default search action
Yushu Zhang 0001
- > Home > Persons > Yushu Zhang 0001
Publications
- 2025
- [j197]Mingfu Xue
, Can He
, Yushu Zhang
, Zhe Liu
, Weiqiang Liu
:
3D Invisible Cloak: A Robust Person Stealth Attack Against Object Detector in Complex 3D Physical Scenarios. IEEE Trans. Emerg. Top. Comput. 13(3): 799-815 (2025) - [j194]Mingfu Xue
, Kewei Chen
, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
An Active Authorization Control Method for Deep Reinforcement Learning Model Based on GANs and Adaptive Trigger. IEEE Trans. Inf. Forensics Secur. 20: 5789-5801 (2025) - 2024
- [j182]Mingfu Xue
, Shifeng Ni, Yinghao Wu, Yushu Zhang, Weiqiang Liu:
Imperceptible and multi-channel backdoor attack. Appl. Intell. 54(11-12): 1099-1116 (2024) - [j178]Mingfu Xue
, Jinlong Fu, Zhiyuan Li, Shifeng Ni
, Heyi Wu, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
A Reinforcement Learning-Based ELF Adversarial Malicious Sample Generation Method. IEEE J. Emerg. Sel. Topics Circuits Syst. 14(4): 743-757 (2024) - [j158]Mingfu Xue
, Xin Wang
, Yinghao Wu
, Shifeng Ni
, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features. IEEE Trans. Artif. Intell. 5(9): 4649-4659 (2024) - [j143]Mingfu Xue
, Yinghao Wu
, Shifeng Ni
, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger. IEEE Trans. Ind. Informatics 20(3): 5004-5013 (2024) - [j134]Mingfu Xue
, Yinghao Wu
, Leo Yu Zhang
, Dujuan Gu
, Yushu Zhang
, Weiqiang Liu
:
SSAT: Active Authorization Control and User's Fingerprint Tracking Framework for DNN IP Protection. ACM Trans. Multim. Comput. Commun. Appl. 20(10): 324:1-324:24 (2024) - [c14]Yifan Shang
, Mingfu Xue
, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection. ACM TUR-C 2024 - [c13]Linji Zhang
, Mingfu Xue
, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
An Imperceptible and Owner-unique Watermarking Method for Graph Neural Networks. ACM TUR-C 2024 - 2023
- [j127]Mingfu Xue
, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples. Appl. Intell. 53(6): 7298-7309 (2023) - [j126]Mingfu Xue
, Xin Wang, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Compression-resistant backdoor attack against deep neural networks. Appl. Intell. 53(17): 20402-20417 (2023) - [j120]Mingfu Xue
, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. IET Comput. Digit. Tech. 17(3-4): 111-126 (2023) - [j116]Mingfu Xue
, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu
:
Detecting backdoor in deep neural networks via intentional adversarial perturbations. Inf. Sci. 634: 564-577 (2023) - [j99]Mingfu Xue
, Chengxiang Yuan, Can He
, Yinghao Wu, Zhiyu Wu, Yushu Zhang
, Zhe Liu
, Weiqiang Liu
:
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks. IEEE Trans. Emerg. Top. Comput. 11(1): 153-169 (2023) - [j98]Mingfu Xue
, Zhiyu Wu, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. IEEE Trans. Emerg. Top. Comput. 11(3): 664-678 (2023) - [i25]Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models. CoRR abs/2310.09822 (2023) - 2022
- [j88]Mingfu Xue
, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication. Appl. Intell. 52(14): 16497-16511 (2022) - [j87]Mingfu Xue
, Can He, Yinghao Wu, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
PTB: Robust physical backdoor attacks against deep neural networks in real world. Comput. Secur. 118: 102726 (2022) - [j77]Mingfu Xue
, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations. IEEE Trans. Artif. Intell. 3(6): 908-923 (2022) - [c7]Yinghao Wu, Mingfu Xue, Dujuan Gu, Yushu Zhang, Weiqiang Liu:
Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks. AICAS 2022: 316-319 - [i24]Mingfu Xue, Xin Wang, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Compression-Resistant Backdoor Attack against Deep Neural Networks. CoRR abs/2201.00672 (2022) - [i23]Mingfu Xue, Shifeng Ni, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks. CoRR abs/2201.13164 (2022) - [i17]Mingfu Xue, Xin Wang, Yinghao Wu, Shifeng Ni, Yushu Zhang, Weiqiang Liu:
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features. CoRR abs/2210.07481 (2022) - 2021
- [c5]Shichang Sun, Haoqi Wang, Mingfu Xue, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks. ISC 2021: 341-357 - [i16]Mingfu Xue, Shichang Sun, Can He, Yushu Zhang, Jian Wang, Weiqiang Liu:
ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples. CoRR abs/2103.01527 (2021) - [i13]Mingfu Xue, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. CoRR abs/2105.13697 (2021) - [i12]Mingfu Xue, Yinghao Wu, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations. CoRR abs/2105.14259 (2021) - [i11]Haoqi Wang, Mingfu Xue, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and remove watermark in deep neural networks via generative adversarial networks. CoRR abs/2106.08104 (2021) - [i10]Mingfu Xue, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Protect the Intellectual Property of Dataset against Unauthorized Use. CoRR abs/2109.07921 (2021) - 2020
- [j60]Mingfu Xue
, Chengxiang Yuan, Heyi Wu, Yushu Zhang, Weiqiang Liu
:
Machine Learning Security: Threats, Countermeasures, and Evaluations. IEEE Access 8: 74720-74742 (2020) - [i8]Mingfu Xue, Chengxiang Yuan, Can He, Zhiyu Wu, Yushu Zhang, Zhe Liu, Weiqiang Liu:
Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks. CoRR abs/2011.13696 (2020)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-05-06 01:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint