Day-ahead Coordinated Scheduling of Hydro and Wind Power Generation System Considering Uncertainties Y Li, T Zhao, C Liu, Y Zhao, Z Yu, K Li, L Wu IEEE Transactions on Industry Applications 55 (3), 2368-2377, 2019 | 31 | 2019 |
Security and Privacy in the Emerging Cyber-Physical World: A Survey Z Yu, Z Kaplan, Q Yan, N Zhang IEEE Communications Surveys & Tutorials 23 (3), 1879-1919, 2021 | 30 | 2021 |
CodeIPPrompt: Intellectual Property Infringement Assessment of Code Language Models Z Yu, Y Wu, N Zhang, C Wang, Y Vorobeychik, C Xiao 40th International Conference on Machine Learning (ICML) 2023, 2023 | 16 | 2023 |
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples H Liu, Z Yu, Y Vorobeychik, N Zhang IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023, 2023 | 16 | 2023 |
SMACK: Semantically Meaningful Adversarial Audio Attack Z Yu, Y Chang, N Zhang, C Xiao 32nd USENIX Security Symposium (USENIX Security 23), 2023 | 12 | 2023 |
When Evil Calls: Targeted Adversarial Voice over IP Network H Liu, Z Yu, M Zha, X Wang, W Yeoh, Y Vorobeychik, N Zhang 2022 ACM Conference on Computer and Communications Security (CCS), 2022 | 12 | 2022 |
Don’t Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models Z Yu, X Liu, S Liang, Z Cameron, C Xiao, N Zhang 33rd USENIX Security Symposium (USENIX Security 24), 2024 | 10 | 2024 |
Please tell me more: Privacy impact of explainability through the lens of membership inference attack H Liu, Y Wu, Z Yu, N Zhang 2024 IEEE Symposium on Security and Privacy (SP), 120-120, 2024 | 8 | 2024 |
PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference A Li*, M Sudvarg*, H Liu, Z Yu, C Gill, N Zhang 2022 IEEE Real-Time Systems Symposium (RTSS), 2022 | 8 | 2022 |
HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions Z Yu, Z Li, Y Chang, S Fong, J Liu, N Zhang 2022 ACM Conference on Computer and Communications Security (CCS), 2022 | 6 | 2022 |
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis Z Yu, S Zhai, N Zhang 2023 ACM Conference on Computer and Communications Security (CCS), 2023 | 5 | 2023 |
Automatic and universal prompt injection attacks against large language models X Liu, Z Yu, Y Zhang, N Zhang, C Xiao arXiv preprint arXiv:2403.04957, 2024 | 4 | 2024 |
PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens H Zhu, Z Yu, W Cao, N Zhang, X Zhang 2022 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2022 | 4 | 2022 |
ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems C Zhou, Q Yan, Z Yu, E Dixit, N Zhang, H Zeng, AS Ghanhdari arXiv preprint arXiv:2305.08037, 2023 | 2 | 2023 |
Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory W Yan, H Zhu, Z Yu, F Tehranipoor, J Chandy, N Zhang, X Zhang 2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020 | 2 | 2020 |
Towards Automated Computational Auditing of mHealth Security and Privacy Regulations B Tung*, Z Yu*, N Zhang 2021 ACM Conference on Computer and Communications Security (CCS), 2021 | 1 | 2021 |
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography Z Yu, Y Chang, S Zhai, N Deily, T Ju, XF Wang, U Jammalamadaka, ... 32nd USENIX Security Symposium (USENIX Security 23), 2023 | | 2023 |
Poster: Intellectual Property Infringement Assessment of Code Language Models Z Yu, Y Wu, N Zhang, C Wang, Y Vorobeychik, C Xiao 44th IEEE Symposium on Security and Privacy (IEEE S&P) 2023, 2023 | | 2023 |
Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference A Li, M Sudvarg, H Liu, Z Yu, C Gill, N Zhang | | |