.
CoRR, 2024

Fluent: Round-efficient Secure Aggregation for Private Federated Learning.
CoRR, 2024

Deceptive Waves: Embedding Malicious Backdoors in PPG Authentication.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DERD: Data-free Adversarial Robustness Distillation through Self-adversarial Teacher Group.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness in the Physical World.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

DarkFed: A Data-Free Backdoor Attack in Federated Learning.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

MISA: Unveiling the Vulnerabilities in Split Federated Learning.
Proceedings of the IEEE International Conference on Acoustics, 2024

PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds.
Proceedings of the Computer Security - ESORICS 2024, 2024

ECLIPSE: Expunging Clean-Label Indiscriminate Poisons via Sparse Diffusion Purification.
Proceedings of the Computer Security - ESORICS 2024, 2024

TrustMIS: Trust-Enhanced Inference Framework for Medical Image Segmentation.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

An Imperceptible and Owner-unique Watermarking Method for Graph Neural Networks.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Conditional Backdoor Attack via JPEG Compression.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
A Survey of PPG's Application in Authentication.
Comput. Secur., December, 2023

Providing prediction reliability through deep neural networks for recommender systems.
Comput. Ind. Eng., November, 2023

Probabilistic Matrix Factorization Recommendation Approach for Integrating Multiple Information Sources.
IEEE Trans. Syst. Man Cybern. Syst., October, 2023

An improved matrix factorization with local differential privacy based on piecewise mechanism for recommendation systems.
Expert Syst. Appl., April, 2023

Buffeting Chaotification Model for Enhancing Chaos and Its Hardware Implementation.
IEEE Trans. Ind. Electron., 2023

Cyber Information Retrieval Through Pragmatics Understanding and Visualization.
IEEE Trans. Dependable Secur. Comput., 2023

From Chaos to Pseudorandomness: A Case Study on the 2-D Coupled Map Lattice.
IEEE Trans. Cybern., 2023

PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data.
IEEE Trans. Cloud Comput., 2023

Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations.
CoRR, 2023

Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models.
CoRR, 2023

Client-side Gradient Inversion Against Federated Learning from Poisoning.
CoRR, 2023

Why Does Little Robustness Help? Understanding Adversarial Transferability From Surrogate Training.
CoRR, 2023

An Efficient Approach to Manage Natural Noises in Recommender Systems.
Algorithms, 2023

SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Towards Self-Interpretable Graph-Level Anomaly Detection.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

A Four-Pronged Defense Against Byzantine Attacks in Federated Learning.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

PointCRT: Detecting Backdoor in 3D Point Cloud via Corruption Robustness.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Backdoor Attack on Deep Neural Networks in Perception Domain.
Proceedings of the International Joint Conference on Neural Networks, 2023

Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Downstream-agnostic Adversarial Examples.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

A Bottom-Up Capsule Network for Hierarchical Image Classification.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2023

Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Preserving Privacy of Input Features Across All Stages of Collaborative Learning.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

Masked Language Model Based Textual Adversarial Example Detection.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Predicate Private Set Intersection with Linear Complexity.
Proceedings of the Applied Cryptography and Network Security, 2023

WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models against Adversarial Examples.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Low-Cost and Confidential ECG Acquisition Framework Using Compressed Sensing and Chaotic Systems for Wireless Body Area Network.
IEEE J. Biomed. Health Informatics, 2022

Semantic-Aware Privacy-Preserving Online Location Trajectory Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2022

A collaborative filtering algorithm based on item labels and Hellinger distance for sparse data.
J. Inf. Sci., 2022

A differentially private nonnegative matrix factorization for recommender system.
Inf. Sci., 2022

A differentially private matrix factorization based on vector perturbation for recommender system.
Neurocomputing, 2022

M-to-N Backdoor Paradigm: A Stealthy and Fuzzy Attack to Deep Learning Models.
CoRR, 2022

Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption.
Complex., 2022

Evaluating Membership Inference Through Adversarial Robustness.
Comput. J., 2022

Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges.
IEEE Access, 2022

Self-Supervised Adversarial Example Detection by Disentangled Representation.
Proceedings of the IEEE International Conference on Trust, 2022

Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning.
Proceedings of the IEEE International Conference on Trust, 2022

A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022

Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Towards Privacy-Preserving Neural Architecture Search.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Detecting and Mitigating Backdoor Attacks with Dynamic and Invisible Triggers.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

A Generic Enhancer for Backdoor Attacks on Deep Neural Networks.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Working Mechanism of Eternalblue and Its Application in Ransomworm.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Towards Private and Scalable Cross-Media Retrieval.
IEEE Trans. Dependable Secur. Comput., 2021

Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms.
IEEE Trans. Circuits Syst. Video Technol., 2021

Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds.
IEEE Trans. Big Data, 2021

A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model.
Secur. Commun. Networks, 2021

Deep neural-based vulnerability discovery demystified: data, model and performance.
Neural Comput. Appl., 2021

An effective and efficient fuzzy approach for managing natural noise in recommender systems.
Inf. Sci., 2021

A new item similarity based on α-divergence for collaborative filtering in sparse data.
Expert Syst. Appl., 2021

Challenges and approaches for mitigating byzantine attacks in federated learning.
CoRR, 2021

From Chaos to Pseudo-Randomness: A Case Study on the 2D Coupled Map Lattice.
CoRR, 2021

CREAMS: Copyrighted Cloud Media Sharing.
CoRR, 2021

Self-Supervised Adversarial Example Detection by Disentangled Representation.
CoRR, 2021

Shielding Federated Learning: A New Attack Approach and Its Defense.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

My Security: An interactive search engine for cybersecurity.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020

Informed Histogram-Based Watermarking.
IEEE Signal Process. Lett., 2020

A genetic algorithm for constructing bijective substitution boxes with high nonlinearity.
Inf. Sci., 2020

A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle.
IEEE Internet Things J., 2020

Design and Analysis on a Parallel Chaos-Based Hash Function.
Int. J. Bifurc. Chaos, 2020

VoterChoice: A ransomware detection honeypot with multiple voting framework.
Concurr. Comput. Pract. Exp., 2020

Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Protecting IP of Deep Neural Networks with Watermarking: A New Label Helps.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence.
Proceedings of the Network and System Security - 14th International Conference, 2020

A New Interval Preference Model and Corresponding Fuzzy Similarity Measure for Collaborative Filtering.
Proceedings of the 6th IEEE International Conference on Big Data Computing Service and Applications, 2020

A New Rabin-Type Cryptosystem with Modulus p<sup>2</sup>q.
Proceedings of the Applications and Techniques in Information Security, 2020

2019
Compressed Sensing Based Selective Encryption With Data Hiding Capability.
IEEE Trans. Ind. Informatics, 2019

Efficiently and securely outsourcing compressed sensing reconstruction to a cloud.
Inf. Sci., 2019

Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security.
IEEE Internet Things J., 2019

Compressed sensing for electrocardiogram acquisition in wireless body sensor network: A comparative analysis.
Int. J. Distributed Sens. Networks, 2019

Static malware clustering using enhanced deep embedding method.
Concurr. Comput. Pract. Exp., 2019

Secure Wireless Communications Based on Compressive Sensing: A Survey.
IEEE Commun. Surv. Tutorials, 2019

Data-Driven Cybersecurity Incident Prediction: A Survey.
IEEE Commun. Surv. Tutorials, 2019

Fast detection of maximal exact matches via fixed sampling of query K-mers and Bloom filtering of index K-mers.
Bioinform., 2019

2018
On the Security of a Class of Diffusion Mechanisms for Image Encryption.
IEEE Trans. Cybern., 2018

Exploiting the Security Aspects of Compressive Sampling.
Secur. Commun. Networks, 2018

Improved known-plaintext attack to permutation-only multimedia ciphers.
Inf. Sci., 2018

Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things.
IEEE Internet Things J., 2018

2017
Harnessing the Hybrid Cloud for Secure Big Image Data Service.
IEEE Internet Things J., 2017

Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers.
Int. J. Bifurc. Chaos, 2017

A local search enhanced differential evolutionary algorithm for sparse recovery.
Appl. Soft Comput., 2017

Cryptanalysis of Optical Ciphers Integrating Double Random Phase Encoding With Permutation.
IEEE Access, 2017

2016
Bi-level Protected Compressive Sampling.
IEEE Trans. Multim., 2016

Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher.
Multim. Tools Appl., 2016

Embedding cryptographic features in compressive sensing.
Neurocomputing, 2016

A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
Int. J. Bifurc. Chaos, 2016

A Review of Compressive Sensing in Information Security Field.
IEEE Access, 2016

2015
Robust coding of encrypted images via structural matrix.
Signal Process. Image Commun., 2015

Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.
CoRR, 2015

Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Joint quantization and diffusion for compressed sensing measurements of natural images.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

2014
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem.
Signal Process. Image Commun., 2014

Robust Coding of Encrypted Images via Structural Matrix.
CoRR, 2014

Embedding Cryptographic Features in Compressive Sensing.
CoRR, 2014

Towards Secure Compressive Sampling Scheme.
CoRR, 2014

A chaotic image encryption scheme owning temp-value feedback.
Commun. Nonlinear Sci. Numer. Simul., 2014

2013
Breaking a Chaotic Image Encryption Algorithm Based on Modulo Addition and XOR Operation.
Int. J. Bifurc. Chaos, 2013

Breaking an image compression and encryption scheme based on Chinese Remainder Theorem.
CoRR, 2013

2012
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure.
J. Syst. Softw., 2012

Breaking a novel colour image encryption algorithm based on chaos
CoRR, 2012


  Loading...