Jie Zhang

Orcid: 0000-0002-4230-1077

Affiliations:
  • University of Science and Technology of China, School of Cyber Science and Security, Hefei, China


According to our database1, Jie Zhang authored at least 41 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Robust Model Watermarking for Image Processing Networks via Structure Consistency.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024

A Robust Database Watermarking Scheme That Preserves Statistical Characteristics.
IEEE Trans. Knowl. Data Eng., June, 2024

Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition.
IEEE Trans. Artif. Intell., March, 2024

On the Vulnerability of Text Sanitization.
CoRR, 2024

Model X-ray: Detect Backdoored Models via Decision Boundary.
CoRR, 2024

Detecting Voice Cloning Attacks via Timbre Watermarking.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

<i>Model X-ray</i>: Detecting Backdoored Models via Decision Boundary.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Transferable Facial Privacy Protection against Blind Face Restoration via Domain-Consistent Adversarial Obfuscation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Attribute-Aware Head Swapping Guided by 3d Modeling.
Proceedings of the IEEE International Conference on Acoustics, 2024

Robust-Wide: Robust Watermarking Against Instruction-Driven Image Editing.
Proceedings of the Computer Vision - ECCV 2024, 2024

GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Detecting Adversarial Examples via Reconstruction-based Semantic Inconsistency.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

Data-Free Hard-Label Robustness Stealing Attack.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Control Risk for Potential Misuse of Artificial Intelligence in Science.
CoRR, 2023

Improving Adversarial Transferability by Stable Diffusion.
CoRR, 2023

FunctionMarker: Watermarking Language Datasets via Knowledge Injection.
CoRR, 2023

Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World.
CoRR, 2023

PrivInfer: Privacy-Preserving Inference for Black-box Large Language Model.
CoRR, 2023

Towards the Vulnerability of Watermarking Artificial Intelligence Generated Content.
CoRR, 2023

Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking.
CoRR, 2023

Aparecium: Revealing Secrets from Physical Photographs.
CoRR, 2023

Watermarking Text Generated by Black-Box Language Models.
CoRR, 2023

Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code Representation.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Ada3Diff: Defending against 3D Adversarial Point Clouds via Adaptive Diffusion.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

ProTegO: Protect Text Content against OCR Extraction Attack.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

AutoStegaFont: Synthesizing Vector Fonts for Hiding Information in Documents.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

DeAR: A Deep-Learning-Based Audio Re-recording Resilient Watermarking.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
JPEG Robust Invertible Grayscale.
IEEE Trans. Vis. Comput. Graph., 2022

Poison Ink: Robust and Invisible Backdoor Attack.
IEEE Trans. Image Process., 2022

Deep Model Intellectual Property Protection via Deep Watermarking.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Tracing Text Provenance via Context-Aware Lexical Substitution.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Deep Template-Based Watermarking.
IEEE Trans. Circuits Syst. Video Technol., 2021

Poison Ink: Robust and Invisible Backdoor Attack.
CoRR, 2021

Exploring Structure Consistency for Deep Model Watermarking.
CoRR, 2021

Initiative Defense against Facial Manipulation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Passport-aware Normalization for Deep Model Protection.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Model Watermarking for Image Processing Networks.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020


  Loading...