Yun Shen

Orcid: 0000-0002-5215-2976

According to our database1, Yun Shen authored at least 143 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Two-Layer Dynamic ECU Group Management Scheme for In-Vehicle CAN Bus.
IEEE Trans. Intell. Transp. Syst., August, 2024

A Multilevel Electronic Control Unit Re-Encryption Scheme for Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., January, 2024

NeFF: Neural Feature Fields for Few-Shot View Synthesis Addressing the Shape-Radiance Ambiguity.
IEEE Signal Process. Lett., 2024

Breaking Agents: Compromising Autonomous LLM Agents Through Malfunction Amplification.
CoRR, 2024

Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization.
CoRR, 2024

Instruction Backdoor Attacks Against Customized LLMs.
Proceedings of the 33rd USENIX Security Symposium, 2024

Quantifying Privacy Risks of Prompts in Visual Prompt Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024

You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Test-Time Poisoning Attacks Against Test-Time Adaptation Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Composite Backdoor Attacks Against Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024

Unsupervised Learning of Facial Optical Flow via Occlusion-Aware Global-Local Matching.
Proceedings of the IEEE International Conference on Acoustics, 2024

Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Driveable 3D Human Reconstruction Focusing on Facial Precision Enhancement.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024

Overview and Trend of Large-scale Model Deployment Mode.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024

Human Model Reconstruction with Facial Region Optimization: A Fusion Nerf Approach.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024

Research on Multi-level Trustworthy Multimedia Data Broadcasting Network Based on Blockchain Oracles.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024

Research on New Media Digital Copyright Registration and Trading Based on Blockchain.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024

FAKEPCD: Fake Point Cloud Detection via Source Attribution.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Exploiting UAV for Air-Ground Integrated Federated Learning: A Joint UAV Location and Resource Optimization Approach.
IEEE Trans. Green Commun. Netw., September, 2023

Joint Training and Resource Allocation Optimization for Federated Learning in UAV Swarm.
IEEE Internet Things J., February, 2023

Comprehensive Assessment of Toxicity in ChatGPT.
CoRR, 2023

On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts.
CoRR, 2023

Prompt Backdoors in Visual Prompt Learning.
CoRR, 2023

Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models.
CoRR, 2023

Watermarking Diffusion Model.
CoRR, 2023

A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots.
Proceedings of the 32nd USENIX Security Symposium, 2023

One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles.
Proceedings of the 32nd USENIX Security Symposium, 2023

Backdoor Attacks Against Dataset Distillation.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Generated Graph Detection.
Proceedings of the International Conference on Machine Learning, 2023

Adaptive Resource Allocation Based on Scoring Mechanism and Priority for 3D rendering.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

Research on 3D Driveable Digital Human Generation System.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

Research on 3D Object Reconstruction Based on Single-view RGB Image.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

Edge Fusion of Intelligent Industrial Park Based on MatrixOne and Pravega.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

A Design of Edge Distributed Video Analysis System Based on Serverless Computing Service.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

Computing Offloading Based on Deep Reinforcement Learning For Virtual Reality Scene.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

An Intelligent Industrial Vision Scheme for Flexible Manufacturing Based on 5G Edge Cloud Collaboration.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

An Adaptive Video Streaming Delivery Structure based on Mobile Edge Intelligent.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

Optimization of VR Video Wireless Transmission Based on Fountain Code.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

Resource Pre-caching Strategy of Digital Twin System Based on Hierarchical MEC Architecture.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

Deployment Strategy of Edge Computing Server for 3D Video Transmission in Digital Twin Cities.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

Federated Learning Model Training Mechanism with Edge Cloud Collaboration for Services in Smart Cities.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

2022
Gradient boosting survival tree with applications in credit scoring.
J. Oper. Res. Soc., 2022

Backdoor Attacks in the Supply Chain of Masked Image Modeling.
CoRR, 2022

A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned.
Proceedings of the 31st USENIX Security Symposium, 2022

Inference Attacks Against Graph Neural Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

Design and Implementation of Distributed Rendering System.
Proceedings of the IEEE Smartworld, 2022

Model Stealing Attacks Against Inductive Graph Neural Networks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Amplifying Membership Exposure via Data Poisoning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Towards Understanding the Robustness Against Evasion Attack on Categorical Data.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Finding MNEMON: Reviving Memories of Node Embeddings.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

CERBERUS: Exploring Federated Prediction of Security Events.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

On the Privacy Risks of Cell-Based NAS Architectures.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

5G and F5G Converged Network Architecture for Fusion System of Video and 3D Model in Intelligent Park.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022

Fine-grained object tracking system infrastructure based on cloud-edge collaboration.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022

Multimedia Analytics Based On Air-assisted Vehicle Network In Smart City.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022

A QoE-driven Adaptive Transmission Scheme for Streaming Media Service.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022

An Algorithm of Emotion Recognition And Valence of Drivers on Multimodal Data.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022

Edge-to-Cloud Intelligent Vehicle-Infrastructure Based on 5G Time-Sensitive Network Integration.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022

2021
UAVs as an Intelligent Service: Boosting Edge Intelligence for Air-Ground Integrated Networks.
IEEE Netw., 2021

Node-Level Membership Inference Attacks Against Graph Neural Networks.
CoRR, 2021

JABBIC Lookups: A Backend Telemetry-Based System for Malware Triage.
Proceedings of the Security and Privacy in Communication Networks, 2021

Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Understanding Worldwide Private Information Collection on Android.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Industrial Vision Optimization Distributed Strategy based on Edge Intelligence Collaboration.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Industrial Intelligent Edge Computing System based on 5G.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Stock Trend Prediction of Communication Industry Based on LSTM Neural Network Algorithm and Research of Industry Development Strategy: - A Case Study of Zhongxing Telecommunication Equipment Corporation.
Proceedings of the ICCMB 2021: The 4th International Conference on Computers in Management and Business, Singapore, 30 January, 2021, 2021

Pragmatic Benchmarking for Research Computing.
Proceedings of the 2021 IEEE High Performance Extreme Computing Conference, 2021

Joint UAV Location and Resource Allocation for Air-Ground Integrated Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2021

ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
A reference map of the human binary protein interactome.
Nat., 2020

Empowering the Edge Intelligence by Air-Ground Integrated Federated Learning in 6G Networks.
CoRR, 2020

UAVs as a Service: Boosting Edge Intelligence for Air-Ground Integrated Networks.
CoRR, 2020

Attackability Characterization of Adversarial Evasion Attack on Discrete Data.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

The Tangled Genealogy of IoT Malware.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Water Temperature Observation by Coastal Acoustic Tomography in Artificial Upwelling Area.
Sensors, 2019

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization.
Proceedings of the International Joint Conference on Neural Networks, 2019

Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

IoT Security and Privacy Labels.
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019

2018
Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Multi-label Learning with Highly Incomplete Data via Collaborative Embedding.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Tiresias: Predicting Security Events Through Deep Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
SparseLoc: Indoor Localization Using Sparse Representation.
IEEE Access, 2017

Accurate cyber-physical system simulation for distributed visual search applications.
Proceedings of the 3rd IEEE International Forum on Research and Technologies for Society and Industry, 2017

Mixed Installation to Optimize the Position and Type Selection of Turbines for Wind Farms.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Towards Deeper Insights into Deep Learning from Imbalanced Data.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

Marmite: Spreading Malicious File Reputation Through Download Graphs.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Mini-Batch Spectral Clustering.
CoRR, 2016

Insights into rooted and non-rooted Android mobile devices with behavior analytics.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Accurate spear phishing campaign attribution and early detection.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Partially Supervised Graph Embedding for Positive Unlabelled Feature Selection.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2015
Quality of Experience Study on Dynamic Adaptive Streaming Based on HTTP.
IEICE Trans. Commun., 2015

Accelerating Support Vector Machine Learning with GPU-Based MapReduce.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

All your Root Checks are Belong to Us: The Sad State of Root Detection.
Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access, 2015

A Method of Traffic Travel Status Segmentation Based on Position Trajectories.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

2014
Risk-Sensitive Reinforcement Learning.
Neural Comput., 2014

Study of collective user behaviour in Twitter: a fuzzy approach.
Neural Comput. Appl., 2014

A Software Platform Design for Objective Video QoE Assessment.
J. Softw., 2014

A Novel Structure of HTTP Adaptive Streaming Based on Unequal Error Protection Rateless Code.
IEICE Trans. Inf. Syst., 2014

Maximum achievable arrival rate of secondary users under GoS constraints in cognitive radio networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

A method of QoE evaluation for adaptive streaming based on bitrate distribution.
Proceedings of the IEEE International Conference on Communications, 2014

Bandwidth estimation of rate adaption algorithm in DASH.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

Risk-averse reinforcement learning for algorithmic trading.
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2014

A unified framework for risk-sensitive Markov control processes.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

An intelligent video streaming delivery of SVC based on rateless UEP convolutional code.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
Risk-Sensitive Markov Control Processes.
SIAM J. Control. Optim., 2013

Construction of approximation spaces for reinforcement learning.
J. Mach. Learn. Res., 2013

Performance Evaluation and Accuracy Upgrading of PESQ in Chinese Environment.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

A study on Quality of Experience for adaptive streaming service.
Proceedings of the IEEE International Conference on Communications, 2013

2012
Enhancing privacy in cloud computing via policy-based obfuscation.
J. Supercomput., 2012

QoE-based evaluation model on video streaming service quality.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Large-scale multimedia data mining using MapReduce framework.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Evaluation of XPath queries with preducates: an Eulerian cycle theory based sequencing approach.
Comput. Syst. Sci. Eng., 2011

A Unified Framework for Risk-sensitive Markov Decision Processes with Finite State and Action Spaces
CoRR, 2011

2010
Discovery of time-varying relations using fuzzy formal concept analysis and associations.
Int. J. Intell. Syst., 2010

Context-Aware Privacy Design Pattern Selection.
Proceedings of the Trust, 2010

Soft Concept Hierarchies to Summarise Data Streams and Highlight Anomalous Changes.
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications, 2010

Intelligent user search behaviour knowledge discovery.
Proceedings of the FUZZ-IEEE 2010, 2010

Text fragment extraction using incremental evolving fuzzy grammar fragments learner.
Proceedings of the FUZZ-IEEE 2010, 2010

2009
Order Independent Incremental Evolving Fuzzy Grammar Fragment Learner.
Proceedings of the Ninth International Conference on Intelligent Systems Design and Applications, 2009

Minimal Combination for Incremental Grammar Fragment Learning.
Proceedings of the Joint 2009 International Fuzzy Systems Association World Congress and 2009 European Society of Fuzzy Logic and Technology Conference, 2009

Data Integration, Approximate Categorisation and Fuzzy Associations.
Proceedings of the Joint 2009 International Fuzzy Systems Association World Congress and 2009 European Society of Fuzzy Logic and Technology Conference, 2009

A Privacy Manager for Cloud Computing.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Data Protection-Aware Design for Cloud Services.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

mTRACK - Monitoring time-varying relations in approximately categorised knowledge.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Intelligent Security Data Analysis.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Fuzzy Association Rules to Summarise Multiple Taxonomies in Large Databases.
Proceedings of the Scalable Fuzzy Algorithms for Data Management and Analysis, 2009

2008
Incremental Evolution of Fuzzy Grammar Fragments to Enhance Instance Matching and Text Mining.
IEEE Trans. Fuzzy Syst., 2008

Granular Association Rules for Multiple Taxonomies: A Mass Assignment Approach.
Proceedings of the Uncertainty Reasoning for the Semantic Web I, 2008

Automated semantic tagging using fuzzy grammar fragments.
Proceedings of the FUZZ-IEEE 2008, 2008

Granular Association Analysis.
Proceedings of the 2008 ECSIS Symposium on Bio-inspired, 2008

2007
A Mass Assignment Approach to Granular Association Rules for Multiple Taxonomies.
Proceedings of the Third ISWC Workshop on Uncertainty Reasoning for the Semantic Web Busan, 2007

Finding Soft Relations in Granular Information Hierarchies.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Computational Intelligence Support for Smart Queries and Adaptive Data.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

2005
Accelerating data retrieval steps in XML documents.
PhD thesis, 2005

Improving Access to Multimedia Using Multi-source Hierarchical Meta-data.
Proceedings of the Adaptive Multimedia Retrieval: User, 2005

Efficient XPath Evaluation.
Proceedings of the Advances in Databases and Information Systems, 2005

2004
A Self-adaptive Scope Allocation Scheme for Labeling Dynamic XML Documents.
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004

2003
Clustering Schemaless XML Documents.
Proceedings of the On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE, 2003

2000
Multi-slice helical CT: scan and image temporal resolution.
IEEE Trans. Medical Imaging, 2000


  Loading...