Segui
Zhi Zhang
Zhi Zhang
Email verificata su uwa.edu.au - Home page
Titolo
Citata da
Citata da
Anno
Backdoor attacks and countermeasures on deep learning: A comprehensive review
Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim
arXiv preprint arXiv:2007.10760, 2020
2332020
Design and evaluation of a multi-domain trojan detection method on deep neural networks
Y Gao, Y Kim, BG Doan, Z Zhang, G Zhang, S Nepal, DC Ranasinghe, ...
IEEE Transactions on Dependable and Secure Computing 19 (4), 2349-2364, 2021
982021
APMSA: Adversarial perturbation against model stealing attacks
J Zhang, S Peng, Y Gao, Z Zhang, Q Hong
IEEE Transactions on Information Forensics and Security 18, 1667-1679, 2023
772023
Pthammer: Cross-user-kernel-boundary rowhammer through implicit accesses
Z Zhang, Y Cheng, D Liu, S Nepal, Z Wang, Y Yarom
Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'20), 28-41, 2020
772020
Evaluation and optimization of distributed machine learning techniques for internet of things
Y Gao, M Kim, C Thapa, A Abuadbba, Z Zhang, S Camtepe, H Kim, ...
IEEE Transactions on Computers 71 (10), 2538-2552, 2021
702021
Dramdig: A knowledge-assisted tool to uncover dram address mapping
M Wang, Z Zhang, Y Cheng, S Nepal
ACM/IEEE Design Automation Conference (DAC'20), 1-6, 2020
512020
KASR: A reliable and practical approach to attack surface reduction of commodity OS kernels
Z Zhang, Y Cheng, S Nepal, D Liu, Q Shen, F Rabhi
International Symposium on Research in Attacks, Intrusions and Defenses …, 2018
48*2018
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh
Z Zhang, Y Cheng, M Wang, W He, W Wang, S Nepal, Y Gao, K Li, ...
USENIX Annual Technical Conference (ATC'22), 399-414, 2022
412022
CATTmew: Defeating software-only physical kernel isolation
Y Cheng, Z Zhang, S Nepal, Z Wang
IEEE Transactions on Dependable and Secure Computing 18 (4), 1989-2004, 2019
35*2019
Quantization backdoors to deep learning commercial frameworks
H Ma, H Qiu, Y Gao, Z Zhang, A Abuadbba, M Xue, A Fu, Z Jiliang, ...
IEEE Transactions on Dependable and Secure Computing, 2023
332023
Dangerous cloaking: Natural trigger based backdoor attacks on object detectors in the physical world
H Ma, Y Li, Y Gao, A Abuadbba, Z Zhang, A Fu, H Kim, SF Al-Sarawi, ...
arXiv preprint arXiv:2201.08619, 2022
312022
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses
Z Zhang, W He, Y Cheng, W Wang, Y Gao, D Liu, K Li, S Nepal, A Fu, ...
IEEE Transactions on Dependable and Secure Computing 20 (5), 3716-3733, 2022
28*2022
PPA: preference profiling attack against federated learning
C Zhou, Y Gao, A Fu, K Chen, Z Dai, Z Zhang, M Xue, Y Zhang
Network and Distributed System Security Symposium (NDSS'23), 2023
252023
Design and Evaluate Recomposited OR-AND-XOR-PUF
J Yao, L Pang, Y Su, Z Zhang, W Yang, A Fu, Y Gao
IEEE Transactions on Emerging Topics in Computing 10 (2), 662-677, 2022
232022
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
H Ma, Y Li, Y Gao, Z Zhang, A Abuadbba, A Fu, SF Al-Sarawi, S Nepal, ...
International Symposium on Reliable Distributed Systems (SRDS'23), 82-92, 2023
22*2023
NTD: Non-transferability enabled deep learning backdoor detection
Y Li, H Ma, Z Zhang, Y Gao, A Abuadbba, M Xue, A Fu, Y Zheng, ...
IEEE Transactions on Information Forensics and Security, 2023
18*2023
Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects
N Li, C Zhou, Y Gao, H Chen, A Fu, Z Zhang, Y Shui
arXiv preprint arXiv:2403.08254, 2024
142024
Whistleblower: A system-level empirical study on rowhammer
W He, Z Zhang, Y Cheng, W Wang, W Song, Y Gao, Q Zhang, K Li, D Liu, ...
IEEE Transactions on Computers, 2023
142023
Detecting hardware-assisted virtualization with inconspicuous features
Z Zhang, Y Cheng, Y Gao, S Nepal, D Liu, Y Zou
IEEE Transactions on Information Forensics and Security 16, 16-27, 2020
142020
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
S Wang, Y Gao, A Fu, Z Zhang, Y Zhang, W Susilo
ACM ASIA Conference on Computer and Communications Security (ASIACCS'23), 2023
132023
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20