📚 Publications
See Google Scholar for additional details.
* denotes equal contribution
Preprint
- UNDER REVIEW Defending Unauthorized Model Merging via Dual-Stage Weight Protection PDF
Wei-Jia Chen, Min-Yen Tsai, Cheng-Yi Lee, Chia-Mu Yu
2025
ECAI BadVim: Unveiling Backdoor Threats in Visual State Space Model arXiv PDF
Cheng-Yi Lee, Yu-Hsuan Chiang, Zhong-You Wu, Chia-Mu Yu, and Chun-Shien LuWACV Defending Against Repetitive Backdoor Attack on Semi-Supervised Learning through Lens of Rate-Distortion-Perception Trade-off PDF Code
Cheng-Yi Lee*, Ching-Chia Kao*, Cheng-Han Yeh, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen
2024
IET Sec. Privacy-enhanced Data Sharing Systems from Hierarchical ID-based Puncturable Functional Encryption with Inner Product Predicates PDF Code
Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo, Raylin TsoICME On the Higher Moment Disparity of Backdoor Attacks [Oral] PDF
Ching-Chia Kao, Cheng-Yi Lee, Chun-Shien Lu, Chia-Mu Yu, Chu-Song ChenICASSP Defending against Clean-Image Backdoor Attack in Multi-Label Classification [Oral] PDF
Cheng-Yi Lee, Cheng-Chang Tsai, Ching-Chia Kao, Chun-Shien Lu, Chia-Mu Yu