


Остановите войну!
for scientists:


default search action
Yihua Zhang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i15]Yihua Zhang, Pranay Sharma, Parikshit Ram, Mingyi Hong, Kush R. Varshney, Sijia Liu:
What Is Missing in IRM Training and Evaluation? Challenges and Solutions. CoRR abs/2303.02343 (2023) - [i14]Jinghan Jia, Yihua Zhang, Dogyoon Song, Sijia Liu, Alfred O. Hero III:
Robustness-preserving Lifelong Learning via Dataset Condensation. CoRR abs/2303.04183 (2023) - [i13]Haomin Zhuang, Yihua Zhang, Sijia Liu:
A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion. CoRR abs/2303.16378 (2023) - 2022
- [c21]Tianlong Chen, Zhenyu Zhang, Yihua Zhang, Shiyu Chang, Sijia Liu, Zhangyang Wang:
Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free. CVPR 2022: 588-599 - [c20]Yihua Zhang, Christian Stöhr
, Susanne Strömberg Jämsvi, Jens Kabo:
Considering the Community of Inquiry Framework in Online Engineering Education. FIE 2022: 1-9 - [c19]Yihua Zhang, Guanhua Zhang, Prashant Khanduri, Mingyi Hong, Shiyu Chang, Sijia Liu:
Revisiting and Advancing Fast Adversarial Training Through The Lens of Bi-Level Optimization. ICML 2022: 26693-26712 - [c18]Yihua Zhang, Yuguang Yao, Parikshit Ram, Pu Zhao, Tianlong Chen, Mingyi Hong, Yanzhi Wang, Sijia Liu:
Advancing Model Pruning via Bi-level Optimization. NeurIPS 2022 - [c17]Guanhua Zhang, Yihua Zhang, Yang Zhang, Wenqi Fan, Qing Li, Sijia Liu, Shiyu Chang:
Fairness Reprogramming. NeurIPS 2022 - [c16]Gaoyuan Zhang, Songtao Lu, Yihua Zhang, Xiangyi Chen, Pin-Yu Chen, Quanfu Fan, Lee Martie, Lior Horesh, Mingyi Hong, Sijia Liu:
Distributed adversarial training to robustify deep neural networks at scale. UAI 2022: 2353-2363 - [i12]Tianlong Chen, Zhenyu Zhang, Yihua Zhang, Shiyu Chang, Sijia Liu, Zhangyang Wang:
Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free. CoRR abs/2205.11819 (2022) - [i11]Gaoyuan Zhang, Songtao Lu, Yihua Zhang, Xiangyi Chen, Pin-Yu Chen, Quanfu Fan, Lee Martie, Lior Horesh, Mingyi Hong, Sijia Liu:
Distributed Adversarial Training to Robustify Deep Neural Networks at Scale. CoRR abs/2206.06257 (2022) - [i10]Guanhua Zhang, Yihua Zhang, Yang Zhang, Wenqi Fan, Qing Li, Sijia Liu, Shiyu Chang:
Fairness Reprogramming. CoRR abs/2209.10222 (2022) - [i9]Yihua Zhang, Yuguang Yao, Parikshit Ram, Pu Zhao
, Tianlong Chen, Mingyi Hong, Yanzhi Wang, Sijia Liu:
Advancing Model Pruning via Bi-level Optimization. CoRR abs/2210.04092 (2022) - [i8]Aochuan Chen, Yuguang Yao, Pin-Yu Chen, Yihua Zhang, Sijia Liu:
Understanding and Improving Visual Prompting: A Label-Mapping Perspective. CoRR abs/2211.11635 (2022) - [i7]Bairu Hou, Jinghan Jia, Yihua Zhang, Guanhua Zhang, Yang Zhang, Sijia Liu, Shiyu Chang:
TextGrad: Advancing Robustness Evaluation in NLP by Gradient-Driven Optimization. CoRR abs/2212.09254 (2022) - 2021
- [i6]Yihua Zhang, Guanhua Zhang, Prashant Khanduri, Mingyi Hong, Shiyu Chang, Sijia Liu:
Revisiting and Advancing Fast Adversarial Training Through The Lens of Bi-Level Optimization. CoRR abs/2112.12376 (2021)
2010 – 2019
- 2019
- [j9]Wan Li
, Yihua Zhang, Yuehan He, Yahui Wang, Shanshan Guo, Xilei Zhao, Yuyan Feng, Zhaona Song, Yuqing Zou, Weiming He, Lina Chen
:
Candidate gene prioritization for non-communicable diseases based on functional information: Case studies. J. Biomed. Informatics 93 (2019) - [j8]Xiao Fu
, Zhijian Wang, Yunfeng Chen, Yihua Zhang, Hao Wu:
Bead Strand Model: a high-efficiency storage structure for self-destructing data in cloud environment. Serv. Oriented Comput. Appl. 13(2): 95-103 (2019) - [j7]Dan Li
, Ming Liu, Shengwei Gao, Yongjun Shi, Yihua Zhang
, Zhiyong Li, Patrick Yin Chiang, Franco Maloberti
, Li Geng
:
Low-Noise Broadband CMOS TIA Based on Multi-Stage Stagger-Tuned Amplifier for High-Speed High-Sensitivity Optical Communication. IEEE Trans. Circuits Syst. I Regul. Pap. 66-I(10): 3676-3689 (2019) - [c15]Yihua Zhang, Zhuoqi Guo, Yang Xie, Dan Li, Shiquan Fan, Xiaoyan Gui, Li Geng:
A Stacked 4×25 Gb/s Optical Receiver in 28 nm CMOS with 0.154 mW/Gb/s Power Efficiency. ISCAS 2019: 1-4 - 2018
- [j6]Yihua Zhang, Marina Blanton, Ghada Almashaqbeh:
Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler. ACM Trans. Priv. Secur. 21(2): 6:1-6:34 (2018) - [c14]Jun Chen, Yihua Zhang, Yuan Wang, Ruoli Ma:
Research on Interaction Modeling of Cross-border E-commerce and Import and Export Trade. ICSEB 2018: 15-19 - [c13]Yang Xie, Dan Li, Yiqun Liu, Ming Liu, Yihua Zhang, Xiaoli Wang, Li Geng:
Low-Noise High-Linearity 56Gb/s PAM-4 Optical Receiver in 45nm SOI CMOS. ISCAS 2018: 1-4 - 2017
- [c12]Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani:
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation. ESORICS (2) 2017: 552-569 - [i5]Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani:
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation. IACR Cryptol. ePrint Arch. 2017: 569 (2017) - 2016
- [j5]Yihua Zhang, Marina Blanton:
Efficient Dynamic Provable Possession of Remote Data via Update Trees. ACM Trans. Storage 12(2): 9:1-9:45 (2016) - [c11]Rui Xing, Ning Dai, Yicheng Zhong, Yihua Zhang, Yi Liu:
A modeling method of customized brackets and individualized trays for orthodontic treatment. CISP-BMEI 2016: 1562-1566 - 2015
- [j4]Yihua Zhang, Marina Blanton, Ghada Almashaqbeh:
Secure distributed genome analysis for GWAS and sequence comparison computation. BMC Medical Informatics Decis. Mak. 15-S(5): S4 (2015) - [i4]Yihua Zhang, Marina Blanton, Ghada Almashaqbeh:
Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler. CoRR abs/1509.01763 (2015) - 2014
- [j3]Shengping Zhang, Jiani Tan, Zhonghui Lai, Ying Li, Junxia Pang, Jianhu Xiao, Zhangjian Huang, Yihua Zhang, Hui Ji, Yisheng Lai:
Effective Virtual Screening Strategy toward Covalent Ligands: Identification of Novel NEDD8-Activating Enzyme Inhibitors. J. Chem. Inf. Model. 54(6): 1785-1797 (2014) - [c10]Yihua Zhang, Marina Blanton:
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications. ISC 2014: 158-178 - [i3]Yihua Zhang, Marina Blanton:
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications. IACR Cryptol. ePrint Arch. 2014: 133 (2014) - 2013
- [j2]Liang Gao, Dongming Li, Yihua Zhang:
Research of Weeds Classification System Based on Shape Feature. J. Softw. 8(7): 1736-1742 (2013) - [j1]Marina Blanton, Yihua Zhang, Keith B. Frikken:
Secure and verifiable outsourcing of large-scale biometric computations. ACM Trans. Inf. Syst. Secur. 16(3): 11 (2013) - [c9]Yihua Zhang, Marina Blanton:
Efficient dynamic provable possession of remote data via balanced update trees. AsiaCCS 2013: 183-194 - [c8]Yihua Zhang, Aaron Steele, Marina Blanton:
PICCO: a general-purpose compiler for private distributed computation. CCS 2013: 813-826 - [c7]Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele:
Secure Computation on Floating Point Numbers. NDSS 2013 - 2012
- [i2]Yihua Zhang, Marina Blanton:
Efficient Dynamic Provable Possession of Remote Data via Update Trees. IACR Cryptol. ePrint Arch. 2012: 291 (2012) - [i1]Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele:
Secure Computation on Floating Point Numbers. IACR Cryptol. ePrint Arch. 2012: 405 (2012) - 2011
- [c6]Yihua Zhang
, Jia Peng, Di Huang
, Fang Li:
Design of Automatic Mapping System between DDC and CLC. ICADL 2011: 357-366 - [c5]Marina Blanton, Yihua Zhang, Keith B. Frikken:
Secure and Verifiable Outsourcing of Large-Scale Biometric Computations. SocialCom/PASSAT 2011: 1185-1191 - 2010
- [c4]Keith B. Frikken, Yihua Zhang:
Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity. ICETE (Selected Papers) 2010: 172-187 - [c3]Keith B. Frikken, Yihua Zhang:
Confidentiality and Integrity for SUM Aggregation in Sensor Networks. SECRYPT 2010: 231-240
2000 – 2009
- 2008
- [c2]Keith B. Frikken, Yihua Zhang:
Yet another privacy metric for publishing micro-data. WPES 2008: 117-122 - 2000
- [c1]Fan Mo, Yihua Zhang, Jun Yu, Qianling Zhang:
An algorithm for VLSI implementation of highly efficient cubic-polynomial evaluation. ASP-DAC 2000: 13-14
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-05-12 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint