A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation L Yang, Y Gao, J Zhang, S Camtepe, D Jayalath Computer Communications 191, 108-118, 2022 | 5 | 2022 |
A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks Y Gao, S Nepal Information Systems Security: 16th International Conference, ICISS 2020 …, 2020 | 2 | 2020 |
A PUF sensor: Securing physical measurements H Ma, Y Gao, O Kavehei, DC Ranasinghe 2017 IEEE International Conference on Pervasive Computing and Communications …, 2017 | 20 | 2017 |
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects B Kuang, A Fu, W Susilo, S Yu, Y Gao Computers & Security 112, 102498, 2022 | 61 | 2022 |
Agriculture 4.0 and Beyond: Evaluating Cyber Threat Intelligence Sources and Techniques in Smart Farming Ecosystems HT Bui, H Aboutorab, A Mahboubi, Y Gao, NH Sultan, A Chauhan, ... Computers & Security, 103754, 2024 | 2 | 2024 |
APMSA: Adversarial Perturbation against Model Stealing Attacks J Zhang, S Peng, Y Gao, Z Zhang, Q Hong IEEE Transactions on Information Forensics and Security, 2023 | 71 | 2023 |
Artificial Intelligence Security: Threats and Countermeasures Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao, W Li, K Li ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021 | 72 | 2021 |
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys J Hou, Y Gao, A Fu, J Chen, X Chen, Y Zhang, W Susilo, J Pieprzyk Cryptology ePrint Archive, 2023 | | 2023 |
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review Y Gao, BG Doan, Z Zhang, S Ma, A Fu, S Nepal, H Kim arXiv preprint arXiv:2007.10760, 2020 | 198 | 2020 |
Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction ND Pham, A Abuadbba, Y Gao, TK Phan, N Chilamkurti IEEE Transactions on Information Forensics and Security, 2023 | 25 | 2023 |
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability Z Zhang, W He, Y Cheng, W Wang, Y Gao, M Wang, K Li, S Nepal, ... IEEE Transactions on Information Forensics and Security, 2021 | 6 | 2021 |
Building secure SRAM PUF key generators on resource constrained devices Y Gao, Y Su, W Yang, S Chen, S Nepal, DC Ranasinghe 2019 IEEE International Conference on Pervasive Computing and Communications …, 2019 | 45 | 2019 |
Can differential privacy practically protect collaborative deep learning inference for IoT? J Ryu, Y Zheng, Y Gao, A Abuadbba, J Kim, D Won, S Nepal, H Kim, ... Wireless Networks, 1-21, 2022 | 15 | 2022 |
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? S Abuadbba, K Kim, M Kim, C Thapa, SA Camtepe, Y Gao, H Kim, ... Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 108 | 2020 |
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences S Wang, Y Gao, A Fu, Z Zhang, Y Zhang, W Susilo ACM Asia Conference on Computer and Communications Security, 2023 | 10 | 2023 |
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World H Ma, Y Li, Y Gao, A Abuadbba, Z Zhang, A Fu, H Kim, SF Al-Sarawi, ... arXiv preprint arXiv:2201.08619, 2022 | 24 | 2022 |
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN B Kim, A Abuadbba, Y Gao, Y Zheng, ME Ahmed, S Nepal, H Kim 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 12* | 2021 |
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks S Park, A Abuadbba, S Wang, K Moore, Y Gao, H Kim, S Nepal Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | 1 | 2023 |
DeepTheft: Stealing DNN Model Architectures through Power Side Channel Y Gao, H Qiu, Z Zhang, B Wang, H Ma, A Abuadbba, M Xue, A Fu, ... IEEE Symposium on Security and Privacy 2024, 2024 | 3 | 2024 |
Design and Evaluate Recomposited OR-AND-XOR-PUF J Yao, L Pang, Y Su, Z Zhang, W Yang, A Fu, Y Gao IEEE Transactions on Emerging Topics in Computing, 2022 | 21 | 2022 |