default search action
Zecheng He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]Qingsong Yao, Zecheng He, Yuexiang Li, Yi Lin, Kai Ma, Yefeng Zheng, S. Kevin Zhou:
Adversarial Medical Image With Hierarchical Feature Hiding. IEEE Trans. Medical Imaging 43(4): 1296-1307 (2024) - [c14]Qingsong Yao, Zecheng He, Xiaodong Yu, S. Kevin Zhou:
Nowhere to Hide: Toward Robust Reactive Medical Adversarial Defense. ISBI 2024: 1-5 - [i15]Zecheng He, Bo Sun, Felix Juefei-Xu, Haoyu Ma, Ankit Ramchandani, Vincent Cheung, Siddharth Shah, Anmol Kalia, Harihar Subramanyam, Alireza Zareian, Li Chen, Ankit Jain, Ning Zhang, Peizhao Zhang, Roshan Sumbaly, Peter Vajda, Animesh Sinha:
Imagine yourself: Tuning-Free Personalized Image Generation. CoRR abs/2409.13346 (2024) - 2023
- [c13]Zecheng He, Guangyuan Hu, Ruby B. Lee:
CloudShield: Real-time Anomaly Detection in the Cloud. CODASPY 2023: 91-102 - [c12]Junjiao Tian, Xiaoliang Dai, Chih-Yao Ma, Zecheng He, Yen-Cheng Liu, Zsolt Kira:
Trainable Projected Gradient Method for Robust Fine-Tuning. CVPR 2023: 7836-7845 - [i14]Guangyuan Hu, Zecheng He, Ruby B. Lee:
SoK: Hardware Defenses Against Speculative Execution Attacks. CoRR abs/2301.03724 (2023) - [i13]Junjiao Tian, Xiaoliang Dai, Chih-Yao Ma, Zecheng He, Yen-Cheng Liu, Zsolt Kira:
Trainable Projected Gradient Method for Robust Fine-tuning. CoRR abs/2303.10720 (2023) - [i12]Qingsong Yao, Zecheng He, Yuexiang Li, Yi Lin, Kai Ma, Yefeng Zheng, S. Kevin Zhou:
Adversarial Medical Image with Hierarchical Feature Hiding. CoRR abs/2312.01679 (2023) - 2021
- [b1]Zecheng He:
Security Meets Deep Learning. Princeton University, USA, 2021 - [j1]Zecheng He, Tianwei Zhang, Ruby B. Lee:
Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems. IEEE Internet Things J. 8(12): 9706-9716 (2021) - [c11]Zecheng He, Srinivas Sunkara, Xiaoxue Zang, Ying Xu, Lijuan Liu, Nevan Wichers, Gabriel Schubiner, Ruby B. Lee, Jindong Chen:
ActionBert: Leveraging User Actions for Semantic Understanding of User Interfaces. AAAI 2021: 5931-5938 - [c10]Zecheng He, Guangyuan Hu, Ruby B. Lee:
New Models for Understanding and Reasoning about Speculative Execution Attacks. HPCA 2021: 40-53 - [c9]Qingsong Yao, Zecheng He, Yi Lin, Kai Ma, Yefeng Zheng, S. Kevin Zhou:
A Hierarchical Feature Constraint to Camouflage Medical Adversarial Attacks. MICCAI (3) 2021: 36-47 - [c8]Guangyuan Hu, Zecheng He, Ruby B. Lee:
SoK: Hardware Defenses Against Speculative Execution Attacks. SEED 2021: 108-120 - [i11]Guangyuan Hu, Zecheng He, Ruby B. Lee:
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support. CoRR abs/2103.06453 (2021) - [i10]Zecheng He, Ruby B. Lee:
CloudShield: Real-time Anomaly Detection in the Cloud. CoRR abs/2108.08977 (2021) - [i9]Qingsong Yao, Zecheng He, S. Kevin Zhou:
Medical Aegis: Robust adversarial protectors for medical images. CoRR abs/2111.10969 (2021) - 2020
- [c7]Qingsong Yao, Zecheng He, Hu Han, S. Kevin Zhou:
Miss the Point: Targeted Adversarial Attack on Multiple Landmark Detection. MICCAI (4) 2020: 692-702 - [i8]Guangyuan Hu, Zecheng He, Ruby B. Lee:
Smartphone Impostor Detection with Built-in Sensors and Deep Learning. CoRR abs/2002.03914 (2020) - [i7]Qingsong Yao, Zecheng He, Hu Han, S. Kevin Zhou:
Miss the Point: Targeted Adversarial Attack on Multiple Landmark Detection. CoRR abs/2007.05225 (2020) - [i6]Zecheng He, Guangyuan Hu, Ruby B. Lee:
New Models for Understanding and Reasoning about Speculative Execution Attacks. CoRR abs/2009.07998 (2020) - [i5]Qingsong Yao, Zecheng He, Yi Lin, Kai Ma, Yefeng Zheng, S. Kevin Zhou:
A Hierarchical Feature Constraint to Camouflage Medical Adversarial Attacks. CoRR abs/2012.09501 (2020) - [i4]Zecheng He, Srinivas Sunkara, Xiaoxue Zang, Ying Xu, Lijuan Liu, Nevan Wichers, Gabriel Schubiner, Ruby B. Lee, Jindong Chen:
ActionBert: Leveraging User Actions for Semantic Understanding of User Interfaces. CoRR abs/2012.12350 (2020)
2010 – 2019
- 2019
- [c6]Zecheng He, Tianwei Zhang, Ruby B. Lee:
Model inversion attacks against collaborative inference. ACSAC 2019: 148-162 - [c5]Zecheng He, Tianwei Zhang, Ruby B. Lee:
Sensitive-Sample Fingerprinting of Deep Neural Networks. CVPR 2019: 4729-4737 - [c4]Zecheng He, Aswin Raghavan, Guangyuan Hu, Sek M. Chai, Ruby B. Lee:
Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning. TrustCom/BigDataSE 2019: 160-167 - 2018
- [i3]Zecheng He, Aswin Raghavan, Sek M. Chai, Ruby B. Lee:
Detecting Zero-day Controller Hijacking Attacks on the Power-Grid with Enhanced Deep Learning. CoRR abs/1806.06496 (2018) - [i2]Tianwei Zhang, Zecheng He, Ruby B. Lee:
Privacy-preserving Machine Learning through Data Obfuscation. CoRR abs/1807.01860 (2018) - [i1]Zecheng He, Tianwei Zhang, Ruby B. Lee:
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting. CoRR abs/1808.03277 (2018) - 2017
- [c3]Zecheng He, Tianwei Zhang, Ruby B. Lee:
Machine Learning Based DDoS Attack Detection from Source Side in Cloud. CSCloud 2017: 114-120 - [c2]Zecheng He, Ketan Tang, Lu Fang:
Cross-scale color image restoration under high density Salt-and-Pepper Noise. ICIP 2017: 3780-3784 - [c1]Zecheng He, Ruby B. Lee:
How secure is your cache against side-channel attacks? MICRO 2017: 341-353
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint