Picture for Yunsi Fei

Yunsi Fei

Northeastern University

MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs

Add code
Aug 20, 2025
Viaarxiv icon

Graph in the Vault: Protecting Edge GNN Inference with Trusted Execution Environment

Add code
Feb 20, 2025
Viaarxiv icon

Non-transferable Pruning

Add code
Oct 10, 2024
Figure 1 for Non-transferable Pruning
Figure 2 for Non-transferable Pruning
Figure 3 for Non-transferable Pruning
Figure 4 for Non-transferable Pruning
Viaarxiv icon

GraphCroc: Cross-Correlation Autoencoder for Graph Structural Reconstruction

Add code
Oct 04, 2024
Figure 1 for GraphCroc: Cross-Correlation Autoencoder for Graph Structural Reconstruction
Figure 2 for GraphCroc: Cross-Correlation Autoencoder for Graph Structural Reconstruction
Figure 3 for GraphCroc: Cross-Correlation Autoencoder for Graph Structural Reconstruction
Figure 4 for GraphCroc: Cross-Correlation Autoencoder for Graph Structural Reconstruction
Viaarxiv icon

VertexSerum: Poisoning Graph Neural Networks for Link Inference

Add code
Aug 02, 2023
Viaarxiv icon

EMShepherd: Detecting Adversarial Samples via Side-channel Leakage

Add code
Mar 27, 2023
Figure 1 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 2 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 3 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 4 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Viaarxiv icon

Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers

Add code
Sep 07, 2021
Figure 1 for Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers
Figure 2 for Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers
Figure 3 for Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers
Figure 4 for Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers
Viaarxiv icon

Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks

Add code
May 28, 2019
Figure 1 for Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks
Figure 2 for Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks
Figure 3 for Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks
Figure 4 for Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks
Viaarxiv icon