Xuhong Zhang

Orcid: 0000-0002-8571-9780

Affiliations:
  • Zhejiang University, Hangzhou, China
  • University of Central Florida, Orlando, FL, USA (PhD 2017)


According to our database1, Xuhong Zhang authored at least 92 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards understanding bogus traffic service in online social networks.
Frontiers Inf. Technol. Electron. Eng., March, 2024

MILG: Realistic lip-sync video generation with audio-modulated image inpainting.
Vis. Informatics, 2024

DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models.
ACM Trans. Priv. Secur., 2024

HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
IEEE Trans. Dependable Secur. Comput., 2024

Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection.
IEEE Trans. Dependable Secur. Comput., 2024

G-Fuzz: A Directed Fuzzing Framework for gVisor.
IEEE Trans. Dependable Secur. Comput., 2024

EdgePro: Edge Deep Learning Model Protection via Neuron Authorization.
IEEE Trans. Dependable Secur. Comput., 2024

TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting.
IEEE Trans. Dependable Secur. Comput., 2024

Understanding the AI-powered Binary Code Similarity Detection.
CoRR, 2024

Bridging Context Gaps: Leveraging Coreference Resolution for Long Contextual Understanding.
CoRR, 2024

CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models.
CoRR, 2024

Iterative or Innovative? A Problem-Oriented Perspective for Code Optimization.
CoRR, 2024

MemDPT: Differential Privacy for Memory Efficient Language Models.
CoRR, 2024

Tool-Planner: Dynamic Solution Tree Planning for Large Language Model with Tool Clustering.
CoRR, 2024

Uncovering LLM-Generated Code: A Zero-Shot Synthetic Code Detector via Code Rewriting.
CoRR, 2024

Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models.
CoRR, 2024

TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment.
CoRR, 2024

PRSA: Prompt Reverse Stealing Attacks against Large Language Models.
CoRR, 2024

Critical Code Guided Directed Greybox Fuzzing for Commits.
Proceedings of the 33rd USENIX Security Symposium, 2024

Exploring ChatGPT's Capabilities on Vulnerability Management.
Proceedings of the 33rd USENIX Security Symposium, 2024

SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024

TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Cons2Plan: Vector Floorplan Generation from Various Conditions via a Learning Framework based on Conditional Diffusion Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Protecting Object Detection Models from Model Extraction Attack via Feature Space Coverage.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Pluggable Watermarking of Deepfake Models for Deepfake Detection.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

SecCoder: Towards Generalizable and Robust Secure Code Generation.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

ERA-CoT: Improving Chain-of-Thought through Entity Relationship Analysis.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

RA-ISF: Learning to Answer and Understand from Retrieval Augmentation via Iterative Self-Feedback.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

Let All Be Whitened: Multi-Teacher Distillation for Efficient Visual Retrieval.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

AdaCCD: Adaptive Semantic Contrasts Discovery Based Cross Lingual Adaptation for Code Clone Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2023

Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Multi-level feature disentanglement network for cross-dataset face forgery detection.
Image Vis. Comput., 2023

MEAOD: Model Extraction Attack against Object Detectors.
CoRR, 2023

How ChatGPT is Solving Vulnerability Management Problem.
CoRR, 2023

Facial Data Minimization: Shallow Model as Your Privacy Filter.
CoRR, 2023

Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models.
CoRR, 2023

Edge Deep Learning Model Protection via Neuron Authorization.
CoRR, 2023

MINER: A Hybrid Data-Driven Approach for REST API Fuzzing.
CoRR, 2023

TextDefense: Adversarial Text Detection based on Word Importance Entropy.
CoRR, 2023

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware.
Proceedings of the 32nd USENIX Security Symposium, 2023

MINER: A Hybrid Data-Driven Approach for REST API Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases.
Proceedings of the 32nd USENIX Security Symposium, 2023

How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023

CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
GRIP-GAN: An Attack-Free Defense Through General Robust Inverse Perturbation.
IEEE Trans. Dependable Secur. Comput., 2022

All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning.
CoRR, 2022

Hijack Vertical Federated Learning Models with Adversarial Embedding.
CoRR, 2022

Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning.
CoRR, 2022

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Proceedings of the 31st USENIX Security Symposium, 2022

Label Inference Attacks Against Vertical Federated Learning.
Proceedings of the 31st USENIX Security Symposium, 2022

Dynamic and Diverse Transformations for Defending Against Adversarial Examples.
Proceedings of the IEEE International Conference on Trust, 2022

Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

EMS: History-Driven Mutation for Coverage-based Fuzzing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

SLIME: program-sensitive energy allocation for fuzzing.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

A Data-free Black-box Attack for Generating Transferable Adversarial Examples.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Constructing Contrastive samples via Summarization for Text Classification with limited annotations.
CoRR, 2021

MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

Learning Human Motion Prediction via Stochastic Differential Equations.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

Constructing contrastive samples via summarization for text classification with limited annotations.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

Backdoor Pre-trained Models Can Transfer to All.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Understanding the Security Risks of Docker Hub.
Proceedings of the Computer Security - ESORICS 2020, 2020

DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

Adversarial Detection on Graph Structured Data.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

2019
An I/O Efficient Distributed Approximation Framework Using Cluster Sampling.
IEEE Trans. Parallel Distributed Syst., 2019

2018
Achieving Load Balance for Parallel Data Access on Distributed File Systems.
IEEE Trans. Computers, 2018

Speed Up Big Data Analytics by Unveiling the Storage Distribution of Sub-Datasets.
IEEE Trans. Big Data, 2018

2017
Deister: A light-weight autonomous block management in data-intensive file systems using deterministic declustering distribution.
J. Parallel Distributed Comput., 2017

SideIO: A Side I/O system framework for hybrid scientific workflow.
J. Parallel Distributed Comput., 2017

DFS-container: achieving containerized block I/O for distributed file systems.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

2016
Sapprox: Enabling Efficient and Accurate Approximations on Sub-datasets with Distribution-aware Online Sampling.
Proc. VLDB Endow., 2016

DataNet: A Data Distribution-Aware Method for Sub-Dataset Analysis on Distributed File Systems.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium, 2016

Accelerating I/O Performance of SVM on HDFS.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

2015
Deister: A Light-Weight Autonomous Block Management in Data-Intensive File Systems Using Deterministic Declustering Distribution.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Experiences in using os-level virtualization for block I/O.
Proceedings of the 10th Parallel Data Storage Workshop, 2015

Achieving up to zero communication delay in BSP-based graph processing via vertex categorization.
Proceedings of the 10th IEEE International Conference on Networking, 2015

UNIO: A Unified I/O System Framework for Hybrid Scientific Workflow.
Proceedings of the Cloud Computing and Big Data, 2015

2014
ScalScheduling: A Scalable Scheduling Architecture for MPI-based interactive analysis programs.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

SLAM: scalable locality-aware middleware for I/O in scientific analysis and visualization.
Proceedings of the 23rd International Symposium on High-Performance Parallel and Distributed Computing, 2014


  Loading...