Anli Yan

Orcid: 0000-0002-2854-2931

According to our database1, Anli Yan authored at least 28 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Are you copying my prompt? Protecting the copyright of vision prompt for VPaaS via watermarking.
Comput. Stand. Interfaces, 2025

Distraction is All You Need for Multimodal Large Language Model Jailbreaking.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

2024
Bag of tricks for backdoor learning.
Wirel. Networks, November, 2024

Defenses to Membership Inference Attacks: A Survey.
ACM Comput. Surv., April, 2024

MTL-Leak: Privacy Risk Assessment in Multi-Task Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark.
CoRR, 2024

Explanation-Guided Adversarial Example Attacks.
Big Data Res., 2024

In-Context Learning with Differentially Private Text Sanitization in Large Language Models.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

Zero-Shot Dense Retrieval Based on Query Expansion.
Proceedings of the Artificial Intelligence Security and Privacy, 2024

2023
Explanation-based data-free model extraction attacks.
World Wide Web (WWW), September, 2023

Holistic Implicit Factor Evaluation of Model Extraction Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Explanation leaks: Explanation-guided model extraction attacks.
Inf. Sci., 2023

GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification.
CoRR, 2023

Zeroth-Order Gradient Approximation Based DaST for Black-Box Adversarial Attacks.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

2022
Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough.
Inf. Sci., 2022

Towards explainable model extraction attacks.
Int. J. Intell. Syst., 2022

DPCL: Contrastive representation learning with differential privacy.
Int. J. Intell. Syst., 2022

Kernel-based adversarial attacks and defenses on support vector classification.
Digit. Commun. Networks, 2022

Explanation-Guided Minimum Adversarial Attack.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Towards Differentially Private Contrastive Learning.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Detect Adversarial Examples by Using Feature Autoencoder.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Effective detection of mobile malware behavior based on explainable deep neural network.
Neurocomputing, 2021

Querying little is enough: Model inversion attack via latent information.
Int. J. Intell. Syst., 2021

IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

2020
Towards Privacy-Preserving Aggregated Prediction from SPDZ.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

2018
Neural Network Rule Extraction for Real Time Traffic Behavior Identification.
Proceedings of the 2018 International Conference on Security, 2018

TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline.
Proceedings of the 2018 International Conference on Security, 2018


  Loading...