Xuhong Zhang
Orcid: 0000-0002-8571-9780Affiliations:
- Zhejiang University, Hangzhou, China
- University of Central Florida, Orlando, FL, USA (PhD 2017)
According to our database1,
Xuhong Zhang
authored at least 92 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Frontiers Inf. Technol. Electron. Eng., March, 2024
Vis. Informatics, 2024
ACM Trans. Priv. Secur., 2024
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
IEEE Trans. Dependable Secur. Comput., 2024
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Bridging Context Gaps: Leveraging Coreference Resolution for Long Contextual Understanding.
CoRR, 2024
CoRR, 2024
Tool-Planner: Dynamic Solution Tree Planning for Large Language Model with Tool Clustering.
CoRR, 2024
Uncovering LLM-Generated Code: A Zero-Shot Synthetic Code Detector via Code Rewriting.
CoRR, 2024
Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models.
CoRR, 2024
TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024
TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Cons2Plan: Vector Floorplan Generation from Various Conditions via a Learning Framework based on Conditional Diffusion Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Protecting Object Detection Models from Model Extraction Attack via Feature Space Coverage.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
RA-ISF: Learning to Answer and Understand from Retrieval Augmentation via Iterative Self-Feedback.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
AdaCCD: Adaptive Semantic Contrasts Discovery Based Cross Lingual Adaptation for Code Clone Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Multi-level feature disentanglement network for cross-dataset face forgery detection.
Image Vis. Comput., 2023
Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning.
CoRR, 2022
Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning.
CoRR, 2022
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Constructing Contrastive samples via Summarization for Text Classification with limited annotations.
CoRR, 2021
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
Constructing contrastive samples via summarization for text classification with limited annotations.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the Computer Security - ESORICS 2020, 2020
DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
2019
IEEE Trans. Parallel Distributed Syst., 2019
2018
IEEE Trans. Computers, 2018
IEEE Trans. Big Data, 2018
2017
Deister: A light-weight autonomous block management in data-intensive file systems using deterministic declustering distribution.
J. Parallel Distributed Comput., 2017
J. Parallel Distributed Comput., 2017
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017
2016
Sapprox: Enabling Efficient and Accurate Approximations on Sub-datasets with Distribution-aware Online Sampling.
Proc. VLDB Endow., 2016
DataNet: A Data Distribution-Aware Method for Sub-Dataset Analysis on Distributed File Systems.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium, 2016
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016
2015
Deister: A Light-Weight Autonomous Block Management in Data-Intensive File Systems Using Deterministic Declustering Distribution.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the 10th Parallel Data Storage Workshop, 2015
Achieving up to zero communication delay in BSP-based graph processing via vertex categorization.
Proceedings of the 10th IEEE International Conference on Networking, 2015
Proceedings of the Cloud Computing and Big Data, 2015
2014
ScalScheduling: A Scalable Scheduling Architecture for MPI-based interactive analysis programs.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
SLAM: scalable locality-aware middleware for I/O in scientific analysis and visualization.
Proceedings of the 23rd International Symposium on High-Performance Parallel and Distributed Computing, 2014