Shuai Zhou

Orcid: 0000-0002-7702-3417

Affiliations:
  • City University of Macau, Faculty of Data Science, Macau
  • University of Technology Sydney, School of Computer Science, Centre of Cyber Security and Privacy, Ultimo, Australia (PhD 2024)
  • University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China (until 2019)


According to our database1, Shuai Zhou authored at least 13 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Unleashing the Power of Pre-trained Encoders for Universal Adversarial Attack Detection.
CoRR, April, 2025

Model Inversion Attack Against Transfer Learning: Inverting a Model Without Querying It.
IEEE Trans. Dependable Secur. Comput., 2025

2024
Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting.
IEEE Trans. Inf. Forensics Secur., 2024

Boosting Model Inversion Attacks With Adversarial Examples.
IEEE Trans. Dependable Secur. Comput., 2024

Defending Against Neural Network Model Inversion Attacks via Data Poisoning.
CoRR, 2024

2023
Label-Only Model Inversion Attacks: Attack With the Least Information.
IEEE Trans. Inf. Forensics Secur., 2023

Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity.
ACM Comput. Surv., 2023

2022
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It.
CoRR, 2022

Label-only Model Inversion Attack: The Attack that Requires the Least Information.
CoRR, 2022

2021
Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Federated Learning.
CoRR, 2021

Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Vertical Federated Learning.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
SecureBP from Homomorphic Encryption.
Secur. Commun. Networks, 2020

2018
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE.
IACR Cryptol. ePrint Arch., 2018


  Loading...