Yufei Chen

Orcid: 0000-0003-3786-928X

Affiliations:
  • City University of Hong Kong, Department of Computer Science, Hong Kong
  • Xi'an Jiao Tong University, Key Laboratoryfor Intelligent Networks and Network Security, China


According to our database1, Yufei Chen authored at least 25 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Intellectual property protection of DNN models.
World Wide Web (WWW), July, 2023

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
IEEE Trans. Dependable Secur. Comput., 2023

Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process.
CoRR, 2023

CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Teacher Model Fingerprinting Attacks Against Transfer Learning.
Proceedings of the 31st USENIX Security Symposium, 2022

Amplifying Membership Exposure via Data Poisoning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Property Inference Attacks Against GANs.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications.
IEEE Trans. Dependable Secur. Comput., 2021

When Deep Learning Meets Differential Privacy: Privacy, Security, and More.
IEEE Netw., 2021

2020
Toward Hand-Dominated Activity Recognition Systems With Wristband-Interaction Behavior Analysis.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System.
IEEE Trans. Dependable Secur. Comput., 2020

Waving Gesture Analysis for User Authentication in the Mobile Environment.
IEEE Netw., 2020

A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models.
CoRR, 2020

2019
Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference.
IEEE Trans. Neural Networks Learn. Syst., 2018

Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2018

Performance evaluation of implicit smartphones authentication via sensor-behavior analysis.
Inf. Sci., 2018

Multi-source Interactive Behavior Analysis for Continuous User Authentication on Smartphones.
Proceedings of the Biometric Recognition - 13th Chinese Conference, 2018

2017
Performance Analysis of Smartphone-Sensor Behavior for Human Activity Recognition.
IEEE Access, 2017

Modeling interactive sensor-behavior with smartphones for implicit and active user authentication.
Proceedings of the IEEE International Conference on Identity, 2017

On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Handwaving Authentication: Unlocking Your Smartwatch Through Handwaving Biometrics.
Proceedings of the Biometric Recognition - 12th Chinese Conference, 2017

Big-data analysis of multi-source logs for anomaly detection on network-based system.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2016
On motion-sensor behavior analysis for human-activity recognition via smartphones.
Proceedings of the IEEE International Conference on Identity, 2016


  Loading...