yinzhi cao google scholar

and has been adopted, in part, by Internet Explorer 8 and, in full, by Google Chrome and the HTML 5 working group. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays. Commun. The following articles are merged in Scholar. Yinzhi Cao, Vaibhav Rastogi & Yan Chen. Google Scholar Digital Library; Zhuang Qian, Shufei Zhang, Kaizhu Huang, Qiufeng Wang, Rui Zhang, and Xinping Yi. [Google Scholar] Preprint. in Cyberspace Security, Excellent Cyberspace Security Students Class, Sichuan University, 2022; GPA: 3.92, rank: 2/172(1%) . Yinzhi Yang, Min Gao, Yuyang Wu, Zheng Liu, Jinpeng Xie, Zhongmin Deng, Guangming Cai, Xinwang Cao & Wei Ke. Finally, we discuss how the texture of adversarial patches can be optimized efficiently using RL by parametrizing the appearance of the patch with a class-specific texture dictionary .

Type "@" in a cell to mention people. In exchange for the increased complexity of the authentication procedure, SSO makes it convenient for users to. Show more. In ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2022. In IEEE Symposium on Security and Privacy (S&P), pages 463--480. Yinzhi Cao, Yun Chen, and Gregory Falco receive award aimed to develop the next generation of academic scientists, engineers, and mathematicians who will focus a significant portion of their careers on national security issues.

PubMed, and Google Scholar. Invited Book Chapters .

The test datasets included scenarios for self-driving car AI, automatic object recognition in online images, and automatic detection of malware masquerading as ordinary software. "BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning". ACM, 1--18. Protecting web-based single sign-on protocols against relying party impersonation attacks through a dedicated bi-directional authenticated secure channel. Improving Model Robustness with Latent Distribution Locally and . 2014. Deep learning (DL) systems are increasingly deployed in safety- and security-critical domains including self-driving cars and malware detection, where the correctness and predictability of a system's behavior for corner case inputs . . 2017. . Vinod Yegneswaran, SRI International. Google Scholar, my papers have been cited for over 10,000 times (h-index is 49). Get unlimited, online access to over 18 million full-text articles from more than 15,000 scientific journals. In Proceedings of the 36th IEEE Symposium on Security and Privacy.

[Google Scholar] Bader M. S., Loeb M., Brooks A.

Yinzhi Cao and Junfeng Yang. John Hopkins University; Duties included: Research on some projects about static analysis; Supervisor: Prof. Yinzhi Cao; 09.2021-06.2022: Research Intern. . Y Cao, Y Shoshitaishvili, K Borgolte, C Kruegel, G Vigna, Y Chen. Yinzhi Cao Johns Hopkins University Email c xc minh ti jhu.edu. chenglin.yangw at gmail dot com / CV / Google Scholar. . In Proceedings of the 38th IEEE Symposium on Security and Privacy. Access. Vaibhav Rastogi Google Verified email at wisc.edu. arxiv, 2020. Google Scholar; Gregory Falco is an assistant professor in the Department of Civil and Systems Engineering and the . Postgrad. Follow. Bo Hui, Yuchen Yang, +3 authors Yinzhi Cao Published 5 January 2021 Computer Science ArXiv Membership inference (MI) attacks affect user privacy by inferring whether given data samples have been used to train a target learning model, e.g., a deep neural network. Zhu F, Sun J, Xu H, Chong Lee Shin OL, Zhao Z, Pei G, Zhu H, Cao C, et al. 2012. . Yantao Lv, Email: moc.qq@578741794. . 2017. ACM ASIA Conference on Computer and Communications Security, 2022. Google Scholar Digital Library; Yunchen Pu, Zhe Gan, Ricardo Henao, Xin Yuan, Chunyuan Li, Andrew Stevens, and Lawrence . (2017). Their combined citations are counted only for the first article. Fengxia Lin, 1 Zhicong Zeng, 1 Yinzhi Song, 1 Liang Li, 1, 2 Zijun Wu, 1 Xiaoduo Zhang, 1 . Yinzhi Cao, Zhichun Li, Vaibhav Rastogi and Yan Chen, poster paper in Proceeding of ACM Conference on Computer and Communications Security (CCS), 2010. PLOS Genetics, 2008. 61: 2008: Y Cao, J Yang, S Jana. ACSAC 2014 : 466-475 Cao, Yinzhi, VinodYegneswaran, Phillip A. Porras, and Yan Chen. Based on Google Scholar, my papers have been cited for over 5,500 times. Yinzhi Cao Johns Hopkins University Verified email at jhu.edu. CrossRef Google Scholar Cao, Y., Yegneswaran, V., Porras, P., Chen, Y.: PathCutter: severing the self-propagation path of XSS JavaScript worms in social web networks. . We're logging your queries and data to improve the feature. Web-based single sign-on describes a class of protocols where a user signs into a web site with the authentication provided as a service by a third party. (410) 516-6718 yinzhi.cao@jhu.edu Location 305 Malone Hall Connect Google Scholar Website Yinzhi Cao is an assistant professor in computer science whose research focuses on the security and privacy of our web, network, and mobile systems. . General Chairs: Bhavani Thuraisingham, The University of Texas at Dallas. Google Scholar Qiwei Chen, Guohui Zhu, Shumin Cao and Aimin Zhao: Advanced Materials Research, 2011, vol. There are two types of MI attacks in the literature, i.e., these with and without shadow models. JShield: Towards Real-time and Vulnerability-based Detection of Polluted Drive-by Download Attacks. "GraphTrack: A Graph-based Cross-Device Tracking Framework". . DeepXplore: Automated whitebox testing of deep learning systems.

Philipp Ruemmer Professor in Computer . , Adam Kortylewski, Cihang Xie, Yinzhi Cao, Alan Yuille ECCV, 2020 : Snapshot Distillation: Teacher-Student Optimization in One Generation Chenglin .

Google Scholar. Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee Proceedings of the 27th USENIX Security Symposium (USENIX Security), August 2018. Texas A&M University, College Station, TX . Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen. 90: 2017:

Their combined citations are counted only for the first article. Research. Deep learning (DL) systems are increasingly deployed in safety- and security-critical domains including self-driving cars and malware detection, where the correctness and predictability of a system's behavior for corner case inputs . Deepxplore: Automated whitebox testing of deep learning systems. Antiviral therapy is the primary treatment. For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).. load content from web.archive.org Neil Zhenqiang Gong, and Yinzhi Cao. 27th USENIX Security Symposium (USENIX Security 18), 711-728, 2018. These advances have led to widespread adoption and deployment of DL in security- and safety-critical .

. Submission history Cao, Xun Ho 2007 Original work published in 1986. . Yinzhi Cao, Alexander Fangxiao Yu, Andrew Aday, Eric Stahl, Jon Merwine, and Junfeng Yang. Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana. Shinji Watanabe received his Bachelor's and Master's degrees in Theoretical Physics from the Waseda University in Tokyo, Japan. Yinzhi Cao (Ph.D. 2014. In: OOPSLA (2014) Google Scholar . Yinzhi Cao, V. Yegneswaran, +1 author Yan Chen; . . 295-297, pp. X Cao, Z Li, X Song, X Cui, P Cao, H Liu, F Cheng, Y Chen. In this section, we first discuss the mathematical framework for patch-based adversarial attacks (Sect. Our experiments show that PatchAttack achieves > 99% success rate on ImageNet for a wide range of architectures, while only manipulating 3% of the image for non-targeted attacks and 10% on average for targeted attacks. . Dehong Cao, 1 , Yinzhi Shen, 2 , Yin Huang, 1 Bo Chen, 1 Zeyu Chen, 1 Jianzhong Ai, 1 Liangren Liu, 1 Lu Yang, 1 , * and Qiang Wei 1 , * . Y Cao, S Liu, Y Zhou, Y Chen, T Zhou . Efficient and Effective Feature Space Exploration for Testing Deep Learning Systems Just Accepted The following articles are merged in Scholar. Loading. Bibliographic details on BibTeX record conf/sp/CaoY15. I will host Drs. PAPERS UNDER SUBMISSION 1) JShield: Towards Real-time and Vulnerability-based Detection of Polluted Drive-by Download Attacks, Yinzhi Cao, Xiang Pan, Yan Chen and Jianwei Zhuge. Putative endothelial progenitor cells do not promote vascular repair but attenuate pericyte-myofibroblast transition in UUO-induced renal fibrosis. Invited Book Chapters 1. In Proceedings of the 26th Symposium on Operating Systems Principles.

193-197. Since Pro has shown net anti-inflammatory properties as part of its beneficial effects, we examined the potential role of Pro in the modulation of macrophage polarization status during both rI/R injury in vivo and exposure of cultured peritoneal macrophages (PMs) to .

Their combined citations are counted only for the first article. Isolation, identification, and culture of EPCs and fibroblasts. Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana. IEEE, 2015. I am a Fellow of IEEE. Google Scholar; Kexin Pei, Yinzhi Cao, Junfeng Yang, and Suman Jana. Try again later. A. Propofol (Pro) confers protection against renal ischemia/reperfusion (rI/R) injury through incompletely characterized mechanisms. arXiv preprint arXiv:1712.01785, 2017. B. Cao, M. Wang, H. Yang, K. Zhao, J. Li, et al. In SOSP. View author publications. Try again later.

Google Scholar; Kexin Pei, Yinzhi Cao, Junfeng Yang, and Suman Jana. You can also search for this author in PubMed Google . Zhaohan Xi. "Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems". I'm interested in computer vision, artificial intelligence and adversarial machine learning. . [Google Scholar] 3. Share. In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC). Yinzhi Cao. Towards Making Systems Forget with Machine Unlearning.

"Practical Blind Membership Inference Attack via Differential Comparisons". . 2017. . Their combined citations are counted only for the first article. T Zhou, S Li, Y Cao, N Gong. 2015. Local Arrangement Chair In Proceedings of the 26th Symposium on Operating Systems Principles (SOSP'17). Poultry Science 95 (9), 2160-2166, 2016. Yinzhi Cao Johns Hopkins University Verified email at jhu.edu. Existing DL testing depends heavily on manually labeled data and therefore often fails to expose erroneous behaviors for rare inputs.

CY Zhou, Y Wang, JX Cao, YJ Chen, Y Liu, YY Sun, DD Pan, CR Ou. He is affiliated with the Johns Hopkins University Information Security Institute (ISI). L. Yan, S. Zhang, . Binghui Wang, Tianchen Zhou, Song Li, Yinzhi Cao, and Neil Zhenqiang Gong. Membership inference (MI) attacks affect user privacy by inferring whether given data samples have been used to train a target learning model, e.g., a deep neural network. PDF. Authors. DeepXplore: Automated Whitebox Testing of Deep Learning Systems. Such research has the goal to model, measure, and affect the quality of AI artifacts, such as data, models and applications, to then facilitate adherence to legal standards. International Workshop on Recent Advances in Intrusion Detection, 276-298. Zhu JJ, Luo J, Cao WT, Shi HP, Yao DW, et al. Yinzhi Cao, Vinod Yegneswaran, Phillip Porras and Yan Chen, "PathCutter: Severing the Self- . 2017. 15 back 2017. Paper Link to paper BibTeX. NDSS, 2015. . Article Download PDF CrossRef View Record in Scopus Google Scholar. . Jinyuan Jia, Yupei Liu, and Neil Zhenqiang Gong.

3.2 we introduce our reinforcement learning (RL) framework for patch-based black-box attacks. Important Dates: Submission: 11:59pm EST, June 20, 2015 Notification of Acceptance: August 12, 2015 Camera Ready: September 2, 2015 Organizing committee. 113. Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning. Google Scholar. First job: Postdoctal Scientist at Columbia University; Now . Yinzhi Cao and Dr. Merged citations. While a vast amount of effort has been invested in characterizing the . B.S. Jinyuan Jia, Xiaoyu Cao, Neil Zhenqiang Gong. Welcome to Yan Chen's Home Page Yan Chen Professor Department of Computer Science Robert R. McCormick School of Engineering and Applied Science Northwestern University 3007 Mudd Hall 2233 Tech Drive, Third Floor Evanston, IL 60208 (847) 491-4946 (Office) (847) 491-2789 (Fax) E-mail : ychen AT northwestern.edu Their combined citations are counted only for the first article. "PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks." In NDSS. DeepXplore: Automated Whitebox Testing of Deep Learning Systems. . Website: Google Scholar Office: Hackerman Hall 128 Lab: Advanced Medical Instrumentation, and Robotics (AMIRo) Debojyoti Biswas Email:dbiswas2@jhu.edu Office: Hackerman Hall 128 Lab: Locomotion In Mechanical and Biological Systems (LIMBS) Ravi Jayakumar Email: rperurj1@jhu.edu Website: Google Scholar Office: Hackerman Hall 128 Google Scholar Lei Mao, Jingrong Liu and Yinzhi Cao: Journal of Northeast University of Technology, 1993, vol. Yinzhi Cao and Junfeng Yang. Yinzhi Cao, Alexander Fangxiao Yu, Andrew Aday, Eric Stahl, Jon Merwine, and Junfeng Yang. Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana. 213: 2015:

Authors: William Paul, Yinzhi Cao, Miaomiao Zhang, Phil Burlina Download PDF Abstract: Machine learning (ML) models used in medical imaging diagnostics can be vulnerable to a variety of privacy attacks, including membership inference attacks, that lead to violations of regulations governing the use of medical data and threaten to compromise .

Cross-device tracking has drawn growing attention from both commercial companies and the general public because of its privacy implications and applications for user profiling, personalized services, etc. Yinzhi Cao Johns Hopkins University Verified email at jhu.edu. 2021. BB Gupta, S Gupta, S Gangwar, M Kumar, PK Meena. Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana Due to the increasing usage of machine learning (ML) techniques in security- and safety-critical domains, such as autonomous systems and medical diagnosis, ensuring correct behavior of ML systems, especially for different corner cases, is of growing importance. 515-519. 1-18. Article Google Scholar 2021. : Phosphor: illuminating dynamic data flow in the jvm.

View 3 excerpts, references background; Save. One particular, wide-used type of cross-device tracking is to leverage browsing histories of user devices, e.g., characterized by a list of IP addresses used by the devices and domains .

 

この記事が気に入ったら
いいね!しよう

最新情報をお届けします

yinzhi cao google scholar

弊社がサポートすることで、日本に住む日本人の方でも簡単にフィリピンの大手証券会社「ヤップスター証券」にて、フィリピン証券口座が作れます。
これから伸び行くアジアの雄「フィリピン」で株の売買をはじめましょう!

興味ある方は、下記のリンクを今すぐクリックしてください。