Seguir
Shengzhi Zhang
Shengzhi Zhang
Boston University MET College
Dirección de correo verificada de bu.edu
Título
Citado por
Citado por
Año
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Y X, C Y, Z Y, L Y, L X, C K, Z S, H H, W XF, G CA
27th USENIX Security Symposium (USENIX Security 18), 2018
271*2018
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
188*2019
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
1602017
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020
1382020
Machine learning based cross-site scripting detection in online social network
R Wang, X Jia, Q Li, S Zhang
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014
442014
All your alexa are belong to us: A remote voice control attack against echo
X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, IM Molloy
2018 IEEE global communications conference (GLOBECOM), 1-6, 2018
422018
A comprehensive study of co-residence threat in multi-tenant public paas clouds
W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu
Information and Communications Security: 18th International Conference …, 2016
222016
Cross-layer damage assessment for cyber situational awareness
P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li
Cyber Situational Awareness: Issues and Research, 155-176, 2010
212010
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM
L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018
182018
HyperCrop: a hypervisor-based countermeasure for return oriented programming
J Jiang, X Jia, D Feng, S Zhang, P Liu
International Conference on Information and Communications Security, 360-373, 2011
162011
DBIA: Data-Free Backdoor Attack Against Transformer Networks
P Lv, H Ma, J Zhou, R Liang, K Chen, S Zhang, Y Yang
2023 IEEE International Conference on Multimedia and Expo (ICME), 2819-2824, 2023
14*2023
A robustness-assured white-box watermark in neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, H Ma, Y Zhao, Y Li
IEEE Transactions on Dependable and Secure Computing, 2023
14*2023
Fast recovery from hidden node collision for IEEE 802.15. 4 LR-WPANs
S Zhang, SJ Yoo
7th IEEE International Conference on Computer and Information Technology …, 2007
142007
Sok: A modularized approach to study the security of automatic speech recognition systems
Y Chen, J Zhang, X Yuan, S Zhang, K Chen, X Wang, S Guo
ACM Transactions on Privacy and Security 25 (3), 1-31, 2022
132022
Ai-lancet: Locating error-inducing neurons to optimize neural networks
Y Zhao, H Zhu, K Chen, S Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
122021
Defending return‐oriented programming based on virtualization techniques
X Jia, R Wang, J Jiang, S Zhang, P Liu
Security and Communication Networks 6 (10), 1236-1249, 2013
122013
LeakProber: a framework for profiling sensitive data leakage paths
J Yu, S Zhang, P Liu, ZT Li
Proceedings of the first ACM conference on Data and application security and …, 2011
122011
Cross-layer comprehensive intrusion harm analysis for production workload server systems
S Zhang, X Jia, P Liu, J Jing
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
122010
Distributed workload and response time management for web applications
S Zhang, H Wu, W Wang, B Yang, P Liu, AV Vasilakos
2011 7th International Conference on Network and Service Management, 1-9, 2011
112011
Using virtual machines to do cross-layer damage assessment
X Jia, S Zhang, J Jing, P Liu
Proceedings of the 1st ACM workshop on Virtual machine security, 29-38, 2008
92008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20