Follow
Yuankai Zhang
Yuankai Zhang
Research Scientist, Facebook
Verified email at fb.com - Homepage
Title
Cited by
Cited by
Year
Hidden Voice Commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th USENIX Security Symposium (Security 16), 2016
7412016
Cocaine noodles: exploiting the gap between human and machine speech recognition
T Vaidya, Y Zhang, M Sherr, C Shields
9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015
2442015
Dispersing Asymmetric DDoS Attacks with SplitStack
A Chen, A Sriraman, T Vaidya, Y Zhang, A Haeberlen, BT Loo, LTX Phan, ...
ACM Workshop on Hot Topics in Networks (HotNets 16), 2016
232016
Dedos: Defusing dos with dispersion oriented software
HM Demoulin, T Vaidya, I Pedisich, B DiMaiolo, J Qian, C Shah, Y Zhang, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
132018
Privacy-preserving Network Provenance
Y Zhang, A O’Neill, M Sherr, W Zhou
Proceedings of the VLDB Endowment 10 (11), 1550 - 1561, 2017
132017
A demonstration of the dedos platform for defusing asymmetric ddos attacks in data centers
HM Demoulin, T Vaidya, I Pedisich, N Sultana, B Wang, J Qian, Y Zhang, ...
Proceedings of the SIGCOMM Posters and Demos, 71-73, 2017
42017
Hidden voice commands In 25th USENIX Security Symposium (USENIX Security 16)
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
Austin, TX, 1-20, 2016
32016
Optimizing and Debugging Distributed Systems with Declarative Languages
Y Zhang
Georgetown University, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–8