default search action
Tianhang Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Tianhang Zheng, Baochun Li:
CMI: Client-Targeted Membership Inference in Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 4122-4132 (2024) - [j3]Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren:
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 9534-9549 (2024) - [i14]Mengnan Zhao, Lihe Zhang, Tianhang Zheng, Yuqiu Kong, Baocai Yin:
Separable Multi-Concept Erasure from Diffusion Models. CoRR abs/2402.05947 (2024) - [i13]Tianhang Zheng, Baochun Li:
FedReview: A Review Mechanism for Rejecting Poisoned Updates in Federated Learning. CoRR abs/2402.16934 (2024) - [i12]Jia Li, Lijie Hu, Zhixian He, Jingfeng Zhang, Tianhang Zheng, Di Wang:
Text Guided Image Editing with Automatic Concept Locating and Forgetting. CoRR abs/2405.19708 (2024) - [i11]Binhao Ma, Tianhang Zheng, Hongsheng Hu, Di Wang, Shuo Wang, Zhongjie Ba, Zhan Qin, Kui Ren:
Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning. CoRR abs/2407.05112 (2024) - [i10]Hanxi Guo, Hao Wang, Tao Song, Tianhang Zheng, Yang Hua, Haibing Guan, Xiangyu Zhang:
Poisoning with A Pill: Circumventing Detection in Federated Learning. CoRR abs/2407.15389 (2024) - [i9]Shaopeng Fu, Xuexue Sun, Ke Qing, Tianhang Zheng, Di Wang:
Pre-trained Encoder Inference: Revealing Upstream Encoders In Downstream Machine Learning Services. CoRR abs/2408.02814 (2024) - 2023
- [c15]Tianhang Zheng, Hao Lan, Baochun Li:
Be Careful with PyPI Packages: You May Unconsciously Spread Backdoor Model Weights. MLSys 2023 - [c14]Tianhang Zheng, Baochun Li:
RDM-DC: Poisoning Resilient Dataset Condensation with Robust Distribution Matching. UAI 2023: 2541-2550 - [i8]Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren:
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. CoRR abs/2310.13424 (2023) - [i7]Jia Li, Lijie Hu, Jingfeng Zhang, Tianhang Zheng, Hua Zhang, Di Wang:
Fair Text-to-Image Diffusion via Fair Mapping. CoRR abs/2311.17695 (2023) - 2022
- [j2]Mengnan Zhao, Bo Wang, Wei Wang, Yuqiu Kong, Tianhang Zheng, Kui Ren:
Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection. IEEE Trans. Inf. Forensics Secur. 17: 2468-2482 (2022) - [j1]Mengdi Huai, Tianhang Zheng, Chenglin Miao, Liuyi Yao, Aidong Zhang:
On the Robustness of Metric Learning: An Adversarial Perspective. ACM Trans. Knowl. Discov. Data 16(5): 95:1-95:25 (2022) - [c13]Tianhang Zheng, Baochun Li:
InfoCensor: An Information-Theoretic Framework against Sensitive Attribute Inference and Demographic Disparity. AsiaCCS 2022: 437-451 - [c12]Tianhang Zheng, Baochun Li:
Poisoning Attacks on Deep Learning based Wireless Traffic Prediction. INFOCOM 2022: 660-669 - 2021
- [c11]Yi Zhu, Chenglin Miao, Tianhang Zheng, Foad Hajiaghajani, Lu Su, Chunming Qiao:
Can We Use Arbitrary Objects to Attack LiDAR Perception in Autonomous Driving? CCS 2021: 1945-1960 - [c10]Hengtong Zhang, Tianhang Zheng, Yaliang Li, Jing Gao, Lu Su, Bo Li:
Profanity-Avoiding Training Framework for Seq2seq Models with Certified Robustness. EMNLP (1) 2021: 5151-5161 - [c9]Tianhang Zheng, Baochun Li:
First-Order Efficient General-Purpose Clean-Label Data Poisoning. INFOCOM 2021: 1-10 - 2020
- [c8]Zhongjie Ba, Tianhang Zheng, Zhan Qin, Hanlin Yu, Liu Liu, Baochun Li, Xue Liu, Kui Ren:
Accelerometer-based smartphone eavesdropping. MobiCom 2020: 73:1-73:2 - [c7]Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, Kui Ren:
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. NDSS 2020 - [i6]Tianhang Zheng, Sheng Liu, Changyou Chen, Junsong Yuan, Baochun Li, Kui Ren:
Towards Understanding the Adversarial Vulnerability of Skeleton-based Action Recognition. CoRR abs/2005.07151 (2020) - [i5]Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu:
Towards Assessment of Randomized Mechanisms for Certifying Adversarial Robustness. CoRR abs/2005.07347 (2020)
2010 – 2019
- 2019
- [c6]Tianhang Zheng, Changyou Chen, Kui Ren:
Distributionally Adversarial Attack. AAAI 2019: 2253-2260 - [c5]Tianhang Zheng, Changyou Chen, Junsong Yuan, Bo Li, Kui Ren:
PointCloud Saliency Maps. ICCV 2019: 1598-1606 - [c4]Qi Wei, Kai Fan, Wenlin Wang, Tianhang Zheng, Amit Chakraborty, Katherine A. Heller, Changyou Chen, Kui Ren:
InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks. ICME 2019: 1324-1329 - [c3]Hengtong Zhang, Tianhang Zheng, Jing Gao, Chenglin Miao, Lu Su, Yaliang Li, Kui Ren:
Data Poisoning Attack against Knowledge Graph Embedding. IJCAI 2019: 4853-4859 - [c2]Tianhang Zheng, Zhi Sun, Kui Ren:
FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification. INFOCOM 2019: 199-207 - [i4]Tianhang Zheng, Zhi Sun, Kui Ren:
FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification. CoRR abs/1901.05914 (2019) - [i3]Hengtong Zhang, Tianhang Zheng, Jing Gao, Chenglin Miao, Lu Su, Yaliang Li, Kui Ren:
Towards Data Poisoning Attack against Knowledge Graph Embedding. CoRR abs/1904.12052 (2019) - 2018
- [i2]Tianhang Zheng, Changyou Chen, Kui Ren:
Distributionally Adversarial Attack. CoRR abs/1808.05537 (2018) - [i1]Tianhang Zheng, Changyou Chen, Junsong Yuan, Kui Ren:
Learning Saliency Maps for Adversarial Point-Cloud Generation. CoRR abs/1812.01687 (2018) - 2017
- [c1]Tianhang Zheng, Zhi Sun, Kui Ren:
Data Independent Identification for Privacy Preservation. PAC 2017: 186-187
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint