Yu Li

Orcid: 0000-0001-9122-5923

Affiliations:
  • Chinese University of Hong Kong, CURE, Hong Kong
  • KU Leuven, Group T, Belgium


According to our database1, Yu Li authored at least 24 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On Function-Coupled Watermarks for Deep Neural Networks.
IEEE J. Emerg. Sel. Topics Circuits Syst., December, 2024

Self-Supervised Video Representation Learning via Capturing Semantic Changes Indicated by Saccades.
IEEE Trans. Circuits Syst. Video Technol., August, 2024

Spatial attention for human-centric visual understanding: An Information Bottleneck method.
Comput. Vis. Image Underst., 2024

Toward Robust and Accurate Adversarial Camouflage Generation against Vehicle Detectors.
CoRR, 2024

Vector Quantization Prompting for Continual Learning.
CoRR, 2024

Enhancing Flow Embedding Through Trace: A Novel Self-supervised Approach for Encrypted Traffic Classification.
Proceedings of the International Joint Conference on Neural Networks, 2024

RAUCA: A Novel Physical Adversarial Attack on Vehicle Detectors via Robust and Accurate Camouflage Generation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
HiBug: On Human-Interpretable Model Debug.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Towards Robust Deep Neural Networks Against Design-Time and Run-Time Failures.
Proceedings of the IEEE International Test Conference, 2023

EXPERT: EXPloiting DRAM ERror Types to Improve the Effective Forecasting Coverage in the Field.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
An Empirical Study on the Efficacy of Deep Active Learning for Image Classification.
CoRR, 2022

What You See is Not What the Network Infers: Detecting Adversarial Examples Based on Semantic Contradiction.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

HybridRepair: towards annotation-efficient repair for deep learning models.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
MixDefense: A Defense-in-Depth Framework for Adversarial Example Detection Based on Statistical and Semantic Analysis.
CoRR, 2021

On Workload-Aware DRAM Failure Prediction in Large-Scale Data Centers.
Proceedings of the 39th IEEE VLSI Test Symposium, 2021

TestRank: Bringing Order into Unlabeled Test Instances for Deep Learning Tasks.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Information Bottleneck Approach to Spatial Attention Learning.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

AppealNet: An Efficient and Highly-Accurate Edge/Cloud Collaborative Architecture for DNN Inference.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

2020
On Configurable Defense against Adversarial Example Attacks.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

DeepDyve: Dynamic Verification for Deep Neural Networks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
On Functional Test Generation for Deep Neural Network IPs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

D2NN: a fine-grained dual modular redundancy framework for deep neural networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
IEEE Std P1838's flexible parallel port and its specification with Google's protocol buffers.
Proceedings of the 23rd IEEE European Test Symposium, 2018

I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018


  Loading...