Design of intentional backdoors in sequential models Z Yang, N Iyer, J Reimann, N Virani arXiv preprint arXiv:1902.09972, 2019 | 42 | 2019 |
Adversarial Vulnerability in Doppler-based Human Activity Recognition Z Yang, Y Zhao, W Yan 2020 International Joint Conference on Neural Networks (IJCNN), 1-7, 2020 | 13 | 2020 |
Justification-based reliability in machine learning N Virani, N Iyer, Z Yang Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 6078-6085, 2020 | 13 | 2020 |
Adversarial reinforcement learning for observer design in autonomous systems under cyber attacks A Gupta, Z Yang arXiv preprint arXiv:1809.06784, 2018 | 7 | 2018 |
Variational encoder-based reliable classification C Bhushan, Z Yang, N Virani, N Iyer 2020 IEEE International Conference on Image Processing (ICIP), 1941-1945, 2020 | 6 | 2020 |
Mixed Initiative Approach for Reliable Tagging of Maintenance Records with Machine Learning N Iyer, N Virani, Z Yang, A Saxena Annual Conference of the PHM Society 14 (1), 2022 | 5 | 2022 |
Risk-aware autonomous navigation Y Tan, N Virani, B Good, S Gray, M Yousefhussien, Z Yang, K Angeliu, ... Artificial Intelligence and Machine Learning for Multi-Domain Operations …, 2021 | 4 | 2021 |
Adversarial Purification with the Manifold Hypothesis Z Yang, Z Xu, J Zhang, R Hartley, P Tu AAAI 2024, 2023 | 3* | 2023 |
Uncertainty-aware Perception Models for Off-road Autonomous Unmanned Ground Vehicles Z Yang, Y Tan, S Sen, J Reimann, J Karigiannis, M Yousefhussien, ... arXiv preprint arXiv:2209.11115, 2022 | 3 | 2022 |
Countermeasure against backdoor attacks using epistemic classifiers Z Yang, N Virani, NS Iyer Artificial Intelligence and Machine Learning for Multi-Domain Operations …, 2020 | 3 | 2020 |
IMPUS: Image Morphing with Perceptually-Uniform Sampling Using Diffusion Models Z Yang, Z Yu, Z Xu, J Singh, J Zhang, D Campbell, P Tu, R Hartley ICLR 2024, 2023 | 2 | 2023 |
ArGue: Attribute-Guided Prompt Tuning for Vision-Language Models X Tian, S Zou, Z Yang, J Zhang CVPR 2024, 2023 | 1 | 2023 |
Transferable Attack for Semantic Segmentation M He, J Zhang, Z Yang, M He, N Barnes, Y Dai arXiv preprint arXiv:2307.16572, 2023 | 1 | 2023 |
An Automatic 3D Ultrasound and Photoacoustic Combined Imaging System for Human Inflammatory Arthritis X Peng, A Dentinger, S Kewalramani, Z Xu, S Gray, S Ghose, YT Tan, ... IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, 2023 | 1 | 2023 |
Test-time Defense against Adversarial Attacks: Detection and Reconstruction of Adversarial Examples via Masked Autoencoder YY Tsai, JC Chao, A Wen, Z Yang, C Mao, T Shah, J Yang arXiv preprint arXiv:2303.12848, 2023 | 1 | 2023 |
Backdoor Attacks in Sequential Decision-Making Agents Z Yang, N Iyer, J Reimann, N Virani AAAI Symposium on The 2nd Workshop on Deep Models and Artificial …, 2020 | 1 | 2020 |
Adversarial reinforcement learning for control system design: A deep reinforcement learning approach Z Yang The Ohio State University, 2018 | 1 | 2018 |
Probabilistic and semantic descriptions of image manifolds and their applications P Tu, Z Yang, R Hartley, Z Xu, J Zhang, Y Fu, D Campbell, J Singh, ... Frontiers in Computer Science 5, 1253682, 2023 | | 2023 |
Grounded Language Acquisition From Object and Action Imagery JR Kubricht, Z Yang, J Qiu, PH Tu arXiv preprint arXiv:2309.06335, 2023 | | 2023 |
Fast identification of trustworthy deep neural networks J Reimann, N Virani, N Iyer, Y Zhaoyuan US Patent 11,625,483, 2023 | | 2023 |