​
Login / Signup
Zhe Zhou
ORCID
Publication Activity (10 Years)
Years Active: 2014-2023
Publications (10 Years): 24
Top Topics
Image Recovery
Liveness Detection
Memory Management
Xm Vts
Top Venues
CoRR
ACSAC
CCS
IEEE Symposium on Security and Privacy
</>
Publications
</>
Zhe Zhou
,
Yanxiang Bi
,
Junpeng Wan
,
Yangfan Zhou
,
Zhou Li
Userspace Bypass: Accelerating Syscall-intensive Applications.
OSDI
(2023)
Jiacen Xu
,
Zhe Zhou
,
Boyuan Feng
,
Yufei Ding
,
Zhou Li
On Adversarial Robustness of Point Cloud Semantic Segmentation.
DSN
(2023)
Junpeng Wan
,
Yanxiang Bi
,
Zhe Zhou
,
Zhou Li
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh.
IEEE Symposium on Security and Privacy
(2022)
Qifan Zhang
,
Junjie Shen
,
Mingtian Tan
,
Zhe Zhou
,
Zhou Li
,
Qi Alfred Chen
,
Haipeng Zhang
Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization.
ACSAC
(2022)
Weili Han
,
Chang Cao
,
Zhe Zhou
,
Shize Chen
,
Lingqi Huang
,
X. Sean Wang
A Smart Framework for Fine-Grained Microphone Acoustic Permission Management.
IEEE Trans. Dependable Secur. Comput.
18 (6) (2021)
Junpeng Wan
,
Yanxiang Bi
,
Zhe Zhou
,
Zhou Li
Volcano: Stateless Cache Side-channel Attack by Exploiting Mesh Interconnect.
CoRR
(2021)
Mingtian Tan
,
Junpeng Wan
,
Zhe Zhou
,
Zhou Li
Invisible Probe: Timing Attacks with PCIe Congestion Side-channel.
IEEE Symposium on Security and Privacy
(2021)
Mingtian Tan
,
Zhe Zhou
,
Zhou Li
The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery.
ACSAC
(2021)
Junyi Wei
,
Yicheng Zhang
,
Zhe Zhou
,
Zhou Li
,
Mohammad Abdullah Al Faruque
Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel.
DSN
(2020)
Zhe Zhou
,
Mingtian Tan
Embedding is not Cipher: Understanding the risk of embedding leakages.
CoRR
(2019)
Mingming Zha
,
Guozhu Meng
,
Chaoyang Lin
,
Zhe Zhou
,
Kai Chen
RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems.
Inscrypt
(2019)
Lu Sun
,
Mingtian Tan
,
Zhe Zhou
A survey of practical adversarial example attacks.
Cybersecur.
1 (1) (2018)
Zhe Zhou
,
Di Tang
,
Wenhao Wang
,
Xiaofeng Wang
,
Zhou Li
,
Kehuan Zhang
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
ACSAC
(2018)
Di Tang
,
Zhe Zhou
,
Yinqian Zhang
,
Kehuan Zhang
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections.
NDSS
(2018)
Zhe Zhou
,
Di Tang
,
Xiaofeng Wang
,
Weili Han
,
Xiangyu Liu
,
Kehuan Zhang
Invisible Mask: Practical Attacks on Face Recognition with Infrared.
CoRR
(2018)
Di Tang
,
Zhe Zhou
,
Yinqian Zhang
,
Kehuan Zhang
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections.
CoRR
(2018)
Wenrui Diao
,
Rui Liu
,
Xiangyu Liu
,
Zhe Zhou
,
Zhou Li
,
Kehuan Zhang
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.
J. Comput. Secur.
26 (3) (2018)
Zhe Zhou
,
Zhou Li
,
Kehuan Zhang
All Your VMs are Disconnected: Attacking Hardware Virtualized Network.
CODASPY
(2017)
Zhe Zhou
,
Wenrui Diao
,
Xiangyu Liu
,
Zhou Li
,
Kehuan Zhang
,
Rui Liu
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU.
Proc. Priv. Enhancing Technol.
2017 (2) (2017)
Xiaolong Bai
,
Zhe Zhou
,
XiaoFeng Wang
,
Zhou Li
,
Xianghang Mi
,
Nan Zhang
,
Tongxin Li
,
Shi-Min Hu
,
Kehuan Zhang
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
USENIX Security Symposium
(2017)
Zhe Zhou
,
Wenrui Diao
,
Xiangyu Liu
,
Zhou Li
,
Kehuan Zhang
,
Rui Liu
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU.
CoRR
(2016)
Tao Zhang
,
Sherman S. M. Chow
,
Zhe Zhou
,
Ming Li
Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization.
IWSEC
(2016)
Zhe Zhou
,
Tao Zhang
,
Sherman S. M. Chow
,
Yupeng Zhang
,
Kehuan Zhang
Efficient Authenticated Multi-Pattern Matching.
AsiaCCS
(2016)
Yannan Liu
,
Lingxiao Wei
,
Zhe Zhou
,
Kehuan Zhang
,
Wenyuan Xu
,
Qiang Xu
On Code Execution Tracking via Power Side-Channel.
CCS
(2016)
Xiangyu Liu
,
Zhe Zhou
,
Wenrui Diao
,
Zhou Li
,
Kehuan Zhang
An Empirical Study on Android for Saving Non-shared Data on Public Storage.
SEC
(2015)
Xiangyu Liu
,
Zhe Zhou
,
Wenrui Diao
,
Zhou Li
,
Kehuan Zhang
When Good Becomes Evil: Keystroke Inference with Smartwatch.
CCS
(2015)
Wenrui Diao
,
Xiangyu Liu
,
Zhe Zhou
,
Kehuan Zhang
,
Zhou Li
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections.
ESORICS (2)
(2015)
Xiangyu Liu
,
Wenrui Diao
,
Zhe Zhou
,
Zhou Li
,
Kehuan Zhang
Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones.
CoRR
(2014)
Wenrui Diao
,
Xiangyu Liu
,
Zhe Zhou
,
Kehuan Zhang
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone.
SPSM@CCS
(2014)
Zhe Zhou
,
Wenrui Diao
,
Xiangyu Liu
,
Kehuan Zhang
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound.
CoRR
(2014)
Zhe Zhou
,
Wenrui Diao
,
Xiangyu Liu
,
Kehuan Zhang
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound.
CCS
(2014)
Wenrui Diao
,
Xiangyu Liu
,
Zhe Zhou
,
Kehuan Zhang
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone.
CoRR
(2014)