ZHU Yulin

Profile of ZHU Yulin

Department of Computer Science, Assistant Professor


Professional Experience

  • 07/2024 – Present, Assistant Professor, Hong Kong Chu Hai College (HKCHC), Tuen Mun, HKSAR.
  • 10/2020 – 07/2024, Postdoctoral Fellow and Research Fellow, Hong Kong Polytechnic University (PolyU), Hung Hom, HKSAR
  • 09/2016 – 10/2020, Teaching Assistant, The Chinese University of Hong Kong (CUHK), Sha Tin, HKSAR.
  • 01/2020 – 08/2020, Part-time Research Intern, TCL Moka International Limited, Sha Tin, HKSAR.

Education

09/2016 – 12/2020
Ph.D.
The Chinese University of Hong Kong

09/2012 – 06/2016
B.S.
Wuhan University


Selected Publications (More in Google Scholar)

  • Journal articles
    1. Michał T. Godziszewski, Marcin Waniek, Yulin Zhu, Kai Zhou, Talal Rahwan, Tomasz P. Michalak. (2024). Adversarial Analysis of Similarity-Based Sign Prediction. Artificial Intelligence, Elsevier, volume 335, DOI: https://doi.org/10.1016/j.artint.2024.104173
    2. Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jun Wu, Jian Ren, Kai Zhou. (2024). From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection. IEEE Trans. on Neural Networks and Learning Systems, DOI: 1109/TNNLS.2024.3400395
    3. Yulin Zhu, Tomasz Michalak, Xiapu Luo, Xiaoge Zhang, Kai Zhou. (2024). Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks. IEEE Trans. on Information Forensics and Security, volume 19, DOI: 1109/TIFS.2024.3364366
    4. Yuni Lai, Yulin Zhu, Wenqi Fan, Xiaoge Zhang, Kai Zhou. (2023). Towards Adversarially Robust Recommendation from Adaptive Fraudster Detection. IEEE Trans. on Information Forensics and Security, volume 19, DOI: https://doi.org/10.1109/TIFS.2023.3327876
    5. Yulin Zhu, Liang Tong, Gaolei Li, Xiapu Luo, Kai Zhou. (2023). FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification. IEEE Trans. on Knowledge and Data Engineering, volume 36, DOI: 1109/TKDE.2023.3322129.
    6. Yuni Lai, Marcin Waniek, Liying Li, Jingwen Wu, Yulin Zhu, Tomasz P Michalak, Talal Rahwan, Kai Zhou. (2024). Coupled-Space Attacks Against Random-Walk-based Anomaly Detection. IEEE Trans. on Information Forensics and Security, volume 19, DOI: 1109/TIFS.2024.3468156.
    7. Yu Bu, Yulin Zhu, Longling Geng, Kai Zhou. (2024). Unleashing the power of indirect attacks against trust prediction via preferential path. Knowledge and Information Systems, https://doi.org/10.1007/s10115-024-02327-9.
  • Conference papers
    1. Yuni Lai, Yulin Zhu, Bailin Pan, Kai Zhou. (2024, May 20th-23th). Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks, IEEE Symposium on Security and Privacy San Francisco, CA, USA. DOI: 1109/SP54263.2024.00241
    2. Yuwei Han, Yuni Lai, Yulin Zhu, Kai Zhou.(2024, April 14th-19th). Cost Aware Untargeted Poisoning Attack Against Graph Neural Networks. IEEE International Conference on Acoustics, Speech and Signal Processing, Seoul, Korea. DOI: 1109/ICASSP48485.2024.10446170.
    3. Yu Bu, Yulin Zhu, Longling Geng, Kai Zhou. (2024, April 14th-19th). Uncovering Strong Ties: A Study of Indirect Sybil Attack on Signed Social Network. IEEE International Conference on Acoustics, Speech and Signal Processing, Seoul, Korea. DOI: 1109/ICASSP48485.2024.10447587
    4. Xing Ai, Jialong Zhou, Yulin Zhu, Gaolei Li, Tomasz P Michalak, Xiapu Luo, Kai Zhou. (2024, May 13th-17th). Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach. IEEE International Conference on Data Engineering, Utrecht, Netherlands. DOI: 1109/ICDE60146.2024.00098
    5. Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou. (2022, May 9th-12th). BinarizedAttack: Structural Poisoning Attacks to Graph-Based Anomaly Detection. IEEE International Conference on Data Engineering, Kuala Lumpur, Malaysia. DOI: 1109/ICDE53745.2022.00006
    6. Kaifa Zhao, Hao Zhou, Yulin Zhu, Xian Zhan, Kai Zhou, Jianfeng Li, Le Yu, Wei Yuan, Xiapu Luo. (2021, November 15th-19th). Structural Attack Against Graph Based Android Malware Detection. Proceedings of ACM Conference on Computer and Communications Security, Seoul, Korea. DOI: https://doi.org/10.1145/3460120.3485387
    7. MT Godziszewski, TP Michalak, M Waniek, T Rahwan, Kai Zhou, Yulin Zhu. (2021, December 7th-10th). Attacking Similarity-Based Sign Prediction. IEEE International Conference on Data Mining, Auckland, New Zealand. DOI: 1109/ICDM51629.2021.00173
    8. Yu Bu, Yulin Zhu, Kai Zhou. (2025, April 6th-11th). Crowdsourced Homophily Ties Based Graph Annotation Via Large Language Model. IEEE International Conference on Acoustics, Speech and Signal Processing, Hyderabad, India.