User profiles for Haojin Zhu

Haojin Zhu

FIEEE, Distinguished Professor, Shanghai Jiao Tong University
Verified email at cs.sjtu.edu.cn
Cited by 13864

Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks

H Zhu, X Lin, R Lu, Y Fan… - IEEE transactions on …, 2009 - ieeexplore.ieee.org
Delay-tolerant networks (DTNs) provide a promising solution to support wide-ranging
applications in the regions where end-to-end network connectivity is not available. In DTNs, the …

Artificial intelligence security and privacy: a survey

…, S Ji, S Li, H Zhu, Z Wang, R Zheng, T Zhu… - Science China …, 2025 - Springer
Artificial intelligence (AI) is revolutionizing both industries and reshaping the global economy.
However, the rapid advancement of AI technologies brings significant security and privacy …

[PDF][PDF] ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications

R Lu, X Lin, H Zhu, PH Ho, X Shen - IEEE INFOCOM 2008-The …, 2008 - nsec.sjtu.edu.cn
In this paper, we introduce an efficient condi-tional privacy preservation (ECPP) protocol in
vehicular ad hoc networks (VANETs) to address the issue on anonymous authentication for …

Security and privacy for storage and computation in cloud computing

L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen… - Information …, 2014 - Elsevier
Cloud computing emerges as a new computing paradigm that aims to provide reliable,
customized and quality of service guaranteed computation environments for cloud users. …

Smoke screener or straight shooter: Detecting elite sybil attacks in user-review social networks

H Zheng, M Xue, H Lu, S Hao, H Zhu, X Liang… - arXiv preprint arXiv …, 2017 - arxiv.org
Popular User-Review Social Networks (URSNs)---such as Dianping, Yelp, and Amazon---are
often the targets of reputation attacks in which fake reviews are posted in order to boost or …

Securing smart grid: cyber attacks, countermeasures, and challenges

…, R Lu, X Shen, X Lin, H Zhu - IEEE Communications …, 2012 - ieeexplore.ieee.org
Smart grid has emerged as the next-generation power grid via the convergence of power
system engineering and information and communication technology. In this article, we describe …

Invisible backdoor attacks on deep neural networks via steganography and regularization

S Li, M Xue, BZH Zhao, H Zhu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Deep neural networks (DNNs) have been proven vulnerable to backdoor attacks, where
hidden features (patterns) trained to a normal model, which is only activated by some specific …

Security in vehicular ad hoc networks

X Lin, R Lu, C Zhang, H Zhu, PH Ho… - IEEE communications …, 2008 - ieeexplore.ieee.org
Vehicular communication networking is a promising approach to facilitating road safety,
traffic management, and infotainment dissemination for drivers and passengers. One of the …

SPARK: A new VANET-based smart parking scheme for large parking lots

R Lu, X Lin, H Zhu, X Shen - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
Searching for a vacant parking space in a congested area or a large parking lot and preventing
auto theft are major concerns to our daily lives. In this paper, we propose a new smart …

Backdoors against natural language processing: A review

…, BZH Zhao, M Xue, S Du, H Zhu - IEEE Security & …, 2022 - ieeexplore.ieee.org
… Shaofeng Li, Tian Dong, Suguo Du, and Haojin Zhu were partially supported by National
Natural Science Foundation of China under grants 62132013, 61972453, and 72171145 …