Follow
Tong Zhou
Tong Zhou
Northeastern University
Verified email at northeastern.edu - Homepage
Title
Cited by
Cited by
Year
Energy efficient virtual machine placement with an improved ant colony optimization over data center networks
W Wei, H Gu, W Lu, T Zhou, X Liu
IEEE Access 7, 60617-60625, 2019
372019
Autorep: Automatic relu replacement for fast private network inference
H Peng, S Huang, T Zhou, Y Luo, C Wang, Z Wang, J Zhao, X Xie, A Li, ...
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
212023
Obfunas: A neural architecture search-based dnn obfuscation approach
T Zhou, S Ren, X Xu
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided …, 2022
132022
NNSplitter: An Active Defense Solution to DNN Model via Automated Weight Obfuscation
T Zhou, Y Luo, S Ren, X Xu
Proceedings of the 40th International Conference on Machine Learning 202 …, 2023
82023
MirrorNet: A TEE-friendly framework for secure on-device DNN inference
Z Liu, Y Luo, S Duan, T Zhou, X Xu
2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), 1-9, 2023
42023
Deep neural network security from a hardware perspective
T Zhou, Y Zhang, S Duan, Y Luo, X Xu
2021 IEEE/ACM International Symposium on Nanoscale Architectures (NANOARCH), 1-6, 2021
32021
AdaPI: Facilitating DNN Model Adaptivity for Efficient Private Inference in Edge Computing
T Zhou, J Zhao, Y Luo, X Xie, W Wen, C Ding, X Xu
arXiv preprint arXiv:2407.05633, 2024
12024
Bileve: Securing Text Provenance in Large Language Models Against Spoofing with Bi-level Signature
T Zhou, X Zhao, X Xu, S Ren
arXiv preprint arXiv:2406.01946, 2024
2024
TBNet: A Neural Architectural Defense Framework Facilitating DNN Model Protection in Trusted Execution Environments
Z Liu, T Zhou, Y Luo, X Xu
arXiv preprint arXiv:2405.03974, 2024
2024
ArchLock: Locking DNN Transferability at the Architecture Level with a Zero-Cost Binary Predictor
T Zhou, S Ren, X Xu
The Twelfth International Conference on Learning Representations, 2024
2024
Two Birds with One Stone: Protecting DNN Models Against Unauthorized Inference and Domain Transfer
T Zhou, S Duan, S Ren, X Xu
The system can't perform the operation now. Try again later.
Articles 1–11