Yunjie Ge

Orcid: 0000-0001-6158-3180

According to our database1, Yunjie Ge authored at least 20 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
CoRR, 2024

Hijacking Attacks against Neural Networks by Analyzing Training Data.
CoRR, 2024

More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
Proceedings of the 33rd USENIX Security Symposium, 2024

Hijacking Attacks against Neural Network by Analyzing Training Data.
Proceedings of the 33rd USENIX Security Symposium, 2024

Enhancing the Transferability of Adversarial Examples with Noise Injection Augmentation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Data Poisoning and Backdoor Attacks on Audio Intelligence Systems.
IEEE Commun. Mag., December, 2023

AdvDDoS: Zero-Query Adversarial Attacks Against Commercial Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2023

An Efficient and Scalable Consensus for Main Blockchain in the Multi-Chain Network.
Proceedings of the International Conference on Networking and Network Applications, 2023

Adversarial Network Pruning by Filter Robustness Estimation.
Proceedings of the IEEE International Conference on Acoustics, 2023

Improving Adversarial Transferability with Ghost Samples.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

2022
WaveFuzz: A Clean-Label Poisoning Attack to Protect Your Voice.
CoRR, 2022

A Few Seconds Can Change Everything: Fast Decision-based Attacks against DNNs.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

2021
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System.
CoRR, 2020

Smart Contract-based Computing ResourcesTrading in Edge Computing.
CoRR, 2020

Smart Contract-based Computing Resources Trading in Edge Computing.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

2019
Data Mining-Based Ethereum Fraud Detection.
Proceedings of the IEEE International Conference on Blockchain, 2019


  Loading...