Publication
Y. Zhang*, Y. Yao*, P. Ram, P. Zhao, T. Chen, M. Hong, Y. Wang, S. Liu, Advancing Model
Pruning via Bi-level Optimization, NeurIPS’22.
Y. Gong*, Y. Yao*, Y. Li, Y. Zhang, X. Liu, X. Lin, S. Liu, Reverse Engineering of Imperceptible
Adversarial Image Perturbations, ICLR’22.
Y. Zhang, Y. Yao, J. Jia, J. Yi, M. Hong, S. Chang, S. Liu, How to Robustify Black-Box ML
Models? A Zeroth-Order Optimization Perspective, ICLR’22 Spotlight.
V. Taneja, P. Chen, Y. Yao, S. Liu, When Does Backdoor Attack Succeed in Image
Reconstruction? A Study of Heuristics VS. Bi-Level Solution, ICASSP’22.
P. Zhao, P. Ram, S. Lu, Y. Yao, D. Bouneffouf, X. Lin, S. Liu, Learning to Generate Image
Source-Agnostic Universal Adversarial Perturbations, IJCAI’22.
Q. Fan*, Y. Li*, Y. Yao, J. Cohn, S. Vos, M. Cianfrocco, CryoRL: Reinforcement Learning
Enables Efficient Cryo-EM Data Collection, arXiv.
L. Liu, Y. Yao, Z. Cao, M. Zhang, DeepLoRa: Learning Accurate Path Loss Model for Long
Distance Links in LPWAN, INFOCOM’21.
L. Li*, M. Liu*, Y. Yao, F. Dang, Z. Cao, Y. Liu, Patronus: Preventing Unauthorized Speech
Recordings with Support for Selective Unscrambling, SenSys’20.
C. Li, Z. Liu, Y. Yao, Z. Cao, M. Zhang, Y. Liu, Wi-fi see it all: generative adversarial
network-augmented versatile wi-fi imaging, SenSys’20.
Y. Yao, Z. Ma, Z. Cao, LoSee: Long-Range Shared Bike Communication System Based On
LoRaWAN Protocol, EWSN’19.
|