Zi Kang

Orcid: 0000-0002-1863-2802

According to our database1, Zi Kang authored at least 16 papers between 2022 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Theft model-based black-box adversarial attack in embedding space.
J. Vis. Commun. Image Represent., 2026

2025
Imperceptible pixel-precise adaptive multi-level sparse adversarial attacks on video recognition models.
Knowl. Based Syst., 2025

CATIL: Customized adversarial training based on instance loss.
Inf. Sci., 2025

Fast and Controllable Bias-Guided Jailbreak Attack on Large Language Models.
IEEE Internet Things J., 2025

FedBS: Solving data heterogeneity issue in federated learning using balanced subtasks.
High Confid. Comput., 2025

2024
Managing cloud security in the presence of strategic hacker and joint responsibility.
J. Oper. Res. Soc., July, 2024

Computation Cost-Driven Offloading Strategy Based on Reinforcement Learning for Consumer Devices.
IEEE Trans. Consumer Electron., February, 2024

Harmonizing Transferability and Imperceptibility: A Novel Ensemble Adversarial Attack.
IEEE Internet Things J., 2024

Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2024

DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack.
Proceedings of the Knowledge Science, Engineering and Management, 2024

An Invisible Backdoor Attack on Cloud Computing in the Internet of Things.
Proceedings of the 10th IEEE Conference on Big Data Security on Cloud, 2024

2023
FGDA-GS: Fast guided decision attack based on gradient signs for skeletal action recognition.
Comput. Secur., December, 2023

QESAR: Query Effective Decision-Based Attack on Skeletal Action Recognition.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

2022
AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of Texture.
CoRR, 2022

SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors?
CoRR, 2022


  Loading...