Fooling detection alone is not enough: Adversarial attack against multiple object tracking YJ Jia, Y Lu, J Shen, QA Chen, H Chen, Z Zhong, TW Wei International Conference on Learning Representations (ICLR'20), 2020 | 139* | 2020 |
System and method for detection of denial of service attacks Y Tang, Z Zhong, Y He US Patent 8,549,645, 2013 | 95 | 2013 |
Fast statistical spam filter by approximate classifications K Li, Z Zhong Proceedings of the joint international conference on measurement and …, 2006 | 69 | 2006 |
Privacy-aware collaborative spam filtering K Li, Z Zhong, L Ramaswamy IEEE Transactions on Parallel and Distributed systems 20 (5), 725-739, 2008 | 68 | 2008 |
Mining dns for malicious domain registrations Y He, Z Zhong, S Krasser, Y Tang 6th International Conference on Collaborative Computing: Networking …, 2010 | 62 | 2010 |
Malware detection via reputation system S Krasser, Y Tang, Y He, Z Zhong US Patent 8,719,939, 2014 | 57 | 2014 |
System and method for botnet detection by comprehensive email behavioral analysis S Krasser, Y Tang, Z Zhong US Patent App. 13/037,988, 2013 | 52 | 2013 |
ALPACAS: A large-scale privacy-aware collaborative anti-spam system Z Zhong, L Ramaswamy, K Li IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 556-564, 2008 | 36 | 2008 |
Sok: On the semantic ai security in autonomous driving J Shen, N Wang, Z Wan, Y Luo, T Sato, Z Hu, X Zhang, S Guo, Z Zhong, ... arXiv preprint arXiv:2203.05314, 2022 | 33 | 2022 |
Detecting multi-sensor fusion errors in advanced driver-assistance systems Z Zhong, Z Hu, S Guo, X Zhang, Z Zhong, B Ray proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 20 | 2022 |
Coverage-based scene fuzzing for virtual autonomous driving testing Z Hu, S Guo, Z Zhong, K Li arXiv preprint arXiv:2106.00873, 2021 | 18 | 2021 |
Identity authentication method, terminal device, and computer-readable storage medium Z Zhong, T Wei, QIU Zhebin US Patent 10,635,893, 2020 | 18 | 2020 |
Speed up statistical spam filter by approximation Z Zhong, K Li IEEE Transactions on Computers 60 (1), 120-134, 2010 | 18 | 2010 |
Throttling Outgoing SPAM for Webmail Services. Z Zhong, K Huang, K Li CEAS, 2005 | 15 | 2005 |
Towards practical lottery ticket hypothesis for adversarial training B Li, S Wang, Y Jia, Y Lu, Z Zhong, L Carin, S Jana arXiv preprint arXiv:2003.05733, 2020 | 14 | 2020 |
Detecting safety problems of multi-sensor fusion in autonomous driving Z Zhong, Z Hu, S Guo, X Zhang, Z Zhong, B Ray arXiv preprint arXiv:2109.06404, 2021 | 10 | 2021 |
Enhancing cross-task transferability of adversarial examples with dispersion reduction Y Jia, Y Lu, S Velipasalar, Z Zhong, T Wei arXiv preprint arXiv:1905.03333, 2019 | 10 | 2019 |
Perception deception: Physical adversarial attack challenges and tactics for dnn-based object detection Z Zhong, W Xu, Y Jia, T Wei Black Hat Europe, 2018 | 10 | 2018 |
System, method, and computer program product for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database N Jyoti, PK Singh, Z Zhong, GWW Roberts, JM Green, S Krasser US Patent App. 13/645,164, 2013 | 9 | 2013 |
System, method, and computer program product for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database N Jyoti, PK Singh, Z Zhong, GWW Roberts, JM Green, S Krasser US Patent 8,306,988, 2012 | 9 | 2012 |