default search action
Yuwen Pu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j7]Dazhen Deng, Chuhan Zhang, Huawei Zheng, Yuwen Pu, Shouling Ji, Yingcai Wu:
AdversaFlow: Visual Red Teaming for Large Language Models with Multi-Level Adversarial Flow. IEEE Trans. Vis. Comput. Graph. 31(1): 492-502 (2025) - 2024
- [j6]Hao Peng, Jieshuai Yang, Dandan Zhao, Xiaogang Xu, Yuwen Pu, Jianmin Han, Xing Yang, Ming Zhong, Shouling Ji:
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space. IEEE Trans. Inf. Forensics Secur. 19: 4881-4896 (2024) - [c10]Pengyu Qiu, Yuwen Pu, Yongchao Liu, Wenyan Liu, Yun Yue, Xiaowei Zhu, Lichun Li, Jinbao Li, Shouling Ji:
Integer Is Enough: When Vertical Federated Learning Meets Rounding. AAAI 2024: 14704-14712 - [c9]Oubo Ma, Yuwen Pu, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, Shouling Ji:
SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems. CCS 2024: 645-659 - [c8]Zeyu Li, Yuwen Pu, Xuhong Zhang, Yu Li, Jinbao Li, Shouling Ji:
Protecting Object Detection Models from Model Extraction Attack via Feature Space Coverage. IJCAI 2024: 431-439 - [c7]Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang:
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention. NDSS 2024 - [i16]Mengyao Du, Miao Zhang, Yuwen Pu, Kai Xu, Shouling Ji, Quanjun Yin:
The Risk of Federated Learning to Skew Fine-Tuning Features and Underperform Out-of-Distribution Robustness. CoRR abs/2401.14027 (2024) - [i15]Oubo Ma, Yuwen Pu, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, Shouling Ji:
SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems. CoRR abs/2402.03741 (2024) - [i14]Yuwen Pu, Jiahao Chen, Chunyi Zhou, Zhou Feng, Qingming Li, Chunqiang Hu, Shouling Ji:
How to Train a Backdoor-Robust Model on a Poisoned Dataset without Auxiliary Data? CoRR abs/2405.12719 (2024) - [i13]Yuwen Pu, Zhuoyuan Ding, Jiahao Chen, Chunyi Zhou, Qingming Li, Chunqiang Hu, Shouling Ji:
A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning. CoRR abs/2405.12751 (2024) - [i12]Jiahao Chen, Zhiqiang Shen, Yuwen Pu, Chunyi Zhou, Changjiang Li, Ting Wang, Shouling Ji:
Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective. CoRR abs/2405.12786 (2024) - [i11]Jiahao Chen, Zhou Feng, Rui Zeng, Yuwen Pu, Chunyi Zhou, Yi Jiang, Yuyou Gan, Jinbao Li, Shouling Ji:
Enhancing Adversarial Transferability with Adversarial Weight Tuning. CoRR abs/2408.09469 (2024) - [i10]Xing He, Jiahao Chen, Yuwen Pu, Qingming Li, Chunyi Zhou, Yingcai Wu, Jinbao Li, Shouling Ji:
CAMH: Advancing Model Hijacking Attack in Machine Learning. CoRR abs/2408.13741 (2024) - [i9]Rui Zeng, Xi Chen, Yuwen Pu, Xuhong Zhang, Tianyu Du, Shouling Ji:
CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models. CoRR abs/2409.01193 (2024) - 2023
- [j5]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, Ting Wang:
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 3653-3668 (2023) - [c6]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. USENIX Security Symposium 2023: 3421-3438 - [i8]Lujia Shen, Xuhong Zhang, Shouling Ji, Yuwen Pu, Chunpeng Ge, Xing Yang, Yanghe Feng:
TextDefense: Adversarial Text Detection based on Word Importance Entropy. CoRR abs/2302.05892 (2023) - [i7]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. CoRR abs/2306.11206 (2023) - [i6]Yuwen Pu, Jiahao Chen, Jiayu Pan, Hao Li, Diqun Yan, Xuhong Zhang, Shouling Ji:
Facial Data Minimization: Shallow Model as Your Privacy Filter. CoRR abs/2310.15590 (2023) - [i5]Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang:
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention. CoRR abs/2311.17400 (2023) - [i4]Zeyu Li, Chenghui Shi, Yuwen Pu, Xuhong Zhang, Yu Li, Jinbao Li, Shouling Ji:
MEAOD: Model Extraction Attack against Object Detectors. CoRR abs/2312.14677 (2023) - 2022
- [c5]Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang:
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution. CCS 2022: 1157-1171 - [i3]Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang:
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution. CoRR abs/2209.01782 (2022) - [i2]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang:
Hijack Vertical Federated Learning Models with Adversarial Embedding. CoRR abs/2212.00322 (2022) - [i1]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Yuwen Pu, Ting Wang:
All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning. CoRR abs/2212.00325 (2022) - 2020
- [j4]Yuwen Pu, Chunqiang Hu, Shaojiang Deng, Arwa Alrawais:
R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme. IEEE Internet Things J. 7(9): 8077-8089 (2020) - [j3]Chunqiang Hu, Yuwen Pu, Feihong Yang, Ruifeng Zhao, Arwa Alrawais, Tao Xiang:
Secure and Efficient Data Collection and Storage of IoT in Smart Ocean. IEEE Internet Things J. 7(10): 9980-9994 (2020) - [j2]Yuwen Pu, Tao Xiang, Chunqiang Hu, Arwa Alrawais, Hongyang Yan:
An efficient blockchain-based privacy preserving scheme for vehicular social networks. Inf. Sci. 540: 308-324 (2020) - [c4]Feihong Yang, Yuwen Pu, Chunqiang Hu, Yan Zhou:
A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks. WASA (1) 2020: 627-639
2010 – 2019
- 2019
- [j1]Yuwen Pu, Jin Luo, Chunqiang Hu, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang:
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. Wirel. Commun. Mob. Comput. 2019: 3985232:1-3985232:11 (2019) - [c3]Yuwen Pu, Ying Wang, Feihong Yang, Jin Luo, Chunqiang Hu, Haibo Hu:
An Efficient and Recoverable Data Sharing Mechanism for Edge Storage. WASA 2019: 247-259 - 2018
- [c2]Yuwen Pu, Jin Luo, Ying Wang, Chunqiang Hu, Yan Huo, Jiong Zhang:
Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach. PAC 2018: 125-126 - [c1]Chunqiang Hu, Jin Luo, Yuwen Pu, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang:
An Efficient Privacy-Preserving Data Aggregation Scheme for IoT. WASA 2018: 164-176
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint