


default search action
Leo Yu Zhang
- > Home > Persons > Leo Yu Zhang
Publications
- 2025
[c76]Ziqi Zhou, Bowen Li, Yufei Song, Zhifei Yu, Shengshan Hu, Wei Wan
, Leo Yu Zhang, Dezhong Yao, Hai Jin:
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors. AAAI 2025: 1201-1209
[i60]Ziqi Zhou, Yifan Hu, Yufei Song, Zijing Li, Shengshan Hu, Leo Yu Zhang, Dezhong Yao, Long Zheng, Hai Jin:
Vanish into Thin Air: Cross-prompt Universal Adversarial Attacks for SAM2. CoRR abs/2510.24195 (2025)- 2024
[j61]Jianrong Lu
, Shengshan Hu
, Wei Wan
, Minghui Li
, Leo Yu Zhang
, Lulu Xue, Hai Jin
:
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 5405-5418 (2024)
[c48]Xianlong Wang
, Shengshan Hu
, Yechao Zhang
, Ziqi Zhou
, Leo Yu Zhang
, Peng Xu
, Wei Wan
, Hai Jin
:
ECLIPSE: Expunging Clean-Label Indiscriminate Poisons via Sparse Diffusion Purification. ESORICS (1) 2024: 146-166
[c47]Wei Wan
, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang
, Hai Jin:
MISA: Unveiling the Vulnerabilities in Split Federated Learning. ICASSP 2024: 6435-6439
[c42]Ziqi Zhou, Yufei Song, Minghui Li, Shengshan Hu, Xianlong Wang, Leo Yu Zhang, Dezhong Yao, Hai Jin:
DarkSAM: Fooling Segment Anything Model to Segment Nothing. NeurIPS 2024
[c40]Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan
, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples. SP 2024: 3015-3033
[c39]Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan
, Hai Jin:
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability. SP 2024: 3365-3384
[i54]Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan
, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples. CoRR abs/2403.10801 (2024)
[i47]Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan
, Hai Jin:
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification. CoRR abs/2406.15093 (2024)
[i45]Ziqi Zhou, Yufei Song, Minghui Li, Shengshan Hu, Xianlong Wang, Leo Yu Zhang, Dezhong Yao, Hai Jin:
DarkSAM: Fooling Segment Anything Model to Segment Nothing. CoRR abs/2409.17874 (2024)
[i40]Ziqi Zhou, Bowen Li, Yufei Song, Zhifei Yu, Shengshan Hu, Wei Wan
, Leo Yu Zhang, Dezhong Yao, Hai Jin:
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors. CoRR abs/2412.16955 (2024)- 2023
[c37]Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou
, Minghui Li
, Leo Yu Zhang
, Hai Jin, Lichao Sun:
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models against Adversarial Examples. AAAI 2023: 872-880
[c29]Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang
, Junhui Hou
, Hai Jin:
Downstream-agnostic Adversarial Examples. ICCV 2023: 4322-4332
[c25]Wei Wan
, Shengshan Hu
, Minghui Li
, Jianrong Lu
, Longling Zhang
, Leo Yu Zhang
, Hai Jin
:
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning. ACM Multimedia 2023: 7394-7402
[i36]Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan
, Hai Jin:
Why Does Little Robustness Help? Understanding Adversarial Transferability From Surrogate Training. CoRR abs/2307.07873 (2023)
[i35]Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin:
Downstream-agnostic Adversarial Examples. CoRR abs/2307.12280 (2023)
[i34]Wei Wan
, Shengshan Hu, Minghui Li, Jianrong Lu, Longling Zhang, Leo Yu Zhang, Hai Jin:
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning. CoRR abs/2308.03331 (2023)
[i29]Xianlong Wang, Shengshan Hu, Minghui Li, Zhifei Yu, Ziqi Zhou, Leo Yu Zhang, Hai Jin:
Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations. CoRR abs/2311.18403 (2023)
[i27]Wei Wan
, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin:
MISA: Unveiling the Vulnerabilities in Split Federated Learning. CoRR abs/2312.11026 (2023)- 2022
[c21]Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li
, Leo Yu Zhang, Hai Jin, Libing Wu:
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer. CVPR 2022: 14994-15003
[c17]Wei Wan
, Shengshan Hu, Jianrong Lu, Leo Yu Zhang, Hai Jin, Yuanyuan He:
Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection. IJCAI 2022: 753-760
[c15]Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan He, Hai Jin:
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label. ACM Multimedia 2022: 678-686
[i25]Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Yu Zhang, Hai Jin, Libing Wu:
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer. CoRR abs/2203.03121 (2022)
[i22]Wei Wan
, Shengshan Hu, Jianrong Lu, Leo Yu Zhang, Hai Jin, Yuanyuan He:
Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection. CoRR abs/2204.13256 (2022)
[i20]Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan He, Hai Jin:
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label. CoRR abs/2207.00278 (2022)
[i17]Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou, Minghui Li, Leo Yu Zhang, Hai Jin, Lichao Sun
:
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples. CoRR abs/2211.12294 (2022)- 2021
[c9]Shengshan Hu, Yechao Zhang, Xiaogeng Liu, Leo Yu Zhang, Minghui Li
, Hai Jin:
AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch. ACM Multimedia 2021: 2335-2343

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-26 08:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






