Follow
Yujie Ji
Yujie Ji
Verified email at lehigh.edu
Title
Cited by
Cited by
Year
Model-reuse attacks on deep learning systems
Y Ji, X Zhang, S Ji, X Luo, T Wang
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1992018
Backdoor attacks against learning systems
Y Ji, X Zhang, T Wang
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
792017
Chinese social media analysis for disease surveillance
X Cui, N Yang, Z Wang, C Hu, W Zhu, H Li, Y Ji, C Liu
Personal and Ubiquitous Computing 19, 1125-1132, 2015
362015
Deepclean: data cleaning via question asking
X Zhang, Y Ji, C Nguyen, T Wang
2018 IEEE 5th International Conference on Data Science and Advanced …, 2018
32018
EagleEye: Attack-agnostic defense against adversarial inputs (technical report)
Y Ji, X Zhang, T Wang
arXiv preprint arXiv:1808.00123, 2018
32018
Modular Learning Component Attacks: Today's Reality, Tomorrow's Challenge
X Zhang, Y Ji, T Wang
arXiv preprint arXiv:1708.07807, 2017
32017
Towards Understanding the Dynamics of Adversarial Attacks
Y Ji, T Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2018
Where Classification Fails, Interpretation Rises
C Nguyen, G Georgiev, Y Ji, T Wang
arXiv preprint arXiv:1712.00558, 2017
2017
On the Dynamics of Adversarial Input Attacks
Y Ji, T Wang
Data Cleaning via Question Asking
X Zhang, Y Ji, C Nguyen, T Wang
The system can't perform the operation now. Try again later.
Articles 1–10