Yihao Huang

Orcid: 0000-0002-5784-770X

Affiliations:
  • East China Normal University, Shanghai Key Lab of Trustworthy Computing, China


According to our database1, Yihao Huang authored at least 34 papers between 2019 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Natural & Adversarial Bokeh Rendering via Circle-of-Confusion Predictive Network.
IEEE Trans. Multim., 2024

CosalPure: Learning Concept from Group Images for Robust Co-Saliency Detection.
CoRR, 2024

MIP: CLIP-based Image Reconstruction from PEFT Gradients.
CoRR, 2024

RUNNER: Responsible UNfair NEuron Repair for Enhancing Deep Neural Network Fairness.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
AdapterFL: Adaptive Heterogeneous Federated Learning for Resource-constrained Mobile Computing Systems.
CoRR, 2023

Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation.
CoRR, 2023

Towards Better Fairness-Utility Trade-off: A Comprehensive Measurement-Based Reinforcement Learning Framework.
CoRR, 2023

FREPA: An Automated and Formal Approach to Requirement Modeling and Analysis in Aircraft Control Domain.
CoRR, 2023

On the Robustness of Segment Anything.
CoRR, 2023

Architecture-agnostic Iterative Black-box Certified Defense against Adversarial Patches.
CoRR, 2023

FedMR: Federated Learning via Model Recombination.
CoRR, 2023

Zero-Day Backdoor Attack against Text-to-Image Diffusion Models via Personalization.
CoRR, 2023

GitFL: Uncertainty-Aware Real-Time Asynchronous Federated Learning Using Version Control.
Proceedings of the IEEE Real-Time Systems Symposium, 2023

ALA: Naturalness-aware Adversarial Lightness Attack.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Evading DeepFake Detectors via Adversarial Statistical Consistency.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
FakeLocator: Robust Localization of GAN-Based Face Manipulations.
IEEE Trans. Inf. Forensics Secur., 2022

Countering Malicious DeepFakes: Survey, Battleground, and Horizon.
Int. J. Comput. Vis., 2022

GitFL: Adaptive Asynchronous Federated Learning using Version Control.
CoRR, 2022

FedCross: Towards Accurate Federated Learning via Multi-Model Cross Aggregation.
CoRR, 2022

ALA: Adversarial Lightness Attack via Naturalness-aware Regularizations.
CoRR, 2022

Masked Faces with Faced Masks.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

2021
AdvBokeh: Learning to Adversarially Defocus Blur.
CoRR, 2021

AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

2020
FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise.
CoRR, 2020

FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles.
CoRR, 2020

FREPA: an automated and formal approach to requirement modeling and analysis in aircraft control domain.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Amora: Black-box Adversarial Morphing Attack.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

2019
Amora: Black-box Adversarial Morphing Attack.
CoRR, 2019

Prema: A Tool for Precise Requirements Editing, Modeling and Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

A Domain Experts Centric Approach to Formal Requirements Modeling and V&V of Embedded Control Software.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019


  Loading...