Yu-an Tan

Orcid: 0000-0001-6404-8853

Affiliations:
  • Beijing Institute of Technology, School of Computer Science and Technology, China


According to our database1, Yu-an Tan authored at least 90 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.
Cybersecur., December, 2024

Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding.
IEEE Trans. Artif. Intell., January, 2024

Dynamic fuzz testing of UAV configuration parameters based on dual guidance of fitness and coverage.
Connect. Sci., 2024

Towards Transferable Adversarial Attacks with Centralized Perturbation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration.
J. Ambient Intell. Humaniz. Comput., October, 2023

Improving the invisibility of adversarial examples with perceptually adaptive perturbation.
Inf. Sci., July, 2023

Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things.
IEEE Trans. Ind. Informatics, June, 2023

Clean-label poisoning attacks on federated learning for IoT.
Expert Syst. J. Knowl. Eng., June, 2023

Building Covert Timing Channel of the IoT-Enabled MTS Based on Multi-Stage Verification.
IEEE Trans. Intell. Transp. Syst., February, 2023

Edge-Cloud Collaborative Defense against Backdoor Attacks in Federated Learning.
Sensors, February, 2023

Stealthy and Flexible Trojan in Deep Learning Framework.
IEEE Trans. Dependable Secur. Comput., 2023

Towards interpreting vulnerability of object detection models via adversarial distillation.
J. Inf. Secur. Appl., 2023

A group key exchange and secure data sharing based on privacy protection for federated learning in edge-cloud collaborative computing environment.
Int. J. Netw. Manag., 2023

Unified High-binding Watermark for Unconditional Image Generation Models.
CoRR, 2023

Concealed Electronic Countermeasures of Radar Signal with Adversarial Examples.
CoRR, 2023

Towards Invisible Backdoor Attacks in the Frequency Domain against Deep Neural Networks.
CoRR, 2023

Stealthy Low-frequency Backdoor Attack against Deep Neural Networks.
CoRR, 2023

A Stealth Security Hardening Method Based on SSD Firmware Function Extension.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2022
Toward feature space adversarial attack in the frequency domain.
Int. J. Intell. Syst., December, 2022

Boosting cross-task adversarial attack with random blur.
Int. J. Intell. Syst., 2022

A fine-grained and traceable multidomain secure data-sharing model for intelligent terminals in edge-cloud collaboration scenarios.
Int. J. Intell. Syst., 2022

Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers.
CoRR, 2022

l-Leaks: Membership Inference Attacks with Logits.
CoRR, 2022

Improving the Transferability of Adversarial Examples with Restructure Embedded Patches.
CoRR, 2022

Boosting Adversarial Transferability of MLP-Mixer.
CoRR, 2022

Decision-based Black-box Attack Against Vision Transformers via Patch-wise Adversarial Removal.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Enhancing the Transferability of Adversarial Examples with Random Patch.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

2021
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers.
Mob. Networks Appl., 2021

Towards a physical-world adversarial patch for blinding object detection models.
Inf. Sci., 2021

Hybrid sequence-based Android malware detection using natural language processing.
Int. J. Intell. Syst., 2021

Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things.
Int. J. Intell. Syst., 2021

Deep learning feature exploration for Android malware detection.
Appl. Soft Comput., 2021

Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Code Decoupling Execution Isolating Based on TF Card Firmware Extension.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Software Misconfiguration Troubleshooting Based on State Analysis.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

On-line Firmware Updating and Fingerprint Generating for Solid State Disks.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement Learning.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

A Random Multi-target Backdooring Attack on Deep Neural Networks.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

2020
A Robust Packet-Dropout Covert Channel over Wireless Networks.
IEEE Wirel. Commun., 2020

An Android Inline Hooking Framework for the Securing Transmitted Data.
Sensors, 2020

An adversarial attack on DNN-based black-box object detectors.
J. Netw. Comput. Appl., 2020

A feature-vector generative adversarial network for evading PDF malware classifiers.
Inf. Sci., 2020

A VirtualXposed-Based Inline Hooking Framework for Android Native Methods.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Two-Way Feature-Aligned And Attention-Rectified Adversarial Training.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

2019
A sensitive network jitter measurement for covert timing channels over interactive traffic.
Multim. Tools Appl., 2019

The security of machine learning in an adversarial setting: A survey.
J. Parallel Distributed Comput., 2019

A packet-reordering covert channel over VoLTE voice and video traffics.
J. Netw. Comput. Appl., 2019

A fault-tolerant and energy-efficient continuous data protection system.
J. Ambient Intell. Humaniz. Comput., 2019

Secure Multi-Party Computation: Theory, practice and applications.
Inf. Sci., 2019

Detecting adversarial examples via prediction difference for deep neural networks.
Inf. Sci., 2019

Optimizing the restoration performance of deduplication systems through an energy-saving data layout.
Ann. des Télécommunications, 2019

A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images.
IEEE Access, 2019

2018
An Efficient Identity-Based Proxy Blind Signature for Semioffline Services.
Wirel. Commun. Mob. Comput., 2018

Covert Timing Channels for IoT over Mobile Networks.
IEEE Wirel. Commun., 2018

DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage.
IEEE Trans. Circuits Syst. Video Technol., 2018

An optimized data hiding scheme for Deflate codes.
Soft Comput., 2018

An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Sensors, 2018

A code protection scheme by process memory relocation for android devices.
Multim. Tools Appl., 2018

An extra-parity energy saving data layout for video surveillance.
Multim. Tools Appl., 2018

A root privilege management scheme with revocable authorization for Android devices.
J. Netw. Comput. Appl., 2018

Building packet length covert channel over mobile VoIP traffics.
J. Netw. Comput. Appl., 2018

Building covert timing channels by packet rearrangement over mobile networks.
Inf. Sci., 2018

RootAgency: A digital signature-based root privilege management agency for cloud terminal devices.
Inf. Sci., 2018

A payload-dependent packet rearranging covert channel for mobile VoIP traffic.
Inf. Sci., 2018

An end-to-end covert channel via packet dropout for mobile networks.
Int. J. Distributed Sens. Networks, 2018

Cross-cluster asymmetric group key agreement for wireless sensor networks.
Sci. China Inf. Sci., 2018

A Covert Channel Over VoLTE via Adjusting Silence Periods.
IEEE Access, 2018

A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application.
IEEE Access, 2018

2017
A methodology for determining the image base of ARM-based industrial control system firmware.
Int. J. Crit. Infrastructure Prot., 2017

A round-optimal lattice-based blind signature scheme for cloud services.
Future Gener. Comput. Syst., 2017

Cryptographic key protection against FROST for mobile devices.
Clust. Comput., 2017

An Anti-Forensics Method against Memory Acquiring for Android Devices.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Determining Image Base of Firmware Files for ARM Devices.
IEICE Trans. Inf. Syst., 2016

Determining image base of firmware for ARM devices by matching literal pools.
Digit. Investig., 2016

2015
Tuner and demodulator design of antenna control system.
Int. J. Wirel. Mob. Comput., 2015

Research on Bluetooth protocols based on Android kernel log.
Int. J. Comput. Sci. Math., 2015

Descrambling data on solid-state disks by reverse-engineering the firmware.
Digit. Investig., 2015

2014
An energy-efficient storage for video surveillance.
Multim. Tools Appl., 2014

2013
Design of satellite TV antenna control system for car carrying.
Int. J. Wirel. Mob. Comput., 2013

2012
Identification of NAND flash ECC algorithms in mobile devices.
Digit. Investig., 2012

Energy Aware Data Layout for De-duplication System.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

2011
A Method of Object-based De-duplication.
J. Networks, 2011

Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups.
J. Comput., 2011

An Improved Cross-Domain Role-Based Authorization Management Model.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

A RBAC Model Based on Multi-granularities of Time Constraints.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2010
A Method of Deduplication for Data Remote Backup.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

2009
Group-caching for NoC based multicore cache coherent systems.
Proceedings of the Design, Automation and Test in Europe, 2009

2007
Research on Customer Classification in E-Supermarket by Using Modified Fuzzy Neural Networks.
Proceedings of the Advances in Neural Networks, 2007

A Collaborative Teaching Approach Using Integrated Electronic Environments for Information Security.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
An Improved Multi-agent Approach for Solving Large Traveling Salesman Problem.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006


  Loading...