Mi Zhang

Orcid: 0000-0003-3567-3478

Affiliations:
  • Fudan University, Shanghai, China
  • University College Dublin, Ireland (former)


According to our database1, Mi Zhang authored at least 60 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Navigate Beyond Shortcuts: Debiased Learning through the Lens of Neural Collapse.
CoRR, 2024

GNNFingers: A Fingerprinting Framework for Verifying Ownerships of Graph Neural Networks.
Proceedings of the ACM on Web Conference 2024, 2024

BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Towards Detection-Recovery Strategy for Robust Decentralized Matrix Factorization.
Proceedings of the Computer Security - ESORICS 2024, 2024

CausalPC: Improving the Robustness of Point Cloud Classification by Causal Effect Identification.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

RRL: Recommendation Reverse Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Enhancing Time Series Predictors With Generalized Extreme Value Loss.
IEEE Trans. Knowl. Data Eng., 2023

Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledge.
IEEE Trans. Dependable Secur. Comput., 2023

JADE: A Linguistics-based Safety Evaluation Platform for LLM.
CoRR, 2023

MIRA: Cracking Black-box Watermarking on Deep Neural Networks via Model Inversion-based Removal Attacks.
CoRR, 2023

MaSS: Model-agnostic, Semantic and Stealthy Data Poisoning Attack on Knowledge Graph Embedding.
Proceedings of the ACM Web Conference 2023, 2023

Anti-FakeU: Defending Shilling Attacks on Graph Neural Network based Recommender Model.
Proceedings of the ACM Web Conference 2023, 2023

Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Cracking White-box DNN Watermarks via Invariant Neuron Transforms.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

RØROS: Building a Responsive Online Recommender System via Meta-Gradients Updating.
Proceedings of the IEEE International Conference on Acoustics, 2023

CAP: Robust Point Cloud Classification via Semantic and Structural Modeling.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

SlowBERT: Slow-down Attacks on Input-adaptive Multi-exit BERT.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

Black-Box Adversarial Attack on Time Series Classification.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
A Geometrical Perspective on Image Style Transfer With Adversarial Learning.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling.
CoRR, 2022

Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model.
CoRR, 2022

UTAF: A Universal Approach to Task-Agnostic Model Fingerprinting.
CoRR, 2022

Understanding the Practice of Security Patch Management across Multiple Branches in OSS Projects.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis.
Proceedings of the 31st USENIX Security Symposium, 2022

Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.
Proceedings of the 31st USENIX Security Symposium, 2022

House of Cans: Covert Transmission of Internal Datasets via Capacity-Aware Neuron Steganography.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Towards Backdoor Attack on Deep Learning based Time Series Classification.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

2021
TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural Networks.
Proceedings of the Computer Security - ESORICS 2021, 2021

Learning to Learn the Future: Modeling Concept Drifts in Time Series Prediction.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

A Deep Learning Framework for Self-evolving Hierarchical Community Detection.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Theory-Oriented Deep Leakage from Gradients via Linear Equation Solver.
CoRR, 2020

Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent.
Proceedings of the 29th USENIX Security Symposium, 2020

Privacy Risks of General-Purpose Language Models.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Modeling Personalized Out-of-Town Distances in Location Recommendation.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020

Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Improving the Robustness of Wasserstein Embedding by Adversarial PAC-Bayesian Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
How Sequence-to-Sequence Models Perceive Language Styles?
CoRR, 2019

Modeling Extreme Events in Time Series Prediction.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

2018
Geographical Feature Extraction for Entities in Location-based Social Networks.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Theoretical Analysis of Image-to-Image Translation with Adversarial Learning.
Proceedings of the 35th International Conference on Machine Learning, 2018

2017
BayDNN: Friend Recommendation with Bayesian Personalized Ranking Deep Neural Network.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2014
Addressing cold start in recommender systems: a semi-supervised co-training algorithm.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014

2012
A Double-Ranking Strategy for Long-Tail Product Recommendation.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

2011
Novelty and Diversity in Top-N Recommendation - Analysis and Evaluation.
ACM Trans. Internet Techn., 2011

2010
Niche Product Retrieval in Top-N Recommendation.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

2009
Novel Item Recommendation by User Profile Partitioning.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Statistical Modeling of Diversity in Top-N Recommender Systems.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Enhancing diversity in Top-N recommendation.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009

Statistical attack detection.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009

Evaluating the Diversity of Top-N Recommendations.
Proceedings of the ICTAI 2009, 2009

2008
Avoiding monotony: improving the diversity of recommendation lists.
Proceedings of the 2008 ACM Conference on Recommender Systems, 2008

Analysis of Methods for Novel Case Selection.
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008

2006
Using a Depth Tree Framework to Evaluate Change Impacts of Modifications to IT Infrastructure.
Proceedings of the ICE-B 2006, 2006

2005
A Web Service-Based Framework for Supply Chain Management.
Proceedings of the Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2005), 2005

ADDI: an agent-based extension to UDDI for supply chain management.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

A Security Model Design in Web Service Environment.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
iOmS: An Agent-Based P2P Framework for Ubiquitous Workflow.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...