Tianwei Zhang

Orcid: 0000-0001-6595-6650

Affiliations:
  • Nanyang Technological University, School of Computer Science and Engineering, Singapore
  • Princeton University, NJ, USA (PhD 2017)
  • Peking University, Beijing, China


According to our database1, Tianwei Zhang authored at least 185 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deep Learning Workload Scheduling in GPU Datacenters: A Survey.
ACM Comput. Surv., June, 2024

An Efficient Preprocessing-Based Approach to Mitigate Advanced Adversarial Attacks.
IEEE Trans. Computers, March, 2024

Differentially Private Federated Learning With an Adaptive Noise Mechanism.
IEEE Trans. Inf. Forensics Secur., 2024

Incremental Learning, Incremental Backdoor Threats.
IEEE Trans. Dependable Secur. Comput., 2024

A Comprehensive Defense Framework Against Model Extraction Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

BadEdit: Backdooring large language models by model editing.
CoRR, 2024

Fluent: Round-efficient Secure Aggregation for Private Federated Learning.
CoRR, 2024

Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning.
CoRR, 2024

PRIME: Protect Your Videos From Malicious Editing.
CoRR, 2024

TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability.
CoRR, 2024

InternEvo: Efficient Long-sequence Large Language Model Training via Hybrid Parallelism and Redundant Sharding.
CoRR, 2024

Digger: Detecting Copyright Content Mis-usage in Large Language Model Training.
CoRR, 2024

Characterization of Large Language Model Development in the Datacenter.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

SAME: Sample Reconstruction against Model Extraction Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Automatic Transformation Search Against Deep Leakage From Gradients.
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023

Secure Decentralized Image Classification With Multiparty Homomorphic Encryption.
IEEE Trans. Circuits Syst. Video Technol., July, 2023

Physical Black-Box Adversarial Attacks Through Transformations.
IEEE Trans. Big Data, June, 2023

Cooperative collision avoidance in multirobot systems using fuzzy rules and velocity obstacles.
Robotica, February, 2023

DefQ: Defensive Quantization Against Inference Slow-Down Attack for Edge Computing.
IEEE Internet Things J., February, 2023

ADS-Lead: Lifelong Anomaly Detection in Autonomous Driving Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems.
IEEE Trans. Intell. Transp. Syst., 2023

Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption.
IEEE Trans. Inf. Forensics Secur., 2023

Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2023

Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding.
IEEE Trans. Inf. Forensics Secur., 2023

FastSecNet: An Efficient Cryptographic Framework for Private Neural Network Inference.
IEEE Trans. Inf. Forensics Secur., 2023

PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees.
IEEE Trans. Inf. Forensics Secur., 2023

Hercules: Boosting the Performance of Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
IEEE Trans. Dependable Secur. Comput., 2023

Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing.
IEEE Trans. Cloud Comput., 2023

A survey on cybersecurity attacks and defenses for unmanned aerial systems.
J. Syst. Archit., 2023

Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval.
IACR Cryptol. ePrint Arch., 2023

The Earth is Flat because...: Investigating LLMs' Belief towards Misinformation via Persuasive Conversation.
CoRR, 2023

Towards Robust and Expressive Whole-body Human Pose and Shape Estimation.
CoRR, 2023

Defense against ML-based Power Side-channel Attacks on DNN Accelerators with Adversarial Attacks.
CoRR, 2023

Detecting Voice Cloning Attacks via Timbre Watermarking.
CoRR, 2023

Singular Regularization with Information Bottleneck Improves Model's Adversarial Robustness.
CoRR, 2023

Rethinking Adversarial Training with Neural Tangent Kernel.
CoRR, 2023

A Unified Hardware-based Threat Detector for AI Accelerators.
CoRR, 2023

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding.
CoRR, 2023

Sentiment Analysis through LLM Negotiations.
CoRR, 2023

AMSP: Super-Scaling LLM Training via Advanced Model States Partitioning.
CoRR, 2023

Towards the Vulnerability of Watermarking Artificial Intelligence Generated Content.
CoRR, 2023

Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models.
CoRR, 2023

Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking.
CoRR, 2023

Instruction Tuning for Large Language Models: A Survey.
CoRR, 2023

Backdooring Textual Inversion for Concept Censorship.
CoRR, 2023

PentestGPT: An LLM-empowered Automatic Penetration Testing Tool.
CoRR, 2023

Adversarial Training Over Long-Tailed Distribution.
CoRR, 2023

Jailbreaker: Automated Jailbreak Across Multiple Large Language Model Chatbots.
CoRR, 2023

Omnipotent Adversarial Training for Unknown Label-noisy and Imbalanced Datasets.
CoRR, 2023

TPU as Cryptographic Accelerator.
CoRR, 2023

Pushing the Limits of ChatGPT on NLP Tasks.
CoRR, 2023

Prompt Injection attack against LLM-integrated Applications.
CoRR, 2023

Extracting Cloud-based Model with Prior Knowledge.
CoRR, 2023

Jailbreaking ChatGPT via Prompt Engineering: An Empirical Study.
CoRR, 2023

GPT-NER: Named Entity Recognition via Large Language Models.
CoRR, 2023

Backdoor Attacks with Input-unique Triggers in NLP.
CoRR, 2023

Boosting Distributed Full-graph GNN Training with Asynchronous One-bit Communication.
CoRR, 2023

Smaller Is Bigger: Rethinking the Embedding Rate of Deep Hiding.
CoRR, 2023

Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

NAUTILUS: Automated RESTful API Vulnerability Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

Hydro: Surrogate-Based Hyperparameter Tuning Service in Datacenters.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

Towards Robust and Expressive Whole-body Human Pose and Shape Estimation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing.
Proceedings of the IEEE INFOCOM 2023, 2023

GuardHFL: Privacy Guardian for Heterogeneous Federated Learning.
Proceedings of the International Conference on Machine Learning, 2023

Extracting Robust Models with Uncertain Examples.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Clean-image Backdoor: Attacking Multi-label Models with Poisoned Labels Only.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

ATTA: Adversarial Task-transferable Attacks on Autonomous Driving Systems.
Proceedings of the IEEE International Conference on Data Mining, 2023

Computation and Data Efficient Backdoor Attacks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

MERCURY: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator.
Proceedings of the International Conference on Field Programmable Technology, 2023

SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Text Classification via Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Color Backdoor: A Robust Poisoning Attack in Color Space.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

PriFR: Privacy-preserving Large-scale File Retrieval System via Blockchain for Encrypted Cloud Data.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

Lucid: A Non-intrusive, Scalable and Interpretable Scheduler for Deep Learning Training Jobs.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

GNN-SL: Sequence Labeling Based on Nearest Examples via GNN.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

Multi-target Backdoor Attacks for Code Pre-trained Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

Defending against Backdoor Attacks in Natural Language Generation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Introduction to the Special Section on Energy-efficient and Secure Computing for Artificial Intelligence and Beyond.
ACM Trans. Sens. Networks, November, 2022

Astraea: A Fair Deep Learning Scheduler for Multi-Tenant GPU Clusters.
IEEE Trans. Parallel Distributed Syst., 2022

A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System.
IEEE Trans. Inf. Forensics Secur., 2022

Ownership Verification of DNN Architectures via Hardware Cache Side Channels.
IEEE Trans. Circuits Syst. Video Technol., 2022

Byzantine-Resilient Decentralized Stochastic Gradient Descent.
IEEE Trans. Circuits Syst. Video Technol., 2022

Topology-Aware Differential Privacy for Decentralized Image Classification.
IEEE Trans. Circuits Syst. Video Technol., 2022

Sentence Similarity Based on Contexts.
Trans. Assoc. Comput. Linguistics, 2022

Online adaptation for autonomous unmanned systems driven by requirements satisfaction model.
Softw. Syst. Model., 2022

A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography.
ACM Comput. Surv., 2022

Efficiency Boosting of Secure Cross-platform Recommender Systems over Sparse Data.
CoRR, 2022

A Benchmark of Long-tailed Instance Segmentation with Noisy Labels (Short Version).
CoRR, 2022

New Secure Sparse Inner Product with Applications to Machine Learning.
CoRR, 2022

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder.
CoRR, 2022

Saving the Limping: Fault-tolerant Quadruped Locomotion via Reinforcement Learning.
CoRR, 2022

SIMC 2.0: Improved Secure ML Inference Against Malicious Clients.
CoRR, 2022

Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption.
CoRR, 2022

Deep Learning Workload Scheduling in GPU Datacenters: Taxonomy, Challenges and Vision.
CoRR, 2022

Alleviating Robust Overfitting of Adversarial Training With Consistency Regularization.
CoRR, 2022

SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
CoRR, 2022

ShiftNAS: Towards Automatic Generation of Advanced Mulitplication-Less Neural Networks.
CoRR, 2022

kNN-NER: Named Entity Recognition with Nearest Neighbor Search.
CoRR, 2022

Clean-Annotation Backdoor Attack against Lane Detection Systems in the Wild.
CoRR, 2022

Threats to Pre-trained Language Models: Survey and Taxonomy.
CoRR, 2022

Primo: Practical Learning-Augmented Systems with Interpretable Models.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Benchmarking and Analyzing 3D Human Pose and Shape Estimation Beyond Algorithms.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Iron: Private Inference on Transformers.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Triggerless Backdoor Attack for NLP Tasks with Clean Labels.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

Text's Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Physical Backdoor Attacks to Lane Detection Systems in Autonomous Driving.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

GNN-LM: Language Modeling based on Global Contexts via GNN.
Proceedings of the Tenth International Conference on Learning Representations, 2022

NASPY: Automated Extraction of Automated Machine Learning Models.
Proceedings of the Tenth International Conference on Learning Representations, 2022

BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models.
Proceedings of the Tenth International Conference on Learning Representations, 2022

A Formal Methodology for Verifying Side-Channel Vulnerabilities in Cache Architectures.
Proceedings of the Formal Methods and Software Engineering, 2022

Watermarking Pre-trained Encoders in Contrastive Learning.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Tear Up the Bubble Boom: Lessons Learned From a Deep Learning Research and Development Cluster.
Proceedings of the IEEE 40th International Conference on Computer Design, 2022

Improving Adversarial Robustness of 3D Point Cloud Classification Models.
Proceedings of the Computer Vision - ECCV 2022, 2022

Titan: a scheduler for foundation model fine-tuning workloads.
Proceedings of the 13th Symposium on Cloud Computing, SoCC 2022, 2022

Cache Refinement Type for Side-Channel Detection of Cryptographic Software.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

On the (In)Security of Secure ROS2.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Fast Nearest Neighbor Machine Translation.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

2021
Novel denial-of-service attacks against cloud-based multi-robot systems.
Inf. Sci., 2021

Toward Secure and Efficient Deep Learning Inference in Dependable IoT Systems.
IEEE Internet Things J., 2021

Adversarial Attacks Against Network Intrusion Detection in IoT Systems.
IEEE Internet Things J., 2021

Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems.
IEEE Internet Things J., 2021

Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey.
CoRR, 2021

Faster Nearest Neighbor Machine Translation.
CoRR, 2021

Protecting Your NLG Models with Semantic and Robust Watermarks.
CoRR, 2021

A General Framework for Defending Against Backdoor Attacks via Influence Graph.
CoRR, 2021

Triggerless Backdoor Attack for NLP Tasks with Clean Labels.
CoRR, 2021

Interpreting Deep Learning Models in Natural Language Processing: A Review.
CoRR, 2021

Fingerprinting Multi-exit Deep Neural Network Models via Inference Time.
CoRR, 2021

A Stealthy and Robust Fingerprinting Scheme for Generative Models.
CoRR, 2021

PEEL: A Provable Removal Attack on Deep Hiding.
CoRR, 2021

Defending against Backdoor Attacks in Natural Language Generation.
CoRR, 2021

Parameter Estimation for the SEIR Model Using Recurrent Nets.
CoRR, 2021

Modeling Text-visual Mutual Dependency for Multi-modal Dialog Generation.
CoRR, 2021

Risk Analysis and Policy Enforcement of Function Interactions in Robot Apps.
CoRR, 2021

When NAS Meets Watermarking: Ownership Verification of DNN Models via Cache Side Channels.
CoRR, 2021

Local Black-box Adversarial Attacks: A Query Efficient Approach.
CoRR, 2021

Characterization and prediction of deep learning workloads in large-scale GPU datacenters.
Proceedings of the International Conference for High Performance Computing, 2021

Analysis and Mitigation of Function Interaction Risks in Robot Apps.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

An Investigation of Byzantine Threats in Multi-Robot Systems.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Practical and Scalable Security Verification of Secure Architectures.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021

Systematic Testing of Autonomous Driving Systems Using Map Topology-Based Scenario Classification.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

A Unified Anomaly Detection Methodology for Lane-Following of Autonomous Driving Systems.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Towards Practical Cloud Offloading for Low-cost Ground Vehicle Workloads.
Proceedings of the 35th IEEE International Parallel and Distributed Processing Symposium, 2021

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

kFolden: k-Fold Ensemble for Out-Of-Distribution Detection.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Layer-wise Model Pruning based on Mutual Information.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Privacy-Preserving Collaborative Learning With Automatic Transformation Search.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Chronus: A Novel Deadline-aware Scheduler for Deep Learning Training Jobs.
Proceedings of the SoCC '21: ACM Symposium on Cloud Computing, 2021

Temporal Watermarks for Deep Reinforcement Learning Models.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

Stealing Deep Reinforcement Learning Models for Fun and Profit.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Efficient, Private and Robust Federated Learning.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques.
CoRR, 2020

The Hidden Vulnerability of Watermarking for Deep Neural Networks.
CoRR, 2020

Generating Adversarial Examples withControllable Non-transferability.
CoRR, 2020

A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models.
CoRR, 2020

Differentially Private Decentralized Learning.
CoRR, 2020

Stealing Deep Reinforcement Learning Models for Fun and Profit.
CoRR, 2020

Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques.
CoRR, 2020

Resisting Adversarial Examples via Wavelet Extension and Denoising.
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020

Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks.
Proceedings of the HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, 2020

A Software Stack for Composable Cloud Robotics System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications.
CoRR, 2019

Sensitive-Sample Fingerprinting of Deep Neural Networks.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Model inversion attacks against collaborative inference.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health.
IEEE Trans. Computers, 2018

VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting.
CoRR, 2018

Privacy-preserving Machine Learning through Data Obfuscation.
CoRR, 2018

IcoRating: A Deep-Learning System for Scam ICO Identification.
CoRR, 2018

Analyzing Cache Side Channels Using Deep Neural Networks.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Host-Based Dos Attacks and Defense in the Cloud.
Proceedings of the Hardware and Architectural Support for Security and Privacy, 2017

CloudShelter: Protecting Virtual Machines' Memory Resource Availability in Clouds.
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017

Machine Learning Based DDoS Attack Detection from Source Side in Cloud.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

DoS Attacks on Your Memory in Cloud.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing.
IEEE Micro, 2016

Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation.
CoRR, 2016

CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

2015
CloudMonatt: an architecture for security health monitoring and attestation of virtual machines in cloud computing.
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015

2014
New models of cache architectures characterizing information leakage from cache side channels.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Side channel vulnerability metrics: the promise and the pitfalls.
Proceedings of the HASP 2013, 2013

A Framework for Realizing Security on Demand in Cloud Computing.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Security verification of hardware-enabled attestation protocols.
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012


  Loading...