default search action
Zhikun Zhang 0001
Person information
- affiliation: Stanford University, Palo Alto, CA, USA
- affiliation (former): CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- affiliation (former): Zhejiang University, Cyber Innovation Joint Research Center, Hangzhou, China
Other persons with the same name
- Zhikun Zhang — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Yan Ren, Heng Zhang, Linkang Du, Zhikun Zhang, Jian Zhang, Hongran Li:
Stealthy Black-Box Attack With Dynamic Threshold Against MARL-Based Traffic Signal Control System. IEEE Trans. Ind. Informatics 20(10): 12021-12031 (2024) - [c26]Linkang Du, Quan Yuan, Min Chen, Mingyang Sun, Peng Cheng, Jiming Chen, Zhikun Zhang:
PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems. AsiaCCS 2024 - [c25]Yiting Qu, Zhikun Zhang, Yun Shen, Michael Backes, Yang Zhang:
FAKEPCD: Fake Point Cloud Detection via Source Attribution. AsiaCCS 2024 - [c24]Yujia Hu, Yuntao Du, Zhikun Zhang, Ziquan Fang, Lu Chen, Kai Zheng, Yunjun Gao:
Real-Time Trajectory Synthesis with Local Differential Privacy. ICDE 2024: 1685-1698 - [c23]Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang:
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. NDSS 2024 - [c22]Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen:
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors. NDSS 2024 - [i25]Lichao Sun, Yue Huang, Haoran Wang, Siyuan Wu, Qihui Zhang, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yue Zhao:
TrustLLM: Trustworthiness in Large Language Models. CoRR abs/2401.05561 (2024) - [i24]Yujia Hu, Yuntao Du, Zhikun Zhang, Ziquan Fang, Lu Chen, Kai Zheng, Yunjun Gao:
Real-Time Trajectory Synthesis with Local Differential Privacy. CoRR abs/2404.11450 (2024) - 2023
- [j6]Heng Zhang, Jun Gu, Zhikun Zhang, Linkang Du, Yongmin Zhang, Yan Ren, Jian Zhang, Hongran Li:
Backdoor attacks against deep reinforcement learning based traffic signal control systems. Peer Peer Netw. Appl. 16(1): 466-474 (2023) - [j5]Yuntao Du, Yujia Hu, Zhikun Zhang, Ziquan Fang, Lu Chen, Baihua Zheng, Yunjun Gao:
LDPTrace: Locally Differentially Private Trajectory Synthesis. Proc. VLDB Endow. 16(8): 1897-1909 (2023) - [c21]Joann Qiongna Chen, Tianhao Wang, Zhikun Zhang, Yang Zhang, Somesh Jha, Zhou Li:
Differentially Private Resource Allocation. ACSAC 2023: 772-786 - [c20]Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen:
DPMLBench: Holistic Evaluation of Differentially Private Machine Learning. CCS 2023: 2621-2635 - [c19]Haiming Wang, Zhikun Zhang, Min Chen, Shibo He:
Making Watermark Survive Model Extraction Attacks in Graph Neural Networks. ICC 2023: 57-62 - [c18]Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang:
Generated Graph Detection. ICML 2023: 23412-23428 - [c17]Yuxiang Guo, Lu Chen, Zhengjie Zhou, Baihua Zheng, Ziquan Fang, Zhikun Zhang, Yuren Mao, Yunjun Gao:
CampER: An Effective Framework for Privacy-Aware Deep Entity Resolution. KDD 2023: 626-637 - [c16]Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang:
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models. USENIX Security Symposium 2023: 1649-1666 - [c15]Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun:
PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information. USENIX Security Symposium 2023: 3241-3258 - [c14]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang:
FACE-AUDITOR: Data Auditing in Facial Recognition Systems. USENIX Security Symposium 2023: 7195-7212 - [i23]Yuntao Du, Yujia Hu, Zhikun Zhang, Ziquan Fang, Lu Chen, Baihua Zheng, Yunjun Gao:
LDPTrace: Locally Differentially Private Trajectory Synthesis. CoRR abs/2302.06180 (2023) - [i22]Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun:
PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information. CoRR abs/2304.02401 (2023) - [i21]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang:
FACE-AUDITOR: Data Auditing in Facial Recognition Systems. CoRR abs/2304.02782 (2023) - [i20]Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen:
DPMLBench: Holistic Evaluation of Differentially Private Machine Learning. CoRR abs/2305.05900 (2023) - [i19]Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang:
Generated Graph Detection. CoRR abs/2306.07758 (2023) - [i18]Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen:
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors. CoRR abs/2308.13904 (2023) - [i17]Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang:
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. CoRR abs/2309.03081 (2023) - [i16]Yiting Qu, Zhikun Zhang, Yun Shen, Michael Backes, Yang Zhang:
FAKEPCD: Fake Point Cloud Detection via Source Attribution. CoRR abs/2312.11213 (2023) - 2022
- [c13]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
Graph Unlearning. CCS 2022: 499-513 - [c12]Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang:
On the Privacy Risks of Cell-Based NAS Architectures. CCS 2022: 1427-1441 - [c11]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CCS 2022: 2643-2657 - [c10]Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. USENIX Security Symposium 2022: 4525-4542 - [c9]Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang:
Inference Attacks Against Graph Neural Networks. USENIX Security Symposium 2022: 4543-4560 - [i15]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CoRR abs/2204.06963 (2022) - [i14]Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang:
On the Privacy Risks of Cell-Based NAS Architectures. CoRR abs/2209.01688 (2022) - [i13]Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang:
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model. CoRR abs/2210.00581 (2022) - 2021
- [j4]Tianhao Wang, Ninghui Li, Zhikun Zhang:
DPSyn: Experiences in the NIST Differential Privacy Data Synthesis Challenges. J. Priv. Confidentiality 11(2) (2021) - [c8]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
When Machine Unlearning Jeopardizes Privacy. CCS 2021: 896-911 - [c7]Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. CCS 2021: 1237-1253 - [c6]Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, Jiming Chen:
AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy. CCS 2021: 1266-1288 - [c5]Jun Gu, Heng Zhang, Zhikun Zhang, Jian Zhang, Hongran Li:
Iris Protection with Verisimilar Feature Structure. ICPADS 2021: 396-401 - [c4]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. USENIX Security Symposium 2021: 929-946 - [i12]Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. CoRR abs/2102.02551 (2021) - [i11]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
Graph Unlearning. CoRR abs/2103.14991 (2021) - [i10]Ninghui Li, Zhikun Zhang, Tianhao Wang:
DPSyn: Experiences in the NIST Differential Privacy Data Synthesis Challenges. CoRR abs/2106.12949 (2021) - [i9]Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang:
Inference Attacks Against Graph Neural Networks. CoRR abs/2110.02631 (2021) - [i8]Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, Jiming Chen:
AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy. CoRR abs/2110.07505 (2021) - 2020
- [j3]Zhikun Zhang, Heng Zhang, Shibo He, Peng Cheng:
Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks. IEEE Trans. Dependable Secur. Comput. 17(2): 236-247 (2020) - [i7]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
When Machine Unlearning Jeopardizes Privacy. CoRR abs/2005.02205 (2020) - [i6]Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. CoRR abs/2005.11753 (2020) - [i5]Yang Zou, Zhikun Zhang, Michael Backes, Yang Zhang:
Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning. CoRR abs/2009.04872 (2020) - [i4]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. CoRR abs/2012.15128 (2020)
2010 – 2019
- 2018
- [j2]Yuyi Sun, Fei Tong, Zhikun Zhang, Shibo He:
Throughput Modeling and Analysis of Random Access in Narrowband Internet of Things. IEEE Internet Things J. 5(3): 1485-1493 (2018) - [j1]Zhikun Zhang, Shibo He, Jiming Chen, Junshan Zhang:
REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing. IEEE Trans. Inf. Forensics Secur. 13(12): 2995-3007 (2018) - [c3]Zhikun Zhang, Tianhao Wang, Ninghui Li, Shibo He, Jiming Chen:
CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. CCS 2018: 212-229 - 2017
- [c2]Jiajun Zhang, Xiaohui Liang, Zhikun Zhang, Shibo He, Zhiguo Shi:
Re-DPoctor: Real-Time Health Data Releasing with W-Day Differential Privacy. GLOBECOM 2017: 1-6 - [i3]Jiajun Zhang, Xiaohui Liang, Zhikun Zhang, Shibo He, Zhiguo Shi:
Re-DPoctor: Real-time health data releasing with w-day differential privacy. CoRR abs/1711.00232 (2017) - [i2]Zhikun Zhang, Shibo He, Jiming Chen, Junshan Zhang:
REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing. CoRR abs/1711.00757 (2017) - [i1]Zhikun Zhang, Shibo He, Mengyuan Zhang, Jiming Chen:
LEPA: Incentivizing Long-term Privacy-preserving Data Aggregation in Crowdsensing. CoRR abs/1712.08807 (2017) - 2015
- [c1]Zhikun Zhang, Heng Zhang, Shibo He, Peng Cheng:
Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks. MASS 2015: 181-189
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint