Tianwei Zhang
Orcid: 0000-0001-6595-6650Affiliations:
- Nanyang Technological University, School of Computer Science and Engineering, Singapore
- Princeton University, NJ, USA (PhD 2017)
- Peking University, Beijing, China
According to our database1,
Tianwei Zhang
authored at least 239 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Big Data, December, 2024
UniSched: A Unified Scheduler for Deep Learning Training Jobs With Different User Demands.
IEEE Trans. Computers, June, 2024
ACM Comput. Surv., June, 2024
A Tamper-Resistant Broadcasting Scheme for Secure Communication in Internet of Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., March, 2024
IEEE Trans. Computers, March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Efficient Training of Large Language Models on Distributed Infrastructures: A Survey.
CoRR, 2024
CoRR, 2024
Security Matrix for Multimodal Agents on Mobile Devices: A Systematic and Proof of Concept Study.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Groot: Adversarial Testing for Generative Text-to-Image Models with Tree-based Semantic Transformation.
CoRR, 2024
TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability.
CoRR, 2024
InternEvo: Efficient Long-sequence Large Language Model Training via Hybrid Parallelism and Redundant Sharding.
CoRR, 2024
CoRR, 2024
FedDSE: Distribution-aware Sub-model Extraction for Federated Learning over Resource-constrained Devices.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 4th International Workshop on Software Engineering and AI for Data Quality in Cyber-Physical Systems/Internet of Things, 2024
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2024
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the 38th ACM International Conference on Supercomputing, 2024
AutoSched: An Adaptive Self-configured Framework for Scheduling Deep Learning Training Workloads.
Proceedings of the 38th ACM International Conference on Supercomputing, 2024
Improving the Generalization of Unseen Crowd Behaviors for Reinforcement Learning based Local Motion Planners.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024
Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approximation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, 2024
UniGuard: A Unified Hardware-oriented Threat Detector for FPGA-based AI Accelerators.
Proceedings of the 34th International Conference on Field-Programmable Logic and Applications, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Walking in Others' Shoes: How Perspective-Taking Guides Large Language Models in Reducing Toxicity and Bias.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing: EMNLP 2024, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Laser Shield: a Physical Defense with Polarizer against Laser Attacks on Autonomous Driving Systems.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
The Earth is Flat because...: Investigating LLMs' Belief towards Misinformation via Persuasive Conversation.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023
IEEE Trans. Circuits Syst. Video Technol., July, 2023
IEEE Trans. Big Data, June, 2023
Cooperative collision avoidance in multirobot systems using fuzzy rules and velocity obstacles.
Robotica, February, 2023
IEEE Internet Things J., February, 2023
IEEE Trans. Intell. Transp. Syst., January, 2023
Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems.
IEEE Trans. Intell. Transp. Syst., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
FastSecNet: An Efficient Cryptographic Framework for Private Neural Network Inference.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing.
IEEE Trans. Cloud Comput., 2023
J. Syst. Archit., 2023
IACR Cryptol. ePrint Arch., 2023
Defense against ML-based Power Side-channel Attacks on DNN Accelerators with Adversarial Attacks.
CoRR, 2023
Singular Regularization with Information Bottleneck Improves Model's Adversarial Robustness.
CoRR, 2023
CoRR, 2023
CoRR, 2023
Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking.
CoRR, 2023
CoRR, 2023
CoRR, 2023
Boosting Distributed Full-graph GNN Training with Asynchronous One-bit Communication.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing.
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
MERCURY: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator.
Proceedings of the International Conference on Field Programmable Technology, 2023
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
PriFR: Privacy-preserving Large-scale File Retrieval System via Blockchain for Encrypted Cloud Data.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023
Lucid: A Non-intrusive, Scalable and Interpretable Scheduler for Deep Learning Training Jobs.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Introduction to the Special Section on Energy-efficient and Secure Computing for Artificial Intelligence and Beyond.
ACM Trans. Sens. Networks, November, 2022
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Online adaptation for autonomous unmanned systems driven by requirements satisfaction model.
Softw. Syst. Model., 2022
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography.
ACM Comput. Surv., 2022
CoRR, 2022
CoRR, 2022
CoRR, 2022
Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption.
CoRR, 2022
Deep Learning Workload Scheduling in GPU Datacenters: Taxonomy, Challenges and Vision.
CoRR, 2022
Alleviating Robust Overfitting of Adversarial Training With Consistency Regularization.
CoRR, 2022
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
CoRR, 2022
ShiftNAS: Towards Automatic Generation of Advanced Mulitplication-Less Neural Networks.
CoRR, 2022
CoRR, 2022
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022
Text's Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
A Formal Methodology for Verifying Side-Channel Vulnerabilities in Cache Architectures.
Proceedings of the Formal Methods and Software Engineering, 2022
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Tear Up the Bubble Boom: Lessons Learned From a Deep Learning Research and Development Cluster.
Proceedings of the IEEE 40th International Conference on Computer Design, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the 13th Symposium on Cloud Computing, SoCC 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022
2021
Inf. Sci., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
CoRR, 2021
CoRR, 2021
CoRR, 2021
CoRR, 2021
When NAS Meets Watermarking: Ownership Verification of DNN Models via Cache Side Channels.
CoRR, 2021
Characterization and prediction of deep learning workloads in large-scale GPU datacenters.
Proceedings of the International Conference for High Performance Computing, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021
Systematic Testing of Autonomous Driving Systems Using Map Topology-Based Scenario Classification.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
A Unified Anomaly Detection Methodology for Lane-Following of Autonomous Driving Systems.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the 35th IEEE International Parallel and Distributed Processing Symposium, 2021
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the SoCC '21: ACM Symposium on Cloud Computing, 2021
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques.
CoRR, 2020
CoRR, 2020
Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques.
CoRR, 2020
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020
Proceedings of the HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications.
CoRR, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health.
IEEE Trans. Computers, 2018
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting.
CoRR, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the Hardware and Architectural Support for Security and Privacy, 2017
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IEEE Micro, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
2015
CloudMonatt: an architecture for security health monitoring and attestation of virtual machines in cloud computing.
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015
2014
New models of cache architectures characterizing information leakage from cache side channels.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the HASP 2013, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2012
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012