


Остановите войну!
for scientists:


default search action
Yuanshun Yao
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j1]Zhujun Xiao, Jenna Cryan, Yuanshun Yao, Yi Hong Gordon Cheo, Yuanchao Shu, Stefan Saroiu, Ben Y. Zhao, Haitao Zheng:
"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing. Proc. Priv. Enhancing Technol. 2023(3): 252-267 (2023) - [c12]Jiankai Sun, Xin Yang, Yuanshun Yao, Junyuan Xie, Di Wu, Chong Wang:
DPAUC: Differentially Private AUC Computation in Federated Learning. AAAI 2023: 15170-15178 - [c11]Zhaowei Zhu, Yuanshun Yao, Jiankai Sun, Hang Li, Yang Liu:
Weak Proxies are Sufficient and Preferable for Fairness with Missing Sensitive Attributes. ICML 2023: 43258-43288 - [i18]Shangyu Xie, Xin Yang, Yuanshun Yao, Tianyi Liu, Taiqing Wang, Jiankai Sun:
Label Inference Attack against Split Learning under Regression Setting. CoRR abs/2301.07284 (2023) - [i17]Yuanshun Yao, Yang Liu:
Understanding Unfairness via Training Concept Influence. CoRR abs/2306.17828 (2023) - [i16]Yang Liu, Yuanshun Yao, Jean-Francois Ton, Xiaoying Zhang, Ruocheng Guo, Hao Cheng, Yegor Klochkov, Muhammad Faaiz Taufiq, Hang Li:
Trustworthy LLMs: a Survey and Guideline for Evaluating Large Language Models' Alignment. CoRR abs/2308.05374 (2023) - [i15]Tongxin Yin, Jean-François Ton, Ruocheng Guo, Yuanshun Yao, Mingyan Liu, Yang Liu:
Fair Classifiers that Abstain without Harm. CoRR abs/2310.06205 (2023) - [i14]Yuanshun Yao, Xiaojun Xu, Yang Liu:
Large Language Model Unlearning. CoRR abs/2310.10683 (2023) - 2022
- [c10]Ruihan Wu, Xin Yang, Yuanshun Yao, Jiankai Sun, Tianyi Liu, Kilian Q. Weinberger, Chong Wang:
Differentially private multi-party data release for linear regression. UAI 2022: 2128-2137 - [i13]Yuanshun Yao, Chong Wang, Hang Li:
Counterfactually Evaluating Explanations in Recommender Systems. CoRR abs/2203.01310 (2022) - [i12]Jiankai Sun, Xin Yang, Yuanshun Yao, Chong Wang:
Label Leakage and Protection from Forward Embedding in Vertical Federated Learning. CoRR abs/2203.01451 (2022) - [i11]Xin Yang, Jiankai Sun, Yuanshun Yao, Junyuan Xie, Chong Wang:
Differentially Private Label Protection in Split Learning. CoRR abs/2203.02073 (2022) - [i10]Jiankai Sun, Xin Yang, Yuanshun Yao, Junyuan Xie, Di Wu, Chong Wang:
Differentially Private AUC Computation in Vertical Federated Learning. CoRR abs/2205.12412 (2022) - [i9]Ruihan Wu, Xin Yang, Yuanshun Yao, Jiankai Sun, Tianyi Liu, Kilian Q. Weinberger, Chong Wang:
Differentially Private Multi-Party Data Release for Linear Regression. CoRR abs/2206.07998 (2022) - [i8]Jiankai Sun, Xin Yang, Yuanshun Yao, Junyuan Xie, Di Wu, Chong Wang:
DPAUC: Differentially Private AUC Computation in Federated Learning. CoRR abs/2208.12294 (2022) - [i7]Zhaowei Zhu, Yuanshun Yao, Jiankai Sun, Yang Liu, Hang Li:
Evaluating Fairness Without Sensitive Attributes: A Framework Using Only Auxiliary Models. CoRR abs/2210.03175 (2022) - [i6]Yuanshun Yao, Chong Wang, Hang Li:
Learning to Counterfactually Explain Recommendations. CoRR abs/2211.09752 (2022) - 2021
- [c9]Emily Wenger, Josephine Passananti
, Arjun Nitin Bhagoji
, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao:
Backdoor Attacks Against Deep Learning Systems in the Physical World. CVPR 2021: 6206-6215 - [i5]Jiankai Sun, Xin Yang, Yuanshun Yao, Aonan Zhang, Weihao Gao, Junyuan Xie, Chong Wang:
Vertical Federated Learning without Revealing Intersection Membership. CoRR abs/2106.05508 (2021) - [i4]Jiankai Sun, Yuanshun Yao, Weihao Gao, Junyuan Xie, Chong Wang:
Defending against Reconstruction Attack in Vertical Federated Learning. CoRR abs/2107.09898 (2021) - 2020
- [i3]Emily Wenger, Josephine Passananti, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao:
Backdoor Attacks on Facial Recognition in the Physical World. CoRR abs/2006.14580 (2020)
2010 – 2019
- 2019
- [c8]Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Latent Backdoor Attacks on Deep Neural Networks. CCS 2019: 2041-2055 - [c7]Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. IEEE Symposium on Security and Privacy 2019: 707-723 - [i2]Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks. CoRR abs/1905.10447 (2019) - 2018
- [c6]Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning. USENIX Security Symposium 2018: 1281-1297 - 2017
- [c5]Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao:
Automated Crowdturfing Attacks and Defenses in Online Review Systems. CCS 2017: 1143-1158 - [c4]Yuanshun Yao, Zhujun Xiao, Bolun Wang, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
Complexity vs. performance: empirical analysis of machine learning as a service. Internet Measurement Conference 2017: 384-397 - [c3]Yanzi Zhu, Yuanshun Yao, Ben Y. Zhao, Haitao Zheng:
Object Recognition and Navigation using a Single Networking Device. MobiSys 2017: 265-277 - [c2]Zhijing Li, Ana Nika, Xinyi Zhang, Yanzi Zhu, Yuanshun Yao, Ben Y. Zhao, Haitao Zheng:
Identifying Value in Crowdsourced Wireless Signal Measurements. WWW 2017: 607-616 - [i1]Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao:
Automated Crowdturfing Attacks and Defenses in Online Review Systems. CoRR abs/1708.08151 (2017) - 2016
- [c1]Xi C. Chen, Yuanshun Yao, Sichao Shi, Snigdhansu Chatterjee
, Vipin Kumar, James H. Faghmous:
A general framework to increase the robustness of model-based change point detection algorithms to outliers and noise. SDM 2016: 162-170
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-11-13 23:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint