default search action
Mi Zhang 0001
Person information
- affiliation: Fudan University, Shanghai, China
- affiliation (former): University College Dublin, Ireland
Other persons with the same name
- Mi Zhang — disambiguation page
- Mi Zhang 0002 — Ohio State University, Columbus, OH, USA (and 3 more)
- Mi Zhang 0003 — Drexel University, Philadelphia, PA, USA
- Mi Zhang 0004 — Wuhan University, School of Remote Sensing and Information Engineering, China
- Mi Zhang 0005 — China University of Petroleum, Beijing, China
- Mi Zhang 0006 — Wuhan University, School of Computer Science, China
- Mi Zhang 0007 — Chinese University of Hong Kong, Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c48]Xiaoyu You, Jianwei Xu, Mi Zhang, Zechen Gao, Min Yang:
RRL: Recommendation Reverse Learning. AAAI 2024: 9296-9304 - [c47]Yuanmin Huang, Mi Zhang, Daizong Ding, Erling Jiang, Zhaoxiang Wang, Min Yang:
CausalPC: Improving the Robustness of Point Cloud Classification by Causal Effect Identification. CVPR 2024: 19779-19789 - [c46]Yuanmin Huang, Mi Zhang, Daizong Ding, Erling Jiang, Qifan Xiao, Xiaoyu You, Yuan Tian, Min Yang:
Towards Detection-Recovery Strategy for Robust Decentralized Matrix Factorization. ESORICS (1) 2024: 24-44 - [c45]Huming Qiu, Junjie Sun, Mi Zhang, Xudong Pan, Min Yang:
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting. SP 2024: 2124-2141 - [c44]Xiaoyu You, Youhe Jiang, Jianwei Xu, Mi Zhang, Min Yang:
GNNFingers: A Fingerprinting Framework for Verifying Ownerships of Graph Neural Networks. WWW 2024: 652-663 - [i13]Yining Wang, Junjie Sun, Chenyue Wang, Mi Zhang, Min Yang:
Navigate Beyond Shortcuts: Debiased Learning through the Lens of Neural Collapse. CoRR abs/2405.05587 (2024) - 2023
- [j4]Xiaohan Zhang, Mi Zhang, Yuan Zhang, Ming Zhong, Xin Zhang, Yinzhi Cao, Min Yang:
Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledge. IEEE Trans. Dependable Secur. Comput. 20(2): 902-916 (2023) - [j3]Mi Zhang, Daizong Ding, Xudong Pan, Min Yang:
Enhancing Time Series Predictors With Generalized Extreme Value Loss. IEEE Trans. Knowl. Data Eng. 35(2): 1473-1487 (2023) - [c43]Daizong Ding, Mi Zhang, Fuli Feng, Yuanmin Huang, Erling Jiang, Min Yang:
Black-Box Adversarial Attack on Time Series Classification. AAAI 2023: 7358-7368 - [c42]Shengyao Zhang, Xudong Pan, Mi Zhang, Min Yang:
SlowBERT: Slow-down Attacks on Input-adaptive Multi-exit BERT. ACL (Findings) 2023: 9992-10007 - [c41]Daizong Ding, Erling Jiang, Yuanmin Huang, Mi Zhang, Wenxuan Li, Min Yang:
CAP: Robust Point Cloud Classification via Semantic and Structural Modeling. CVPR 2023: 12260-12270 - [c40]Xudong Pan, Mi Zhang, Duocai Wu:
RØROS: Building a Responsive Online Recommender System via Meta-Gradients Updating. ICASSP 2023: 1-5 - [c39]Xudong Pan, Mi Zhang, Yifan Yan, Yining Wang, Min Yang:
Cracking White-box DNN Watermarks via Invariant Neuron Transforms. KDD 2023: 1783-1794 - [c38]Yifan Yan, Xudong Pan, Mi Zhang, Min Yang:
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation. USENIX Security Symposium 2023: 2347-2364 - [c37]Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang:
Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks. USENIX Security Symposium 2023: 2939-2956 - [c36]Xiaoyu You, Chi Li, Daizong Ding, Mi Zhang, Fuli Feng, Xudong Pan, Min Yang:
Anti-FakeU: Defending Shilling Attacks on Graph Neural Network based Recommender Model. WWW 2023: 938-948 - [c35]Xiaoyu You, Beina Sheng, Daizong Ding, Mi Zhang, Xudong Pan, Min Yang, Fuli Feng:
MaSS: Model-agnostic, Semantic and Stealthy Data Poisoning Attack on Knowledge Graph Embedding. WWW 2023: 2000-2010 - [i12]Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang:
Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks. CoRR abs/2303.09731 (2023) - [i11]Yifan Yan, Xudong Pan, Mi Zhang, Min Yang:
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation. CoRR abs/2303.09732 (2023) - [i10]Yifan Lu, Wenxuan Li, Mi Zhang, Xudong Pan, Min Yang:
MIRA: Cracking Black-box Watermarking on Deep Neural Networks via Model Inversion-based Removal Attacks. CoRR abs/2309.03466 (2023) - [i9]Mi Zhang, Xudong Pan, Min Yang:
JADE: A Linguistics-based Safety Evaluation Platform for LLM. CoRR abs/2311.00286 (2023) - [i8]Huming Qiu, Junjie Sun, Mi Zhang, Xudong Pan, Min Yang:
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting. CoRR abs/2312.04902 (2023) - 2022
- [j2]Xudong Pan, Mi Zhang, Daizong Ding, Min Yang:
A Geometrical Perspective on Image Style Transfer With Adversarial Learning. IEEE Trans. Pattern Anal. Mach. Intell. 44(1): 63-75 (2022) - [c34]Daizong Ding, Mi Zhang, Yuanmin Huang, Xudong Pan, Fuli Feng, Erling Jiang, Min Yang:
Towards Backdoor Attack on Deep Learning based Time Series Classification. ICDE 2022: 1274-1287 - [c33]Xudong Pan, Yifan Yan, Mi Zhang, Min Yang:
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting. KDD 2022: 1327-1336 - [c32]Xudong Pan, Shengyao Zhang, Mi Zhang, Yifan Yan, Min Yang:
House of Cans: Covert Transmission of Internal Datasets via Capacity-Aware Neuron Steganography. NeurIPS 2022 - [c31]Xudong Pan, Mi Zhang, Beina Sheng, Jiaming Zhu, Min Yang:
Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation. USENIX Security Symposium 2022: 3611-3628 - [c30]Xudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Zhemin Yang:
Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis. USENIX Security Symposium 2022: 3989-4006 - [c29]Xin Tan, Yuan Zhang, Jiajun Cao, Kun Sun, Mi Zhang, Min Yang:
Understanding the Practice of Security Patch Management across Multiple Branches in OSS Projects. WWW 2022: 767-777 - [i7]Xudong Pan, Mi Zhang, Yifan Yan:
UTAF: A Universal Approach to Task-Agnostic Model Fingerprinting. CoRR abs/2201.07391 (2022) - [i6]Yifan Yan, Xudong Pan, Yining Wang, Mi Zhang, Min Yang:
Cracking White-box DNN Watermarks via Invariant Neuron Transforms. CoRR abs/2205.00199 (2022) - [i5]Xudong Pan, Yifan Yan, Shengyao Zhang, Mi Zhang, Min Yang:
Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model. CoRR abs/2206.14371 (2022) - [i4]Xudong Pan, Qifan Xiao, Mi Zhang, Min Yang:
A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling. CoRR abs/2207.08556 (2022) - 2021
- [c28]Xudong Pan, Mi Zhang, Yifan Yan, Min Yang:
Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains. ACSAC 2021: 634-645 - [c27]Daizong Ding, Mi Zhang, Hanrui Wang, Xudong Pan, Min Yang, Xiangnan He:
A Deep Learning Framework for Self-evolving Hierarchical Community Detection. CIKM 2021: 372-381 - [c26]Xiaoyu You, Mi Zhang, Daizong Ding, Fuli Feng, Yuanmin Huang:
Learning to Learn the Future: Modeling Concept Drifts in Time Series Prediction. CIKM 2021: 2434-2443 - [c25]Xudong Pan, Mi Zhang, Yifan Lu, Min Yang:
TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural Networks. ESORICS (1) 2021: 542-562 - 2020
- [c24]Daizong Ding, Mi Zhang, Xudong Pan, Min Yang, Xiangnan He:
Improving the Robustness of Wasserstein Embedding by Adversarial PAC-Bayesian Learning. AAAI 2020: 3791-3800 - [c23]Xiaohan Zhang, Yuan Zhang, Ming Zhong, Daizong Ding, Yinzhi Cao, Yukun Zhang, Mi Zhang, Min Yang:
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware. CCS 2020: 757-770 - [c22]Daizong Ding, Mi Zhang, Xudong Pan, Min Yang, Xiangnan He:
Modeling Personalized Out-of-Town Distances in Location Recommendation. ICDM 2020: 112-121 - [c21]Xudong Pan, Mi Zhang, Shouling Ji, Min Yang:
Privacy Risks of General-Purpose Language Models. SP 2020: 1314-1331 - [c20]Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, Min Yang:
Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent. USENIX Security Symposium 2020: 1641-1658 - [i3]Xudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Min Yang:
Theory-Oriented Deep Leakage from Gradients via Linear Equation Solver. CoRR abs/2010.13356 (2020)
2010 – 2019
- 2019
- [c19]Daizong Ding, Mi Zhang, Xudong Pan, Min Yang, Xiangnan He:
Modeling Extreme Events in Time Series Prediction. KDD 2019: 1114-1122 - [i2]Ruozi Huang, Mi Zhang, Xudong Pan, Beina Sheng:
How Sequence-to-Sequence Models Perceive Language Styles? CoRR abs/1908.05947 (2019) - 2018
- [c18]Xudong Pan, Mi Zhang, Daizong Ding:
Theoretical Analysis of Image-to-Image Translation with Adversarial Learning. ICML 2018: 4003-4012 - [c17]Daizong Ding, Mi Zhang, Xudong Pan, Duocai Wu, Pearl Pu:
Geographical Feature Extraction for Entities in Location-based Social Networks. WWW 2018: 833-842 - [i1]Xudong Pan, Mi Zhang, Daizong Ding:
Theoretical Analysis of Image-to-Image Translation with Adversarial Learning. CoRR abs/1806.07001 (2018) - 2017
- [c16]Daizong Ding, Mi Zhang, Shao-Yuan Li, Jie Tang, Xiaotie Chen, Zhi-Hua Zhou:
BayDNN: Friend Recommendation with Bayesian Personalized Ranking Deep Neural Network. CIKM 2017: 1479-1488 - 2014
- [c15]Mi Zhang, Jie Tang, Xuchen Zhang, Xiangyang Xue:
Addressing cold start in recommender systems: a semi-supervised co-training algorithm. SIGIR 2014: 73-82 - 2012
- [c14]Mi Zhang, Neil Hurley, Wei Li, Xiangyang Xue:
A Double-Ranking Strategy for Long-Tail Product Recommendation. Web Intelligence 2012: 282-286 - 2011
- [j1]Neil Hurley, Mi Zhang:
Novelty and Diversity in Top-N Recommendation - Analysis and Evaluation. ACM Trans. Internet Techn. 10(4): 14:1-14:30 (2011) - 2010
- [c13]Mi Zhang, Neil Hurley:
Niche Product Retrieval in Top-N Recommendation. Web Intelligence 2010: 74-81
2000 – 2009
- 2009
- [c12]Mi Zhang, Neil Hurley:
Evaluating the Diversity of Top-N Recommendations. ICTAI 2009: 457-460 - [c11]Neil Hurley, Zunping Cheng, Mi Zhang:
Statistical attack detection. RecSys 2009: 149-156 - [c10]Mi Zhang:
Enhancing diversity in Top-N recommendation. RecSys 2009: 397-400 - [c9]Mi Zhang, Neil Hurley:
Statistical Modeling of Diversity in Top-N Recommender Systems. Web Intelligence 2009: 490-497 - [c8]Mi Zhang, Neil Hurley:
Novel Item Recommendation by User Profile Partitioning. Web Intelligence 2009: 508-515 - 2008
- [c7]Neil Hurley, Mi Zhang:
Analysis of Methods for Novel Case Selection. ICTAI (2) 2008: 217-224 - [c6]Mi Zhang, Neil Hurley:
Avoiding monotony: improving the diversity of recommendation lists. RecSys 2008: 123-130 - 2006
- [c5]Min Yang, Mi Zhang, Peng Han, Haiguang Chen, Xi Zhou, Dilin Mao, Chuanshan Gao:
Using a Depth Tree Framework to Evaluate Change Impacts of Modifications to IT Infrastructure. ICE-B 2006: 88-92 - 2005
- [c4]Mi Zhang, Zunping Cheng, Ziji Ma, Binyu Zang:
A Security Model Design in Web Service Environment. CIT 2005: 736-740 - [c3]Mi Zhang, Zunping Cheng, Yongzun Zhao, Joshua Zhexue Huang, Yinsheng Li, Binyu Zang:
ADDI: an agent-based extension to UDDI for supply chain management. CSCWD (1) 2005: 405-410 - [c2]Mi Zhang, Jianjun Xu, Zunping Cheng, Yinsheng Li, Binyu Zang:
A Web Service-Based Framework for Supply Chain Management. ISORC 2005: 316-319 - 2004
- [c1]Min Yang, Zunping Cheng, Ning Shang, Mi Zhang, Min Li, Jing Dai, Wei Wang, Dilin Mao, Chuanshan Gao:
iOmS: An Agent-Based P2P Framework for Ubiquitous Workflow. GCC 2004: 997-1000
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint