default search action
Shengzhi Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Qihang Zhou, Wenzhuo Cao, Xiaoqi Jia, Shengzhi Zhang, Jiayun Chen, Nan Jiang, Weijuan Zhang, Haichao Du, Zhenyu Song, Qingjia Huang:
HClave: An isolated execution environment design for hypervisor runtime security. Comput. Secur. 144: 103923 (2024) - [j14]Hong Zhu, Yue Zhao, Shengzhi Zhang, Kai Chen:
NeuralSanitizer: Detecting Backdoors in Neural Networks. IEEE Trans. Inf. Forensics Secur. 19: 4970-4985 (2024) - [j13]Qianwei Lv, He Luo, Guoqiang Wang, Jianwei Tai, Shengzhi Zhang:
PEDI-GAN: power equipment data imputation based on generative adversarial networks with auxiliary encoder. J. Supercomput. 80(9): 11893-11922 (2024) - [c36]Yang Chen, Shengzhi Zhang, Xiaoqi Jia, Qihang Zhou, Heqing Huang, Shaowen Xu, Haochao Du:
SEDSpec: Securing Emulated Devices by Enforcing Execution Specification. DSN 2024: 522-534 - [c35]Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng:
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning. NDSS 2024 - [c34]Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang:
MEA-Defender: A Robust Watermark against Model Extraction Attack. SP 2024: 2515-2533 - [i9]Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang:
MEA-Defender: A Robust Watermark against Model Extraction Attack. CoRR abs/2401.15239 (2024) - 2023
- [j12]Juan Wang, Wenzhe Yi, Mengda Yang, Jiaci Ma, Shengzhi Zhang, Shirong Hao:
Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain. J. Netw. Comput. Appl. 218: 103718 (2023) - [j11]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Hualong Ma, Yue Zhao, Yingjiu Li:
A Robustness-Assured White-Box Watermark in Neural Networks. IEEE Trans. Dependable Secur. Comput. 20(6): 5214-5229 (2023) - [c33]Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang:
DBIA: Data-Free Backdoor Attack Against Transformer Networks. ICME 2023: 2819-2824 - [c32]Hong Zhu, Shengzhi Zhang, Kai Chen:
AI-Guardian: Defeating Adversarial Attacks using Backdoors. SP 2023: 701-718 - [c31]Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen:
A Data-free Backdoor Injection Approach in Neural Networks. USENIX Security Symposium 2023: 2671-2688 - [i8]Pan Li, Peizhuo Lv, Kai Chen, Yuling Cai, Fan Xiang, Shengzhi Zhang:
Model Stealing Attack against Multi-Exit Networks. CoRR abs/2305.13584 (2023) - 2022
- [j10]Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, Xiaofeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. ACM Trans. Priv. Secur. 25(3): 17:1-17:31 (2022) - [c30]Qihang Zhou, Xiaoqi Jia, Shengzhi Zhang, Nan Jiang, Jiayun Chen, Weijuan Zhang:
SecFortress: Securing Hypervisor using Cross-layer Isolation. IPDPS 2022: 212-222 - [c29]Yuxiao Luo, Jianwei Tai, Xiaoqi Jia, Shengzhi Zhang:
Practical Backdoor Attack Against Speaker Recognition System. ISPEC 2022: 468-484 - [c28]Yue Yu, Xiaoqi Jia, Xun An, Shengzhi Zhang:
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification. SEC 2022: 507-523 - [c27]Yun He, Xiaoqi Jia, Shengzhi Zhang, Lou Chitkushev:
EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave. TrustCom 2022: 225-232 - [i7]Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng:
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning. CoRR abs/2209.03563 (2022) - 2021
- [c26]Yue Zhao, Hong Zhu, Kai Chen, Shengzhi Zhang:
AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks. CCS 2021: 141-158 - [i6]Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, XiaoFeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. CoRR abs/2103.10651 (2021) - [i5]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Yue Zhao, Yingjiu Li:
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks. CoRR abs/2103.13628 (2021) - [i4]Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang:
DBIA: Data-free Backdoor Injection Attack against Transformer Networks. CoRR abs/2111.11870 (2021) - 2020
- [j9]Yuxuan Chen, Xuejing Yuan, Aohui Wang, Kai Chen, Shengzhi Zhang, Heqing Huang:
Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside. EAI Endorsed Trans. Security Safety 6(22): e3 (2020) - [c25]Jianwei Tai, Xiaoqi Jia, Qingjia Huang, Weijuan Zhang, Haichao Du, Shengzhi Zhang:
SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation. ACSAC 2020: 939-950 - [c24]Yun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang:
EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX. RAID 2020: 195-208 - [c23]Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang:
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. USENIX Security Symposium 2020: 2667-2684
2010 – 2019
- 2019
- [j8]Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. IEEE Trans. Dependable Secur. Comput. 16(3): 438-453 (2019) - [c22]Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Shengzhi Zhang, Kai Chen:
Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors. CCS 2019: 1989-2004 - 2018
- [c21]Weijuan Zhang, Xiaoqi Jia, Shengzhi Zhang, Rui Wang, Peng Liu:
Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine. APSEC 2018: 219-228 - [c20]Xuejing Yuan, Yuxuan Chen, Aohui Wang, Kai Chen, Shengzhi Zhang, Heqing Huang, Ian M. Molloy:
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo. GLOBECOM 2018: 1-6 - [c19]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. USENIX Security Symposium 2018: 49-64 - [c18]Shengzhi Zhang, Omar Makke, Oleg Gusikhin, Ayush Shah, Athanasios V. Vasilakos:
A Security Model for Dependable Vehicle Middleware and Mobile Applications Connection. VEHITS 2018: 379-386 - [i3]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. CoRR abs/1801.08535 (2018) - [i2]Yue Zhao, Hong Zhu, Qintao Shen, Ruigang Liang, Kai Chen, Shengzhi Zhang:
Practical Adversarial Attack Against Object Detector. CoRR abs/1812.10217 (2018) - 2017
- [c17]Shengzhi Zhang, Xiaoqi Jia, Weijuan Zhang:
Towards comprehensive protection for OpenFlow controllers. APNOMS 2017: 82-87 - [c16]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. MobiSys 2017: 488-501 - [i1]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. CoRR abs/1704.05600 (2017) - 2016
- [j7]Shengzhi Zhang, Xiaoqi Jia, Peng Liu:
Towards service continuity for transactional applications via diverse device drivers. Int. J. Inf. Comput. Secur. 8(4): 382-400 (2016) - [j6]Shengzhi Zhang, Shuai Yu, Chaojun Liu, Xuebing Yuan, Sheng Liu:
A Dual-Linear Kalman Filter for Real-Time Orientation Determination System Using Low-Cost MEMS Sensors. Sensors 16(2): 264 (2016) - [c15]Weijuan Zhang, Xiaoqi Jia, Chang Wang, Shengzhi Zhang, Qingjia Huang, Mingsheng Wang, Peng Liu:
A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds. ICICS 2016: 361-375 - [c14]Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu:
Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors. IWSEC 2016: 3-20 - [c13]Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu:
Classifying Android Malware with Dynamic Behavior Dependency Graphs. Trustcom/BigDataSE/ISPA 2016: 378-385 - 2015
- [j5]Xuebing Yuan, Shuai Yu, Shengzhi Zhang, Guoping Wang, Sheng Liu:
Quaternion-Based Unscented Kalman Filter for Accurate Indoor Heading Estimation Using Wearable Multi-Sensor System. Sensors 15(5): 10872-10890 (2015) - [c12]Craig Sanders, Ayush Shah, Shengzhi Zhang:
Comprehensive Analysis of the Android Google Play's Auto-update Policy. ISPEC 2015: 365-377 - [c11]Mark E. Fioravanti II, Ayush Shah, Shengzhi Zhang:
A Study of Network Domains Used in Android Applications. NSS 2015: 467-474 - 2014
- [c10]Rui Wang, Xiaoqi Jia, Qinlei Li, Shengzhi Zhang:
Machine Learning Based Cross-Site Scripting Detection in Online Social Network. HPCC/CSS/ICESS 2014: 823-826 - 2013
- [j4]Shengzhi Zhang, Wenjie Wang, Haishan Wu, Athanasios V. Vasilakos, Peng Liu:
Towards transparent and distributed workload management for large scale web servers. Future Gener. Comput. Syst. 29(4): 913-925 (2013) - [j3]Xiaoqi Jia, Rui Wang, Jun Jiang, Shengzhi Zhang, Peng Liu:
Defending return-oriented programming based on virtualization techniques. Secur. Commun. Networks 6(10): 1236-1249 (2013) - 2012
- [j2]Shengzhi Zhang, Sang-Jo Yoo:
Hidden node collision recovery protocol for low rate wireless personal area networks. Wirel. Commun. Mob. Comput. 12(15): 1351-1362 (2012) - [c9]Shengzhi Zhang, Peng Liu:
Letting applications operate through attacks launched from compromised drivers. AsiaCCS 2012: 91-92 - [c8]Shengzhi Zhang, Peng Liu:
Assessing the Trustworthiness of Drivers. RAID 2012: 42-63 - 2011
- [j1]Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing:
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems. IEEE Trans. Inf. Forensics Secur. 6(4): 1323-1334 (2011) - [c7]Shengzhi Zhang, Haishan Wu, Wenjie Wang, Bo Yang, Peng Liu, Athanasios V. Vasilakos:
Distributed workload and response time management for web applications. CNSM 2011: 1-9 - [c6]Junfeng Yu, Shengzhi Zhang, Peng Liu, Zhitang Li:
LeakProber: a framework for profiling sensitive data leakage paths. CODASPY 2011: 75-84 - [c5]Jun Jiang, Xiaoqi Jia, Dengguo Feng, Shengzhi Zhang, Peng Liu:
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming. ICICS 2011: 360-373 - 2010
- [c4]Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing:
Cross-layer comprehensive intrusion harm analysis for production workload server systems. ACSAC 2010: 297-306 - [p1]Peng Liu, Xiaoqi Jia, Shengzhi Zhang, Xi Xiong, Yoon-chan Jhi, Kun Bai, Jason H. Li:
Cross-Layer Damage Assessment for Cyber Situational Awareness. Cyber Situational Awareness 2010: 155-176
2000 – 2009
- 2009
- [c3]Shengzhi Zhang, Xi Xiong, Xiaoqi Jia, Peng Liu:
Availability-sensitive intrusion recovery. VMSec@CCS 2009: 43-48 - 2008
- [c2]Xiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu:
Using virtual machines to do cross-layer damage assessment. VMSec 2008: 29-38 - 2007
- [c1]Shengzhi Zhang, Sang-Jo Yoo:
Fast Recovery from Hidden Node Collision for IEEE 802.15.4 LR-WPANs. CIT 2007: 393-398
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint