Yuankai Zhang
Yuankai Zhang
Research Scientist, Facebook
Verified email at fb.com - Homepage
Title
Cited by
Cited by
Year
Hidden Voice Commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th USENIX Security Symposium (Security 16), 2016
4452016
Cocaine noodles: exploiting the gap between human and machine speech recognition
T Vaidya, Y Zhang, M Sherr, C Shields
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
1232015
Dispersing Asymmetric DDoS Attacks with SplitStack
A Chen, A Sriraman, T Vaidya, Y Zhang, A Haeberlen, BT Loo, LTX Phan, ...
ACM Workshop on Hot Topics in Networks (HotNets 16), 2016
162016
Dedos: Defusing dos with dispersion oriented software
HM Demoulin, T Vaidya, I Pedisich, B DiMaiolo, J Qian, C Shah, Y Zhang, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
92018
Privacy-preserving Network Provenance
Y Zhang, A O’Neill, M Sherr, W Zhou
Proceedings of the VLDB Endowment 10 (11), 1550 - 1561, 2017
82017
A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers
HM Demoulin, T Vaidya, I Pedisich, N Sultana, B Wang, J Qian, Y Zhang, ...
Proceedings of the SIGCOMM Posters and Demos, 71-73, 2017
32017
Hidden voice commands 25th USENIX Security Symposium (USENIX Security 16)
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
Austin, TX, 1-20, 2016
22016
Optimizing and Debugging Distributed Systems with Declarative Languages
Y Zhang
Georgetown University, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–8