Follow
Zhiyuan Yu
Zhiyuan Yu
Verified email at wustl.edu - Homepage
Title
Cited by
Cited by
Year
Don’t Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models
Z Yu, X Liu, S Liang, Z Cameron, C Xiao, N Zhang
33rd USENIX Security Symposium (USENIX Security 24), 2024
632024
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Z Yu, Z Kaplan, Q Yan, N Zhang
IEEE Communications Surveys & Tutorials 23 (3), 1879-1919, 2021
462021
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples
H Liu, Z Yu, Y Vorobeychik, N Zhang
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023, 2023
332023
CodeIPPrompt: Intellectual Property Infringement Assessment of Code Language Models
Z Yu, Y Wu, N Zhang, C Wang, Y Vorobeychik, C Xiao
40th International Conference on Machine Learning (ICML) 2023, 2023
322023
Day-ahead Coordinated Scheduling of Hydro and Wind Power Generation System Considering Uncertainties
Y Li, T Zhao, C Liu, Y Zhao, Z Yu, K Li, L Wu
IEEE Transactions on Industry Applications 55 (3), 2368-2377, 2019
322019
Automatic and universal prompt injection attacks against large language models
X Liu, Z Yu, Y Zhang, N Zhang, C Xiao
arXiv preprint arXiv:2403.04957, 2024
302024
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis
Z Yu, S Zhai, N Zhang
2023 ACM Conference on Computer and Communications Security (CCS), 2023
212023
SMACK: Semantically Meaningful Adversarial Audio Attack
Z Yu, Y Chang, N Zhang, C Xiao
32nd USENIX Security Symposium (USENIX Security 23), 2023
202023
Please tell me more: Privacy impact of explainability through the lens of membership inference attack
H Liu, Y Wu, Z Yu, N Zhang
2024 IEEE Symposium on Security and Privacy (SP), 120-120, 2024
182024
When Evil Calls: Targeted Adversarial Voice over IP Network
H Liu, Z Yu, M Zha, X Wang, W Yeoh, Y Vorobeychik, N Zhang
2022 ACM Conference on Computer and Communications Security (CCS), 2022
182022
HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions
Z Yu, Z Li, Y Chang, S Fong, J Liu, N Zhang
2022 ACM Conference on Computer and Communications Security (CCS), 2022
122022
PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference
A Li*, M Sudvarg*, H Liu, Z Yu, C Gill, N Zhang
2022 IEEE Real-Time Systems Symposium (RTSS), 2022
112022
PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens
H Zhu, Z Yu, W Cao, N Zhang, X Zhang
2022 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2022
62022
Polyrhythm: Adaptive tuning of a multichannel attack template for timing interference. In 2022 IEEE Real-Time Systems Symposium (RTSS)
A Li, M Sudvarg, H Liu, Z Yu, C Gill, N Zhang
IEEE, 2022
62022
ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems
C Zhou, Q Yan, Z Yu, E Dixit, N Zhang, H Zeng, AS Ghanhdari
arXiv preprint arXiv:2305.08037, 2023
52023
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography
Z Yu, Y Chang, S Zhai, N Deily, T Ju, XF Wang, U Jammalamadaka, ...
32nd USENIX Security Symposium (USENIX Security 23), 2023
32023
Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory
W Yan, H Zhu, Z Yu, F Tehranipoor, J Chandy, N Zhang, X Zhang
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
22020
PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning
Z Yu, A Li, R Wen, Y Chen, N Zhang
2024 ACM Conference on Computer and Communications Security (CCS), 2024
12024
Towards Automated Computational Auditing of mHealth Security and Privacy Regulations
B Tung*, Z Yu*, N Zhang
2021 ACM Conference on Computer and Communications Security (CCS), 2021
12021
Understanding the Bad Development Practices of Android Custom Permissions in the Wild
X Zhang, Z Yu, X Li, C Zhang, C Sun, N Zhang, RH Deng
IEEE Transactions on Dependable and Secure Computing, 2025
2025
The system can't perform the operation now. Try again later.
Articles 1–20