Tianhang Zheng

Orcid: 0000-0002-5151-1527

According to our database1, Tianhang Zheng authored at least 24 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FedReview: A Review Mechanism for Rejecting Poisoned Updates in Federated Learning.
CoRR, 2024

Separable Multi-Concept Erasure from Diffusion Models.
CoRR, 2024

2023
Fair Text-to-Image Diffusion via Fair Mapping.
CoRR, 2023

FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.
CoRR, 2023

RDM-DC: Poisoning Resilient Dataset Condensation with Robust Distribution Matching.
Proceedings of the Uncertainty in Artificial Intelligence, 2023

2022
On the Robustness of Metric Learning: An Adversarial Perspective.
ACM Trans. Knowl. Discov. Data, 2022

Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection.
IEEE Trans. Inf. Forensics Secur., 2022

Poisoning Attacks on Deep Learning based Wireless Traffic Prediction.
Proceedings of the IEEE INFOCOM 2022, 2022

InfoCensor: An Information-Theoretic Framework against Sensitive Attribute Inference and Demographic Disparity.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
First-Order Efficient General-Purpose Clean-Label Data Poisoning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Profanity-Avoiding Training Framework for Seq2seq Models with Certified Robustness.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Can We Use Arbitrary Objects to Attack LiDAR Perception in Autonomous Driving?
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Towards Assessment of Randomized Mechanisms for Certifying Adversarial Robustness.
CoRR, 2020

Towards Understanding the Adversarial Vulnerability of Skeleton-based Action Recognition.
CoRR, 2020

Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Accelerometer-based smartphone eavesdropping.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

2019
Towards Data Poisoning Attack against Knowledge Graph Embedding.
CoRR, 2019

FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Data Poisoning Attack against Knowledge Graph Embedding.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

PointCloud Saliency Maps.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Distributionally Adversarial Attack.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Learning Saliency Maps for Adversarial Point-Cloud Generation.
CoRR, 2018

2017
Data Independent Identification for Privacy Preservation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017


  Loading...