Follow
Zhuohang Li
Zhuohang Li
Verified email at vanderbilt.edu - Homepage
Title
Cited by
Cited by
Year
Advpulse: Universal, synchronization-free, and targeted audio adversarial attacks via subsecond perturbations
Z Li, Y Wu, J Liu, Y Chen, B Yuan
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
1002020
Real-time, universal, and robust adversarial attacks against speaker recognition systems
Y Xie, C Shi, Z Li, J Liu, Y Chen, B Yuan
ICASSP 2020-2020 IEEE international conference on acoustics, speech and …, 2020
972020
Practical adversarial attacks against speaker recognition systems
Z Li, C Shi, Y Xie, J Liu, B Yuan, Y Chen
Proceedings of the 21st international workshop on mobile computing systems …, 2020
822020
Auditing privacy defenses in federated learning via generative gradient leakage
Z Li, J Zhang, L Liu, J Liu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
742022
Enabling fast and universal audio adversarial attack using generative model
Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan
Proceedings of the AAAI conference on artificial intelligence 35 (16), 14129 …, 2021
582021
Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array
Z Li, C Shi, T Zhang, Y Xie, J Liu, B Yuan, Y Chen
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
282021
Audio-domain position-independent backdoor attack via unnoticeable triggers
C Shi, T Zhang, Z Li, H Phan, T Zhao, Y Wang, J Liu, B Yuan, Y Chen
Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022
222022
BioFace-3D: Continuous 3D facial reconstruction through lightweight single-ear biosensors
Y Wu, V Kakaraparthi, Z Li, T Pham, J Liu, P Nguyen
Proceedings of the 27th Annual International Conference on Mobile Computing …, 2021
162021
Real-time, robust and adaptive universal adversarial attacks against speaker recognition systems
Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan
Journal of signal processing systems, 1-14, 2021
152021
Time to rethink the design of qi standard? security and privacy vulnerability analysis of qi wireless charging
Y Wu, Z Li, N Van Nostrand, J Liu
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
92021
Privacy-preserving speech-based depression diagnosis via federated learning
Y Cui, Z Li, L Liu, J Zhang, J Liu
2022 44th Annual International Conference of the IEEE Engineering in …, 2022
72022
Byzantine-robust federated learning through spatial-temporal analysis of local model updates
Z Li, L Liu, J Zhang, J Liu
2021 IEEE 27th International Conference on Parallel and Distributed Systems …, 2021
72021
SAC: Reliable Hallucination Detection in Black-Box Language Models via Semantic-aware Cross-check Consistency
J Zhang, Z Li, K Das, BA Malin, S Kumar
arXiv preprint arXiv:2311.01740, 2023
6*2023
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN
H Phan, C Shi, Y Xie, T Zhang, Z Li, T Zhao, J Liu, Y Wang, Y Chen, ...
European Conference on Computer Vision, 708-724, 2022
62022
HeatDeCam: detecting hidden spy cameras via thermal emissions
Z Yu, Z Li, Y Chang, S Fong, J Liu, N Zhang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
42022
Fair and Privacy-Preserving Alzheimer's Disease Diagnosis Based on Spontaneous Speech Analysis via Federated Learning
SIA Meerza, Z Li, L Liu, J Zhang, J Liu
2022 44th Annual International Conference of the IEEE Engineering in …, 2022
42022
Security and privacy in the age of cordless power world
Y Wu, Z Li, N Van Nostrand, J Liu
Proceedings of the 18th conference on embedded networked sensor systems, 717-718, 2020
42020
Speech privacy leakage from shared gradients in distributed learning
Z Li, J Zhang, J Liu
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
32023
Reconstruction distortion of learned image compression with imperceptible perturbations
Y Sui, Z Li, D Ding, X Pan, X Xu, S Liu, Z Chen
arXiv preprint arXiv:2306.01125, 2023
22023
Why Does Differential Privacy with Large Epsilon Defend Against Practical Membership Inference Attacks?
A Lowy, Z Li, J Liu, T Koike-Akino, K Parsons, Y Wang
arXiv preprint arXiv:2402.09540, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20