Follow
Shengzhi Zhang
Shengzhi Zhang
Boston University MET College
Verified email at bu.edu
Title
Cited by
Cited by
Year
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Y X, C Y, Z Y, L Y, L X, C K, Z S, H H, W XF, G CA
27th USENIX Security Symposium (USENIX Security 18), 2018
296*2018
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
2332019
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
1752017
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020
1742020
All your alexa are belong to us: A remote voice control attack against echo
X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, IM Molloy
2018 IEEE global communications conference (GLOBECOM), 1-6, 2018
542018
Machine learning based cross-site scripting detection in online social network
R Wang, X Jia, Q Li, S Zhang
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014
482014
A robustness-assured white-box watermark in neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, H Ma, Y Zhao, Y Li
IEEE Transactions on Dependable and Secure Computing 20 (6), 5214-5229, 2023
32*2023
Sok: A modularized approach to study the security of automatic speech recognition systems
Y Chen, J Zhang, X Yuan, S Zhang, K Chen, X Wang, S Guo
ACM Transactions on Privacy and Security 25 (3), 1-31, 2022
252022
A comprehensive study of co-residence threat in multi-tenant public paas clouds
W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu
Information and Communications Security: 18th International Conference …, 2016
232016
Cross-layer damage assessment for cyber situational awareness
P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li
Cyber Situational Awareness: Issues and Research, 155-176, 2010
212010
DBIA: Data-Free Backdoor Attack Against Transformer Networks
P Lv, H Ma, J Zhou, R Liang, K Chen, S Zhang, Y Yang
2023 IEEE International Conference on Multimedia and Expo (ICME), 2819-2824, 2023
20*2023
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM
L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018
202018
Ai-lancet: Locating error-inducing neurons to optimize neural networks
Y Zhao, H Zhu, K Chen, S Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
182021
A data-free backdoor injection approach in neural networks
P Lv, C Yue, R Liang, Y Yang, S Zhang, H Ma, K Chen
32nd USENIX Security Symposium (USENIX Security 23), 2671-2688, 2023
162023
HyperCrop: a hypervisor-based countermeasure for return oriented programming
J Jiang, X Jia, D Feng, S Zhang, P Liu
International Conference on Information and Communications Security, 360-373, 2011
162011
Fast recovery from hidden node collision for IEEE 802.15. 4 LR-WPANs
S Zhang, SJ Yoo
7th IEEE International Conference on Computer and Information Technology …, 2007
142007
LeakProber: a framework for profiling sensitive data leakage paths
J Yu, S Zhang, P Liu, ZT Li
Proceedings of the first ACM conference on Data and application security and …, 2011
132011
Cross-layer comprehensive intrusion harm analysis for production workload server systems
S Zhang, X Jia, P Liu, J Jing
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
132010
Ai-guardian: Defeating adversarial attacks using backdoors
H Zhu, S Zhang, K Chen
2023 IEEE Symposium on Security and Privacy (SP), 701-718, 2023
122023
Defending return‐oriented programming based on virtualization techniques
X Jia, R Wang, J Jiang, S Zhang, P Liu
Security and Communication Networks 6 (10), 1236-1249, 2013
122013
The system can't perform the operation now. Try again later.
Articles 1–20