Obserwuj
Zhi Zhang (张智)
Zhi Zhang (张智)
Zweryfikowany adres z uwa.edu.au - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Backdoor attacks and countermeasures on deep learning: A comprehensive review
Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim
arXiv preprint arXiv:2007.10760, 2020
1832020
Design and evaluation of a multi-domain trojan detection method on deep neural networks
Y Gao, Y Kim, BG Doan, Z Zhang, G Zhang, S Nepal, DC Ranasinghe, ...
IEEE Transactions on Dependable and Secure Computing 19 (4), 2349-2364, 2021
672021
APMSA: Adversarial perturbation against model stealing attacks
J Zhang, S Peng, Y Gao, Z Zhang, Q Hong
IEEE Transactions on Information Forensics and Security 18, 1667-1679, 2023
602023
Pthammer: Cross-user-kernel-boundary rowhammer through implicit accesses
Z Zhang, Y Cheng, D Liu, S Nepal, Z Wang, Y Yarom
2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020
542020
Evaluation and optimization of distributed machine learning techniques for internet of things
Y Gao, M Kim, C Thapa, A Abuadbba, Z Zhang, S Camtepe, H Kim, ...
IEEE Transactions on Computers 71 (10), 2538-2552, 2021
442021
KASR: A reliable and practical approach to attack surface reduction of commodity OS kernels
Z Zhang, Y Cheng, S Nepal, D Liu, Q Shen, F Rabhi
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
43*2018
Dramdig: A knowledge-assisted tool to uncover dram address mapping
M Wang, Z Zhang, Y Cheng, S Nepal
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
372020
CATTmew: Defeating software-only physical kernel isolation
Y Cheng, Z Zhang, S Nepal, Z Wang
IEEE Transactions on Dependable and Secure Computing 18 (4), 1989-2004, 2019
32*2019
{SoftTRR}: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh
Z Zhang, Y Cheng, M Wang, W He, W Wang, S Nepal, Y Gao, K Li, ...
2022 USENIX Annual Technical Conference (USENIX ATC 22), 399-414, 2022
252022
Quantization backdoors to deep learning commercial frameworks
H Ma, H Qiu, Y Gao, Z Zhang, A Abuadbba, M Xue, A Fu, Z Jiliang, ...
IEEE Transactions on Dependable and Secure Computing, 2023
222023
Dangerous cloaking: Natural trigger based backdoor attacks on object detectors in the physical world
H Ma, Y Li, Y Gao, A Abuadbba, Z Zhang, A Fu, H Kim, SF Al-Sarawi, ...
arXiv preprint arXiv:2201.08619, 2022
202022
Design and Evaluate Recomposited OR-AND-XOR-PUF
J Yao, L Pang, Y Su, Z Zhang, W Yang, A Fu, Y Gao
IEEE Transactions on Emerging Topics in Computing 10 (2), 662-677, 2022
172022
Implicit hammer: Cross-privilege-boundary rowhammer through implicit accesses
Z Zhang, W He, Y Cheng, W Wang, Y Gao, D Liu, K Li, S Nepal, A Fu, ...
IEEE Transactions on Dependable and Secure Computing, 2022
16*2022
PPA: preference profiling attack against federated learning
C Zhou, Y Gao, A Fu, K Chen, Z Dai, Z Zhang, M Xue, Y Zhang
2023 Network and Distributed System Security Symposium (NDSS 23), 2023
142023
Detecting hardware-assisted virtualization with inconspicuous features
Z Zhang, Y Cheng, Y Gao, S Nepal, D Liu, Y Zou
IEEE Transactions on Information Forensics and Security 16, 16-27, 2020
142020
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
H Ma, Y Li, Y Gao, Z Zhang, A Abuadbba, A Fu, SF Al-Sarawi, S Nepal, ...
2023 42nd International Symposium on Reliable Distributed Systems (SRDS), 82-92, 2023
13*2023
A covert channel using event channel state on xen hypervisor
Q Shen, M Wan, Z Zhang, Z Zhang, S Qing, Z Wu
International Conference on Information and Communications Security, 125-134, 2013
112013
Towards a critical evaluation of robustness for deep learning backdoor countermeasures
H Qiu, H Ma, Z Zhang, A Abuadbba, W Kang, A Fu, Y Gao
IEEE Transactions on Information Forensics and Security, 2023
92023
NTD: Non-transferability enabled deep learning backdoor detection
Y Li, H Ma, Z Zhang, Y Gao, A Abuadbba, M Xue, A Fu, Y Zheng, ...
IEEE Transactions on Information Forensics and Security, 2023
9*2023
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
S Wang, Y Gao, A Fu, Z Zhang, Y Zhang, W Susilo
2023 18th ACM ASIA Conference on Computer and Communications Security (ACM …, 2023
92023
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20