Tianwei Zhang
Tianwei Zhang
Verified email at - Homepage
Cited by
Cited by
Cloudradar: A real-time side-channel attack detection system in clouds
T Zhang, Y Zhang, RB Lee
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
Model inversion attacks against collaborative inference
Z He, T Zhang, RB Lee
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
Adversarial attacks against network intrusion detection in IoT systems
H Qiu, T Dong, T Zhang, J Lu, G Memmi, M Qiu
IEEE Internet of Things Journal 8 (13), 10327-10335, 2021
Jailbreaking chatgpt via prompt engineering: An empirical study
Y Liu, G Deng, Z Xu, Y Li, Y Zheng, Y Zhang, L Zhao, T Zhang, K Wang, ...
arXiv preprint arXiv:2305.13860, 2023
Instruction tuning for large language models: A survey
S Zhang, L Dong, X Li, S Zhang, X Sun, S Wang, J Li, R Hu, T Zhang, ...
arXiv preprint arXiv:2308.10792, 2023
Deepsweep: An evaluation framework for mitigating DNN backdoor attacks using data augmentation
H Qiu, Y Zeng, S Guo, T Zhang, M Qiu, B Thuraisingham
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
Machine learning based DDoS attack detection from source side in cloud
Z He, T Zhang, RB Lee
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017
MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots
G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li, H Wang, T Zhang, Y Liu
The Network and Distributed System Security Symposium (NDSS), 2024
Gpt-ner: Named entity recognition via large language models
S Wang, X Sun, X Li, R Ouyang, F Wu, T Zhang, J Li, G Wang
arXiv preprint arXiv:2304.10428, 2023
Prompt Injection attack against LLM-integrated Applications
Y Liu, G Deng, Y Li, K Wang, Z Wang, X Wang, T Zhang, Y Liu, H Wang, ...
arXiv preprint arXiv:2306.05499, 2023
Stealthy and efficient adversarial attacks against deep reinforcement learning
J Sun, T Zhang, X Xie, L Ma, Y Zheng, K Chen, Y Liu
Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 5883-5891, 2020
Sensitive-sample fingerprinting of deep neural networks
Z He, T Zhang, R Lee
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
Characterization and prediction of deep learning workloads in large-scale gpu datacenters
Q Hu, P Sun, S Yan, Y Wen, T Zhang
Proceedings of the International Conference for High Performance Computing …, 2021
Privacy-preserving machine learning through data obfuscation
T Zhang, Z He, RB Lee
arXiv preprint arXiv:1807.01860, 2018
Attacking and protecting data privacy in edge–cloud collaborative inference systems
Z He, T Zhang, RB Lee
IEEE Internet of Things Journal 8 (12), 9706-9716, 2021
New models of cache architectures characterizing information leakage from cache side channels
T Zhang, RB Lee
Proceedings of the 30th annual computer security applications conference, 96-105, 2014
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
X Lou, T Zhang, J Jiang, Y Zhang
ACM Computing Surveys (CSUR) 54 (6), 1-37, 2021
Text Classification via Large Language Models
X Sun, X Li, J Li, F Wu, S Guo, T Zhang, G Wang
Findings of Conference on Empirical Methods in Natural Language Processing …, 2023
Badpre: Task-agnostic backdoor attacks to pre-trained nlp foundation models
K Chen, Y Meng, X Sun, S Guo, T Zhang, J Li, C Fan
International Conference on Learning Representations (ICLR), 2022
Dos attacks on your memory in cloud
T Zhang, Y Zhang, RB Lee
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20