Zhe Zhou
Orcid: 0000-0003-4879-6258Affiliations:
- Fudan University, School of Computer Science, Shanghai, China
- Chinese University of Hong Kong, Department of Information Engineering, Hong Kong
According to our database1,
Zhe Zhou
authored at least 30 papers
between 2014 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
CoRR, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.
J. Comput. Secur., 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
Proceedings of the Advances in Information and Computer Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound.
CoRR, 2014
Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones.
CoRR, 2014
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014