Yunhan Jia

According to our database1, Yunhan Jia authored at least 22 papers between 2014 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022

2021
Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
Proceedings of the 30th USENIX Security Symposium, 2021

Demo: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
Proceedings of the IEEE Security and Privacy Workshops, 2021

2020
Hold Tight and Never Let Go: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
CoRR, 2020

Towards Practical Lottery Ticket Hypothesis for Adversarial Training.
CoRR, 2020

Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack.
CoRR, 2020

Fooling Detection Alone is Not Enough: Adversarial Attack against Multiple Object Tracking.
Proceedings of the 8th International Conference on Learning Representations, 2020

Explainable machine learning in deployment.
Proceedings of the FAT* '20: Conference on Fairness, 2020

Enhancing Cross-Task Black-Box Transferability of Adversarial Examples With Dispersion Reduction.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking.
CoRR, 2019

Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction.
CoRR, 2019

ABSTRACT: Cloud-based Image Classification Service is Not Robust to Affine Transformation: A Forgotten Battlefield.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms.
PhD thesis, 2018

2017
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Towards secure and safe appified automated vehicles.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017

TrafficNet: An open naturalistic driving scenario library.
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017

Dissecting VOD services for cellular: performance, root causes and best practices.
Proceedings of the 2017 Internet Measurement Conference, 2017

Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
The Misuse of Android Unix Domain Sockets and Security Implications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Demo: Mapping global mobile performance trends with mobilyzer and mobiPerf.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014


  Loading...