default search action
Zhiyuan Yu 0001
Person information
- affiliation: Washington University, St. Louis, MO, USA
Other persons with the same name
- Zhiyuan Yu — disambiguation page
- Zhiyuan Yu 0002
— Shandong University, Jinan, China
- Zhiyuan Yu 0003
— Xi'an Jiaotong-Liverpool University, Suzhou, China
- Zhiyuan Yu 0004
— University of Science and Technology of China, Hefei, China
- Zhiyuan Yu 0005
— Beijing Institute of Precision Mechatronics and Controls, Beijing, China
- Zhiyuan Yu 0006
— Hong Kong University of Science and Technology, Hong Kong, SAR, China
- Zhiyuan Yu 0007
— Southeast University, Nanjing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Zhiyuan Yu
, Ao Li
, Ruoyao Wen
, Yijia Chen
, Ning Zhang
:
PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning. CCS 2024: 3853-3867 - [c14]Zhiyuan Yu
:
Towards Proactive Protection against Unauthorized Speech Synthesis. CCS 2024: 5128-5130 - [c13]Han Liu, Yuhao Wu, Zhiyuan Yu
, Ning Zhang:
Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack. SP 2024: 4791-4809 - [c12]Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang:
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models. USENIX Security Symposium 2024 - [i4]Xiaogeng Liu, Zhiyuan Yu, Yizhe Zhang, Ning Zhang, Chaowei Xiao:
Automatic and Universal Prompt Injection Attacks against Large Language Models. CoRR abs/2403.04957 (2024) - [i3]Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang:
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models. CoRR abs/2403.17336 (2024) - 2023
- [c11]Zhiyuan Yu
, Shixuan Zhai
, Ning Zhang
:
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis. CCS 2023: 460-474 - [c10]Han Liu
, Yuhao Wu, Zhiyuan Yu
, Yevgeniy Vorobeychik, Ning Zhang:
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples. CVPR 2023: 5146-5155 - [c9]Zhiyuan Yu
, Yuhao Wu, Ning Zhang, Chenguang Wang, Yevgeniy Vorobeychik, Chaowei Xiao:
CodeIPPrompt: Intellectual Property Infringement Assessment of Code Language Models. ICML 2023: 40373-40389 - [c8]Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, XiaoFeng Wang, Uday Jammalamadaka, Ning Zhang:
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography. USENIX Security Symposium 2023: 2815-2832 - [c7]Zhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao:
SMACK: Semantically Meaningful Adversarial Audio Attack. USENIX Security Symposium 2023: 3799-3816 - [i2]Ce Zhou, Qiben Yan, Zhiyuan Yu, Eshan Dixit, Ning Zhang, Huacheng Zeng, Alireza Safdari Ghanhdari:
ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems. CoRR abs/2305.08037 (2023) - 2022
- [c6]Han Liu
, Zhiyuan Yu
, Mingming Zha, XiaoFeng Wang, William Yeoh
, Yevgeniy Vorobeychik, Ning Zhang:
When Evil Calls: Targeted Adversarial Voice over IP Network. CCS 2022: 2009-2023 - [c5]Zhiyuan Yu
, Zhuohang Li, Yuanhaur Chang
, Skylar Fong, Jian Liu
, Ning Zhang:
HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions. CCS 2022: 3107-3120 - [c4]Huifeng Zhu, Zhiyuan Yu
, Weidong Cao
, Ning Zhang, Xuan Zhang:
PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens. ICCAD 2022: 67:1-67:9 - [c3]Ao Li, Marion Sudvarg, Han Liu
, Zhiyuan Yu
, Chris Gill, Ning Zhang:
PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference. RTSS 2022: 225-239 - 2021
- [j1]Zhiyuan Yu
, Zack Kaplan
, Qiben Yan
, Ning Zhang
:
Security and Privacy in the Emerging Cyber-Physical World: A Survey. IEEE Commun. Surv. Tutorials 23(3): 1879-1919 (2021) - [c2]Brian Tung, Zhiyuan Yu
, Ning Zhang:
Towards Automated Computational Auditing of mHealth Security and Privacy Regulations. CCS 2021: 2396-2398 - [i1]Zhiyuan Yu, Zack Kaplan, Qiben Yan, Ning Zhang:
Security and Privacy in the Emerging Cyber-Physical World: A Survey. CoRR abs/2105.13347 (2021) - 2020
- [c1]Wei Yan, Huifeng Zhu, Zhiyuan Yu
, Fatemeh Tehranipoor, John A. Chandy
, Ning Zhang, Xuan Zhang:
Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory. HOST 2020: 91-101
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-06-17 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint