Yihua Zhang

Orcid: 0000-0002-1567-5444

According to our database1, Yihua Zhang authored at least 47 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Power of Few: Accelerating and Enhancing Data Reweighting with Coreset Selection.
CoRR, 2024

How does promoting the minority fraction affect generalization? A theoretical study of the one-hidden-layer neural network on group imbalance.
CoRR, 2024

UnlearnCanvas: A Stylized Image Dataset to Benchmark Machine Unlearning for Diffusion Models.
CoRR, 2024

Revisiting Zeroth-Order Optimization for Memory-Efficient LLM Fine-Tuning: A Benchmark.
CoRR, 2024

2023
Visual Prompting Upgrades Neural Network Sparsification: A Data-Model Perspective.
CoRR, 2023

SalUn: Empowering Machine Unlearning via Gradient-based Weight Saliency in Both Image Classification and Generation.
CoRR, 2023

To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Unsafe Images ... For Now.
CoRR, 2023

DeepZero: Scaling up Zeroth-Order Optimization for Deep Model Training.
CoRR, 2023

An Introduction to Bi-level Optimization: Foundations and Applications in Signal Processing and Machine Learning.
CoRR, 2023

Selectivity Drives Productivity: Efficient Dataset Pruning for Enhanced Transfer Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Linearly Constrained Bilevel Optimization: A Smoothed Implicit Gradient Approach.
Proceedings of the International Conference on Machine Learning, 2023

What Is Missing in IRM Training and Evaluation? Challenges and Solutions.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

TextGrad: Advancing Robustness Evaluation in NLP by Gradient-Driven Optimization.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Robust Mixture-of-Expert Training for Convolutional Neural Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Robustness-Preserving Lifelong Learning Via Dataset Condensation.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Understanding and Improving Visual Prompting: A Label-Mapping Perspective.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Distributed adversarial training to robustify deep neural networks at scale.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Fairness Reprogramming.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Advancing Model Pruning via Bi-level Optimization.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Revisiting and Advancing Fast Adversarial Training Through The Lens of Bi-Level Optimization.
Proceedings of the International Conference on Machine Learning, 2022

Considering the Community of Inquiry Framework in Online Engineering Education.
Proceedings of the IEEE Frontiers in Education Conference, 2022

Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2020
A 16Gb/s Triple-Mode Driver in 0.18μm CMOS Technology.
Proceedings of the 2020 IEEE International Conference on Integrated Circuits, 2020

2019
Low-Noise Broadband CMOS TIA Based on Multi-Stage Stagger-Tuned Amplifier for High-Speed High-Sensitivity Optical Communication.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019

Bead Strand Model: a high-efficiency storage structure for self-destructing data in cloud environment.
Serv. Oriented Comput. Appl., 2019

Candidate gene prioritization for non-communicable diseases based on functional information: Case studies.
J. Biomed. Informatics, 2019

A Stacked 4×25 Gb/s Optical Receiver in 28 nm CMOS with 0.154 mW/Gb/s Power Efficiency.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2019

2018
Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler.
ACM Trans. Priv. Secur., 2018

Low-Noise High-Linearity 56Gb/s PAM-4 Optical Receiver in 45nm SOI CMOS.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

Research on Interaction Modeling of Cross-border E-commerce and Import and Export Trade.
Proceedings of the 2nd International Conference on Software and e-Business, 2018

2017
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation.
IACR Cryptol. ePrint Arch., 2017

2016
Efficient Dynamic Provable Possession of Remote Data via Update Trees.
ACM Trans. Storage, 2016

A modeling method of customized brackets and individualized trays for orthodontic treatment.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
Secure distributed genome analysis for GWAS and sequence comparison computation.
BMC Medical Informatics Decis. Mak., December, 2015

2014
Effective Virtual Screening Strategy toward Covalent Ligands: Identification of Novel NEDD8-Activating Enzyme Inhibitors.
J. Chem. Inf. Model., 2014

Efficient Secure and Verifiable Outsourcing of Matrix Multiplications.
IACR Cryptol. ePrint Arch., 2014

2013
Secure and verifiable outsourcing of large-scale biometric computations.
ACM Trans. Inf. Syst. Secur., 2013

Research of Weeds Classification System Based on Shape Feature.
J. Softw., 2013

PICCO: a general-purpose compiler for private distributed computation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Efficient dynamic provable possession of remote data via balanced update trees.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Secure Computation on Floating Point Numbers.
IACR Cryptol. ePrint Arch., 2012

2011
Design of Automatic Mapping System between DDC and CLC.
Proceedings of the Digital Libraries: For Cultural Heritage, Knowledge Dissemination, and Future Creation, 2011

2010
Confidentiality and Integrity for SUM Aggregation in Sensor Networks.
Proceedings of the SECRYPT 2010, 2010

Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

2008
Yet another privacy metric for publishing micro-data.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

2000
An algorithm for VLSI implementation of highly efficient cubic-polynomial evaluation.
Proceedings of ASP-DAC 2000, 2000


  Loading...