Jiaheng Zhang

Orcid: 0000-0002-7950-7845

According to our database1, Jiaheng Zhang authored at least 62 papers between 2017 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
DMark: Order-Agnostic Watermarking for Diffusion Large Language Models.
CoRR, October, 2025

DiffuGuard: How Intrinsic Safety is Lost and Found in Diffusion Large Language Models.
CoRR, September, 2025

MoPE: A Mixture of Password Experts for Improving Password Guessing.
CoRR, September, 2025

RepoMark: A Code Usage Auditing Framework for Code Large Language Models.
CoRR, August, 2025

ExtendAttack: Attacking Servers of LRMs via Extending Reasoning.
CoRR, June, 2025

TrojanTO: Action-Level Backdoor Attacks against Trajectory Optimization Models.
CoRR, June, 2025

FinMultiTime: A Four-Modal Bilingual Dataset for Financial Time-Series Analysis.
CoRR, June, 2025

Efficient Reasoning via Chain of Unconscious Thought.
CoRR, May, 2025

Silent Leaks: Implicit Knowledge Extraction Attack on RAG Systems through Benign Queries.
CoRR, May, 2025

GuardReasoner-VL: Safeguarding VLMs via Reinforced Reasoning.
CoRR, May, 2025

Geneshift: Impact of different scenario shift on Jailbreaking LLM.
CoRR, April, 2025

Efficient Inference for Large Reasoning Models: A Survey.
CoRR, March, 2025

Sparse Autoencoder as a Zero-Shot Classifier for Concept Erasing in Text-to-Image Diffusion Models.
CoRR, March, 2025

NaviDet: Efficient Input-level Backdoor Detection on Text-to-Image Synthesis via Neuron Activation Variation.
CoRR, March, 2025

Navigating the Helpfulness-Truthfulness Trade-Off with Uncertainty-Aware Instruction Fine-Tuning.
CoRR, February, 2025

GuardReasoner: Towards Reasoning-based LLM Safeguards.
CoRR, January, 2025

Reliable and Responsible Foundation Models.
Trans. Mach. Learn. Res., 2025

Arena: Multi-Leader Synchronous Byzantine Fault Tolerance.
IEEE Trans. Inf. Forensics Secur., 2025

Vectorized Falcon-Sign Implementations using SSE2, AVX2, AVX-512F, NEON, and RVV.
IACR Cryptol. ePrint Arch., 2025

zkPyTorch: A Hierarchical Optimized Compiler for Zero-Knowledge Machine Learning.
IACR Cryptol. ePrint Arch., 2025

GKR for Boolean Circuits with Sub-linear RAM Operations.
IACR Cryptol. ePrint Arch., 2025

Data Availability for Thousands of Nodes.
IACR Cryptol. ePrint Arch., 2025

An Edge-Guided SAM for effective complex object segmentation.
Expert Syst. Appl., 2025

Quasi-stability criteria for continuous memristive neural networks with interval delays.
Commun. Nonlinear Sci. Numer. Simul., 2025

Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation.
Proceedings of the 34th USENIX Security Symposium, 2025

DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs.
Proceedings of the 34th USENIX Security Symposium, 2025

Provably Robust Multi-bit Watermarking for AI-generated Text.
Proceedings of the 34th USENIX Security Symposium, 2025

zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference.
Proceedings of the 34th USENIX Security Symposium, 2025

HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Cost.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Prompt Inversion Attack Against Collaborative Inference of Large Language Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Mosformer: Maliciously Secure Three-Party Inference Framework for Large Transformers.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

BatchZK: A Fully Pipelined GPU-Accelerated System for Batch Generation of Zero-Knowledge Proofs.
Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2025

2024
Demodulation Scheme Against Phase Noise Using an Ensemble Clustering Approach.
IEEE Trans. Mob. Comput., December, 2024

Privacy-Preserving Physical-Layer Authentication Under Cooperative Attacks.
IEEE/ACM Trans. Netw., April, 2024

Hybrid Physical-Layer Authentication.
IEEE Trans. Mob. Comput., February, 2024

An Efficient and Extensible Zero-knowledge Proof Framework for Neural Networks.
IACR Cryptol. ePrint Arch., 2024

Scalable Collaborative zk-SNARK and Its Application to Efficient Proof Outsourcing.
IACR Cryptol. ePrint Arch., 2024

HyperPianist: Pianist with Linear-Time Prover via Fully Distributed HyperPlonk.
IACR Cryptol. ePrint Arch., 2024

Political-LLM: Large Language Models in Political Science.
CoRR, 2024

Lazarus: Resilient and Elastic Training of Mixture-of-Experts Models with Adaptive Expert Placement.
CoRR, 2024

Provably Robust Multi-bit Watermarking for AI-generated Text via Error Correction Code.
CoRR, 2024

Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

SelfLoc: High Quality Unsupervised Object Localization with Self-Prompt SAM.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

2023
Security Provided by the Physical Layer in Wireless Communications.
IEEE Netw., September, 2023

Reading Multilevel 2-D Barcodes Using a Machine Learning Approach.
IEEE Internet Things J., July, 2023

Physical Layer Authentication in Spatial Modulation.
IEEE Trans. Commun., May, 2023

Efficient Zero-Knowledge Proofs: Theory and Practice
PhD thesis, 2023

Joint Estimation of Channel Responses and Phase Noises in Asynchronous MIMO Systems With Intentional Timing Offset.
IEEE Trans. Commun., 2023

Correlation Intractability and SNARGs from Sub-exponential DDH.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
An improved YOLOv5-based vegetable disease detection method.
Comput. Electron. Agric., 2022

Polynomial Commitment with a One-to-Many Prover and Applications.
Proceedings of the 31st USENIX Security Symposium, 2022

zkBridge: Trustless Cross-chain Bridges Made Practical.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Bag-of-Concepts representation for document classification based on automatic knowledge acquisition from probabilistic knowledge base.
Knowl. Based Syst., 2020

Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time.
IACR Cryptol. ePrint Arch., 2020

Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Convolutional Transformer with Sentiment-aware Attention for Sentiment Analysis.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Zero Knowledge Proofs for Decision Tree Predictions and Accuracy.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Searching for Cryptogenography Upper Bounds via Sum of Square Programming.
Proceedings of the 30th International Symposium on Algorithms and Computation, 2019

Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2017
Modeling of a dynamic dual-input dual-output fast steeringmirror system.
Frontiers Inf. Technol. Electron. Eng., 2017

PDD Graph: Bridging Electronic Medical Records and Biomedical Knowledge Graphs via Entity Linking.
Proceedings of the Semantic Web - ISWC 2017, 2017


  Loading...