Tianwei Zhang
Tianwei Zhang
Verified email at ntu.edu.sg - Homepage
Cited by
Cited by
Cloudradar: A real-time side-channel attack detection system in clouds
T Zhang, Y Zhang, RB Lee
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
Machine learning based DDoS attack detection from source side in cloud
Z He, T Zhang, RB Lee
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017
CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing
T Zhang, RB Lee
Proceedings of the 42nd Annual International Symposium on Computer …, 2015
Model inversion attacks against collaborative inference
Z He, T Zhang, RB Lee
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
Privacy-preserving machine learning through data obfuscation
T Zhang, Z He, RB Lee
arXiv preprint arXiv:1807.01860, 2018
New models of cache architectures characterizing information leakage from cache side channels
T Zhang, RB Lee
Proceedings of the 30th annual computer security applications conference, 96-105, 2014
Side channel vulnerability metrics: the promise and the pitfalls
T Zhang, F Liu, S Chen, RB Lee
Proceedings of the 2nd International Workshop on Hardware and Architectural …, 2013
Stealthy and efficient adversarial attacks against deep reinforcement learning
J Sun, T Zhang, X Xie, L Ma, Y Zheng, K Chen, Y Liu
Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 5883-5891, 2020
Dos attacks on your memory in cloud
T Zhang, Y Zhang, RB Lee
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Icorating: A deep-learning system for scam ico identification
S Bian, Z Deng, F Li, W Monroe, P Shi, Z Sun, W Wu, S Wang, WY Wang, ...
arXiv preprint arXiv:1803.03670, 2018
A framework for realizing security on demand in cloud computing
P Jamkhedkar, J Szefer, D Perez-Botero, T Zhang, G Triolo, RB Lee
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
Memory DoS attacks in multi-tenant clouds: Severity and mitigation
T Zhang, Y Zhang, RB Lee
arXiv preprint arXiv:1603.03404, 2016
Sensitive-sample fingerprinting of deep neural networks
Z He, T Zhang, R Lee
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
Adversarial attacks against network intrusion detection in IoT systems
H Qiu, T Dong, T Zhang, J Lu, G Memmi, M Qiu
IEEE Internet of Things Journal, 2020
Monitoring and attestation of virtual machine security health in cloud computing
T Zhang, RB Lee
IEEE Micro 36 (5), 28-37, 2016
Secure cache modeling for measuring side-channel leakage
T Zhang, RB Lee
Technical Report, Princeton University, 2014
Toward secure and efficient deep learning inference in dependable IoT systems
H Qiu, Q Zheng, T Zhang, M Qiu, G Memmi, J Lu
IEEE Internet of Things Journal 8 (5), 3180-3188, 2020
Verideep: Verifying integrity of deep neural networks through sensitive-sample fingerprinting
Z He, T Zhang, RB Lee
arXiv preprint arXiv:1808.03277, 2018
Design, implementation and verification of cloud architecture for monitoring a virtual machine's security health
T Zhang, RB Lee
IEEE Transactions on Computers 67 (6), 799-815, 2017
Towards byzantine-resilient learning in decentralized systems
S Guo, T Zhang, X Xie, L Ma, T Xiang, Y Liu
arXiv preprint arXiv:2002.08569, 2020
The system can't perform the operation now. Try again later.
Articles 1–20