Don’t Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models Z Yu, X Liu, S Liang, Z Cameron, C Xiao, N Zhang 33rd USENIX Security Symposium (USENIX Security 24), 2024 | 63 | 2024 |
Security and Privacy in the Emerging Cyber-Physical World: A Survey Z Yu, Z Kaplan, Q Yan, N Zhang IEEE Communications Surveys & Tutorials 23 (3), 1879-1919, 2021 | 46 | 2021 |
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples H Liu, Z Yu, Y Vorobeychik, N Zhang IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023, 2023 | 33 | 2023 |
CodeIPPrompt: Intellectual Property Infringement Assessment of Code Language Models Z Yu, Y Wu, N Zhang, C Wang, Y Vorobeychik, C Xiao 40th International Conference on Machine Learning (ICML) 2023, 2023 | 32 | 2023 |
Day-ahead Coordinated Scheduling of Hydro and Wind Power Generation System Considering Uncertainties Y Li, T Zhao, C Liu, Y Zhao, Z Yu, K Li, L Wu IEEE Transactions on Industry Applications 55 (3), 2368-2377, 2019 | 32 | 2019 |
Automatic and universal prompt injection attacks against large language models X Liu, Z Yu, Y Zhang, N Zhang, C Xiao arXiv preprint arXiv:2403.04957, 2024 | 30 | 2024 |
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis Z Yu, S Zhai, N Zhang 2023 ACM Conference on Computer and Communications Security (CCS), 2023 | 21 | 2023 |
SMACK: Semantically Meaningful Adversarial Audio Attack Z Yu, Y Chang, N Zhang, C Xiao 32nd USENIX Security Symposium (USENIX Security 23), 2023 | 20 | 2023 |
Please tell me more: Privacy impact of explainability through the lens of membership inference attack H Liu, Y Wu, Z Yu, N Zhang 2024 IEEE Symposium on Security and Privacy (SP), 120-120, 2024 | 18 | 2024 |
When Evil Calls: Targeted Adversarial Voice over IP Network H Liu, Z Yu, M Zha, X Wang, W Yeoh, Y Vorobeychik, N Zhang 2022 ACM Conference on Computer and Communications Security (CCS), 2022 | 18 | 2022 |
HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions Z Yu, Z Li, Y Chang, S Fong, J Liu, N Zhang 2022 ACM Conference on Computer and Communications Security (CCS), 2022 | 12 | 2022 |
PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference A Li*, M Sudvarg*, H Liu, Z Yu, C Gill, N Zhang 2022 IEEE Real-Time Systems Symposium (RTSS), 2022 | 11 | 2022 |
PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens H Zhu, Z Yu, W Cao, N Zhang, X Zhang 2022 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2022 | 6 | 2022 |
Polyrhythm: Adaptive tuning of a multichannel attack template for timing interference. In 2022 IEEE Real-Time Systems Symposium (RTSS) A Li, M Sudvarg, H Liu, Z Yu, C Gill, N Zhang IEEE, 2022 | 6 | 2022 |
ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems C Zhou, Q Yan, Z Yu, E Dixit, N Zhang, H Zeng, AS Ghanhdari arXiv preprint arXiv:2305.08037, 2023 | 5 | 2023 |
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography Z Yu, Y Chang, S Zhai, N Deily, T Ju, XF Wang, U Jammalamadaka, ... 32nd USENIX Security Symposium (USENIX Security 23), 2023 | 3 | 2023 |
Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory W Yan, H Zhu, Z Yu, F Tehranipoor, J Chandy, N Zhang, X Zhang 2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020 | 2 | 2020 |
PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning Z Yu, A Li, R Wen, Y Chen, N Zhang 2024 ACM Conference on Computer and Communications Security (CCS), 2024 | 1 | 2024 |
Towards Automated Computational Auditing of mHealth Security and Privacy Regulations B Tung*, Z Yu*, N Zhang 2021 ACM Conference on Computer and Communications Security (CCS), 2021 | 1 | 2021 |
Understanding the Bad Development Practices of Android Custom Permissions in the Wild X Zhang, Z Yu, X Li, C Zhang, C Sun, N Zhang, RH Deng IEEE Transactions on Dependable and Secure Computing, 2025 | | 2025 |