What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yansong Gao
Google Scholar
ORCID:
0000-0001-6029-5064
39
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
DFirmSan: A lightweight dynamic memory sanitizer for Linux-based firmware.
Shanquan Yang
Yansong Gao
Boyu Kuang
Yixuan Yang
Anmin Fu
2025
journals/tifs
Decaf: Data Distribution Decompose Attack Against Federated Learning.
Zhiyang Dai
Yansong Gao
Chunyi Zhou
Anmin Fu
Zhi Zhang
Minhui Xue
Yifeng Zheng
Yuqing Zhang
2025
journals/tifs
TruVRF: Toward Triple-Granularity Verification on Machine Unlearning.
Chunyi Zhou
Yansong Gao
Anmin Fu
Kai Chen
Zhi Zhang
Minhui Xue
Zhiyang Dai
Shouling Ji
Yuqing Zhang
2025
journals/tifs
Fantastic Interrupts and Where to Find Them: Exploiting Non-Movable Interrupts on x86.
Xin Zhang
Qingni Shen
Zhi Zhang
Yansong Gao
Jiajun Zou
Yi Yang
Zhonghai Wu
2025
conf/acisp
DeGain: Detecting GAN-Based Data Inversion in Collaborative Deep Learning.
Zhenzhu Chen
Yansong Gao
Anmin Fu
Fanjian Zeng
Boyu Kuang
Robert H. Deng
2025
conf/ndss
Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!
Yansong Gao
Huaibing Peng
Hua Ma
Zhi Zhang
Shuo Wang
Rayne Holland
Anmin Fu
Minhui Xue
Derek Abbott
2025
journals/compsec
A login page transparency and visual similarity-based zero-day phishing defense protocol.
Gaurav Varshney
Akanksha Raj
Divya Sangwan
Sharif Abuadbba
Rina Mishra
Yansong Gao
2025
journals/tifs
Division and Union: Latent Model Watermarking.
Zhiyang Dai
Yansong Gao
Boyu Kuang
Yifeng Zheng
Ajmal Mian
Ruimin Wang
Anmin Fu
2025
conf/asiaccs
Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World.
Hua Ma
Alsharif Abuadbba
Yansong Gao
Hyoungshick Kim
Surya Nepal
2025
conf/uss
Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer.
Junkai Liang
Zhi Zhang
Xin Zhang
Qingni Shen
Yansong Gao
Xingliang Yuan
Haiyang Xue
Pengfei Wu
Zhonghai Wu
2025
conf/uss
TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis.
Bo Zhang
Yansong Gao
Changlong Yu
Boyu Kuang
Zhi Zhang
Hyoungshick Kim
Anmin Fu
2024
journals/compsec
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems.
Hang Thanh Bui
Hamed Aboutorab
Arash Mahboubi
Yansong Gao
Nazatul Haque Sultan
Aufeef Chauhan
Mohammad Zavid Parvez
Michael Bewong
Rafiqul Islam
Zahidul Islam
Seyit Ahmet Çamtepe
Praveen Gauravaram
Dineshkumar Singh
Muhammad Ali Babar
Shihao Yan
2024
journals/compsec
BopSkyline: Boosting privacy-preserving skyline query service in the cloud.
Weibo Wang
Yifeng Zheng
Songlei Wang
Zhongyun Hua
Lei Xu
Yansong Gao
2024
journals/tifs
CareFL: Contribution Guided Byzantine-Robust Federated Learning.
Qihao Dong
Shengyuan Yang
Zhiyang Dai
Yansong Gao
Shang Wang
Yuan Cao
Anmin Fu
Willy Susilo
2024
journals/tifs
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
Yinshan Li
Hua Ma
Zhi Zhang
Yansong Gao
Alsharif Abuadbba
Minhui Xue
Anmin Fu
Yifeng Zheng
Said F. Al-Sarawi
Derek Abbott
2024
journals/tifs
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses.
Huaibing Peng
Huming Qiu
Hua Ma
Shuo Wang
Anmin Fu
Said F. Al-Sarawi
Derek Abbott
Yansong Gao
2024
journals/tifs
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
Huming Qiu
Hua Ma
Zhi Zhang
Alsharif Abuadbba
Wei Kang
Anmin Fu
Yansong Gao
2024
conf/ccs
Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense.
Hua Ma
Shang Wang
Yansong Gao
Zhi Zhang
Huming Qiu
Minhui Xue
Alsharif Abuadbba
Anmin Fu
Surya Nepal
Derek Abbott
2024
conf/uss
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection.
Shaofeng Li
Xinyu Wang
Minhui Xue
Haojin Zhu
Zhi Zhang
Yansong Gao
Wen Wu
Xuemin (Sherman) Shen
2024
conf/sp
DeepTheft: Stealing DNN Model Architectures through Power Side Channel.
Yansong Gao
Huming Qiu
Zhi Zhang
Binghui Wang
Hua Ma
Alsharif Abuadbba
Minhui Xue
Anmin Fu
Surya Nepal
2024
conf/asiaccs
SoK: Rowhammer on Commodity Operating Systems.
Zhi Zhang
Decheng Chen
Jiahao Qi
Yueqiang Cheng
Shijie Jiang
Yiyang Lin
Yansong Gao
Surya Nepal
Yi Zou
Jiliang Zhang
Yang Xiang
2023
journals/compsec
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning.
Hua Ma
Qun Li
Yifeng Zheng
Zhi Zhang
Xiaoning Liu
Yansong Gao
Said F. Al-Sarawi
Derek Abbott
2023
journals/tifs
Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction.
Ngoc Duy Pham
Alsharif Abuadbba
Yansong Gao
Khoa Tran Phan
Naveen K. Chilamkurti
2023
journals/tifs
APMSA: Adversarial Perturbation Against Model Stealing Attacks.
Jiliang Zhang
Shuang Peng
Yansong Gao
Zhi Zhang
Qinghui Hong
2023
conf/asiaccs
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Shang Wang
Yansong Gao
Anmin Fu
Zhi Zhang
Yuqing Zhang
Willy Susilo
Dongxi Liu
2023
conf/ndss
PPA: Preference Profiling Attack Against Federated Learning.
Chunyi Zhou
Yansong Gao
Anmin Fu
Kai Chen
Zhiyang Dai
Zhi Zhang
Minhui Xue
Yuqing Zhang
2023
conf/acsac
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Seonhye Park
Alsharif Abuadbba
Shuo Wang
Kristen Moore
Yansong Gao
Hyoungshick Kim
Surya Nepal
2022
journals/compsec
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation.
Yueqiang Cheng
Zhi Zhang
Yansong Gao
Zhaofeng Chen
Shengjian Guo
Qifei Zhang
Rui Mei
Surya Nepal
Yang Xiang
2022
journals/compsec
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.
Boyu Kuang
Anmin Fu
Willy Susilo
Shui Yu
Yansong Gao
2022
journals/compsec
SEDML: Securely and efficiently harnessing distributed knowledge in machine learning.
Yansong Gao
Qun Li
Yifeng Zheng
Guohong Wang
Jiannan Wei
Mang Su
2022
journals/tifs
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
Zhenzhu Chen
Shang Wang
Anmin Fu
Yansong Gao
Shui Yu
Robert H. Deng
2021
journals/tifs
Detecting Hardware-Assisted Virtualization With Inconspicuous Features.
Zhi Zhang
Yueqiang Cheng
Yansong Gao
Surya Nepal
Dongxi Liu
Yi Zou
2021
journals/tifs
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability.
Zhi Zhang
Wei He
Yueqiang Cheng
Wenhao Wang
Yansong Gao
Minghua Wang
Kang Li
Surya Nepal
Yang Xiang
2021
conf/dsn
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN.
Bedeuro Kim
Alsharif Abuadbba
Yansong Gao
Yifeng Zheng
Muhammad Ejaz Ahmed
Surya Nepal
Hyoungshick Kim
2020
conf/ccs
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Sharif Abuadbba
Kyuyeon Kim
Minki Kim
Chandra Thapa
Seyit Ahmet Çamtepe
Yansong Gao
Hyoungshick Kim
Surya Nepal
2020
conf/iciss
A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks.
Yansong Gao
Surya Nepal
2019
journals/tifs
Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses.
Yansong Gao
Yang Su
Lei Xu
Damith Chinthana Ranasinghe
2019
conf/acsac
STRIP: a defence against trojan attacks on deep neural networks.
Yansong Gao
Chang Xu
Derui Wang
Shiping Chen
Damith Chinthana Ranasinghe
Surya Nepal
2015
conf/acns
mrPUF: A Novel Memristive Device Based Physical Unclonable Function.
Yansong Gao
Damith Chinthana Ranasinghe
Said F. Al-Sarawi
Omid Kavehei
Derek Abbott
Coauthors
Ajmal Mian
(1)
Akanksha Raj
(1)
Alsharif Abuadbba
(8)
Anmin Fu
(17)
Arash Mahboubi
(1)
Aufeef Chauhan
(1)
Bedeuro Kim
(1)
Binghui Wang
(1)
Bo Zhang
(1)
Boyu Kuang
(5)
Chandra Thapa
(1)
Chang Xu
(1)
Changlong Yu
(1)
Chunyi Zhou
(3)
Damith Chinthana Ranasinghe
(3)
Decheng Chen
(1)
Derek Abbott
(6)
Derui Wang
(1)
Dineshkumar Singh
(1)
Divya Sangwan
(1)
Dongxi Liu
(2)
Fanjian Zeng
(1)
Gaurav Varshney
(1)
Guohong Wang
(1)
Haiyang Xue
(1)
Hamed Aboutorab
(1)
Hang Thanh Bui
(1)
Haojin Zhu
(1)
Hua Ma
(8)
Huaibing Peng
(2)
Huming Qiu
(4)
Hyoungshick Kim
(5)
Jiahao Qi
(1)
Jiajun Zou
(1)
Jiannan Wei
(1)
Jiliang Zhang
(2)
Junkai Liang
(1)
Kai Chen
(2)
Kang Li
(1)
Khoa Tran Phan
(1)
Kristen Moore
(1)
Kyuyeon Kim
(1)
Lei Xu
(2)
Mang Su
(1)
Michael Bewong
(1)
Minghua Wang
(1)
Minhui Xue
(8)
Minki Kim
(1)
Mohammad Zavid Parvez
(1)
Muhammad Ali Babar
(1)
Muhammad Ejaz Ahmed
(1)
Naveen K. Chilamkurti
(1)
Nazatul Haque Sultan
(1)
Ngoc Duy Pham
(1)
Omid Kavehei
(1)
Pengfei Wu
(1)
Praveen Gauravaram
(1)
Qifei Zhang
(1)
Qihao Dong
(1)
Qinghui Hong
(1)
Qingni Shen
(2)
Qun Li
(2)
Rafiqul Islam
(1)
Rayne Holland
(1)
Rina Mishra
(1)
Robert H. Deng
(2)
Rui Mei
(1)
Ruimin Wang
(1)
Said F. Al-Sarawi
(4)
Seonhye Park
(1)
Seyit Ahmet Çamtepe
(2)
Shang Wang
(4)
Shanquan Yang
(1)
Shaofeng Li
(1)
Sharif Abuadbba
(2)
Shengjian Guo
(1)
Shengyuan Yang
(1)
Shihao Yan
(1)
Shijie Jiang
(1)
Shiping Chen
(1)
Shouling Ji
(1)
Shuang Peng
(1)
Shui Yu
(2)
Shuo Wang
(3)
Songlei Wang
(1)
Surya Nepal
(12)
Wei He
(1)
Wei Kang
(1)
Weibo Wang
(1)
Wen Wu
(1)
Wenhao Wang
(1)
Willy Susilo
(3)
Xiaoning Liu
(1)
Xin Zhang
(1)
Xin Zhang
(1)
Xingliang Yuan
(1)
Xinyu Wang
(1)
Xuemin (Sherman) Shen
(1)
Yang Su
(1)
Yang Xiang
(3)
Yansong Gao
(39)
Yi Yang
(1)
Yi Zou
(2)
Yifeng Zheng
(7)
Yinshan Li
(1)
Yixuan Yang
(1)
Yiyang Lin
(1)
Yuan Cao
(1)
Yueqiang Cheng
(4)
Yuqing Zhang
(4)
Zahidul Islam
(1)
Zhaofeng Chen
(1)
Zhenzhu Chen
(2)
Zhi Zhang
(19)
Zhiyang Dai
(5)
Zhonghai Wu
(2)
Zhongyun Hua
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to