A comprehensive survey on poisoning attacks and countermeasures in machine learning Z Tian, L Cui, J Liang, S Yu ACM Computing Surveys 55 (8), 1-35, 2022 | 213 | 2022 |
A distance-based method for building an encrypted malware traffic identification framework J Liu, Z Tian, R Zheng, L Liu IEEE Access 7, 100014-100028, 2019 | 36 | 2019 |
Bfu: Bayesian federated unlearning with parameter self-sharing W Wang, Z Tian, C Zhang, A Liu, S Yu Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023 | 20 | 2023 |
Generative adversarial networks: A survey on attack and defense perspective C Zhang, S Yu, Z Tian, JJQ Yu ACM Computing Surveys 56 (4), 1-35, 2023 | 18 | 2023 |
Sneaking through security: Mutating live network traffic to evade learning-based NIDS S Tan, X Zhong, Z Tian, Q Dong IEEE Transactions on Network and Service Management 19 (3), 2295-2308, 2022 | 16 | 2022 |
Personalized federated learning for heterogeneous residential load forecasting X Qu, C Guan, G Xie, Z Tian, K Sood, C Sun, L Cui Big Data Mining and Analytics 6 (4), 421-432, 2023 | 15 | 2023 |
Two-layer detection framework with a high accuracy and efficiency for a malware family over the TLS protocol R Zheng, J Liu, L Liu, S Liao, K Li, J Wei, L Li, Z Tian PloS one 15 (5), e0232696, 2020 | 14 | 2020 |
Machine unlearning: A comprehensive survey W Wang, Z Tian, C Zhang, S Yu arXiv preprint arXiv:2405.07406, 2024 | 12 | 2024 |
Modeling and analyzing the spatial-temporal propagation of malware in mobile wearable IoT networks J Dou, G Xie, Z Tian, L Cui, S Yu IEEE Internet of Things Journal, 2023 | 9 | 2023 |
Machine unlearning via representation forgetting with parameter self-sharing W Wang, C Zhang, Z Tian, S Yu IEEE Transactions on Information Forensics and Security, 2023 | 8 | 2023 |
A survey on semantic communication networks: Architecture, security, and privacy S Guo, Y Wang, N Zhang, Z Su, TH Luan, Z Tian, X Shen IEEE Communications Surveys & Tutorials, 2024 | 7 | 2024 |
An Asynchronous Multi-Task Semantic Communication Method Z Tian, H Vo, C Zhang, G Min, S Yu IEEE Network, 2023 | 6 | 2023 |
The Role of Class Information in Model Inversion Attacks against Image Deep Learning Classifiers Z Tian, L Cui, C Zhang, S Tan, S Yu, Y Tian IEEE Transactions on Dependable and Secure Computing, 2023 | 4 | 2023 |
Construct new graphs using information bottleneck against property inference attacks C Zhang, Z Tian, JQ James, S Yu ICC 2023-IEEE International Conference on Communications, 765-770, 2023 | 3 | 2023 |
Unveiling the Unseen: Video Recognition Attacks on Social Software H Zhao, H Wu, X Bian, S Liu, G Cheng, X Hu, Z Tian Australasian Conference on Information Security and Privacy, 412-432, 2024 | 1 | 2024 |
Forgetting and Remembering Are Both You Need: Balanced Graph Structure Unlearning C Zhang, W Wang, Z Tian, S Yu IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck S Guo, Z Su, Z Tian, S Yu 2022 IEEE International Conference on Trust, Security and Privacy in …, 2022 | 1 | 2022 |
A Novel Android Malware Detection Method Based on Visible User Interface S Tan, Z Tian, X Zhong, S Yu, W Zhang, G Dong 2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021 | 1 | 2021 |
CRCGAN: Toward robust feature extraction in finger vein recognition Z Zhang, Z Zhou, Z Tian, S Yu Pattern Recognition 158, 111064, 2025 | | 2025 |
Model-Enabled Task-Oriented Semantic Communications Through Knowledge Synchronization Z Tian, W Wang, C Zhang, S Yu IEEE Transactions on Cognitive Communications and Networking, 2025 | | 2025 |