关注
Yifan Yan
Yifan Yan
在 fudan.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Exploring the security boundary of data reconstruction via neuron exclusivity analysis
X Pan, M Zhang, Y Yan, J Zhu, Z Yang
31st USENIX Security Symposium (USENIX Security 22), 3989-4006, 2022
39*2022
Rethinking {White-Box} Watermarks on Deep Learning Models under Neural Structural Obfuscation
Y Yan, X Pan, M Zhang, M Yang
32nd USENIX Security Symposium (USENIX Security 23), 2347-2364, 2023
112023
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting
X Pan, Y Yan, M Zhang, M Yang
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and …, 2022
112022
Cracking white-box dnn watermarks via invariant neuron transforms
X Pan, M Zhang, Y Yan, Y Wang, M Yang
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and …, 2023
102023
Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains
X Pan, M Zhang, Y Yan, M Yang
Annual Computer Security Applications Conference (ACSAC), 634-645, 2021
92021
Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model
X Pan, Y Yan, S Zhang, M Zhang, M Yang
arXiv preprint arXiv:2206.14371, 2022
12022
House of Cans: Covert Transmission of Internal Datasets via Capacity-Aware Neuron Steganography
X Pan, S Zhang, M Zhang, Y Yan, M Yang
Advances in Neural Information Processing Systems 35, 24838-24850, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–7