Follow
Xuhong Zhang
Title
Cited by
Cited by
Year
Label inference attacks against vertical federated learning
C Fu, X Zhang, S Ji, J Chen, J Wu, S Guo, J Zhou, AX Liu, T Wang
31st USENIX security symposium (USENIX Security 22), 1397-1414, 2022
1652022
Backdoor Pre-trained Models Can Transfer to All
L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
962021
Understanding the security risks of docker hub
P Liu, S Ji, L Fu, K Lu, X Zhang, WH Lee, T Lu, W Chen, R Beyah
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
532020
Sapprox: Enabling efficient and accurate approximations on sub-datasets with distribution-aware online sampling
X Zhang, J Wang, J Yin
Proceedings of the VLDB Endowment 10 (3), 109-120, 2016
392016
Achieving load balance for parallel data access on distributed file systems
D Huang, D Han, J Wang, J Yin, X Chen, X Zhang, J Zhou, M Ye
IEEE Transactions on Computers 67 (3), 388-402, 2017
332017
Seeing is living? rethinking the security of facial liveness verification in the deepfake era
C Li, L Wang, S Ji, X Zhang, Z Xi, S Guo, T Wang
31th USENIX Security Symposium (USENIX Security 22), Boston, MA, 2022
302022
{MPInspector}: A systematic and automatic approach for evaluating the security of {IoT} messaging protocols
Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan, Z Lin, C Lin, S Deng, ...
30th USENIX Security Symposium (USENIX Security 21), 4205-4222, 2021
302021
Neuronfair: Interpretable white-box fairness testing through biased neuron identification
H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ji, J Wang, Y Yu, J Chen
Proceedings of the 44th International Conference on Software Engineering …, 2022
292022
Your labels are selling you out: Relation leaks in vertical federated learning
P Qiu, X Zhang, S Ji, T Du, Y Pu, J Zhou, T Wang
IEEE Transactions on Dependable and Secure Computing 20 (5), 3653-3668, 2022
252022
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware
B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ...
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
242022
EMS: History-Driven Mutation for Coverage-based Fuzzing.
C Lyu, S Ji, X Zhang, H Liang, B Zhao, K Lu, R Beyah
NDSS, 2022
242022
V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing
G Pan, X Lin, X Zhang, Y Jia, S Ji, C Wu, X Ying, J Wang, Y Wu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
222021
GRIP-GAN: An attack-free defense through general robust inverse perturbation
H Zheng, J Chen, H Du, W Zhu, S Ji, X Zhang
IEEE Transactions on Dependable and Secure Computing 19 (6), 4204-4224, 2021
202021
SLIME: Program-Sensitive Energy Allocation for Fuzzing
C Lyu, H Liang, S Ji, X Zhang, B Zhao, M Han, Y Li, Z Wang, W Wang, ...
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
172022
" Is your explanation stable?" A Robustness Evaluation Framework for Feature Attribution
Y Gan, Y Mao, X Zhang, S Ji, Y Pu, M Han, J Yin, T Wang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
142022
Learning human motion prediction via stochastic differential equations
K Lyu, Z Liu, S Wu, H Chen, X Zhang, Y Yin
Proceedings of the 29th ACM International Conference on Multimedia, 4976-4984, 2021
142021
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Y Mao, C Fu, S Wang, S Ji, X Zhang, Z Liu, J Zhou, AX Liu, R Beyah, ...
2022 IEEE Symposium on Security and Privacy (S&P), 1423-1439, 2022
132022
IFIZZ: Deep-state and efficient fault-scenario generation to test IoT firmware
P Liu, S Ji, X Zhang, Q Dai, K Lu, L Fu, W Chen, P Cheng, W Wang, ...
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
132021
Constructing contrastive samples via summarization for text classification with limited annotations
Y Du, T Ma, L Wu, F Xu, X Zhang, B Long, S Ji
arXiv preprint arXiv:2104.05094, 2021
122021
Speed up big data analytics by unveiling the storage distribution of sub-datasets
J Wang, X Zhang, J Yin, R Wang, H Wu, D Han
IEEE Transactions on Big Data 4 (2), 231-244, 2016
122016
The system can't perform the operation now. Try again later.
Articles 1–20