Följ
Zecheng He
Zecheng He
Meta GenAI
Verifierad e-postadress på meta.com - Startsida
Titel
Citeras av
Citeras av
År
Model Inversion Attacks Against Collaborative Inference
Z He, T Zhang, RB Lee
Annual Computer Security Applications Conference (ACSAC), 148-162, 2019
3572019
Machine learning based ddos attack detection from source side in cloud
Z He, T Zhang, RB Lee
IEEE International Conference on Cyber Security and Cloud Computing (CSCloud …, 2017
2182017
How secure is your cache against side-channel attacks?
Z He, RB Lee
IEEE/ACM International Symposium on Microarchitecture (MICRO), 341-353, 2017
1092017
Attacking and Protecting Data Privacy in Edge–Cloud Collaborative Inference Systems
Z He, T Zhang, RB Lee
IEEE Internet of Things Journal 8 (12), 9706-9716, 2020
1082020
Privacy-preserving Machine Learning through Data Obfuscation
T Zhang, Z He, RB Lee
arXiv preprint arXiv:1807.01860, 2018
1052018
Sensitive-sample fingerprinting of deep neural networks
Z He, T Zhang, R Lee
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
992019
ActionBert: Leveraging User Actions for Semantic Understanding of User Interfaces
Z He, S Sunkara, X Zang, Y Xu, L Liu, N Wichers, G Schubiner, R Lee, ...
AAAI Conference on Artificial Intelligence (AAAI), 2021
812021
Movie Gen: A Cast of Media Foundation Models
A Polyak, A Zohar, A Brown, A Tjandra, A Sinha, A Lee, A Vyas, B Shi, ...
arXiv preprint arXiv:2410.13720, 2024
772024
Miss the Point: Targeted Adversarial Attack on Multiple Landmark Detection
Q Yao, Z He, H Han, SK Zhou
International Conference on Medical Image Computing and Computer-Assisted …, 2020
432020
Power-grid controller anomaly detection with enhanced temporal deep learning
Z He, A Raghavan, G Hu, S Chai, R Lee
IEEE International Conference On Trust, Security And Privacy In Computing …, 2019
38*2019
Verideep: Verifying integrity of deep neural networks through sensitive-sample fingerprinting
Z He, T Zhang, RB Lee
arXiv preprint arXiv:1808.03277, 2018
342018
Trainable Projected Gradient Method for Robust Fine-tuning
J Tian, Z He, X Dai, CY Ma, YC Liu, Z Kira
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
332023
New Models for Understanding and Reasoning about Speculative Execution Attacks
Z He, G Hu, R Lee
IEEE International Symposium on High-Performance Computer Architecture (HPCA), 2021
302021
A hierarchical feature constraint to camouflage medical adversarial attacks
Q Yao, Z He, Y Lin, K Ma, Y Zheng, SK Zhou
Medical Image Computing and Computer Assisted Intervention–MICCAI 2021: 24th …, 2021
242021
SoK: Hardware Defenses Against Speculative Execution Attacks
G Hu, Z He, RB Lee
2021 International Symposium on Secure and Private Execution Environment …, 2021
232021
Cloudshield: Real-time anomaly detection in the cloud
Z He, G Hu, RB Lee
Proceedings of the Thirteenth ACM Conference on Data and Application …, 2023
82023
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
G Hu, Z He, RB Lee
TinyML Research Symposium, 2021
8*2021
Imagine yourself: Tuning-Free Personalized Image Generation
Z He, B Sun, F Juefei-Xu, H Ma, A Ramchandani, V Cheung, S Shah, ...
arXiv preprint arXiv:2409.13346, 2024
62024
Adversarial Medical Image with Hierarchical Feature Hiding
Q Yao, Z He, Y Li, Y Lin, K Ma, Y Zheng, SK Zhou
IEEE Transactions on Medical Imaging, 2023
42023
Medical Aegis: Robust adversarial protectors for medical images
Q Yao, Z He, SK Zhou
arXiv preprint arXiv:2111.10969, 2021
42021
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20