Yang Zhang
Orcid: 0000-0003-3612-7348Affiliations:
- CISPA, Helmholtz Center for Information Security, Saarbrücken, Germany
- Saarland University, Saarland Informatics Campus, Saarbrücken, Germany
According to our database1,
Yang Zhang
authored at least 153 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on cispa.de
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
2024
IEEE Trans. Dependable Secur. Comput., 2024
Proc. Priv. Enhancing Technol., 2024
<i>ModSCAN</i>: Measuring Stereotypical Bias in Large Vision-Language Models from Vision and Language Modalities.
CoRR, 2024
Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data.
CoRR, 2024
Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm?
CoRR, 2024
Breaking Agents: Compromising Autonomous LLM Agents Through Malfunction Amplification.
CoRR, 2024
CoRR, 2024
UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images.
CoRR, 2024
CoRR, 2024
Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
The Death and Life of Great Prompts: Analyzing the Evolution of LLM Prompts from the Structural Perspective.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
ModSCAN: Measuring Stereotypical Bias in Large Vision-Language Models from Vision and Language Modalities.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT Models.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
ZeroFake: Zero-Shot Detection of Fake Images Generated and Edited by Text-to-Image Generation Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts.
CoRR, 2023
Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning.
CoRR, 2023
Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models.
CoRR, 2023
Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing.
CoRR, 2023
CoRR, 2023
CoRR, 2023
CoRR, 2023
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
FairSR: Fairness-aware Sequential Recommendation through Multi-Task Learning with Preference Graph Embeddings.
ACM Trans. Intell. Syst. Technol., 2022
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models.
CoRR, 2022
CoRR, 2022
Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models.
CoRR, 2022
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network.
IEEE Trans. Dependable Secur. Comput., 2021
On exploring feature representation learning of items to forecast their rise and fall in social media.
J. Intell. Inf. Syst., 2021
"Go eat a bat, Chang!": On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19.
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
CoRR, 2020
CoRR, 2020
Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning.
CoRR, 2020
"Go eat a bat, Chang!": An Early Look on the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19.
CoRR, 2020
Everything About You: A Multimodal Approach towards Friendship Inference in Online Social Networks.
CoRR, 2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Knowl. Inf. Syst., 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the Web Information Systems Engineering - WISE 2019, 2019
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019
How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
CoRR, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
Proceedings of the International Conference on Web Intelligence, 2017
Proceedings of the Eleventh International Conference on Web and Social Media, 2017
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the Complex Networks & Their Applications V - Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), Milan, Italy, November 30, 2016
2015
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the Engineering the Web in the Big Data Era - 15th International Conference, 2015
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Distance and Friendship: A Distance-Based Model for Link Prediction in Social Networks.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013