Follow
zhenyu zhong
zhenyu zhong
Baidu Security
Verified email at baidu.com
Title
Cited by
Cited by
Year
Fooling detection alone is not enough: Adversarial attack against multiple object tracking
YJ Jia, Y Lu, J Shen, QA Chen, H Chen, Z Zhong, TW Wei
International Conference on Learning Representations (ICLR'20), 2020
125*2020
System and method for detection of denial of service attacks
Y Tang, Z Zhong, Y He
US Patent 8,549,645, 2013
932013
Fast statistical spam filter by approximate classifications
K Li, Z Zhong
Proceedings of the joint international conference on measurement and …, 2006
702006
Privacy-aware collaborative spam filtering
K Li, Z Zhong, L Ramaswamy
IEEE Transactions on Parallel and Distributed systems 20 (5), 725-739, 2008
682008
Mining dns for malicious domain registrations
Y He, Z Zhong, S Krasser, Y Tang
6th International Conference on Collaborative Computing: Networking …, 2010
612010
Malware detection via reputation system
S Krasser, Y Tang, Y He, Z Zhong
US Patent 8,719,939, 2014
572014
System and method for botnet detection by comprehensive email behavioral analysis
S Krasser, Y Tang, Z Zhong
US Patent App. 13/037,988, 2013
512013
ALPACAS: A large-scale privacy-aware collaborative anti-spam system
Z Zhong, L Ramaswamy, K Li
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 556-564, 2008
362008
Sok: On the semantic ai security in autonomous driving
J Shen, N Wang, Z Wan, Y Luo, T Sato, Z Hu, X Zhang, S Guo, Z Zhong, ...
arXiv preprint arXiv:2203.05314, 2022
252022
Identity authentication method, terminal device, and computer-readable storage medium
Z Zhong, T Wei, QIU Zhebin
US Patent 10,635,893, 2020
182020
Speed up statistical spam filter by approximation
Z Zhong, K Li
IEEE Transactions on Computers 60 (1), 120-134, 2010
182010
Detecting multi-sensor fusion errors in advanced driver-assistance systems
Z Zhong, Z Hu, S Guo, X Zhang, Z Zhong, B Ray
proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
172022
Coverage-based scene fuzzing for virtual autonomous driving testing
Z Hu, S Guo, Z Zhong, K Li
arXiv preprint arXiv:2106.00873, 2021
172021
Throttling Outgoing SPAM for Webmail Services.
Z Zhong, K Huang, K Li
CEAS, 2005
152005
Towards practical lottery ticket hypothesis for adversarial training
B Li, S Wang, Y Jia, Y Lu, Z Zhong, L Carin, S Jana
arXiv preprint arXiv:2003.05733, 2020
142020
Detecting safety problems of multi-sensor fusion in autonomous driving
Z Zhong, Z Hu, S Guo, X Zhang, Z Zhong, B Ray
arXiv preprint arXiv:2109.06404, 2021
112021
Perception deception: Physical adversarial attack challenges and tactics for dnn-based object detection
Z Zhong, W Xu, Y Jia, T Wei
Black Hat Europe, 2018
102018
System, method, and computer program product for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database
N Jyoti, PK Singh, Z Zhong, GWW Roberts, JM Green, S Krasser
US Patent App. 13/645,164, 2013
92013
System, method, and computer program product for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database
N Jyoti, PK Singh, Z Zhong, GWW Roberts, JM Green, S Krasser
US Patent 8,306,988, 2012
92012
Enhancing cross-task transferability of adversarial examples with dispersion reduction
Y Jia, Y Lu, S Velipasalar, Z Zhong, T Wei
arXiv preprint arXiv:1905.03333, 2019
82019
The system can't perform the operation now. Try again later.
Articles 1–20