Folgen
Shengzhi Zhang
Shengzhi Zhang
Boston University MET College
Bestätigte E-Mail-Adresse bei bu.edu
Titel
Zitiert von
Zitiert von
Jahr
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Y X, C Y, Z Y, L Y, L X, C K, Z S, H H, W XF, G CA
27th USENIX Security Symposium (USENIX Security 18), 2018
302*2018
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
2542019
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020
1802020
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
1792017
All your alexa are belong to us: A remote voice control attack against echo
X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, IM Molloy
2018 IEEE global communications conference (GLOBECOM), 1-6, 2018
552018
Machine learning based cross-site scripting detection in online social network
R Wang, X Jia, Q Li, S Zhang
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014
522014
A robustness-assured white-box watermark in neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, H Ma, Y Zhao, Y Li
IEEE Transactions on Dependable and Secure Computing 20 (6), 5214-5229, 2023
43*2023
Sok: A modularized approach to study the security of automatic speech recognition systems
Y Chen, J Zhang, X Yuan, S Zhang, K Chen, X Wang, S Guo
ACM Transactions on Privacy and Security 25 (3), 1-31, 2022
282022
DBIA: Data-free backdoor attack against transformer networks
P Lv, H Ma, J Zhou, R Liang, K Chen, S Zhang, Y Yang
2023 IEEE International Conference on Multimedia and Expo (ICME), 2819-2824, 2023
26*2023
A comprehensive study of co-residence threat in multi-tenant public PaaS clouds
W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu
Information and Communications Security: 18th International Conference …, 2016
242016
Ai-lancet: Locating error-inducing neurons to optimize neural networks
Y Zhao, H Zhu, K Chen, S Zhang
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
222021
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM
L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018
222018
A data-free backdoor injection approach in neural networks
P Lv, C Yue, R Liang, Y Yang, S Zhang, H Ma, K Chen
32nd USENIX Security Symposium (USENIX Security 23), 2671-2688, 2023
182023
Cross-layer damage assessment for cyber situational awareness
P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li
Cyber Situational Awareness: Issues and Research, 155-176, 2010
182010
Ai-guardian: Defeating adversarial attacks using backdoors
H Zhu, S Zhang, K Chen
2023 IEEE Symposium on Security and Privacy (SP), 701-718, 2023
162023
HyperCrop: a hypervisor-based countermeasure for return oriented programming
J Jiang, X Jia, D Feng, S Zhang, P Liu
International Conference on Information and Communications Security, 360-373, 2011
162011
Fast recovery from hidden node collision for IEEE 802.15. 4 LR-WPANs
S Zhang, SJ Yoo
7th IEEE International Conference on Computer and Information Technology …, 2007
142007
LeakProber: a framework for profiling sensitive data leakage paths
J Yu, S Zhang, P Liu, Z Li
Proceedings of the first ACM conference on Data and application security and …, 2011
132011
Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain
J Wang, W Yi, M Yang, J Ma, S Zhang, S Hao
Journal of Network and Computer Applications 218, 103718, 2023
122023
Defending return‐oriented programming based on virtualization techniques
X Jia, R Wang, J Jiang, S Zhang, P Liu
Security and Communication Networks 6 (10), 1236-1249, 2013
122013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20