Zhi Zhang

Orcid: 0000-0003-3604-5369

Affiliations:
  • University of New South Wales, NSW, Australia
  • Data61, CSIRO, Australia
  • Peking University, Beijing, China (former)


According to our database1, Zhi Zhang authored at least 42 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2024

NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
IEEE Trans. Inf. Forensics Secur., 2024

SegScope: Probing Fine-grained Interrupts via Architectural Footprints.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024

2023
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning.
Comput. Secur., October, 2023

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023

APMSA: Adversarial Perturbation Against Model Stealing Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses.
IEEE Trans. Dependable Secur. Comput., 2023

DeepTheft: Stealing DNN Model Architectures through Power Side Channel.
CoRR, 2023

One-to-Multiple Clean-Label Image Camouflage (OmClic) based Backdoor Attack on Deep Learning.
CoRR, 2023

Imperceptible Sample-Specific Backdoor to DNN with Denoising Autoencoder.
CoRR, 2023

PPA: Preference Profiling Attack Against Federated Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Design and Evaluate Recomposited OR-AND-XOR-PUF.
IEEE Trans. Emerg. Top. Comput., 2022

Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
CoRR, 2022

MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning.
CoRR, 2022

CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences.
CoRR, 2022

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
CoRR, 2022

Systematically Evaluation of Challenge Obfuscated APUFs.
CoRR, 2022

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022

A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM.
CoRR, 2022

Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation.
Comput. Secur., 2022

SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

2021
Software-only Rowhammer Attacks and Countermeasures.
PhD thesis, 2021

BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability.
IEEE Trans. Inf. Forensics Secur., 2021

Detecting Hardware-Assisted Virtualization With Inconspicuous Features.
IEEE Trans. Inf. Forensics Secur., 2021

CATTmew: Defeating Software-Only Physical Kernel Isolation.
IEEE Trans. Dependable Secur. Comput., 2021

NTD: Non-Transferability Enabled Backdoor Detection.
CoRR, 2021

Design and Evaluate Recomposited OR-AND-XOR-PUF.
CoRR, 2021

Quantization Backdoors to Deep Learning Models.
CoRR, 2021

2020
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review.
CoRR, 2020

GhostKnight: Breaching Data Integrity via Speculative Execution.
CoRR, 2020

PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses.
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020

DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

2019
TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique.
CoRR, 2019

PiBooster: A Light-Weight Approach to Performance Improvements in Page Table Management for Paravirtual Virtual-Machines.
CoRR, 2019

2018
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018

Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation.
CoRR, 2018

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2016
PiBooster: Performance Accelerations in Page Table Management for Paravirtual VMs.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2013
A Covert Channel Using Event Channel State on Xen Hypervisor.
Proceedings of the Information and Communications Security - 15th International Conference, 2013


  Loading...