default search action
Zhi Zhang 0001
Person information
- affiliation: University of Western Australia, Perth, WA, Australia
- affiliation (former): Data61, CSIRO, Australia
- affiliation (former): University of New South Wales, NSW, Australia
- affiliation (former): Peking University, Beijing, China
- unicode name: 张智
Other persons with the same name
- Zhi Zhang — disambiguation page
- Zhi Zhang 0002 — North China Electric Power University, Beijing, China
- Zhi Zhang 0003 — Beijing University of Posts and Telecommunications, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Guohong Wang, Hua Ma, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Wei Kang, Said F. Al-Sarawi, Gongxuan Zhang, Derek Abbott:
One-to-Multiple Clean-Label Image Camouflage (OmClic) based backdoor attack on deep learning. Knowl. Based Syst. 288: 111456 (2024) - [j14]Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Jiliang Zhang, Said F. Al-Sarawi, Derek Abbott:
Quantization Backdoors to Deep Learning Commercial Frameworks. IEEE Trans. Dependable Secur. Comput. 21(3): 1155-1172 (2024) - [j13]Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott:
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection. IEEE Trans. Inf. Forensics Secur. 19: 104-119 (2024) - [j12]Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao:
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. IEEE Trans. Inf. Forensics Secur. 19: 455-468 (2024) - [c13]Zhi Zhang, Decheng Chen, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang, Yang Xiang:
SoK: Rowhammer on Commodity Operating Systems. AsiaCCS 2024 - [c12]Xin Zhang, Zhi Zhang, Qingni Shen, Wenhao Wang, Yansong Gao, Zhuoxi Yang, Jiliang Zhang:
SegScope: Probing Fine-grained Interrupts via Architectural Footprints. HPCA 2024: 424-438 - [c11]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:
DeepTheft: Stealing DNN Model Architectures through Power Side Channel. SP 2024: 3311-3326 - [c10]Shaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen:
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection. USENIX Security Symposium 2024 - [i28]Na Li, Chunyi Zhou, Yansong Gao, Hui Chen, Anmin Fu, Zhi Zhang, Yu Shui:
Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects. CoRR abs/2403.08254 (2024) - 2023
- [j11]Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott:
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning. Comput. Secur. 133: 103406 (2023) - [j10]Huming Qiu, Hua Ma, Zhi Zhang, Yansong Gao, Yifeng Zheng, Anmin Fu, Pan Zhou, Derek Abbott, Said F. Al-Sarawi:
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(4): 1185-1198 (2023) - [j9]Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou:
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses. IEEE Trans. Dependable Secur. Comput. 20(5): 3716-3733 (2023) - [j8]Jiliang Zhang, Shuang Peng, Yansong Gao, Zhi Zhang, Qinghui Hong:
APMSA: Adversarial Perturbation Against Model Stealing Attacks. IEEE Trans. Inf. Forensics Secur. 18: 1667-1679 (2023) - [c9]Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. AsiaCCS 2023: 938-950 - [c8]Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. NDSS 2023 - [c7]Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World. SRDS 2023: 82-92 - [i27]Jiliang Zhang, Jing Xu, Zhi Zhang, Yansong Gao:
Imperceptible Sample-Specific Backdoor to DNN with Denoising Autoencoder. CoRR abs/2302.04457 (2023) - [i26]Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang:
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs. CoRR abs/2308.01463 (2023) - [i25]Guohong Wang, Hua Ma, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Wei Kang, Said F. Al-Sarawi, Gongxuan Zhang, Derek Abbott:
One-to-Multiple Clean-Label Image Camouflage (OmClic) based Backdoor Attack on Deep Learning. CoRR abs/2309.04036 (2023) - [i24]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:
DeepTheft: Stealing DNN Model Architectures through Power Side Channel. CoRR abs/2309.11894 (2023) - 2022
- [j7]Yueqiang Cheng, Zhi Zhang, Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei, Surya Nepal, Yang Xiang:
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation. Comput. Secur. 113: 102556 (2022) - [j6]Yansong Gao, Minki Kim, Chandra Thapa, Alsharif Abuadbba, Zhi Zhang, Seyit Camtepe, Hyoungshick Kim, Surya Nepal:
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things. IEEE Trans. Computers 71(10): 2538-2552 (2022) - [j5]Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith C. Ranasinghe, Hyoungshick Kim:
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks. IEEE Trans. Dependable Secur. Comput. 19(4): 2349-2364 (2022) - [j4]Jianrong Yao, Lihui Pang, Yang Su, Zhi Zhang, Wei Yang, Anmin Fu, Yansong Gao:
Design and Evaluate Recomposited OR-AND-XOR-PUF. IEEE Trans. Emerg. Top. Comput. 10(2): 662-677 (2022) - [c6]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu:
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh. USENIX ATC 2022: 399-414 - [i23]Zhi Zhang, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou:
A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM. CoRR abs/2201.02986 (2022) - [i22]Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World. CoRR abs/2201.08619 (2022) - [i21]Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. CoRR abs/2202.04856 (2022) - [i20]Yansong Gao, Jianrong Yao, Lihui Pang, Zhi Zhang, Anmin Fu, Naixue Xiong, Hyoungshick Kim:
Systematically Evaluation of Challenge Obfuscated APUFs. CoRR abs/2203.15316 (2022) - [i19]Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao:
Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. CoRR abs/2204.06273 (2022) - [i18]Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo:
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences. CoRR abs/2206.00145 (2022) - [i17]Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott:
MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning. CoRR abs/2207.09080 (2022) - [i16]Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World. CoRR abs/2209.02339 (2022) - 2021
- [b1]Zhi Zhang:
Software-only Rowhammer Attacks and Countermeasures. University of New South Wales, Sydney, Australia, 2021 - [j3]Yueqiang Cheng, Zhi Zhang, Surya Nepal, Zhi Wang:
CATTmew: Defeating Software-Only Physical Kernel Isolation. IEEE Trans. Dependable Secur. Comput. 18(4): 1989-2004 (2021) - [j2]Zhi Zhang, Yueqiang Cheng, Yansong Gao, Surya Nepal, Dongxi Liu, Yi Zou:
Detecting Hardware-Assisted Virtualization With Inconspicuous Features. IEEE Trans. Inf. Forensics Secur. 16: 16-27 (2021) - [j1]Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Minghua Wang, Kang Li, Surya Nepal, Yang Xiang:
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability. IEEE Trans. Inf. Forensics Secur. 16: 5167-5181 (2021) - [i15]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu:
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh. CoRR abs/2102.10269 (2021) - [i14]Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things. CoRR abs/2103.02762 (2021) - [i13]Huming Qiu, Hua Ma, Zhi Zhang, Yifeng Zheng, Anmin Fu, Pan Zhou, Yansong Gao, Derek Abbott, Said F. Al-Sarawi:
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things. CoRR abs/2105.03822 (2021) - [i12]Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Derek Abbott:
Quantization Backdoors to Deep Learning Models. CoRR abs/2108.09187 (2021) - [i11]Jianrong Yao, Lihui Pang, Zhi Zhang, Wei Yang, Anmin Fu, Yansong Gao:
Design and Evaluate Recomposited OR-AND-XOR-PUF. CoRR abs/2110.00909 (2021) - [i10]Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott:
NTD: Non-Transferability Enabled Backdoor Detection. CoRR abs/2111.11157 (2021) - 2020
- [c5]Minghua Wang, Zhi Zhang, Yueqiang Cheng, Surya Nepal:
DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping. DAC 2020: 1-6 - [c4]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. MICRO 2020: 28-41 - [i9]Zhi Zhang, Yueqiang Cheng, Yinqian Zhang, Surya Nepal:
GhostKnight: Breaching Data Integrity via Speculative Execution. CoRR abs/2002.00524 (2020) - [i8]Minghua Wang, Zhi Zhang, Yueqiang Cheng, Surya Nepal:
DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping. CoRR abs/2004.02354 (2020) - [i7]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. CoRR abs/2007.08707 (2020) - [i6]Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim:
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review. CoRR abs/2007.10760 (2020)
2010 – 2019
- 2019
- [i5]Zhi Zhang, Yueqiang Cheng:
PiBooster: A Light-Weight Approach to Performance Improvements in Page Table Management for Paravirtual Virtual-Machines. CoRR abs/1910.09277 (2019) - [i4]Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith Chinthana Ranasinghe, Hyoungshick Kim:
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks. CoRR abs/1911.10312 (2019) - [i3]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang:
TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique. CoRR abs/1912.03076 (2019) - 2018
- [c3]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. RAID 2018: 691-710 - [i2]Yueqiang Cheng, Zhi Zhang, Surya Nepal:
Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation. CoRR abs/1802.07060 (2018) - [i1]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS. CoRR abs/1802.07062 (2018) - 2016
- [c2]Zhi Zhang, Yueqiang Cheng:
PiBooster: Performance Accelerations in Page Table Management for Paravirtual VMs. CLOUD 2016: 513-520 - 2013
- [c1]Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing, Zhonghai Wu:
A Covert Channel Using Event Channel State on Xen Hypervisor. ICICS 2013: 125-134
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint