Alert button
Picture for Yunsi Fei

Yunsi Fei

Alert button

Northeastern University

VertexSerum: Poisoning Graph Neural Networks for Link Inference

Add code
Bookmark button
Alert button
Aug 02, 2023
Ruyi Ding, Shijin Duan, Xiaolin Xu, Yunsi Fei

Figure 1 for VertexSerum: Poisoning Graph Neural Networks for Link Inference
Figure 2 for VertexSerum: Poisoning Graph Neural Networks for Link Inference
Figure 3 for VertexSerum: Poisoning Graph Neural Networks for Link Inference
Figure 4 for VertexSerum: Poisoning Graph Neural Networks for Link Inference
Viaarxiv icon

EMShepherd: Detecting Adversarial Samples via Side-channel Leakage

Add code
Bookmark button
Alert button
Mar 27, 2023
Ruyi Ding, Cheng Gongye, Siyue Wang, Aidong Ding, Yunsi Fei

Figure 1 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 2 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 3 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 4 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Viaarxiv icon

Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers

Add code
Bookmark button
Alert button
Sep 07, 2021
Amel Nestor Docena, Thomas Wahl, Trevor Pearce, Yunsi Fei

Figure 1 for Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers
Figure 2 for Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers
Figure 3 for Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers
Figure 4 for Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers
Viaarxiv icon

Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks

Add code
Bookmark button
Alert button
May 28, 2019
Pu Zhao, Siyue Wang, Cheng Gongye, Yanzhi Wang, Yunsi Fei, Xue Lin

Figure 1 for Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks
Figure 2 for Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks
Figure 3 for Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks
Figure 4 for Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks
Viaarxiv icon