Yang Zhang

According to our database1, Yang Zhang authored at least 39 papers between 2015 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models.
CoRR, 2020

Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning.
CoRR, 2020

BadNL: Backdoor Attacks Against NLP Models.
CoRR, 2020

When Machine Unlearning Jeopardizes Privacy.
CoRR, 2020

Stealing Links from Graph Neural Networks.
CoRR, 2020

Dynamic Backdoor Attacks Against Machine Learning Models.
CoRR, 2020

Everything About You: A Multimodal Approach towards Friendship Inference in Online Social Networks.
CoRR, 2020

Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
Proceedings of the 29th USENIX Security Symposium, 2020

Towards Plausible Graph Anonymization.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
CoRR, 2019

Language in Our Time: An Empirical Analysis of Hashtags.
Proceedings of the World Wide Web Conference, 2019

A Graph-Based Approach to Explore Relationship Between Hashtags and Images.
Proceedings of the Web Information Systems Engineering - WISE 2019, 2019

ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Fairwalk: Towards Fair Graph Embedding.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
CoRR, 2018

ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
CoRR, 2018

Tagvisor: A Privacy Advisor for Sharing Hashtags.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

You Are Where You App: An Assessment on Location Privacy of Social Applications.
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018

Dissecting Privacy Risks in Biomedical Data.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
CTRL+Z: Recovering Anonymized Social Graphs.
CoRR, 2017

Does #like4like indeed provoke more likes?
Proceedings of the International Conference on Web Intelligence, 2017

DeepCity: A Feature Learning Framework for Mining Location Check-Ins.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Quantifying Location Sociality.
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017

Semantic Annotation for Places in LBSN through Graph Embedding.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

walk2friends: Inferring Social Links from Mobility Profiles.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
On Impact of Weather on Human Mobility in Cities.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

An Empirical Study on User Access Control in Online Social Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

2015
A new access control scheme for Facebook-style social networks.
Comput. Secur., 2015

Exploring Communities for Effective Location Prediction.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

A Logical Approach to Restricting Access in Online Social Networks.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Community-Driven Social Influence Analysis and Applications.
Proceedings of the Engineering the Web in the Big Data Era - 15th International Conference, 2015

Location Prediction: Communities Speak Louder than Friends.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Cryptographic Protocols for Enforcing Relationship-Based Access Control Policies.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Inferring Friendship from Check-in Data of Location-Based Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Distance and Friendship: A Distance-Based Model for Link Prediction in Social Networks.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Event Prediction with Community Leaders.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015


  Loading...