- 🔭 I’m currently working on Artificial Intelligence Security, particularly Model Inversion Attacks (MIA)
- 🌱 I’m currently persuing my Ph.D. degree on Cyber Science and Engineering in Southeast University, China.
- 📫 How to reach me: zhangzp9970@outlook.com
- 👯 I’m looking to collaborate on Artificial Intelligence Security and making differences!
- 😄 Pronouns: zzp
- ✒️ Motto: Independent of Sprit, Free of Mind. (独立之精神,自由之思想)
- Z. Zhang, X. Wang, J. Huang, and S. Zhang, “Analysis and Utilization of Hidden Information in Model Inversion Attacks,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4449–4462, 2023, doi: 10.1109/TIFS.2023.3295942. [Code]
- Z. Zhang and J. Huang, “Aligning the domains in cross domain model inversion attack,” Neural Networks, vol. 178, p. 106490, Oct. 2024, doi: 10.1016/j.neunet.2024.106490. [Code]
- Z. Zhang and J. Huang, “Exploiting the connections between images and deep feature vectors in model inversion attacks,” Neurocomputing, p. 131457, Sept. 2025, doi: 10.1016/j.neucom.2025.131457. [Code]
- S. Zhang, J. Huang, Z. Zhang, and C. Qi, “Compromise Privacy in Large-Batch Federated Learning via Malicious Model Parameters,” in Algorithms and Architectures for Parallel Processing, W. Meng, R. Lu, G. Min, and J. Vaidya, Eds., in Lecture Notes in Computer Science. Cham: Springer Nature Switzerland, 2023, pp. 63–80. doi: 10.1007/978-3-031-22677-9_4. [Code]
- S. Zhang, J. Huang, Z. Zhang, P. Li, and C. Qi, “Compromise privacy in large-batch Federated Learning via model poisoning,” Information Sciences, vol. 647, p. 119421, Nov. 2023, doi: 10.1016/j.ins.2023.119421. [Code]
- C. Liang, J. Huang, Z. Zhang, and S. Zhang, “Defending against model extraction attacks with OOD feature learning and decision boundary confusion,” Computers & Security, vol. 136, p. 103563, Jan. 2024, doi: 10.1016/j.cose.2023.103563.
- P. Li, J. Huang, H. Wu, Z. Zhang, and C. Qi, “SecureNet: Proactive intellectual property protection and model security defense for DNNs based on backdoor learning,” Neural Networks, p. 106199, Feb. 2024, doi: 10.1016/j.neunet.2024.106199.
- Y. Zhang, J. Huang, P. Li, Z. Zhang, and C. Ding, “T-TNet: A dual-dependency trigger framework for active defense and hierarchical access control via multi-domain information fusion,” Journal of Systems Architecture, vol. 168, p. 103544, Nov. 2025, doi: 10.1016/j.sysarc.2025.103544.