Jun Zhang
Swinburne University of Technology
H-index: 43
Oceania-Australia
Top articles of Jun Zhang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display | Lin Li Chao Chen Lei Pan Leo Yu Zhang Jun Zhang | 2023/10/16 | |
The application of neural network for software vulnerability detection: a review | Yuhui Zhu Guanjun Lin Lipeng Song Jun Zhang | 2023/1 | |
Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication | Lin Li Chao Chen Lei Pan Yonghang Tai Jun Zhang | 2023/9/25 | |
A survey on privacy inference attacks and defenses in cloud-based deep neural network | Xiaoyu Zhang Chao Chen Yi Xie Xiaofeng Chen Jun Zhang | 2023/1/1 | |
A Survey of PPG's Application in Authentication | Lin Li Chao Chen Lei Pan Leo Yu Zhang Zhifeng Wang | 2023/9/21 | |
Sigd: A cross-session dataset for ppg-based user authentication in different demographic groups | Lin Li Chao Chen Lei Pan Jun Zhang Yang Xiang | 2023/6/18 | |
Security and privacy problems in voice assistant applications: A survey | Computers & Security | Jingjin Li Chao Chen Mostafa Rahimi Azghadi Hossein Ghodosi Lei Pan | 2023/11/1 |
Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives | Nan Sun Ming Ding Jiaojiao Jiang Weikang Xu Xiaoxing Mo | 2023/5/5 | |
IoTFuzz: Automated Discovery of Violations in Smart Homes With Real Environment | IEEE Internet of Things Journal | Xinbo Ban Ming Ding Shigang Liu Chao Chen Jun Zhang | 2023/10/19 |
Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack | IEEE Transactions on Dependable and Secure Computing | Chi Liu Huajie Chen Tianqing Zhu Jun Zhang Wanlei Zhou | 2023/2/2 |
Domain adaptation for Windows advanced persistent threat detection | Computers & Security | Rory Coulter Jun Zhang Lei Pan Yang Xiang | 2022/1/1 |
Attention distraction: Watermark removal through continual learning with selective forgetting | Proceedings of IEEE International Conference on Multimedia & Expo (ICME) 2022 | Qi Zhong Leo Yu Zhang Shengshan Hu Longxiang Gao Jun Zhang | 2022/4/5 |
Video is all you need: Attacking PPG-based biometric authentication | Lin Li Chao Chen Lei Pan Jun Zhang Yang Xiang | 2022/11/11 | |
Cyber code intelligence for android malware detection | IEEE Transactions on Cybernetics | Junyang Qiu Qing-Long Han Wei Luo Lei Pan Surya Nepal | 2022/4/27 |
Event detection in online social network: Methodologies, state-of-art, and evolution | Xiangyu Hu Wanlun Ma Chao Chen Sheng Wen Jun Zhang | 2022/11/1 | |
Cyber information retrieval through pragmatics understanding and visualization | IEEE Transactions on Dependable and Secure Computing | Nan Sun Jun Zhang Shang Gao Leo Yu Zhang Seyit Camtepe | 2022/2/14 |
Automated binary analysis: A survey | Zian Liu Chao Chen Ahmed Ejaz Dongxi Liu Jun Zhang | 2022/10/10 | |
Privacy intelligence: A survey on image privacy in online social networks | Chi Liu Tianqing Zhu Jun Zhang Wanlei Zhou | 2022/12/23 | |
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation | arXiv preprint arXiv:2202.05416 | Yuantian Miao Chao Chen Lei Pan Jun Zhang Yang Xiang | 2022/2/11 |
No-Label User-Level Membership Inference for ASR Model Auditing | Yuantian Miao Chao Chen Lei Pan Shigang Liu Seyit Camtepe | 2022/9/22 |