Kai Zhou

Orcid: 0000-0003-1383-2765

Affiliations:
  • Hong Kong Polytechnic University, Department of Computing, Hong Kong
  • Washington University in Saint Louis, MO, USA (former)
  • Michigan State University, East Lansing, MI, USA (PhD 2018)


According to our database1, Kai Zhou authored at least 41 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Adversarially Robust Recommendation From Adaptive Fraudster Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices.
CoRR, 2024

Collective Certified Robustness against Graph Injection Attacks.
CoRR, 2024

Adversarially Robust Signed Graph Contrastive Learning from Balance Augmentation.
CoRR, 2024

Universally Robust Graph Neural Networks by Preserving Neighbor Similarity.
CoRR, 2024

2023
Hiding From Centrality Measures: A Stackelberg Game Perspective.
IEEE Trans. Knowl. Data Eng., October, 2023

Toward Certified Robustness of Graph Neural Networks in Adversarial AIoT Environments.
IEEE Internet Things J., August, 2023

Cost Aware Untargeted Poisoning Attack against Graph Neural Networks, .
CoRR, 2023

Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks.
CoRR, 2023

Black-Box Attacks against Signed Graph Analysis via Balance Poisoning.
CoRR, 2023

Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach.
CoRR, 2023

Dual-Space Attacks against Random-Walk-based Anomaly Detection.
CoRR, 2023

Homophily-Driven Sanitation View for Robust Graph Contrastive Learning.
CoRR, 2023

Simple yet Effective Gradient-Free Graph Convolutional Networks.
CoRR, 2023

2022
How Fraudster Detection Contributes to Robust Recommendation.
CoRR, 2022

FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification.
CoRR, 2022

Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Graphs.
CoRR, 2022

From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection.
CoRR, 2022

BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

2021
CASO: Cost-Aware Secure Outsourcing of General Computational Problems.
IEEE Trans. Serv. Comput., 2021

Attacking Similarity-Based Sign Prediction.
Proceedings of the IEEE International Conference on Data Mining, 2021

Structural Attack against Graph Based Android Malware Detection.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Strategic Evasion of Centrality Measures.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

2020
P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing.
IEEE Trans. Big Data, 2020

Robust Collective Classification against Structural Attacks.
Proceedings of the Thirty-Sixth Conference on Uncertainty in Artificial Intelligence, 2020

Blocking Adversarial Influence in Social Networks.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Computing Equilibria in Binary Networked Public Goods Games.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Adversarial Robustness of Similarity-Based Link Prediction.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Attacking Similarity-Based Link Prediction in Social Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Privacy Characterization and Quantification in Data Publishing.
IEEE Trans. Knowl. Data Eng., 2018

PassBio: Privacy-Preserving User-Centric Biometric Authentication.
IEEE Trans. Inf. Forensics Secur., 2018

Adversarial Link Prediction in Social Networks.
CoRR, 2018

Security and Privacy Enhancement for Outsourced Biometric Identification.
CoRR, 2018

Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network.
CoRR, 2018

Security and Privacy Enhancement for Outsourced Biometric Identification.
Proceedings of the IEEE Global Communications Conference, 2018

2017
ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2017

2016
CDMA System Design and Capacity Analysis Under Disguised Jamming.
IEEE Trans. Inf. Forensics Secur., 2016

Secure Fine-Grained Access Control of Mobile User Data through Untrusted Cloud.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

LinSOS: Secure outsourcing of linear computations based on affine mapping.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Secure outsourcing of scalar multiplication on elliptic curves.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Robust CDMA receiver design under disguised jamming.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016


  Loading...