Cloudradar: A real-time side-channel attack detection system in clouds T Zhang, Y Zhang, RB Lee Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 268 | 2016 |
Model inversion attacks against collaborative inference Z He, T Zhang, RB Lee Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 209 | 2019 |
Adversarial attacks against network intrusion detection in IoT systems H Qiu, T Dong, T Zhang, J Lu, G Memmi, M Qiu IEEE Internet of Things Journal 8 (13), 10327-10335, 2020 | 200 | 2020 |
Machine learning based DDoS attack detection from source side in cloud Z He, T Zhang, RB Lee 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017 | 180 | 2017 |
Deepsweep: An evaluation framework for mitigating DNN backdoor attacks using data augmentation H Qiu, Y Zeng, S Guo, T Zhang, M Qiu, B Thuraisingham Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 123 | 2021 |
Stealthy and efficient adversarial attacks against deep reinforcement learning J Sun, T Zhang, X Xie, L Ma, Y Zheng, K Chen, Y Liu Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 5883-5891, 2020 | 98 | 2020 |
Privacy-preserving machine learning through data obfuscation T Zhang, Z He, RB Lee arXiv preprint arXiv:1807.01860, 2018 | 82 | 2018 |
Sensitive-sample fingerprinting of deep neural networks Z He, T Zhang, R Lee Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019 | 75 | 2019 |
New models of cache architectures characterizing information leakage from cache side channels T Zhang, RB Lee Proceedings of the 30th annual computer security applications conference, 96-105, 2014 | 64 | 2014 |
Characterization and prediction of deep learning workloads in large-scale gpu datacenters Q Hu, P Sun, S Yan, Y Wen, T Zhang Proceedings of the International Conference for High Performance Computing …, 2021 | 63 | 2021 |
CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing T Zhang, RB Lee Proceedings of the 42nd Annual International Symposium on Computer …, 2015 | 59 | 2015 |
Attacking and protecting data privacy in edge–cloud collaborative inference systems Z He, T Zhang, RB Lee IEEE Internet of Things Journal 8 (12), 9706-9716, 2020 | 58 | 2020 |
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography X Lou, T Zhang, J Jiang, Y Zhang ACM Computing Surveys (CSUR) 54 (6), 1-37, 2021 | 56 | 2021 |
Icorating: A deep-learning system for scam ico identification S Bian, Z Deng, F Li, W Monroe, P Shi, Z Sun, W Wu, S Wang, WY Wang, ... arXiv preprint arXiv:1803.03670, 2018 | 55 | 2018 |
Badpre: Task-agnostic backdoor attacks to pre-trained nlp foundation models K Chen, Y Meng, X Sun, S Guo, T Zhang, J Li, C Fan arXiv preprint arXiv:2110.02467, 2021 | 54 | 2021 |
Jailbreaking chatgpt via prompt engineering: An empirical study Y Liu, G Deng, Z Xu, Y Li, Y Zheng, Y Zhang, L Zhao, T Zhang, Y Liu arXiv preprint arXiv:2305.13860, 2023 | 49 | 2023 |
Side channel vulnerability metrics: the promise and the pitfalls T Zhang, F Liu, S Chen, RB Lee Proceedings of the 2nd International Workshop on Hardware and Architectural …, 2013 | 48 | 2013 |
Dos attacks on your memory in cloud T Zhang, Y Zhang, RB Lee Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 46 | 2017 |
Fast nearest neighbor machine translation Y Meng, X Li, X Zheng, F Wu, X Sun, T Zhang, J Li arXiv preprint arXiv:2105.14528, 2021 | 44 | 2021 |
Toward secure and efficient deep learning inference in dependable IoT systems H Qiu, Q Zheng, T Zhang, M Qiu, G Memmi, J Lu IEEE Internet of Things Journal 8 (5), 3180-3188, 2020 | 43 | 2020 |