Takip et
Yun Shen
Yun Shen
netapp.com üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
" do anything now": Characterizing and evaluating in-the-wild jailbreak prompts on large language models
X Shen, Z Chen, M Backes, Y Shen, Y Zhang
The 31th ACM Conference on Computer and Communications Security (CCS) 2024, 2024
4112024
A privacy manager for cloud computing
S Pearson, Y Shen, M Mowbray
Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009
3812009
Tiresias: Predicting security events through deep learning
Y Shen, E Mariconti, PA Vervier, G Stringhini
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2302018
Inference Attacks Against Graph Neural Networks
Z Zhang, M Chen, M Backes, Y Shen, Y Zhang
The 31st USENIX Security Symposium 2022, 2022
1352022
Node-level membership inference attacks against graph neural networks
X He, R Wen, Y Wu, M Backes, Y Shen, Y Zhang
arXiv preprint arXiv:2102.05429, 2021
1232021
Enhancing privacy in cloud computing via policy-based obfuscation
M Mowbray, S Pearson, Y Shen
The Journal of Supercomputing 61 (2), 267-291, 2012
1022012
The tangled genealogy of IoT malware
E Cozzi, PA Vervier, M Dell'Amico, Y Shen, L Bilge, D Balzarotti
Proceedings of the 36th Annual Computer Security Applications Conference, 1-16, 2020
922020
{ATTACK2VEC}: Leveraging temporal word embeddings to understand the evolution of cyberattacks
Y Shen, G Stringhini
28th USENIX Security Symposium (USENIX Security 19), 905-921, 2019
882019
Model Stealing Attacks Against Inductive Graph Neural Networks
Y Shen, X He, Y Han, Y Zhang
The 43rd IEEE Symposium on Security and Privacy (S&P) 2022, 2022
862022
Before toasters rise up: A view into the emerging IoT threat landscape
PA Vervier, Y Shen
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
812018
Privacy enhancing technologies: A review
Y Shen, S Pearson
Hewlet Packard Development Company. Disponible en https://bit. ly/3cfpAKz, 2011
702011
Data protection-aware design for cloud services
S Creese, P Hopkins, S Pearson, Y Shen
Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009
632009
Composite backdoor attacks against large language models
H Huang, Z Zhao, M Backes, Y Shen, Y Zhang
NAACL Findings 2024, 2024
602024
Accurate spear phishing campaign attribution and early detection
YF Han, Y Shen
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2079-2086, 2016
592016
Iot security and privacy labels
Y Shen, PA Vervier
Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome …, 2019
492019
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content
X He, S Zannettou, Y Shen, Y Zhang
The 45th IEEE Symposium on Security and Privacy (S&P), 2024
452024
Context-aware privacy design pattern selection
S Pearson, Y Shen
International Conference on Trust, Privacy and Security in Digital Business …, 2010
442010
Watermarking diffusion model
Y Liu, Z Li, M Backes, Y Shen, Y Zhang
arXiv preprint arXiv:2305.12502, 2023
372023
Marmite: spreading malicious file reputation through download graphs
G Stringhini, Y Shen, Y Han, X Zhang
Proceedings of the 33rd Annual Computer Security Applications Conference, 91-102, 2017
342017
Amplifying Membership Exposure via Data Poisoning
Y Chen, C Shen, Y Shen, C Wang, Y Zhang
Thirty-sixth Conference on Neural Information Processing Systems (NeurIPS) 2022, 2022
322022
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20