Yupei Liu

Orcid: 0000-0003-4300-758X

According to our database1, Yupei Liu authored at least 25 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Policy-Oriented Cognitive Risk Map Modeling for Lane Change via Deep Successor Representation.
IEEE Trans. Intell. Transp. Syst., May, 2025

A Critical Evaluation of Defenses against Prompt Injection Attacks.
CoRR, May, 2025

Risk Assessment of Cyclists in the Mixed Traffic Based on Multilevel Graph Representation.
IEEE Trans. Intell. Transp. Syst., April, 2025

TrojanDec: Data-free Detection of Trojan Inputs in Self-supervised Learning.
CoRR, January, 2025

DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

SecureGaze: Defending Gaze Estimation Against Backdoor Attacks.
Proceedings of the 23rd ACM Conference on Embedded Networked Sensor Systems, 2025

TrojanDec: Data-free Detection of Trojan Inputs in Self-supervised Learning.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Enhancing Interpretability of Autonomous Driving via Human-Like Cognitive Maps: A Case Study on Lane Change.
IEEE Trans. Intell. Veh., September, 2024

Defending Deep Regression Models against Backdoor Attacks.
CoRR, 2024

Evaluating Large Language Model based Personal Information Extraction and Countermeasures.
CoRR, 2024

Formalizing and Benchmarking Prompt Injection Attacks and Defenses.
Proceedings of the 33rd USENIX Security Symposium, 2024

A Hippocampus-Inspired Dynamic Planning Method for Overtaking Scenes via Predictive Map.
Proceedings of the 27th IEEE International Conference on Intelligent Transportation Systems, 2024

2023
User Association, Subchannel and Power Allocation in Space-Air-Ground Integrated Vehicular Network With Delay Constraints.
IEEE Trans. Netw. Sci. Eng., 2023

Prompt Injection Attacks and Defenses in LLM-Integrated Applications.
CoRR, 2023

PORE: Provably Robust Recommender Systems against Data Poisoning Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
StolenEncoder: Stealing Pre-trained Encoders.
CoRR, 2022

Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles.
Proceedings of the 31st USENIX Security Symposium, 2022

BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Deep Reinforcement Learning for Interference Suppression in RIS-Aided High-Speed Railway Networks.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Fog Computing Vehicular Network Resource Management Based on Chemical Reaction Optimization.
IEEE Trans. Veh. Technol., 2021

Security Analysis of Camera-LiDAR Semantic-Level Fusion Against Black-Box Attacks on Autonomous Vehicles.
CoRR, 2021

2019
Energy-Efficient Subchannel Matching and Power Allocation in NOMA Autonomous Driving Vehicular Networks.
IEEE Wirel. Commun., 2019

2017
Users' continuance intention of virtual learning community services: the moderating role of usage experience.
Interact. Learn. Environ., 2017


  Loading...