User profiles for Haojin Zhu
Haojin ZhuFIEEE, Distinguished Professor, Shanghai Jiao Tong University Verified email at cs.sjtu.edu.cn Cited by 13864 |
Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks
Delay-tolerant networks (DTNs) provide a promising solution to support wide-ranging
applications in the regions where end-to-end network connectivity is not available. In DTNs, the …
applications in the regions where end-to-end network connectivity is not available. In DTNs, the …
Artificial intelligence security and privacy: a survey
Artificial intelligence (AI) is revolutionizing both industries and reshaping the global economy.
However, the rapid advancement of AI technologies brings significant security and privacy …
However, the rapid advancement of AI technologies brings significant security and privacy …
[PDF][PDF] ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
In this paper, we introduce an efficient condi-tional privacy preservation (ECPP) protocol in
vehicular ad hoc networks (VANETs) to address the issue on anonymous authentication for …
vehicular ad hoc networks (VANETs) to address the issue on anonymous authentication for …
Security and privacy for storage and computation in cloud computing
Cloud computing emerges as a new computing paradigm that aims to provide reliable,
customized and quality of service guaranteed computation environments for cloud users. …
customized and quality of service guaranteed computation environments for cloud users. …
Smoke screener or straight shooter: Detecting elite sybil attacks in user-review social networks
Popular User-Review Social Networks (URSNs)---such as Dianping, Yelp, and Amazon---are
often the targets of reputation attacks in which fake reviews are posted in order to boost or …
often the targets of reputation attacks in which fake reviews are posted in order to boost or …
Securing smart grid: cyber attacks, countermeasures, and challenges
Smart grid has emerged as the next-generation power grid via the convergence of power
system engineering and information and communication technology. In this article, we describe …
system engineering and information and communication technology. In this article, we describe …
Invisible backdoor attacks on deep neural networks via steganography and regularization
Deep neural networks (DNNs) have been proven vulnerable to backdoor attacks, where
hidden features (patterns) trained to a normal model, which is only activated by some specific …
hidden features (patterns) trained to a normal model, which is only activated by some specific …
Security in vehicular ad hoc networks
Vehicular communication networking is a promising approach to facilitating road safety,
traffic management, and infotainment dissemination for drivers and passengers. One of the …
traffic management, and infotainment dissemination for drivers and passengers. One of the …
SPARK: A new VANET-based smart parking scheme for large parking lots
Searching for a vacant parking space in a congested area or a large parking lot and preventing
auto theft are major concerns to our daily lives. In this paper, we propose a new smart …
auto theft are major concerns to our daily lives. In this paper, we propose a new smart …
Backdoors against natural language processing: A review
… Shaofeng Li, Tian Dong, Suguo Du, and Haojin Zhu were partially supported by National
Natural Science Foundation of China under grants 62132013, 61972453, and 72171145 …
Natural Science Foundation of China under grants 62132013, 61972453, and 72171145 …