Follow
Honggang Yu
Honggang Yu
Ph.D. Student, Electrical & Computer Eng., University of Florida
Verified email at ufl.edu
Title
Cited by
Cited by
Year
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples
H Yu, K Yang, T Zhang, YY Tsai, TY Ho, Y Jin
ISOC Network and Distributed System Security Symposium (NDSS), 2020
1502020
Deepem: Deep neural networks model recovery through em side-channel information leakage
H Yu, H Ma, K Yang, Y Zhao, Y Jin
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
922020
Cross-device profiled side-channel attacks using meta-transfer learning
H Yu, H Shan, M Panoff, Y Jin
2021 58th ACM/IEEE Design Automation Conference (DAC), 703-708, 2021
272021
Beyond digital domain: Fooling deep learning based recognition system in physical world
K Yang, T Tsai, H Yu, TY Ho, Y Jin
Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 1088-1095, 2020
212020
A review and comparison of ai-enhanced side channel analysis
M Panoff, H Yu, H Shan, Y Jin
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-20, 2022
182022
Robust roadside physical adversarial attack against deep learning in lidar perception modules
K Yang, T Tsai, H Yu, M Panoff, TY Ho, Y Jin
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
182021
Audio Adversarial Examples Generation with Recurrent Neural Networks*
KH Chang, PH Huang, H Yu, Y Jin, TC Wang
2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 488-493, 2020
162020
Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis
H Yu, S Wang, H Shan, M Panoff, M Lee, K Yang, Y Jin
2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023
22023
Generation of black-box audio adversarial examples based on gradient approximation and autoencoders
PH Huang, H Yu, M Panoff, TC Wang
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-19, 2022
22022
Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms
W Fu, H Yu, O Arias, K Yang, Y Jin, T Yavuz, X Guo
Proceedings of the Great Lakes Symposium on VLSI 2022, 481-486, 2022
12022
A Privacy Leakage Issue in Qi-Compatible Cellphone Wireless Charging by Stray Magnetic Field Sniffing
Y Yang, Z Zhan, H Yu, Q Huang, S Wang
2024 IEEE Applied Power Electronics Conference (APEC), 1-8, 2024
2024
Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers
H Yu, S Zeng, T Zhang, IC Lin, Y Jin
arXiv preprint arXiv:2109.10770, 2021
2021
Deep Learning Application Attacks through Feature Manipulations
H Yu, K Yang, Y Jin
2019 Government Microcircuit Applications and Critical Technology Conference …, 2019
2019
CloudLeak: DNN Model Extractions from Commercial MLaaS Platforms
Y Jin, TY Ho, H Yu
2020 Black Hat USA, 0
The system can't perform the operation now. Try again later.
Articles 1–14