Leo Yu ZHANG

Leo Yu ZHANG

Deakin University

H-index: 28

Oceania-Australia

About Leo Yu ZHANG

Leo Yu ZHANG, With an exceptional h-index of 28 and a recent h-index of 26 (since 2020), a distinguished researcher at Deakin University, specializes in the field of AI Security and Privacy, Cloud Security, Multimedia Security.

His recent articles reflect a diverse array of research interests and contributions to the field:

Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability

Fluent: Round-efficient Secure Aggregation for Private Federated Learning

An Explainable Intellectual Property Protection Method for Deep Neural Networks based on Intrinsic Features

Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models

FairCMS: Cloud Media Sharing With Fair Copyright Protection

Conditional Backdoor Attack via JPEG Compression

Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning

Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud

Leo Yu ZHANG Information

University

Position

School of Info Technology

Citations(all)

2980

Citations(since 2020)

2356

Cited By

1499

hIndex(all)

28

hIndex(since 2020)

26

i10Index(all)

60

i10Index(since 2020)

55

Email

University Profile Page

Deakin University

Google Scholar

View Google Scholar Profile

Leo Yu ZHANG Skills & Research Interests

AI Security and Privacy

Cloud Security

Multimedia Security

Top articles of Leo Yu ZHANG

Title

Journal

Author(s)

Publication Date

Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability

Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P’24)

Yechao Zhang

Shengshan Hu

Leo Yu Zhang

Junyu Shi

Minghui Li

...

2024

Fluent: Round-efficient Secure Aggregation for Private Federated Learning

arXiv preprint arXiv:2403.06143

Xincheng Li

Jianting Ning

Geong Sen Poh

Leo Yu Zhang

Xinchun Yin

...

2024/3/10

An Explainable Intellectual Property Protection Method for Deep Neural Networks based on Intrinsic Features

IEEE Transactions on Artificial Intelligence

Mingfu Xue

Xin Wang

Yinghao Wu

Shifeng Ni

Leo Yu Zhang

...

2024/4/16

Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models

IEEE Transactions on Dependable and Secure Computing

Zeming Yao

Hangtao Zhang

Yicheng Guo

Xin Tian

Wei Peng

...

2024/2/26

FairCMS: Cloud Media Sharing With Fair Copyright Protection

IEEE Transactions on Computational Social Systems

Xiangli Xiao

Yushu Zhang

Leo Yu Zhang

Zhongyun Hua

Zhe Liu

...

2024/3/27

Conditional Backdoor Attack via JPEG Compression

Proceedings of the AAAI Conference on Artificial Intelligence

Qiuyu Duan

Zhongyun Hua

Qing Liao

Yushu Zhang

Leo Yu Zhang

2024/3/24

Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning

IEEE Transactions on Information Forensics and Security

Jianrong Lu

Shengshan Hu

Wei Wan

Minghui Li

Leo Yu Zhang

...

2024/1/31

Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud

Computer Standards & Interfaces

Zesen Hou

Jianting Ning

Xinyi Huang

Shengmin Xu

Leo Yu Zhang

2024/8/1

Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples

arXiv preprint arXiv:2403.10801

Ziqi Zhou

Minghui Li

Wei Liu

Shengshan Hu

Yechao Zhang

...

2024/3/16

Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks

arXiv preprint arXiv:2401.16687

Lulu Xue

Shengshan Hu

Ruizhi Zhao

Leo Yu Zhang

Shengqing Hu

...

2024/1/30

Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics

Xiaoxing Mo

Yechao Zhang

Leo Yu Zhang

Wei Luo

Nan Sun

...

2024/2/1

MISA: Unveiling the Vulnerabilities in Split Federated Learning

Wei Wan

Yuxuan Ning

Shengshan Hu

Lulu Xue

Minghui Li

...

2024/4/14

Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation

Proceedings of the AAAI Conference on Artificial Intelligence

Di Mi

Yanjun Zhang

Leo Yu Zhang

Shengshan Hu

Qi Zhong

...

2024/3/24

Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness

IJCAI (arXiv:2404.11357)

Hangtao Zhang

Shengshan Hu

Yichen Wang

Leo Yu Zhang

Ziqi Zhou

...

2024/4/17

SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display

Lin Li

Chao Chen

Lei Pan

Leo Yu Zhang

Jun Zhang

...

2023/10/16

AGRAMPLIFIER: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification

IEEE Transactions on Information Forensics and Security

Zirui Gong

Liyue Shen

Yanjun Zhang

Leo Yu Zhang

Jingwei Wang

...

2023/11/16

Masked Language Model Based Textual Adversarial Example Detection

Xiaomei Zhang

Zhaoxi Zhang

Qi Zhong

Xufei Zheng

Yanjun Zhang

...

2023/7/10

Probabilistic Matrix Factorization Recommendation Approach for Integrating Multiple Information Sources

IEEE Transactions on Systems, Man, and Cybernetics: Systems

Jiangzhou Deng

Xun Ran

Yong Wang

Leo Yu Zhang

Junpeng Guo

2023/6/12

LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks

Mengyao Ma

Yanjun Zhang

Pathum Chamikara Mahawaga Arachchige

Leo Yu Zhang

Mohan Baruwal Chhetri

...

2023/7/10

Corrupting Unbounded Unlearnable Datasets with Pixel-based Image Transformations

Xianlong Wang

Shengshan Hu

Minghui Li

Zhifei Yu

Ziqi Zhou

...

2023/10/13

See List of Professors in Leo Yu ZHANG University(Deakin University)