Zhe Zhou

Orcid: 0000-0003-4879-6258

Affiliations:
  • Fudan University, School of Computer Science, Shanghai, China
  • Chinese University of Hong Kong, Department of Information Engineering, Hong Kong


According to our database1, Zhe Zhou authored at least 30 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Userspace Bypass: Accelerating Syscall-intensive Applications.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

On Adversarial Robustness of Point Cloud Semantic Segmentation.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
A Smart Framework for Fine-Grained Microphone Acoustic Permission Management.
IEEE Trans. Dependable Secur. Comput., 2021

Attacking Point Cloud Segmentation with Color-only Perturbation.
CoRR, 2021

Volcano: Stateless Cache Side-channel Attack by Exploiting Mesh Interconnect.
CoRR, 2021

Invisible Probe: Timing Attacks with PCIe Congestion Side-channel.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
Embedding is not Cipher: Understanding the risk of embedding leakages.
CoRR, 2019

RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.
J. Comput. Secur., 2018

A survey of practical adversarial example attacks.
Cybersecur., 2018

Invisible Mask: Practical Attacks on Face Recognition with Infrared.
CoRR, 2018

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU.
Proc. Priv. Enhancing Technol., 2017

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017

All Your VMs are Disconnected: Attacking Hardware Virtualized Network.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization.
Proceedings of the Advances in Information and Computer Security, 2016

Efficient Authenticated Multi-Pattern Matching.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

On Code Execution Tracking via Power Side-Channel.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
An Empirical Study on Android for Saving Non-shared Data on Public Storage.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections.
Proceedings of the Computer Security - ESORICS 2015, 2015

When Good Becomes Evil: Keystroke Inference with Smartwatch.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound.
CoRR, 2014

Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones.
CoRR, 2014

Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014


  Loading...