Zhiyuan Yu
Zhiyuan Yu
Home
News
Publications
Teaching
Contact
1
PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning
(
CCS 2024
)
I like this work in that it highlights the principle of holistic reasoning and leverages physical laws. Traditional object recognition and tracking tends to isolate objects and recognize them individually, however, this largely overlooks contextual information. We proposed to incorporate physical invariants, physics-bounded behavior modeling, and efficient rule-based interaction identification, which were used via a reasoning inference framework to produce resilient reocgnition results.
Zhiyuan Yu
,
Ao Li
,
Ruoyao Wen
,
Yijia Chen
,
Ning Zhang
Code
Dataset
Artifact Badges - Available, Functional, Results Reproduced
Website
PDF
DOI
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models
(
USENIX Security 2024
)
This is a systematic study on jailbreak attacks against commercial large language model (LLM) systems. We analyzed existing jailbreak prompts, examined their contributing factors, and conducted user studies to explore human behavioral patterns during jailbreak attempts.
Zhiyuan Yu
,
Xiaogeng Liu
,
Shunning Liang
,
Zach Cameron
,
Chaowei Xiao
,
Ning Zhang
Code
Dataset
Distinguished Paper Award
Artifact Badges - Available, Functional, Results Reproduced
Press
DOI
Website
PDF
Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack
(
IEEE SP 2024
)
We proposed a perturbation-based membership inference attack against image classification models, leveraging importance of pixels as indicated by attribution maps from XAI techniques (e.g., GradCAM, LIME, SHAP).
Han Liu
,
Yuhao Wu
,
Zhiyuan Yu
,
Ning Zhang
DOI
PDF
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis
(
CCS 2023
)
We introduced the concept of proactive defense to combat unauthorized speech synthesis. Our defense works by adding perturbations to speech samples before releasing them into the public domain (e.g., social media and streaming platforms). While the processed sample still sounds like the victim to humans, when it is used for speech synthesis by the attacker, the resulting synthetic speech would resemble others’ voices rather than the victim’s.
Zhiyuan Yu
,
Shixuan Zhai
,
Ning Zhang
Code
DOI
National Public Radio Report
Winner of the FTC Voice Cloning Challenge
PDF
SMACK: Semantically Meaningful Adversarial Audio Attack
(
USENIX Security 2023
)
We introduced a new type of adversarial audio perturbations that manipulate inherent speech attributes like prosody. Compared to traditional Lp-based perturbations, our proposed attack showed improved naturalness and resiliency even when transmitted over-the-air.
Zhiyuan Yu
,
Yuanhaur Chang
,
Ning Zhang
,
Chaowei Xiao
Code
Artifact Badges - Available, Functional, Results Reproduced
DOI
PDF
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography
(
USENIX Security 2023
)
We designed a defense-in-depth approach to verify the integrity of 3D printed medical pastient-specific devices (PSDs). We leveraged CT scans to obtain physical characteristics of the prints, designed computer graphic techniques to crosscheck geometry, and computed Hounsfield units (HU) value distribution to validate materials.
Zhiyuan Yu
,
Yuanhaur Chang
,
Shixuan Zhai
,
Nicholas Deily
,
Tao Ju
,
Xiaofeng Wang
,
Uday Jammalamadaka
,
Ning Zhang
Code
Distinguished Artifact Award
Artifact Badges - Available, Functional, Results Reproduced
DOI
Press
PDF
CodeIPPrompt: Intellectual Property Infringement Assessment of Code Language Models
(
ICML 2023
)
This is an intersting and timely research investigating the potential IP violation of outputs from LLM-based code generation models (such as GitHub Copilot). We developed the first benchmark toolkit to quantify the extent of IP infringement of LLM models, which has been used by companies like Microsoft, and we also proposed several mitigation methods.
Zhiyuan Yu
,
Yuhao Wu
,
Ning Zhang
,
Chenguang Wang
,
Yevgeniy Vorobeychik
,
Chaowei Xiao
Code
Dataset
Website
DOI
Press
PDF
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples
(
CVPR 2023
)
Unlike traditional adversarial attacks that mislead predictions, we developed adversarial perturbations to cause significant delays in the LiDAR perception module by maximizing the number of bounding box proposals.
Han Liu
,
Zhiyuan Yu
,
Yevgeniy Vorobeychik
,
Ning Zhang
Code
DOI
PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens
(
ICCAD 2022
)
We developed an automated attack framework with a software-hardware co-design approach, injecting common-mode noise through power cables to spoof touches on touchscreens.
Huifeng Zhu
,
Zhiyuan Yu
,
Weidong Cao
,
Ning Zhang
,
Xuan Zhang
Code
DOI
PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference
(
RTSS 2022
)
We proposed an AI-driven attack, exploiting resource contention over hardware (memory, cache, TLB) and OS (network, I/O queues) channels to maximize time delays of a victim process in real-time systems.
Ao Li
,
Marion Sudvarg
,
Han Liu
,
Zhiyuan Yu
,
Chris Gill
,
Ning Zhang
Code
DOI
»
Cite
×