What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhi Zhang
Google Scholar
22
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Practical Opcode-based Fault Attack on AES-NI.
Xue Gong
Xin Zhang
Qianmei Wu
Fan Zhang
Junge Xu
Qingni Shen
Zhi Zhang
2025
journals/tifs
Decaf: Data Distribution Decompose Attack Against Federated Learning.
Zhiyang Dai
Yansong Gao
Chunyi Zhou
Anmin Fu
Zhi Zhang
Minhui Xue
Yifeng Zheng
Yuqing Zhang
2025
journals/tifs
TruVRF: Toward Triple-Granularity Verification on Machine Unlearning.
Chunyi Zhou
Yansong Gao
Anmin Fu
Kai Chen
Zhi Zhang
Minhui Xue
Zhiyang Dai
Shouling Ji
Yuqing Zhang
2025
journals/tifs
Fantastic Interrupts and Where to Find Them: Exploiting Non-Movable Interrupts on x86.
Xin Zhang
Qingni Shen
Zhi Zhang
Yansong Gao
Jiajun Zou
Yi Yang
Zhonghai Wu
2025
conf/ndss
Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!
Yansong Gao
Huaibing Peng
Hua Ma
Zhi Zhang
Shuo Wang
Rayne Holland
Anmin Fu
Minhui Xue
Derek Abbott
2025
conf/uss
Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer.
Junkai Liang
Zhi Zhang
Xin Zhang
Qingni Shen
Yansong Gao
Xingliang Yuan
Haiyang Xue
Pengfei Wu
Zhonghai Wu
2025
conf/uss
THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models.
Yujin Huang
Zhi Zhang
Qingchuan Zhao
Xingliang Yuan
Chunyang Chen
2025
conf/uss
TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis.
Bo Zhang
Yansong Gao
Changlong Yu
Boyu Kuang
Zhi Zhang
Hyoungshick Kim
Anmin Fu
2024
journals/tifs
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
Yinshan Li
Hua Ma
Zhi Zhang
Yansong Gao
Alsharif Abuadbba
Minhui Xue
Anmin Fu
Yifeng Zheng
Said F. Al-Sarawi
Derek Abbott
2024
journals/tifs
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
Huming Qiu
Hua Ma
Zhi Zhang
Alsharif Abuadbba
Wei Kang
Anmin Fu
Yansong Gao
2024
conf/ccs
Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense.
Hua Ma
Shang Wang
Yansong Gao
Zhi Zhang
Huming Qiu
Minhui Xue
Alsharif Abuadbba
Anmin Fu
Surya Nepal
Derek Abbott
2024
conf/uss
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection.
Shaofeng Li
Xinyu Wang
Minhui Xue
Haojin Zhu
Zhi Zhang
Yansong Gao
Wen Wu
Xuemin (Sherman) Shen
2024
conf/sp
DeepTheft: Stealing DNN Model Architectures through Power Side Channel.
Yansong Gao
Huming Qiu
Zhi Zhang
Binghui Wang
Hua Ma
Alsharif Abuadbba
Minhui Xue
Anmin Fu
Surya Nepal
2024
conf/asiaccs
SoK: Rowhammer on Commodity Operating Systems.
Zhi Zhang
Decheng Chen
Jiahao Qi
Yueqiang Cheng
Shijie Jiang
Yiyang Lin
Yansong Gao
Surya Nepal
Yi Zou
Jiliang Zhang
Yang Xiang
2023
journals/compsec
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning.
Hua Ma
Qun Li
Yifeng Zheng
Zhi Zhang
Xiaoning Liu
Yansong Gao
Said F. Al-Sarawi
Derek Abbott
2023
journals/tifs
APMSA: Adversarial Perturbation Against Model Stealing Attacks.
Jiliang Zhang
Shuang Peng
Yansong Gao
Zhi Zhang
Qinghui Hong
2023
conf/asiaccs
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Shang Wang
Yansong Gao
Anmin Fu
Zhi Zhang
Yuqing Zhang
Willy Susilo
Dongxi Liu
2023
conf/ndss
PPA: Preference Profiling Attack Against Federated Learning.
Chunyi Zhou
Yansong Gao
Anmin Fu
Kai Chen
Zhiyang Dai
Zhi Zhang
Minhui Xue
Yuqing Zhang
2022
journals/compsec
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation.
Yueqiang Cheng
Zhi Zhang
Yansong Gao
Zhaofeng Chen
Shengjian Guo
Qifei Zhang
Rui Mei
Surya Nepal
Yang Xiang
2021
journals/tifs
Detecting Hardware-Assisted Virtualization With Inconspicuous Features.
Zhi Zhang
Yueqiang Cheng
Yansong Gao
Surya Nepal
Dongxi Liu
Yi Zou
2021
journals/tifs
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability.
Zhi Zhang
Wei He
Yueqiang Cheng
Wenhao Wang
Yansong Gao
Minghua Wang
Kang Li
Surya Nepal
Yang Xiang
2013
conf/icics
A Covert Channel Using Event Channel State on Xen Hypervisor.
Qingni Shen
Mian Wan
Zhuangzhuang Zhang
Zhi Zhang
Sihan Qing
Zhonghai Wu
Coauthors
Alsharif Abuadbba
(4)
Anmin Fu
(10)
Binghui Wang
(1)
Bo Zhang
(1)
Boyu Kuang
(1)
Changlong Yu
(1)
Chunyang Chen
(1)
Chunyi Zhou
(3)
Decheng Chen
(1)
Derek Abbott
(4)
Dongxi Liu
(2)
Fan Zhang
(1)
Haiyang Xue
(1)
Haojin Zhu
(1)
Hua Ma
(6)
Huaibing Peng
(1)
Huming Qiu
(3)
Hyoungshick Kim
(1)
Jiahao Qi
(1)
Jiajun Zou
(1)
Jiliang Zhang
(2)
Junge Xu
(1)
Junkai Liang
(1)
Kai Chen
(2)
Kang Li
(1)
Mian Wan
(1)
Minghua Wang
(1)
Minhui Xue
(8)
Pengfei Wu
(1)
Qianmei Wu
(1)
Qifei Zhang
(1)
Qingchuan Zhao
(1)
Qinghui Hong
(1)
Qingni Shen
(4)
Qun Li
(1)
Rayne Holland
(1)
Rui Mei
(1)
Said F. Al-Sarawi
(2)
Shang Wang
(2)
Shaofeng Li
(1)
Shengjian Guo
(1)
Shijie Jiang
(1)
Shouling Ji
(1)
Shuang Peng
(1)
Shuo Wang
(1)
Sihan Qing
(1)
Surya Nepal
(6)
Wei He
(1)
Wei Kang
(1)
Wen Wu
(1)
Wenhao Wang
(1)
Willy Susilo
(1)
Xiaoning Liu
(1)
Xin Zhang
(1)
Xin Zhang
(2)
Xingliang Yuan
(2)
Xinyu Wang
(1)
Xue Gong
(1)
Xuemin (Sherman) Shen
(1)
Yang Xiang
(3)
Yansong Gao
(19)
Yi Yang
(1)
Yi Zou
(2)
Yifeng Zheng
(3)
Yinshan Li
(1)
Yiyang Lin
(1)
Yueqiang Cheng
(4)
Yujin Huang
(1)
Yuqing Zhang
(4)
Zhaofeng Chen
(1)
Zhi Zhang
(22)
Zhiyang Dai
(3)
Zhonghai Wu
(3)
Zhuangzhuang Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to