Zhiyi Tian

Orcid: 0000-0001-8905-0941

According to our database1, Zhiyi Tian authored at least 37 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ROSE: A Receiver-Oriented Semantic Communication Framework.
IEEE Netw., March, 2025

Evaluation of Machine Unlearning Through Model Difference.
IEEE Trans. Inf. Forensics Secur., 2025

SCU: An Efficient Machine Unlearning Scheme for Deep Learning Enabled Semantic Communications.
IEEE Trans. Inf. Forensics Secur., 2025

FedU: Federated Unlearning via User-Side Influence Approximation Forgetting.
IEEE Trans. Dependable Secur. Comput., 2025

CRFU: Compressive Representation Forgetting Against Privacy Leakage on Machine Unlearning.
IEEE Trans. Dependable Secur. Comput., 2025

Backdoored Sample Cleansing for Unlabeled Datasets via Bootstrapped Dual Set Purification.
IEEE Trans. Dependable Secur. Comput., 2025

CRCGAN: Toward robust feature extraction in finger vein recognition.
Pattern Recognit., 2025

TAPE: Tailored Posterior Difference for Auditing of Machine Unlearning.
Proceedings of the ACM on Web Conference 2025, 2025

MOUSSE: A Multimodality-Oriented Unified Semantic Communication System by Contrastive Learning.
Proceedings of the 2025 IEEE Wireless Communications and Networking Conference (WCNC), 2025

Can Self Supervision Rejuvenate Similarity-Based Link Prediction?
Proceedings of the Data Science: Foundations and Applications, 2025

Inversion Triplet - A Contrastive Backdoor Mitigation Method for Self-Supervised Vision Encoders.
Proceedings of the Data Science: Foundations and Applications, 2025

IDIR: Interpolated Diffusion Image Reconstruction for Generalizable Detection of Synthetic Images.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2025

Introducing Graph Context into Language Models through Parameter-Efficient Fine-Tuning for Lexical Relation Mining.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

MG-Det: Deepfake Detection with Multi-granularity.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
Semantic Communications Toward Graph Data.
IEEE Wirel. Commun., December, 2024

An Asynchronous Multi-Task Semantic Communication Method.
IEEE Netw., July, 2024

Generative Adversarial Networks: A Survey on Attack and Defense Perspective.
ACM Comput. Surv., April, 2024

Modeling and Analyzing the Spatial-Temporal Propagation of Malware in Mobile Wearable IoT Networks.
IEEE Internet Things J., January, 2024

Forgetting and Remembering Are Both You Need: Balanced Graph Structure Unlearning.
IEEE Trans. Inf. Forensics Secur., 2024

Machine Unlearning via Representation Forgetting With Parameter Self-Sharing.
IEEE Trans. Inf. Forensics Secur., 2024

The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers.
IEEE Trans. Dependable Secur. Comput., 2024

Machine Unlearning: A Comprehensive Survey.
CoRR, 2024

A Survey on Semantic Communication Networks: Architecture, Security, and Privacy.
CoRR, 2024

From the Perspective of AI Safety: Analyzing the Impact of XAI Performance on Adversarial Attack.
Proceedings of the 2024 IEEE Global Communications Conference, 2024

Continuous Verification of Catastrophic Recalling in Machine Unlearning via Adversarial Testing.
Proceedings of the 9th IEEE International Conference on Data Science in Cyberspace, 2024

Unveiling the Unseen: Video Recognition Attacks on Social Software.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning.
ACM Comput. Surv., 2023

Personalized Federated Learning for Heterogeneous Residential Load Forecasting.
Big Data Min. Anal., 2023

Inferring Private Data from AI Models in Metaverse through Black-box Model Inversion Attacks.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Construct New Graphs Using Information Bottleneck Against Property Inference Attacks.
Proceedings of the IEEE International Conference on Communications, 2023

BFU: Bayesian Federated Unlearning with Parameter Self-Sharing.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Sneaking Through Security: Mutating Live Network Traffic to Evade Learning-Based NIDS.
IEEE Trans. Netw. Serv. Manag., 2022

Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck.
Proceedings of the IEEE International Conference on Trust, 2022

GSMI: A Gradient Sign Optimization Based Model Inversion Method.
Proceedings of the AI 2021: Advances in Artificial Intelligence, 2022

2021
A Novel Android Malware Detection Method Based on Visible User Interface.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2019
A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework.
IEEE Access, 2019

2017
Cancelled Primary Care Appointments: A Prospective Cohort Study of Diabetic Patients.
J. Medical Syst., 2017


  Loading...