Follow
Yansong Gao
Yansong Gao
CSIRO's Data61
Verified email at data61.csiro.au - Homepage
Title
Cited by
Year
A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation
L Yang, Y Gao, J Zhang, S Camtepe, D Jayalath
Computer Communications 191, 108-118, 2022
52022
A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks
Y Gao, S Nepal
Information Systems Security: 16th International Conference, ICISS 2020 …, 2020
22020
A PUF sensor: Securing physical measurements
H Ma, Y Gao, O Kavehei, DC Ranasinghe
2017 IEEE International Conference on Pervasive Computing and Communications …, 2017
202017
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
B Kuang, A Fu, W Susilo, S Yu, Y Gao
Computers & Security 112, 102498, 2022
612022
Agriculture 4.0 and Beyond: Evaluating Cyber Threat Intelligence Sources and Techniques in Smart Farming Ecosystems
HT Bui, H Aboutorab, A Mahboubi, Y Gao, NH Sultan, A Chauhan, ...
Computers & Security, 103754, 2024
22024
APMSA: Adversarial Perturbation against Model Stealing Attacks
J Zhang, S Peng, Y Gao, Z Zhang, Q Hong
IEEE Transactions on Information Forensics and Security, 2023
712023
Artificial Intelligence Security: Threats and Countermeasures
Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao, W Li, K Li
ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021
722021
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys
J Hou, Y Gao, A Fu, J Chen, X Chen, Y Zhang, W Susilo, J Pieprzyk
Cryptology ePrint Archive, 2023
2023
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Y Gao, BG Doan, Z Zhang, S Ma, A Fu, S Nepal, H Kim
arXiv preprint arXiv:2007.10760, 2020
1982020
Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction
ND Pham, A Abuadbba, Y Gao, TK Phan, N Chilamkurti
IEEE Transactions on Information Forensics and Security, 2023
252023
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability
Z Zhang, W He, Y Cheng, W Wang, Y Gao, M Wang, K Li, S Nepal, ...
IEEE Transactions on Information Forensics and Security, 2021
62021
Building secure SRAM PUF key generators on resource constrained devices
Y Gao, Y Su, W Yang, S Chen, S Nepal, DC Ranasinghe
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
452019
Can differential privacy practically protect collaborative deep learning inference for IoT?
J Ryu, Y Zheng, Y Gao, A Abuadbba, J Kim, D Won, S Nepal, H Kim, ...
Wireless Networks, 1-21, 2022
152022
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
S Abuadbba, K Kim, M Kim, C Thapa, SA Camtepe, Y Gao, H Kim, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
1082020
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
S Wang, Y Gao, A Fu, Z Zhang, Y Zhang, W Susilo
ACM Asia Conference on Computer and Communications Security, 2023
102023
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
H Ma, Y Li, Y Gao, A Abuadbba, Z Zhang, A Fu, H Kim, SF Al-Sarawi, ...
arXiv preprint arXiv:2201.08619, 2022
242022
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN
B Kim, A Abuadbba, Y Gao, Y Zheng, ME Ahmed, S Nepal, H Kim
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
12*2021
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks
S Park, A Abuadbba, S Wang, K Moore, Y Gao, H Kim, S Nepal
Proceedings of the 39th Annual Computer Security Applications Conference …, 2023
12023
DeepTheft: Stealing DNN Model Architectures through Power Side Channel
Y Gao, H Qiu, Z Zhang, B Wang, H Ma, A Abuadbba, M Xue, A Fu, ...
IEEE Symposium on Security and Privacy 2024, 2024
32024
Design and Evaluate Recomposited OR-AND-XOR-PUF
J Yao, L Pang, Y Su, Z Zhang, W Yang, A Fu, Y Gao
IEEE Transactions on Emerging Topics in Computing, 2022
212022
The system can't perform the operation now. Try again later.
Articles 1–20