default search action
Zhe Zhou 0001
Person information
- unicode name: 周喆
- affiliation: Fudan University, School of Computer Science, Shanghai, China
- affiliation: Chinese University of Hong Kong, Department of Information Engineering, Hong Kong
Other persons with the same name
- Zhe Zhou — disambiguation page
- Zhe Zhou 0002 — Peking University, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c20]Jiacen Xu, Zhe Zhou, Boyuan Feng, Yufei Ding, Zhou Li:
On Adversarial Robustness of Point Cloud Semantic Segmentation. DSN 2023: 531-544 - [c19]Zhe Zhou, Yanxiang Bi, Junpeng Wan, Yangfan Zhou, Zhou Li:
Userspace Bypass: Accelerating Syscall-intensive Applications. OSDI 2023: 33-49 - 2022
- [c18]Qifan Zhang, Junjie Shen, Mingtian Tan, Zhe Zhou, Zhou Li, Qi Alfred Chen, Haipeng Zhang:
Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization. ACSAC 2022: 56-70 - [c17]Junpeng Wan, Yanxiang Bi, Zhe Zhou, Zhou Li:
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh. SP 2022: 1506-1524 - 2021
- [j4]Weili Han, Chang Cao, Zhe Zhou, Shize Chen, Lingqi Huang, X. Sean Wang:
A Smart Framework for Fine-Grained Microphone Acoustic Permission Management. IEEE Trans. Dependable Secur. Comput. 18(6): 2705-2718 (2021) - [c16]Mingtian Tan, Zhe Zhou, Zhou Li:
The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery. ACSAC 2021: 17-30 - [c15]Mingtian Tan, Junpeng Wan, Zhe Zhou, Zhou Li:
Invisible Probe: Timing Attacks with PCIe Congestion Side-channel. SP 2021: 322-338 - [i9]Junpeng Wan, Yanxiang Bi, Zhe Zhou, Zhou Li:
Volcano: Stateless Cache Side-channel Attack by Exploiting Mesh Interconnect. CoRR abs/2103.04533 (2021) - [i8]Jiacen Xu, Zhe Zhou, Boyuan Feng, Yufei Ding, Zhou Li:
Attacking Point Cloud Segmentation with Color-only Perturbation. CoRR abs/2112.05871 (2021) - 2020
- [c14]Junyi Wei, Yicheng Zhang, Zhe Zhou, Zhou Li, Mohammad Abdullah Al Faruque:
Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel. DSN 2020: 125-137
2010 – 2019
- 2019
- [c13]Mingming Zha, Guozhu Meng, Chaoyang Lin, Zhe Zhou, Kai Chen:
RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems. Inscrypt 2019: 101-117 - [i7]Zhe Zhou, Mingtian Tan:
Embedding is not Cipher: Understanding the risk of embedding leakages. CoRR abs/1901.09769 (2019) - 2018
- [j3]Lu Sun, Mingtian Tan, Zhe Zhou:
A survey of practical adversarial example attacks. Cybersecur. 1(1): 9 (2018) - [j2]Wenrui Diao, Rui Liu, Xiangyu Liu, Zhe Zhou, Zhou Li, Kehuan Zhang:
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks. J. Comput. Secur. 26(3): 283-309 (2018) - [c12]Zhe Zhou, Di Tang, Wenhao Wang, Xiaofeng Wang, Zhou Li, Kehuan Zhang:
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection. ACSAC 2018: 77-88 - [c11]Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang:
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections. NDSS 2018 - [i6]Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang:
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections. CoRR abs/1801.01949 (2018) - [i5]Zhe Zhou, Di Tang, Xiaofeng Wang, Weili Han, Xiangyu Liu, Kehuan Zhang:
Invisible Mask: Practical Attacks on Face Recognition with Infrared. CoRR abs/1803.04683 (2018) - 2017
- [j1]Zhe Zhou, Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang, Rui Liu:
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU. Proc. Priv. Enhancing Technol. 2017(2): 57-73 (2017) - [c10]Zhe Zhou, Zhou Li, Kehuan Zhang:
All Your VMs are Disconnected: Attacking Hardware Virtualized Network. CODASPY 2017: 249-260 - [c9]Xiaolong Bai, Zhe Zhou, XiaoFeng Wang, Zhou Li, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, Kehuan Zhang:
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment. USENIX Security Symposium 2017: 593-608 - 2016
- [c8]Zhe Zhou, Tao Zhang, Sherman S. M. Chow, Yupeng Zhang, Kehuan Zhang:
Efficient Authenticated Multi-Pattern Matching. AsiaCCS 2016: 593-604 - [c7]Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, Qiang Xu:
On Code Execution Tracking via Power Side-Channel. CCS 2016: 1019-1031 - [c6]Tao Zhang, Sherman S. M. Chow, Zhe Zhou, Ming Li:
Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. IWSEC 2016: 215-233 - [i4]Zhe Zhou, Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang, Rui Liu:
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU. CoRR abs/1605.06610 (2016) - 2015
- [c5]Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang:
When Good Becomes Evil: Keystroke Inference with Smartwatch. CCS 2015: 1273-1285 - [c4]Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang, Zhou Li:
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections. ESORICS (2) 2015: 20-39 - [c3]Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang:
An Empirical Study on Android for Saving Non-shared Data on Public Storage. SEC 2015: 542-556 - 2014
- [c2]Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang:
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone. SPSM@CCS 2014: 63-74 - [c1]Zhe Zhou, Wenrui Diao, Xiangyu Liu, Kehuan Zhang:
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound. CCS 2014: 429-440 - [i3]Zhe Zhou, Wenrui Diao, Xiangyu Liu, Kehuan Zhang:
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound. CoRR abs/1407.0803 (2014) - [i2]Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang:
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone. CoRR abs/1407.4923 (2014) - [i1]Xiangyu Liu, Wenrui Diao, Zhe Zhou, Zhou Li, Kehuan Zhang:
Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones. CoRR abs/1407.5410 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint