Yuanzhang Li

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Interpretable adversarial example detection via high-level concept activation vector.
Comput. Secur., 2025

2024
Adaptive vertical federated learning via feature map transferring in mobile edge computing.
Computing, April, 2024

Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding.
IEEE Trans. Artif. Intell., January, 2024

A federated learning attack method based on edge collaboration via cloud.
Softw. Pract. Exp., 2024

Dataflow optimization with layer-wise design variables estimation method for enflame CNN accelerators.
J. Parallel Distributed Comput., 2024

Accelerating page loads via streamlining JavaScript engine for distributed learning.
Inf. Sci., 2024

Modifying the one-hot encoding technique can enhance the adversarial robustness of the visual model for symbol recognition.
Expert Syst. Appl., 2024

Bypassing software-based remote attestation using debug registers.
Connect. Sci., 2024

Dynamic fuzz testing of UAV configuration parameters based on dual guidance of fitness and coverage.
Connect. Sci., 2024

COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module.
Comput. Secur., 2024

ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks.
Comput. Networks, 2024

CCE&D: A Configuration Failure Prevention Method for Autonomous Driving Systems.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

Towards Transferable Adversarial Attacks with Centralized Perturbation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Microservice combination optimisation based on improved gray wolf algorithm.
Connect. Sci., December, 2023

Improving the invisibility of adversarial examples with perceptually adaptive perturbation.
Inf. Sci., July, 2023

Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering.
Inf. Sci., July, 2023

Building Covert Timing Channel of the IoT-Enabled MTS Based on Multi-Stage Verification.
IEEE Trans. Intell. Transp. Syst., February, 2023

Membership Inference Attacks Against Deep Learning Models via Logits Distribution.
IEEE Trans. Dependable Secur. Comput., 2023

Stealthy and Flexible Trojan in Deep Learning Framework.
IEEE Trans. Dependable Secur. Comput., 2023

Towards interpreting vulnerability of object detection models via adversarial distillation.
J. Inf. Secur. Appl., 2023

Unified High-binding Watermark for Unconditional Image Generation Models.
CoRR, 2023

Towards Invisible Backdoor Attacks in the Frequency Domain against Deep Neural Networks.
CoRR, 2023

Stealthy Low-frequency Backdoor Attack against Deep Neural Networks.
CoRR, 2023

Research on Evasion and Detection of Malicious JavaScript Code.
Proceedings of the Machine Learning for Cyber Security - 5th International Conference, 2023

A Stealth Security Hardening Method Based on SSD Firmware Function Extension.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication.
Proceedings of the Blockchain Technology and Emerging Applications, 2023

Fuzz Testing of UAV Configurations Based on Evolutionary Algorithm.
Proceedings of the Blockchain Technology and Emerging Applications, 2023

DFaP: Data Filtering and Purification Against Backdoor Attacks.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture.
Int. J. Intell. Syst., December, 2022

Toward feature space adversarial attack in the frequency domain.
Int. J. Intell. Syst., December, 2022

Towards robust and stealthy communication for wireless intelligent terminals.
Int. J. Intell. Syst., December, 2022

OM-TCN: A dynamic and agile opponent modeling approach for competitive games.
Inf. Sci., 2022

A Reliable Covert Channel for Stealthy Data Transmission for Internet-of-Underwater-Things.
IEEE Internet Things Mag., 2022

Boosting cross-task adversarial attack with random blur.
Int. J. Intell. Syst., 2022

Security of federated learning for cloud-edge intelligence collaborative computing.
Int. J. Intell. Syst., 2022

A fine-grained and traceable multidomain secure data-sharing model for intelligent terminals in edge-cloud collaboration scenarios.
Int. J. Intell. Syst., 2022

Boosting training for PDF malware classifier via active learning.
Int. J. Intell. Syst., 2022

A robust packet-dropping covert channel for mobile intelligent terminals.
Int. J. Intell. Syst., 2022

Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers.
CoRR, 2022

l-Leaks: Membership Inference Attacks with Logits.
CoRR, 2022

Improving the Transferability of Adversarial Examples with Restructure Embedded Patches.
CoRR, 2022

ZM-CTC: Covert timing channel construction method based on zigzag matrix.
Comput. Commun., 2022

Enhancing the Transferability of Adversarial Examples with Random Patch.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Universal Physical Adversarial Attack via Background Image.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis.
Mob. Networks Appl., 2021

An Efficient Bounded Model Checking Approach for Web Service Composition.
Mob. Networks Appl., 2021

Analyzing host security using D-S evidence theory and multisource information fusion.
Int. J. Intell. Syst., 2021

On-demand cut off the covert channel to mitigate meltdown.
Sci. China Inf. Sci., 2021

Deep learning feature exploration for Android malware detection.
Appl. Soft Comput., 2021

Offensive and Defensive Countermeasure Technology of Return-Oriented Programming.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

Free Adversarial Training with Layerwise Heuristic Learning.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Code Decoupling Execution Isolating Based on TF Card Firmware Extension.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Building a Covert Timing Channel over VoIP via Packet Length.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement Learning.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

A Classic Multi-method Collaborative Obfuscation Strategy.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

A Random Multi-target Backdooring Attack on Deep Neural Networks.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Research on Off-Path Exploits of Network Protocols.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

2020
A Robust Packet-Dropout Covert Channel over Wireless Networks.
IEEE Wirel. Commun., 2020

An Android Inline Hooking Framework for the Securing Transmitted Data.
Sensors, 2020

A feature-vector generative adversarial network for evading PDF malware classifiers.
Inf. Sci., 2020

Cross-lingual multi-keyword rank search with semantic extension over encrypted data.
Inf. Sci., 2020

Boosting performance of virtualized desktop infrastructure with physical GPU and SPICE.
Sci. China Inf. Sci., 2020

Building Undetectable Covert Channels Over Mobile Networks with Machine Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
A hierarchical group key agreement protocol using orientable attributes for cloud computing.
Inf. Sci., 2019

Optimizing the restoration performance of deduplication systems through an energy-saving data layout.
Ann. des Télécommunications, 2019

A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images.
IEEE Access, 2019

An RTP Extension for Reliable User-Data Transmission over VoIP Traffic.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

Boosting Training for PDF Malware Classifier via Active Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Evading PDF Malware Classifiers with Generative Adversarial Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Research and Application of Trusted Service Evaluation Model in Social Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
An Efficient Identity-Based Proxy Blind Signature for Semioffline Services.
Wirel. Commun. Mob. Comput., 2018

Covert Timing Channels for IoT over Mobile Networks.
IEEE Wirel. Commun., 2018

DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage.
IEEE Trans. Circuits Syst. Video Technol., 2018

Research on QoS service composition based on coevolutionary genetic algorithm.
Soft Comput., 2018

An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Sensors, 2018

A code protection scheme by process memory relocation for android devices.
Multim. Tools Appl., 2018

An extra-parity energy saving data layout for video surveillance.
Multim. Tools Appl., 2018

An authenticated asymmetric group key agreement based on attribute encryption.
J. Netw. Comput. Appl., 2018

A root privilege management scheme with revocable authorization for Android devices.
J. Netw. Comput. Appl., 2018

Building covert timing channels by packet rearrangement over mobile networks.
Inf. Sci., 2018

RootAgency: A digital signature-based root privilege management agency for cloud terminal devices.
Inf. Sci., 2018

An end-to-end covert channel via packet dropout for mobile networks.
Int. J. Distributed Sens. Networks, 2018

A Covert Channel Over VoLTE via Adjusting Silence Periods.
IEEE Access, 2018

Acquiring Hidden Space via Modifying Block Bitmap for Android Devices.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Maintaining Root via Custom Android Kernel Across Over-The-Air Upgrade.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Cryptographic key protection against FROST for mobile devices.
Clust. Comput., 2017

A VoLTE Encryption Experiment for Android Smartphones.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

A Code Self-Relocation Method for Embedded System.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

A Transparent Encryption Scheme of Video Data for Android Devices.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Determining image base of firmware for ARM devices by matching literal pools.
Digit. Investig., 2016

2015
Tuner and demodulator design of antenna control system.
Int. J. Wirel. Mob. Comput., 2015

The information hiding mechanism based on compressed document format.
Int. J. Comput. Sci. Math., 2015

Research on Bluetooth protocols based on Android kernel log.
Int. J. Comput. Sci. Math., 2015

Descrambling data on solid-state disks by reverse-engineering the firmware.
Digit. Investig., 2015

2014
An energy-efficient storage for video surveillance.
Multim. Tools Appl., 2014

Partially linear structure identification in generalized additive models with NP-dimensionality.
Comput. Stat. Data Anal., 2014

2013
Empirical and weighted conditional likelihoods for matched case-control studies with missing covariates.
J. Multivar. Anal., 2013

Design of satellite TV antenna control system for car carrying.
Int. J. Wirel. Mob. Comput., 2013

2012
Hybrid S-RAID: A Power-Aware Archival Storage Architecture.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

2011
Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups.
J. Comput., 2011

2010
A Method of Deduplication for Data Remote Backup.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010


  Loading...