Yifan Yan

Orcid: 0009-0007-5735-1193

According to our database1, Yifan Yan authored at least 20 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Matryoshka: Exploiting the Over-Parametrization of Deep Learning Models for Covert Data Transmission.
IEEE Trans. Pattern Anal. Mach. Intell., February, 2025

2024
Optical Parameter Decoupling and Optimization for Elliptically Polarized Atomic Magnetometer.
IEEE Trans. Instrum. Meas., 2024

MUTE-SLAM: Real-Time Neural SLAM with Multiple Tri-Plane Hash Representations.
CoRR, 2024

2023
Lossless segmentation of cardiac medical images by a resolution consistent network with nondamage data preprocessing.
Multim. Tools Appl., 2023

Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation.
Proceedings of the 32nd USENIX Security Symposium, 2023

ScentCarving: Fabricating Thin, Multi-layered and Paper-Based Scent Release through Laser Printing.
Proceedings of the Adjunct Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology, 2023

A Unified Framework for Rank-based Loss Minimization.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Cracking White-box DNN Watermarks via Invariant Neuron Transforms.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

EdibleToy: Empowering Children to Create Their Own Meals with a DIY Wafer Paper Kit.
Proceedings of the 22nd Annual ACM Interaction Design and Children Conference, 2023

2022
Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model.
CoRR, 2022

UTAF: A Universal Approach to Task-Agnostic Model Fingerprinting.
CoRR, 2022

Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis.
Proceedings of the 31st USENIX Security Symposium, 2022

House of Cans: Covert Transmission of Internal Datasets via Capacity-Aware Neuron Steganography.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

2021
Few-shot learning with relation propagation and constraint.
IET Comput. Vis., 2021

Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Theory-Oriented Deep Leakage from Gradients via Linear Equation Solver.
CoRR, 2020

Active Learning with Query Generation for Cost-Effective Text Classification.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2018
Cross modal similarity learning with active queries.
Pattern Recognit., 2018

Cost-Effective Active Learning for Hierarchical Multi-Label Classification.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018


  Loading...