Jie Zhang

Orcid: 0000-0002-4230-1077

Affiliations:
  • A*STAR, CFAR, Singapore
  • Nanyang Technological University, College of Computing and Data Science, Singapore (2023 - 2024)
  • University of Science and Technology of China, School of Cyber Science and Security, Hefei, China (PhD 2022)


According to our database1, Jie Zhang authored at least 65 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Cowpox: Towards the Immunity of VLM-based Multi-Agent Systems.
CoRR, August, 2025

Towards Effective Prompt Stealing Attack against Text-to-Image Diffusion Models.
CoRR, August, 2025

PoseGuard: Pose-Guided Generation with Safety Guardrails.
CoRR, August, 2025

BURN: Backdoor Unlearning via Adversarial Boundary Analysis.
CoRR, July, 2025

IRCopilot: Automated Incident Response with Large Language Models.
CoRR, May, 2025

Holmes: Automated Fact Check with Large Language Models.
CoRR, May, 2025

Inception: Jailbreak the Memory Mechanism of Text-to-Image Generation Systems.
CoRR, April, 2025

A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training and Deployment.
CoRR, April, 2025

Mask Image Watermarking.
CoRR, April, 2025

Clean Image May be Dangerous: Data Poisoning Attacks Against Deep Hashing.
CoRR, March, 2025

Exploiting Vulnerabilities in Speech Translation Systems through Targeted Adversarial Attacks.
CoRR, March, 2025

Picky LLMs and Unreliable RMs: An Empirical Study on Safety Alignment after Instruction Tuning.
CoRR, February, 2025

InferDPT: Privacy-Preserving Inference for Closed-Box Large Language Models.
IEEE Trans. Dependable Secur. Comput., 2025

Security analysis and adaptive false data injection against multi-sensor fusion localization for autonomous driving.
Inf. Fusion, 2025

CamLopa: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

On the Vulnerability of Text Sanitization.
Proceedings of the 2025 Conference of the Nations of the Americas Chapter of the Association for Computational Linguistics: Human Language Technologies, 2025

VideoShield: Regulating Diffusion-based Video Generation Models via Watermarking.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

2024
Dual-verification-based model fingerprints against ambiguity attacks.
Cybersecur., December, 2024

Robust Model Watermarking for Image Processing Networks via Structure Consistency.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024

A Robust Database Watermarking Scheme That Preserves Statistical Characteristics.
IEEE Trans. Knowl. Data Eng., June, 2024

Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition.
IEEE Trans. Artif. Intell., March, 2024

EraseAnything: Enabling Concept Erasure in Rectified Flow Transformers.
CoRR, 2024

Reinforcement Learning Enhanced LLMs: A Survey.
CoRR, 2024

SuperMark: Robust and Training-free Image Watermarking via Diffusion-based Super-Resolution.
CoRR, 2024

FaceTracer: Unveiling Source Identities from Swapped Face Images and Videos for Fraud Prevention.
CoRR, 2024

Model X-ray: Detect Backdoored Models via Decision Boundary.
CoRR, 2024

ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Detecting Voice Cloning Attacks via Timbre Watermarking.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

<i>Model X-ray</i>: Detecting Backdoored Models via Decision Boundary.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Transferable Facial Privacy Protection against Blind Face Restoration via Domain-Consistent Adversarial Obfuscation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Attribute-Aware Head Swapping Guided by 3d Modeling.
Proceedings of the IEEE International Conference on Acoustics, 2024

Robust-Wide: Robust Watermarking Against Instruction-Driven Image Editing.
Proceedings of the Computer Vision - ECCV 2024, 2024

GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Detecting Adversarial Examples via Reconstruction-based Semantic Inconsistency.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

Data-Free Hard-Label Robustness Stealing Attack.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Control Risk for Potential Misuse of Artificial Intelligence in Science.
CoRR, 2023

Improving Adversarial Transferability by Stable Diffusion.
CoRR, 2023

FunctionMarker: Watermarking Language Datasets via Knowledge Injection.
CoRR, 2023

Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World.
CoRR, 2023

PrivInfer: Privacy-Preserving Inference for Black-box Large Language Model.
CoRR, 2023

Towards the Vulnerability of Watermarking Artificial Intelligence Generated Content.
CoRR, 2023

Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking.
CoRR, 2023

Aparecium: Revealing Secrets from Physical Photographs.
CoRR, 2023

Watermarking Text Generated by Black-Box Language Models.
CoRR, 2023

Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code Representation.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Ada3Diff: Defending against 3D Adversarial Point Clouds via Adaptive Diffusion.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

ProTegO: Protect Text Content against OCR Extraction Attack.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

AutoStegaFont: Synthesizing Vector Fonts for Hiding Information in Documents.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

DeAR: A Deep-Learning-Based Audio Re-recording Resilient Watermarking.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
JPEG Robust Invertible Grayscale.
IEEE Trans. Vis. Comput. Graph., 2022

Poison Ink: Robust and Invisible Backdoor Attack.
IEEE Trans. Image Process., 2022

Deep Model Intellectual Property Protection via Deep Watermarking.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Tracing Text Provenance via Context-Aware Lexical Substitution.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Deep Template-Based Watermarking.
IEEE Trans. Circuits Syst. Video Technol., 2021

Poison Ink: Robust and Invisible Backdoor Attack.
CoRR, 2021

Exploring Structure Consistency for Deep Model Watermarking.
CoRR, 2021

Initiative Defense against Facial Manipulation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Passport-aware Normalization for Deep Model Protection.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Model Watermarking for Image Processing Networks.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020


  Loading...