Æȷοì
Jialong Zhang
Jialong Zhang
ByteDance AI Lab
bytedance.comÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia conference on computer and communications ¡¦, 2018
5172018
Analyzing Spammers¡¯ Social Networks for Fun and Profit
C Yang, R Harkreader, J Zhang, S Shin, G Gu
Proc. World Wide Web, 16-20, 2012
425*2012
Systematic mining of associated server herds for uncovering malware and attack campaigns
J Zhang, S Saha, G Gu, SJ Lee, B Nardelli
US Patent 9,088,598, 2015
1182015
Srid: State relation based intrusion detection for false data injection attacks in scada
Y Wang, Z Xu, J Zhang, L Xu, H Wang, G Gu
Computer Security-ESORICS 2014: 19th European Symposium on Research in ¡¦, 2014
1082014
Attacking the brain: Races in the {SDN} control plane
L Xu, J Huang, S Hong, J Zhang, G Gu
26th USENIX Security Symposium (USENIX Security 17), 451-468, 2017
902017
Securing input data of deep learning inference systems via partitioned enclave execution
Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy
arXiv preprint arXiv:1807.00969, 1-14, 2018
74*2018
GoldenEye: Efficiently and Effectively Unveiling Malware¡¯s Targeted Environment
Z Xu, J Zhang, G Gu, Z Lin
Research in Attacks, Intrusions and Defenses: 17th International Symposium ¡¦, 2014
512014
Using gradients to detect backdoors in neural networks
W Carvalho, B Chen, BJ Edwards, T Lee, IM Molloy, J Zhang
US Patent 11,132,444, 2021
472021
A taste of tweets: reverse engineering Twitter spammers
C Yang, J Zhang, G Gu
Proceedings of the 30th Annual Computer Security Applications Conference, 86-95, 2014
372014
Systematic mining of associated server herds for malware campaign discovery
J Zhang, S Saha, G Gu, SJ Lee, M Mellia
2015 IEEE 35th International Conference on Distributed Computing Systems ¡¦, 2015
312015
Identifying malicious web infrastructures
X Hu, J Jang, T Wang, J Zhang
US Patent 9,578,042, 2017
292017
Precisely and scalably vetting javascript bridge in android hybrid apps
G Yang, A Mendoza, J Zhang, G Gu
Research in Attacks, Intrusions, and Defenses: 20th International Symposium ¡¦, 2017
282017
Poisonamplifier: A guided approach of discovering compromised websites through reversing search poisoning attacks
J Zhang, C Yang, Z Xu, G Gu
Research in Attacks, Intrusions, and Defenses: 15th International Symposium ¡¦, 2012
252012
Defending against model inversion attacks on neural networks
F Araujo, J Zhang, T Taylor, MP Stoecklin
US Patent 10,733,292, 2020
222020
Autovac: Automatically extracting system resource constraints and generating vaccines for malware immunization
Z Xu, J Zhang, G Gu, Z Lin
2013 IEEE 33rd International Conference on Distributed Computing Systems ¡¦, 2013
222013
NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System.
J Zhang, G Gu
NDSS, 2013
222013
Reaching data confidentiality and model accountability on the caltrain
Z Gu, H Jamjoom, D Su, H Huang, J Zhang, T Ma, D Pendarakis, I Molloy
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems ¡¦, 2019
212019
Privacy enhancing deep learning cloud service using a trusted execution environment
Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy
US Patent 11,443,182, 2022
172022
Characterizing google hacking: A first large-scale quantitative study
J Zhang, J Notani, G Gu
International Conference on Security and Privacy in Communication Networks ¡¦, 2015
172015
Scarecrow: Deactivating evasive malware via its own evasive logic
J Zhang, Z Gu, J Jang, D Kirat, M Stoecklin, X Shu, H Huang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems ¡¦, 2020
152020
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20