Shengzhi Zhang

Orcid: 0000-0001-9432-9779

According to our database1, Shengzhi Zhang authored at least 52 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
MEA-Defender: A Robust Watermark against Model Extraction Attack.
CoRR, 2024

2023
Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain.
J. Netw. Comput. Appl., September, 2023

A Robustness-Assured White-Box Watermark in Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Model Stealing Attack against Multi-Exit Networks.
CoRR, 2023

A Data-free Backdoor Injection Approach in Neural Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

AI-Guardian: Defeating Adversarial Attacks using Backdoors.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

DBIA: Data-Free Backdoor Attack Against Transformer Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems.
ACM Trans. Priv. Secur., 2022

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning.
CoRR, 2022

EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave.
Proceedings of the IEEE International Conference on Trust, 2022

An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Practical Backdoor Attack Against Speaker Recognition System.
Proceedings of the Information Security Practice and Experience, 2022

SecFortress: Securing Hypervisor using Cross-layer Isolation.
Proceedings of the 2022 IEEE International Parallel and Distributed Processing Symposium, 2022

2021
DBIA: Data-free Backdoor Injection Attack against Transformer Networks.
CoRR, 2021

HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks.
CoRR, 2021

AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside.
EAI Endorsed Trans. Security Safety, 2020

Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices.
Proceedings of the 29th USENIX Security Symposium, 2020

EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019

Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Practical Adversarial Attack Against Object Detector.
CoRR, 2018

A Security Model for Dependable Vehicle Middleware and Mobile Applications Connection.
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Proceedings of the 27th USENIX Security Symposium, 2018

All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo.
Proceedings of the IEEE Global Communications Conference, 2018

Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Towards comprehensive protection for OpenFlow controllers.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
A Dual-Linear Kalman Filter for Real-Time Orientation Determination System Using Low-Cost MEMS Sensors.
Sensors, 2016

Towards service continuity for transactional applications via diverse device drivers.
Int. J. Inf. Comput. Secur., 2016

Classifying Android Malware with Dynamic Behavior Dependency Graphs.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors.
Proceedings of the Advances in Information and Computer Security, 2016

A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
Quaternion-Based Unscented Kalman Filter for Accurate Indoor Heading Estimation Using Wearable Multi-Sensor System.
Sensors, 2015

A Study of Network Domains Used in Android Applications.
Proceedings of the Network and System Security - 9th International Conference, 2015

Comprehensive Analysis of the Android Google Play's Auto-update Policy.
Proceedings of the Information Security Practice and Experience, 2015

2014
Machine Learning Based Cross-Site Scripting Detection in Online Social Network.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
Defending return-oriented programming based on virtualization techniques.
Secur. Commun. Networks, 2013

Towards transparent and distributed workload management for large scale web servers.
Future Gener. Comput. Syst., 2013

2012
Hidden node collision recovery protocol for low rate wireless personal area networks.
Wirel. Commun. Mob. Comput., 2012

Assessing the Trustworthiness of Drivers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Letting applications operate through attacks launched from compromised drivers.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems.
IEEE Trans. Inf. Forensics Secur., 2011

HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

LeakProber: a framework for profiling sensitive data leakage paths.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Distributed workload and response time management for web applications.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Availability-sensitive intrusion recovery.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009

2008
Using virtual machines to do cross-layer damage assessment.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008

2007
Fast Recovery from Hidden Node Collision for IEEE 802.15.4 LR-WPANs.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007


  Loading...