1. Y. Zhang*, Y. Yao*, P. Ram, P. Zhao, T. Chen, M. Hong, Y. Wang, S. Liu, Advancing Model Pruning via Bi-level Optimization, NeurIPS’22.

  2. Y. Gong*, Y. Yao*, Y. Li, Y. Zhang, X. Liu, X. Lin, S. Liu, Reverse Engineering of Imperceptible Adversarial Image Perturbations, ICLR’22.

  3. Y. Zhang, Y. Yao, J. Jia, J. Yi, M. Hong, S. Chang, S. Liu, How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective, ICLR’22 Spotlight.

  4. V. Taneja, P. Chen, Y. Yao, S. Liu, When Does Backdoor Attack Succeed in Image Reconstruction? A Study of Heuristics VS. Bi-Level Solution, ICASSP’22.

  5. P. Zhao, P. Ram, S. Lu, Y. Yao, D. Bouneffouf, X. Lin, S. Liu, Learning to Generate Image Source-Agnostic Universal Adversarial Perturbations, IJCAI’22.

  6. Q. Fan*, Y. Li*, Y. Yao, J. Cohn, S. Vos, M. Cianfrocco, CryoRL: Reinforcement Learning Enables Efficient Cryo-EM Data Collection, arXiv.

  7. L. Liu, Y. Yao, Z. Cao, M. Zhang, DeepLoRa: Learning Accurate Path Loss Model for Long Distance Links in LPWAN, INFOCOM’21.

  8. L. Li*, M. Liu*, Y. Yao, F. Dang, Z. Cao, Y. Liu, Patronus: Preventing Unauthorized Speech Recordings with Support for Selective Unscrambling, SenSys’20.

  9. C. Li, Z. Liu, Y. Yao, Z. Cao, M. Zhang, Y. Liu, Wi-fi see it all: generative adversarial network-augmented versatile wi-fi imaging, SenSys’20.

  10. Y. Yao, Z. Ma, Z. Cao, LoSee: Long-Range Shared Bike Communication System Based On LoRaWAN Protocol, EWSN’19.