Yansong Gao
Orcid: 0000-0001-6029-5064Affiliations:
- CSIRO, Data61, Sydney, Australia
- Nanjing University of Science and Technology, Nanjing, China
- University of Adelaide, Australia (PhD 2017)
According to our database1,
Yansong Gao
authored at least 112 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on github.com
On csauthors.net:
Bibliography
2025
A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures.
ACM Comput. Surv., March, 2025
2024
Can differential privacy practically protect collaborative deep learning inference for IoT?
Wirel. Networks, August, 2024
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
One-to-Multiple Clean-Label Image Camouflage (OmClic) based backdoor attack on deep learning.
Knowl. Based Syst., 2024
Expert Syst. Appl., 2024
From Solitary Directives to Interactive Encouragement! LLM Secure Code Generation by Natural Language Prompting.
CoRR, 2024
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking.
CoRR, 2024
CoRR, 2024
Comput. Secur., 2024
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems.
Comput. Secur., 2024
AI Commun., 2024
SARA: A Sparsity-Aware Efficient Oblivious Aggregation Service for Federated Matrix Factorization.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024
ThermalScope: A Practical Interrupt Side Channel Attack Based on Thermal Event Interrupts.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning.
Comput. Secur., October, 2023
MLMSA: Multilabel Multiside-Channel-Information Enabled Deep Learning Attacks on APUF Variants.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., September, 2023
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023
PPTA: A location privacy-preserving and flexible task assignment service for spatial crowdsourcing.
Comput. Networks, April, 2023
Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Wisecr: Secure Simultaneous Code Dissemination to Many Batteryless Computational RFID Devices.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
IEEE Trans. Dependable Secur. Comput., 2023
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys.
IACR Cryptol. ePrint Arch., 2023
ACM Comput. Surv., 2023
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
Dataset, June, 2022
VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Emerg. Top. Comput., 2022
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2022
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs.
IEEE Trans. Dependable Secur. Comput., 2022
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022
Knowl. Based Syst., 2022
MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
CoRR, 2022
MLMSA: Multi-Label Multi-Side-Channel-Information enabled Deep Learning Attacks on APUF Variants.
CoRR, 2022
MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning.
CoRR, 2022
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences.
CoRR, 2022
Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
CoRR, 2022
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022
CoRR, 2022
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.
Comput. Secur., 2022
SEDML: Securely and efficiently harnessing distributed knowledge in machine learning.
Comput. Secur., 2022
Comput. Secur., 2022
A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation.
Comput. Commun., 2022
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices.
IEEE Trans. Dependable Secur. Comput., 2021
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021
Wisecr: Secure Simultaneous Code Disseminationto Many Batteryless Computational RFID Devices.
CoRR, 2021
IEEE Access, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2020
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.
CoRR, 2020
VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT.
CoRR, 2020
FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning.
CoRR, 2020
CoRR, 2020
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
Proceedings of the 38th IEEE International Conference on Computer Design, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Hash Functions and Benchmarks for Resource Constrained Passive Devices: A Preliminary Study.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices.
Dataset, July, 2018
Security-Aware Proportional Fairness Resource Allocation for Cognitive Heterogeneous Networks.
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
IACR Cryptol. ePrint Arch., 2018
TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs.
CoRR, 2018
CoRR, 2018
2017
IEEE Trans. Circuits Syst. I Regul. Pap., 2017
CoRR, 2017
CoRR, 2017
Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication.
CoRR, 2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
2016
Read operation performance of large selectorless cross-point array with self-rectifying memristive device.
Integr., 2016
Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Future Large-Scale Memristive Device Crossbar Arrays: Limits Imposed by Sneak-Path Currents on Read Operations.
CoRR, 2015
Proceedings of the Applied Cryptography and Network Security, 2015