Yuwen Pu

Orcid: 0000-0003-2311-4943

According to our database1, Yuwen Pu authored at least 30 papers between 2018 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
AdversaFlow: Visual Red Teaming for Large Language Models with Multi-Level Adversarial Flow.
IEEE Trans. Vis. Comput. Graph., January, 2025

2024
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space.
IEEE Trans. Inf. Forensics Secur., 2024

CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models.
CoRR, 2024

CAMH: Advancing Model Hijacking Attack in Machine Learning.
CoRR, 2024

Enhancing Adversarial Transferability with Adversarial Weight Tuning.
CoRR, 2024

Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective.
CoRR, 2024

A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning.
CoRR, 2024

How to Train a Backdoor-Robust Model on a Poisoned Dataset without Auxiliary Data?
CoRR, 2024

SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems.
CoRR, 2024

The Risk of Federated Learning to Skew Fine-Tuning Features and Underperform Out-of-Distribution Robustness.
CoRR, 2024

Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Protecting Object Detection Models from Model Extraction Attack via Feature Space Coverage.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

<i>SUB-PLAY: </i> Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Integer Is Enough: When Vertical Federated Learning Meets Rounding.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

MEAOD: Model Extraction Attack against Object Detectors.
CoRR, 2023

Facial Data Minimization: Shallow Model as Your Privacy Filter.
CoRR, 2023

TextDefense: Adversarial Text Detection based on Word Importance Entropy.
CoRR, 2023

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning.
CoRR, 2022

Hijack Vertical Federated Learning Models with Adversarial Embedding.
CoRR, 2022

"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
An efficient blockchain-based privacy preserving scheme for vehicular social networks.
Inf. Sci., 2020

R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme.
IEEE Internet Things J., 2020

Secure and Efficient Data Collection and Storage of IoT in Smart Ocean.
IEEE Internet Things J., 2020

A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

2019
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT.
Wirel. Commun. Mob. Comput., 2019

An Efficient and Recoverable Data Sharing Mechanism for Edge Storage.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

2018
An Efficient Privacy-Preserving Data Aggregation Scheme for IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018


  Loading...