default search action
Jiyi Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Han Fang, Yupeng Qiu, Guorui Qin, Jiyi Zhang, Kejiang Chen, Weiming Zhang, Ee-Chien Chang:
DP2Dataset Protection by Data Poisoning. IEEE Trans. Dependable Secur. Comput. 21(2): 636-649 (2024) - [c9]Jiyi Zhang, Han Fang, Ee-Chien Chang:
Finding Input Data Domains of Image Classification Models with Hard-Label Black-Box Access. ACM Multimedia 2024: 11166-11174 - [i9]Jiyi Zhang, Han Fang, Ee-Chien Chang:
Domain Bridge: Generative model-based domain forensic for black-box models. CoRR abs/2402.04640 (2024) - [i8]Xiaoxia Li, Siyuan Liang, Jiyi Zhang, Han Fang, Aishan Liu, Ee-Chien Chang:
Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs. CoRR abs/2402.14872 (2024) - 2023
- [j7]Zengjie Wang, Xiaoyu Niu, Zhenxia Liu, Wen Luo, Zhaoyuan Yu, Jiyi Zhang, Linwang Yuan:
A line-of-sight zoning method for intervisibility computation by considering terrain relief. Int. J. Geogr. Inf. Sci. 37(11): 2416-2436 (2023) - [j6]Fan Yang, Yiting Pan, Fangshuo Zhang, Fangyuan Feng, Zhenjia Liu, Jiyi Zhang, Yu Liu, Lin Li:
Geometry and Topology Reconstruction of BIM Wall Objects from Photogrammetric Meshes and Laser Point Clouds. Remote. Sens. 15(11): 2856 (2023) - [j5]Han Fang, Zhaoyang Jia, Yupeng Qiu, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
De-END: Decoder-Driven Watermarking Network. IEEE Trans. Multim. 25: 7571-7581 (2023) - [c8]Han Fang, Yupeng Qiu, Kejiang Chen, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions. AAAI 2023: 5054-5061 - [c7]Jiyi Zhang, Han Fang, Wesley Joon-Wie Tann, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers. AsiaCCS 2023: 704-715 - [c6]Jiyi Zhang, Tianzi Wei, Ruitong Liu, Fan Yang, Yingying Wei, Jingyu Wang:
A Multi-dimensional Unified Concavity and Convexity Detection Method Based on Geometric Algebra. CGI (4) 2023: 188-199 - [c5]Han Fang, Jiyi Zhang, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. ICCV 2023: 4312-4321 - [i7]Han Fang, Jiyi Zhang, Yupeng Qiu, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. CoRR abs/2301.01218 (2023) - [i6]Jiyi Zhang, Han Fang, Hwee Kuan Lee, Ee-Chien Chang:
Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation. CoRR abs/2305.05869 (2023) - [i5]Jiyi Zhang, Han Fang, Ee-Chien Chang:
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks. CoRR abs/2306.01400 (2023) - 2022
- [j4]Dongshuang Li, Yuhao Teng, Xinxin Zhou, Jiyi Zhang, Wen Luo, Binru Zhao, Zhaoyuan Yu, Linwang Yuan:
A tensor-based approach to unify organization and operation of data for irregular spatio-temporal fields. Int. J. Geogr. Inf. Sci. 36(9): 1885-1904 (2022) - [j3]Fan Yang, You Li, Mingliang Che, Shihua Wang, Yingli Wang, Jiyi Zhang, Xinliang Cao, Chi Zhang:
The Polygonal 3D Layout Reconstruction of an Indoor Environment via Voxel-Based Room Segmentation and Space Partition. ISPRS Int. J. Geo Inf. 11(10): 530 (2022) - [c4]Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee:
Confusing and Detecting ML Adversarial Attacks with Injected Attractors. AsiaCCS 2022: 322-336 - [i4]Han Fang, Zhaoyang Jia, Yupeng Qiu, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
De-END: Decoder-driven Watermarking Network. CoRR abs/2206.13032 (2022) - 2021
- [j2]Hong Gao, Zhenjun Yan, Xu Hu, Zhaoyuan Yu, Wen Luo, Linwang Yuan, Jiyi Zhang:
A Method for Exploring and Analyzing Spatiotemporal Patterns of Traffic Congestion in Expressway Networks Based on Origin-Destination Data. ISPRS Int. J. Geo Inf. 10(5): 288 (2021) - [j1]Fan Yang, Mingliang Che, Xinkai Zuo, Lin Li, Jiyi Zhang, Chi Zhang:
Volumetric Representation and Sphere Packing of Indoor Space for Three-Dimensional Room Segmentation. ISPRS Int. J. Geo Inf. 10(11): 739 (2021) - [c3]Zhenjun Yan, Zhaoyuan Yu, Yun Wang, Wen Luo, Jiyi Zhang, Hong Gao, Linwang Yuan:
Unified Expression Frame of Geodetic Stations Based on Conformal Geometric Algebra. CGI 2021: 682-693 - [c2]Jiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang, Hwee Kuan Lee:
Common Component in Black-Boxes Is Prone to Attacks. ESORICS (1) 2021: 584-604 - [i3]Jiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang:
Mitigating Adversarial Attacks by Distributing Different Copies to Different Users. CoRR abs/2111.15160 (2021) - 2020
- [i2]Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee:
Detection and Recovery of Adversarial Attacks with Injected Attractors. CoRR abs/2003.02732 (2020)
2010 – 2019
- 2019
- [c1]Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, Zhenkai Liang:
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment. CCS 2019: 225-240 - 2018
- [i1]Jiyi Zhang, Hung Dang, Hwee Kuan Lee, Ee-Chien Chang:
Learning Inverse Mappings with Adversarial Criterion. CoRR abs/1802.04504 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint