Shengzhi Zhang
Shengzhi Zhang
Boston University MET College
Verified email at
Cited by
Cited by
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Y X, C Y, Z Y, L Y, L X, C K, Z S, H H, W XF, G CA
27th USENIX Security Symposium (USENIX Security 18), 2018
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Machine learning based cross-site scripting detection in online social network
R Wang, X Jia, Q Li, S Zhang
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014
Devil’s whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th {USENIX} Security Symposium ({USENIX} Security 20), 2667-2684, 2020
All your alexa are belong to us: A remote voice control attack against echo
X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, IM Molloy
2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018
Cross-layer damage assessment for cyber situational awareness
P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li
Cyber Situational Awareness, 155-176, 2010
A comprehensive study of co-residence threat in multi-tenant public paas clouds
W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu
International Conference on Information and Communications Security, 361-375, 2016
Fast recovery from hidden node collision for IEEE 802.15. 4 LR-WPANs
S Zhang, SJ Yoo
7th IEEE International Conference on Computer and Information Technology …, 2007
HyperCrop: a hypervisor-based countermeasure for return oriented programming
J Jiang, X Jia, D Feng, S Zhang, P Liu
International Conference on Information and Communications Security, 360-373, 2011
LeakProber: a framework for profiling sensitive data leakage paths
J Yu, S Zhang, P Liu, ZT Li
Proceedings of the first ACM conference on Data and application security and …, 2011
Cross-layer comprehensive intrusion harm analysis for production workload server systems
S Zhang, X Jia, P Liu, J Jing
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for arm
L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018
Defending return‐oriented programming based on virtualization techniques
X Jia, R Wang, J Jiang, S Zhang, P Liu
Security and Communication Networks 6 (10), 1236-1249, 2013
Distributed workload and response time management for web applications
S Zhang, H Wu, W Wang, B Yang, P Liu, AV Vasilakos
2011 7th International Conference on Network and Service Management, 1-9, 2011
Using virtual machines to do cross-layer damage assessment
X Jia, S Zhang, J Jing, P Liu
Proceedings of the 1st ACM workshop on Virtual machine security, 29-38, 2008
Classifying Android malware with dynamic behavior dependency graphs
Z Lin, R Wang, X Jia, S Zhang, C Wu
2016 IEEE Trustcom/BigDataSE/ISPA, 378-385, 2016
Comprehensive analysis of the android google play’s auto-update policy
C Sanders, A Shah, S Zhang
International Conference on Information Security Practice and Experience …, 2015
Towards transparent and distributed workload management for large scale web servers
S Zhang, W Wang, H Wu, AV Vasilakos, P Liu
Future Generation Computer Systems 29 (4), 913-925, 2013
Peda: comprehensive damage assessment for production environment server systems
S Zhang, X Jia, P Liu, J Jing
IEEE Transactions on Information Forensics and Security 6 (4), 1323-1334, 2011
The system can't perform the operation now. Try again later.
Articles 1–20