Xuhong Zhang
Zhejiang University
H-index: 12
Asia-China
Top articles of Xuhong Zhang
Towards understanding bogus traffic service in online social networks
Frontiers of Information Technology & Electronic Engineering
2024/3
Ping He
H-Index: 9
Xuhong Zhang
H-Index: 6
Changting Lin
H-Index: 5
Ting Wang
H-Index: 6
Shouling Ji
H-Index: 25
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection
IEEE Transactions on Dependable and Secure Computing
2024/2/21
EdgePro: Edge Deep Learning Model Protection via Neuron Authorization
IEEE Transactions on Dependable and Secure Computing
2024/2/13
Tao Liu
H-Index: 6
Jiawei Liu
H-Index: 3
Yao Cheng
H-Index: 3
Xuhong Zhang
H-Index: 6
Shouling Ji
H-Index: 25
DEEPFAKER: a unified evaluation platform for facial deepfake and detection models
ACM Transactions on Privacy and Security
2024/2/6
Hijack Vertical Federated Learning Models As One Party
IEEE Transactions on Dependable and Secure Computing
2024/1/24
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning
IEEE Transactions on Information Forensics and Security
2024/1/19
Xuhong Zhang
H-Index: 6
Shouling Ji
H-Index: 25
Chong Fu
H-Index: 21
Xing Yang
H-Index: 26
Ting Wang
H-Index: 6
TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting
IEEE Transactions on Dependable and Secure Computing
2023/12/6
Multi-level feature disentanglement network for cross-dataset face forgery detection
Image and Vision Computing
2023/7/1
One bad apple spoils the barrel: Understanding the security risks introduced by third-party components in iot firmware
IEEE Transactions on Dependable and Secure Computing
2023/5/25
How iot re-using threatens your sensitive data: Exploring the user-data disposal in used iot devices
2023/5/21
G-fuzz: A directed fuzzing framework for gvisor
IEEE Transactions on Dependable and Secure Computing
2023/2/22
Yuwei Li
H-Index: 12
Yuan Chen
H-Index: 2
Shouling Ji
H-Index: 25
Xuhong Zhang
H-Index: 6
Peng Lin
H-Index: 5
{FreeEagle}: Detecting Complex Neural Trojans in {Data-Free} Cases
2023
{MINER}: A Hybrid {Data-Driven} Approach for {REST}{API} Fuzzing
2023
" Is your explanation stable?" A Robustness Evaluation Framework for Feature Attribution
2022/11/7
Xuhong Zhang
H-Index: 6
Shouling Ji
H-Index: 25
Meng Han
H-Index: 3
Jianwei Yin
H-Index: 24
Ting Wang
H-Index: 6
Your labels are selling you out: Relation leaks in vertical federated learning
IEEE Transactions on Dependable and Secure Computing
2022/9/22
Xuhong Zhang
H-Index: 6
Shouling Ji
H-Index: 25
Tianyu Du
H-Index: 5
Jun Zhou
H-Index: 16
Ting Wang
H-Index: 6
Seeing is living? rethinking the security of facial liveness verification in the deepfake era
2022
Li Wang
H-Index: 0
Shouling Ji
H-Index: 25
Xuhong Zhang
H-Index: 6
Zhaohan Xi
H-Index: 1
Ting Wang
H-Index: 6
SLIME: Program-Sensitive Energy Allocation for Fuzzing
2022/7/18
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware
2022/7/18
Neuronfair: Interpretable white-box fairness testing through biased neuron identification
2022/5/25
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
2022/5