Yansong Gao

Orcid: 0000-0001-5783-2172

According to our database1, Yansong Gao authored at least 109 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2024

On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses.
IEEE Trans. Inf. Forensics Secur., 2024

NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects.
CoRR, 2024

Sponge Attack Against Multi-Exit Networks With Data Poisoning.
IEEE Access, 2024

SegScope: Probing Fine-grained Interrupts via Architectural Footprints.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024

2023
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning.
Comput. Secur., October, 2023

MLMSA: Multilabel Multiside-Channel-Information Enabled Deep Learning Attacks on APUF Variants.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., September, 2023

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023

PPTA: A location privacy-preserving and flexible task assignment service for spatial crowdsourcing.
Comput. Networks, April, 2023

Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables.
IEEE Trans. Serv. Comput., 2023

APMSA: Adversarial Perturbation Against Model Stealing Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction.
IEEE Trans. Inf. Forensics Secur., 2023

Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses.
IEEE Trans. Dependable Secur. Comput., 2023

Wisecr: Secure Simultaneous Code Dissemination to Many Batteryless Computational RFID Devices.
IEEE Trans. Dependable Secur. Comput., 2023

FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
IEEE Trans. Dependable Secur. Comput., 2023

Evaluation of Federated Learning in Phishing Email Detection.
Sensors, 2023

Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys.
IACR Cryptol. ePrint Arch., 2023

Artificial Intelligence Security: Threats and Countermeasures.
ACM Comput. Surv., 2023

ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud.
CoRR, 2023

Horizontal Class Backdoor to Deep Learning.
CoRR, 2023

DeepTheft: Stealing DNN Model Architectures through Power Side Channel.
CoRR, 2023

One-to-Multiple Clean-Label Image Camouflage (OmClic) based Backdoor Attack on Deep Learning.
CoRR, 2023

Fast Diffusion Probabilistic Model Sampling through the lens of Backward Error Analysis.
CoRR, 2023

Imperceptible Sample-Specific Backdoor to DNN with Denoising Autoencoder.
CoRR, 2023

Vertical Federated Learning: Taxonomies, Threats, and Prospects.
CoRR, 2023

TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

PPA: Preference Profiling Attack Against Federated Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Orientation-based Feature Aggregation for Multi-Target Multi-Camera Tracking.
Proceedings of the 6th IEEE International Conference on Industrial Cyber-Physical Systems, 2023

CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
Dataset, June, 2022

VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
IEEE Trans. Inf. Forensics Secur., 2022

Design and Evaluate Recomposited OR-AND-XOR-PUF.
IEEE Trans. Emerg. Top. Comput., 2022

Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2022

TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs.
IEEE Trans. Dependable Secur. Comput., 2022

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022

Towards privacy-preserving and verifiable federated matrix factorization.
Knowl. Based Syst., 2022

Beyond the worst-case analysis of random priority: Smoothed and average-case approximation ratios in mechanism design.
Inf. Comput., 2022

Tracking Dataset IP Use in Deep Neural Networks.
CoRR, 2022

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
CoRR, 2022

MLMSA: Multi-Label Multi-Side-Channel-Information enabled Deep Learning Attacks on APUF Variants.
CoRR, 2022

MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning.
CoRR, 2022

CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences.
CoRR, 2022

On Scheduling Mechanisms Beyond the Worst Case.
CoRR, 2022

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
CoRR, 2022

Systematically Evaluation of Challenge Obfuscated APUFs.
CoRR, 2022

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022

A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM.
CoRR, 2022

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.
Comput. Secur., 2022

SEDML: Securely and efficiently harnessing distributed knowledge in machine learning.
Comput. Secur., 2022

Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation.
Comput. Secur., 2022

A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation.
Comput. Commun., 2022

Physical publicly verifiable randomness from pulsars.
Astron. Comput., 2022

SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Deep Reference Priors: What is the best way to pretrain a model?
Proceedings of the International Conference on Machine Learning, 2022

2021
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability.
IEEE Trans. Inf. Forensics Secur., 2021

Detecting Hardware-Assisted Virtualization With Inconspicuous Features.
IEEE Trans. Inf. Forensics Secur., 2021

SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices.
IEEE Trans. Dependable Secur. Comput., 2021

A free-energy principle for representation learning.
Mach. Learn. Sci. Technol., 2021

NTD: Non-Transferability Enabled Backdoor Detection.
CoRR, 2021

Design and Evaluate Recomposited OR-AND-XOR-PUF.
CoRR, 2021

Quantization Backdoors to Deep Learning Models.
CoRR, 2021

Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021

Wisecr: Secure Simultaneous Code Disseminationto Many Batteryless Computational RFID Devices.
CoRR, 2021

Token-Modification Adversarial Attacks for Natural Language Processing: A Survey.
CoRR, 2021

Security Evaluation of n-Choose-k-Sum PUFs Against Modeling Attacks.
IEEE Access, 2021

An Information-Geometric Distance on the Space of Tasks.
Proceedings of the 38th International Conference on Machine Learning, 2021

Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.
CoRR, 2020

VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT.
CoRR, 2020

FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning.
CoRR, 2020

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review.
CoRR, 2020

End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks.
Proceedings of the Information Systems Security - 16th International Conference, 2020

Side-Channel Leakage Detection Based on Constant Parameter Channel Model.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses.
IEEE Trans. Inf. Forensics Secur., 2019

Hash Functions and Benchmarks for Resource Constrained Passive Devices: A Preliminary Study.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Building Secure SRAM PUF Key Generators on Resource Constrained Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Average-case Analysis of the Assignment Problem with Independent Preferences.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

STRIP: a defence against trojan attacks on deep neural networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices.
Dataset, July, 2018

Security-Aware Proportional Fairness Resource Allocation for Cognitive Heterogeneous Networks.
IEEE Trans. Veh. Technol., 2018

PUF-FSM: A Controlled Strong PUF.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Efficient Erasable PUFs from Programmable Logic and Memristors.
IACR Cryptol. ePrint Arch., 2018

TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs.
CoRR, 2018

Lightweight (Reverse) Fuzzy Extractor with Multiple Referenced PUF Responses.
CoRR, 2018

2017
PUF Sensor: Exploiting PUF Unreliability for Secure Wireless Sensing.
IEEE Trans. Circuits Syst. I Regul. Pap., 2017

PUF-FSM: A Controlled Strong PUF.
CoRR, 2017

Exploiting PUF Models for Error Free Response Generation.
CoRR, 2017

Detecting Recycled Commodity SoCs: Exploiting Aging-Induced SRAM PUF Unreliability.
CoRR, 2017

R<sup>3</sup>PUF: A Highly Reliable Memristive Device based Reconfigurable PUF.
CoRR, 2017

Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication.
CoRR, 2017

A PUF sensor: Securing physical measurements.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Smoothed and Average-Case Approximation Ratios of Mechanisms: Beyond the Worst-Case Analysis.
Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science, 2017

2016
Read operation performance of large selectorless cross-point array with self-rectifying memristive device.
Integr., 2016

Emerging Physical Unclonable Functions With Nanotechnology.
IEEE Access, 2016

Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

2015
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs.
IACR Cryptol. ePrint Arch., 2015

Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality.
IACR Cryptol. ePrint Arch., 2015

Secure Key Exchange Protocol based on Virtual Proof of Reality.
IACR Cryptol. ePrint Arch., 2015

Future Large-Scale Memristive Device Crossbar Arrays: Limits Imposed by Sneak-Path Currents on Read Operations.
CoRR, 2015

mrPUF: A Novel Memristive Device Based Physical Unclonable Function.
Proceedings of the Applied Cryptography and Network Security, 2015

2013
Theoretical Framework of Technical Kinematics Evaluation Software.
Proceedings of the Information Computing and Applications - 4th International Conference, 2013


  Loading...