Xuhong Zhang

About Xuhong Zhang

Xuhong Zhang, With an exceptional h-index of 12 and a recent h-index of 12 (since 2020), a distinguished researcher at Zhejiang University, specializes in the field of Trustworthy AI, Applications of Generative AI.

His recent articles reflect a diverse array of research interests and contributions to the field:

Towards understanding bogus traffic service in online social networks

Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection

EdgePro: Edge Deep Learning Model Protection via Neuron Authorization

DEEPFAKER: a unified evaluation platform for facial deepfake and detection models

Hijack Vertical Federated Learning Models As One Party

HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning

TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting

Multi-level feature disentanglement network for cross-dataset face forgery detection

Xuhong Zhang Information

University

Position

___

Citations(all)

589

Citations(since 2020)

541

Cited By

96

hIndex(all)

12

hIndex(since 2020)

12

i10Index(all)

20

i10Index(since 2020)

18

Email

University Profile Page

Google Scholar

Xuhong Zhang Skills & Research Interests

Trustworthy AI

Applications of Generative AI

Top articles of Xuhong Zhang

Towards understanding bogus traffic service in online social networks

Frontiers of Information Technology & Electronic Engineering

2024/3

Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection

IEEE Transactions on Dependable and Secure Computing

2024/2/21

EdgePro: Edge Deep Learning Model Protection via Neuron Authorization

IEEE Transactions on Dependable and Secure Computing

2024/2/13

DEEPFAKER: a unified evaluation platform for facial deepfake and detection models

ACM Transactions on Privacy and Security

2024/2/6

Hijack Vertical Federated Learning Models As One Party

IEEE Transactions on Dependable and Secure Computing

2024/1/24

HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning

IEEE Transactions on Information Forensics and Security

2024/1/19

TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting

IEEE Transactions on Dependable and Secure Computing

2023/12/6

Multi-level feature disentanglement network for cross-dataset face forgery detection

Image and Vision Computing

2023/7/1

One bad apple spoils the barrel: Understanding the security risks introduced by third-party components in iot firmware

IEEE Transactions on Dependable and Secure Computing

2023/5/25

How iot re-using threatens your sensitive data: Exploring the user-data disposal in used iot devices

2023/5/21

G-fuzz: A directed fuzzing framework for gvisor

IEEE Transactions on Dependable and Secure Computing

2023/2/22

{FreeEagle}: Detecting Complex Neural Trojans in {Data-Free} Cases

2023

{MINER}: A Hybrid {Data-Driven} Approach for {REST}{API} Fuzzing

2023

" Is your explanation stable?" A Robustness Evaluation Framework for Feature Attribution

2022/11/7

Your labels are selling you out: Relation leaks in vertical federated learning

IEEE Transactions on Dependable and Secure Computing

2022/9/22

Seeing is living? rethinking the security of facial liveness verification in the deepfake era

2022

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware

2022/7/18

Neuronfair: Interpretable white-box fairness testing through biased neuron identification

2022/5/25

Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings

2022/5

See List of Professors in Xuhong Zhang University(Zhejiang University)

Co-Authors

academic-engine