default search action
Yufei Chen 0001
Person information
- unicode name: 陈宇飞
- affiliation: City University of Hong Kong, Department of Computer Science, Hong Kong
- affiliation: Xi'an Jiao Tong University, Key Laboratoryfor Intelligent Networks and Network Security, China
Other persons with the same name
- Yufei Chen (aka: Yu-Fei Chen) — disambiguation page
- Yufei Chen 0002 (aka: Yu-Fei Chen 0002) — Tongji University, College of Electronics and Information Engineering, Shanghai, China (and 2 more)
- Yufei Chen 0003 — ZTE Corp., Beijing, China
- Yufei Chen 0004 — Peking University, Institute of Computer Science and Technology, Beijing, China
- Yufei Chen 0005 — Fudan University, School of Computer Science, Shanghai, China
- Yufei Chen 0006 — University of New South Wales, Faculty of Medicine, Sydney, NSW, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? IEEE Trans. Dependable Secur. Comput. 20(4): 2867-2881 (2023) - [j10]Sen Peng, Yufei Chen, Jie Xu, Zizhuo Chen, Cong Wang, Xiaohua Jia:
Intellectual property protection of DNN models. World Wide Web (WWW) 26(4): 1877-1911 (2023) - [c12]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang:
CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement. ISSTA 2023: 475-487 - [i7]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang:
CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement. CoRR abs/2304.04222 (2023) - [i6]Sen Peng, Yufei Chen, Cong Wang, Xiaohua Jia:
Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process. CoRR abs/2306.03436 (2023) - 2022
- [c11]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang:
Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. ICSE 2022: 921-933 - [c10]Junhao Zhou, Yufei Chen, Chao Shen, Yang Zhang:
Property Inference Attacks Against GANs. NDSS 2022 - [c9]Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang:
Amplifying Membership Exposure via Data Poisoning. NeurIPS 2022 - [c8]Yufei Chen, Chao Shen, Cong Wang, Yang Zhang:
Teacher Model Fingerprinting Attacks Against Transfer Learning. USENIX Security Symposium 2022: 3593-3610 - [i5]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang:
FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. CoRR abs/2204.02567 (2022) - [i4]Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang:
Amplifying Membership Exposure via Data Poisoning. CoRR abs/2211.00463 (2022) - 2021
- [j9]Xinyan Li, Yufei Chen, Cong Wang, Chao Shen:
When Deep Learning Meets Differential Privacy: Privacy, Security, and More. IEEE Netw. 35(6): 148-155 (2021) - [j8]Yufei Chen, Chao Shen, Cong Wang, Qixue Xiao, Kang Li, Yu Chen:
Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications. IEEE Trans. Dependable Secur. Comput. 18(5): 2017-2028 (2021) - [i3]Yufei Chen, Chao Shen, Cong Wang, Yang Zhang:
Teacher Model Fingerprinting Attacks Against Transfer Learning. CoRR abs/2106.12478 (2021) - [i2]Junhao Zhou, Yufei Chen, Chao Shen, Yang Zhang:
Property Inference Attacks Against GANs. CoRR abs/2111.07608 (2021) - 2020
- [j7]Chao Shen, Zhao Wang, Chengxiang Si, Yufei Chen, Xiaojie Su:
Waving Gesture Analysis for User Authentication in the Mobile Environment. IEEE Netw. 34(2): 57-63 (2020) - [j6]Chao Shen, Yufei Chen, Xiaohong Guan, Roy A. Maxion:
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System. IEEE Trans. Dependable Secur. Comput. 17(2): 335-349 (2020) - [j5]Chao Shen, Yufei Chen, Gengshan Yang, Xiaohong Guan:
Toward Hand-Dominated Activity Recognition Systems With Wristband-Interaction Behavior Analysis. IEEE Trans. Syst. Man Cybern. Syst. 50(7): 2501-2511 (2020) - [i1]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models. CoRR abs/2006.14871 (2020)
2010 – 2019
- 2019
- [c7]Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, Kang Li:
Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms. USENIX Security Symposium 2019: 443-460 - 2018
- [j4]Chao Shen, Yufei Chen, Xiaohong Guan:
Performance evaluation of implicit smartphones authentication via sensor-behavior analysis. Inf. Sci. 430: 538-553 (2018) - [j3]Chao Shen, Yuanxun Li, Yufei Chen, Xiaohong Guan, Roy A. Maxion:
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication. IEEE Trans. Inf. Forensics Secur. 13(1): 48-62 (2018) - [j2]Chao Shen, Yufei Chen, Yao Liu, Xiaohong Guan:
Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference. IEEE Trans. Neural Networks Learn. Syst. 29(12): 6292-6302 (2018) - [c6]Xiaozi Liu, Chao Shen, Yufei Chen:
Multi-source Interactive Behavior Analysis for Continuous User Authentication on Smartphones. CCBR 2018: 669-677 - 2017
- [j1]Yufei Chen, Chao Shen:
Performance Analysis of Smartphone-Sensor Behavior for Human Activity Recognition. IEEE Access 5: 3095-3110 (2017) - [c5]Zhanpei Jia, Chao Shen, Xiao Yi, Yufei Chen, Tianwen Yu, Xiaohong Guan:
Big-data analysis of multi-source logs for anomaly detection on network-based system. CASE 2017: 1136-1141 - [c4]Zhao Wang, Chao Shen, Yufei Chen:
Handwaving Authentication: Unlocking Your Smartwatch Through Handwaving Biometrics. CCBR 2017: 545-553 - [c3]Chao Shen, Ziqiang Ren, Yufei Chen, Zhao Wang:
On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach. CSS 2017: 494-502 - [c2]Yufei Chen, Chao Shen, Zhao Wang, Tianwen Yu:
Modeling interactive sensor-behavior with smartphones for implicit and active user authentication. ISBA 2017: 1-6 - 2016
- [c1]Chao Shen, Yufei Chen, Gengshan Yang:
On motion-sensor behavior analysis for human-activity recognition via smartphones. ISBA 2016: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint