Yulin Zhu

ORCID: 0000-0003-1231-1386
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Graph Neural Networks
  • Network Security and Intrusion Detection
  • Neurological disorders and treatments
  • Complex Network Analysis Techniques
  • Parkinson's Disease Mechanisms and Treatments
  • Neuroscience and Neural Engineering
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • EEG and Brain-Computer Interfaces
  • Spam and Phishing Detection
  • Blind Source Separation Techniques
  • Access Control and Trust
  • Optical Network Technologies
  • Advanced Photonic Communication Systems
  • Privacy-Preserving Technologies in Data
  • Neural dynamics and brain function
  • Neuroscience and Neuropharmacology Research
  • Advanced Malware Detection Techniques
  • Advanced Memory and Neural Computing
  • Advanced Fiber Laser Technologies
  • Neural Networks and Applications
  • Energy Load and Power Forecasting
  • HVDC Systems and Fault Protection
  • Control Systems in Engineering

Hong Kong Polytechnic University
2021-2024

Beijing University of Civil Engineering and Architecture
2024

Tianjin University
2017-2023

Beijing Jiaotong University
2021-2022

Duke University
2021

Education Department of Heilongjiang Province
2019-2020

Malware detection techniques achieve great success with deeper insight into the semantics of malware. Among existing techniques, function call graph (FCG) based methods promising performance due to their prominent representations malware's functionalities. Meanwhile, recent adversarial attacks not only perturb feature vectors deceive classifiers (i.e., feature-space attacks) but also investigate how generate real evasive malware problem-space attacks). However, are limited inconsistent...

10.1145/3460120.3485387 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

Graph-based Anomaly Detection (GAD) is becoming prevalent due to the powerful representation abilities of graphs as well recent advances in graph mining techniques. These GAD tools, however, expose a new attacking surface, ironically their unique advantage being able exploit relations among data. That is, attackers now can manipulate those (i.e., structure graph) allow some target nodes evade detection. In this paper, we vulnerability by designing type targeted structural poisoning attacks...

10.1109/icde53745.2022.00006 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2022-05-01

10.1109/sp54263.2024.00241 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2024-05-19

Signed social networks are widely used to model the trust relationships among online users in security-sensitive systems such as cryptocurrency trading platforms, where prediction plays a critical role. In this paper, we investigate how attackers could mislead by secretly manipulating signed networks. To end, first design effective poisoning attacks against representative models. The formulated hard bi-level optimization problems, for which propose several efficient approximation solutions....

10.1109/tifs.2024.3364366 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

Clinically deployed deep brain stimulation (DBS) for the treatment of Parkinson's disease operates in an open loop with fixed parameters, and this may result high energy consumption suboptimal therapy. The objective manuscript is to establish, through simulation a computational model, closed-loop control system that can automatically adjust parameters recover normal activity model neurons. Exaggerated beta band recognized as hallmark neurons globus pallidus internus (GPi) was used feedback...

10.3389/fnins.2021.750806 article EN cc-by Frontiers in Neuroscience 2021-09-16

The Fairness and Goodness Algorithm (FGA) is a widely used trust system in signed directed networks. However, attackers can manipulate scores on FGA by launching indirect Sybil attacks exploiting strong ties. In this work, we propose novel attack method vicinage-attack that formulates the problem as combination optimization for mining candidate attacking edges. Our constructs perturbation spaces infers existence of polymorphic To evaluate vicinage-attack, compare it against several baselines...

10.1109/icassp48485.2024.10447587 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

In this paper, we present a computational analysis of the problem attacking sign prediction, whereby aim attacker (a network member) is to hide from defender (an analyst) signs target set links by removing some other, non-target, links. The turns out be NP-hard if either local or global similarity measures are used for prediction. We propose heuristic algorithm and test its effectiveness on several real-life synthetic datasets.

10.1109/icdm51629.2021.00173 article EN 2021 IEEE International Conference on Data Mining (ICDM) 2021-12-01

Graph Neural Networks (GNNs) have become widely used in the field of graph mining. However, these networks are vulnerable to structural perturbations. While many research efforts focused on analyzing vulnerability through poisoning attacks, we identified an inefficiency current attack losses. These losses steer strategy towards modifying edges targeting misclassified nodes or resilient nodes, resulting a waste adversarial perturbation. To address this issue, propose novel loss framework...

10.1109/icassp48485.2024.10446170 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

Despite the tremendous success of graph neural networks in learning relational data, it has been widely investigated that are vulnerable to structural attacks on homophilic graphs. Motivated by this, a surge robust models is crafted enhance adversarial robustness However, vulnerability based heterophilic graphs remains mystery us. To bridge this gap, paper, we start explore and theoretically prove update negative classification loss negatively correlated with pairwise similarities powered...

10.48550/arxiv.2401.09754 preprint EN cc-by arXiv (Cornell University) 2024-01-01

The success of graph neural networks stimulates the prosperity mining and corresponding downstream tasks including anomaly detection (GAD). However, it has been explored that those methods are vulnerable to structural manipulations on relational data. That is, attacker can maliciously perturb structures assist target nodes in evading detection. In this article, we explore vulnerability two typical GAD systems: unsupervised FeXtra-based supervised convolutional network (GCN)-based GAD....

10.1109/tnnls.2024.3400395 article EN IEEE Transactions on Neural Networks and Learning Systems 2024-01-01

10.1109/i2mtc60896.2024.10560621 article EN 2022 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) 2024-05-20

Parkinson's disease (PD) is a degenerative disorder of central nervous system that endangers the olds' health seriously. The motor symptoms PD can be attributed to distorted relay reliability thalamus cortical sensorimotor input results from increase inhibitory internal segment globus pallidum (GPi). Based on this, we construct GPi-thalamocortical computational model generate normal and pathological firing patterns by varying GPi spike train input. A kind closed-loop deep brain stimulation...

10.1109/tnsre.2017.2699223 article EN IEEE Transactions on Neural Systems and Rehabilitation Engineering 2017-05-02

The akinesia symptoms for Parkinson's disease (PD) is characterized by the abnormal beta (13-30Hz) oscillations in basal ganglia. Deep brain stimulation (DBS) can alleviate movement disorders targeting include thalamic ventralis intermedius nucleus, subthalamic and globus pallidus. Here, we construct a computational model, an inhibitory loop between striatum pallidus externa (GPe). We present firing pattern spectral characteristics of striatal neurons GPe simulated healthy Parkinsonian...

10.23919/chicc.2019.8866389 article EN 2019-07-01

The robustness of recommender systems under node injection attacks has garnered significant attention. Recently, GraphRfi, a Graph-Neural-Network-based (GNN-based) system, was proposed and shown to effectively mitigate the impact injected fake users. However, we demonstrate that GraphRfi remains vulnerable due supervised nature its fraudster detection component, where obtaining clean labels is challenging in practice. In particular, propose powerful poisoning attack, MetaC, against both...

10.1109/tifs.2023.3327876 article EN IEEE Transactions on Information Forensics and Security 2023-10-26

Abstract In the realm of network security, adversarial attacks pose a significant threat, prompting research into innovative strategies for enhancing both attack and defense mechanisms. This paper presents novel exploration enhancement on Fairness Goodness Algorithm (FGA) Review to Reviewer (REV2), focusing trust prediction within signed graphs. contrast traditional time-based dynamics, propagation in FGA REV2 is grounded iterative processes. Through meticulous analysis structures, this...

10.21203/rs.3.rs-3511555/v1 preprint EN cc-by Research Square (Research Square) 2023-11-06

We propose and analyze an instantaneous frequency measurement system by using optical power monitoring technique with improved resolution. The primary component adopted in the proposal is a dual-polarization quadrature phase shift keying (DP-QPSK) modulator which used to modulate microwave signal that has designed time delay shifting. generated sent polarization beam splitter (PBS) DP-QPSK modulator. Owing complementary transmission nature of interference introduced PBS, information...

10.1088/1674-1056/ac40ff article EN Chinese Physics B 2021-12-08
Coming Soon ...