Shengzhi Zhang
Orcid: 0000-0001-9432-9779
According to our database1,
Shengzhi Zhang
authored at least 56 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
1
3
3
1
2
1
1
1
2
1
2
1
1
3
3
4
1
3
1
4
2
3
2
1
2
3
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
PEDI-GAN: power equipment data imputation based on generative adversarial networks with auxiliary encoder.
J. Supercomput., June, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Comput. Secur., 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain.
J. Netw. Comput. Appl., September, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
2022
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems.
ACM Trans. Priv. Secur., 2022
Proceedings of the IEEE International Conference on Trust, 2022
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification.
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the 2022 IEEE International Parallel and Distributed Processing Symposium, 2022
2021
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks.
CoRR, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
EAI Endorsed Trans. Security Safety, 2020
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019
Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
A Security Model for Dependable Vehicle Middleware and Mobile Applications Connection.
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018
2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
2016
A Dual-Linear Kalman Filter for Real-Time Orientation Determination System Using Low-Cost MEMS Sensors.
Sensors, 2016
Towards service continuity for transactional applications via diverse device drivers.
Int. J. Inf. Comput. Secur., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Advances in Information and Computer Security, 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
2015
Quaternion-Based Unscented Kalman Filter for Accurate Indoor Heading Estimation Using Wearable Multi-Sensor System.
Sensors, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Information Security Practice and Experience, 2015
2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
2013
Secur. Commun. Networks, 2013
Future Gener. Comput. Syst., 2013
2012
Hidden node collision recovery protocol for low rate wireless personal area networks.
Wirel. Commun. Mob. Comput., 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the 7th International Conference on Network and Service Management, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
2008
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
2007
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007