Xuhong Zhang
Cited by
Cited by
Label inference attacks against vertical federated learning
C Fu, X Zhang, S Ji, J Chen, J Wu, S Guo, J Zhou, AX Liu, T Wang
31st USENIX security symposium (USENIX Security 22), 1397-1414, 2022
Backdoor Pre-trained Models Can Transfer to All
L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Understanding the security risks of docker hub
P Liu, S Ji, L Fu, K Lu, X Zhang, WH Lee, T Lu, W Chen, R Beyah
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
Sapprox: Enabling efficient and accurate approximations on sub-datasets with distribution-aware online sampling
X Zhang, J Wang, J Yin
Proceedings of the VLDB Endowment 10 (3), 109-120, 2016
Achieving load balance for parallel data access on distributed file systems
D Huang, D Han, J Wang, J Yin, X Chen, X Zhang, J Zhou, M Ye
IEEE Transactions on Computers 67 (3), 388-402, 2017
{MPInspector}: A systematic and automatic approach for evaluating the security of {IoT} messaging protocols
Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan, Z Lin, C Lin, S Deng, ...
30th USENIX Security Symposium (USENIX Security 21), 4205-4222, 2021
Neuronfair: Interpretable white-box fairness testing through biased neuron identification
H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ji, J Wang, Y Yu, J Chen
Proceedings of the 44th International Conference on Software Engineering …, 2022
Seeing is living? rethinking the security of facial liveness verification in the deepfake era
C Li, L Wang, S Ji, X Zhang, Z Xi, S Guo, T Wang
31th USENIX Security Symposium (USENIX Security 22), Boston, MA, 2022
Your labels are selling you out: Relation leaks in vertical federated learning
P Qiu, X Zhang, S Ji, T Du, Y Pu, J Zhou, T Wang
IEEE Transactions on Dependable and Secure Computing, 2022
EMS: History-Driven Mutation for Coverage-based Fuzzing.
C Lyu, S Ji, X Zhang, H Liang, B Zhao, K Lu, R Beyah
NDSS, 2022
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware
B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ...
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
Grip-gan: An attack-free defense through general robust inverse perturbation
H Zheng, J Chen, H Du, W Zhu, S Ji, X Zhang
IEEE Transactions on Dependable and Secure Computing 19 (6), 4204-4224, 2021
V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing
G Pan, X Lin, X Zhang, Y Jia, S Ji, C Wu, X Ying, J Wang, Y Wu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
SLIME: Program-Sensitive Energy Allocation for Fuzzing
C Lyu, H Liang, S Ji, X Zhang, B Zhao, M Han, Y Li, Z Wang, W Wang, ...
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
Learning human motion prediction via stochastic differential equations
K Lyu, Z Liu, S Wu, H Chen, X Zhang, Y Yin
Proceedings of the 29th ACM International Conference on Multimedia, 4976-4984, 2021
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Y Mao, C Fu, S Wang, S Ji, X Zhang, Z Liu, J Zhou, AX Liu, R Beyah, ...
2022 IEEE Symposium on Security and Privacy (S&P), 1423-1439, 2022
IFIZZ: Deep-state and efficient fault-scenario generation to test IoT firmware
P Liu, S Ji, X Zhang, Q Dai, K Lu, L Fu, W Chen, P Cheng, W Wang, ...
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
Speed up big data analytics by unveiling the storage distribution of sub-datasets
J Wang, X Zhang, J Yin, R Wang, H Wu, D Han
IEEE Transactions on Big Data 4 (2), 231-244, 2016
" Is your explanation stable?" A Robustness Evaluation Framework for Feature Attribution
Y Gan, Y Mao, X Zhang, S Ji, Y Pu, M Han, J Yin, T Wang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Constructing contrastive samples via summarization for text classification with limited annotations
Y Du, T Ma, L Wu, F Xu, X Zhang, B Long, S Ji
arXiv preprint arXiv:2104.05094, 2021
The system can't perform the operation now. Try again later.
Articles 1–20