Follow
Jie Zhang
Jie Zhang
Research Scientist, CFAR, A*STAR, << NTU << USTC
Verified email at cfar.a-star.edu.sg - Homepage
Title
Cited by
Cited by
Year
Model watermarking for image processing networks
J Zhang, D Chen, J Liao, H Fang, W Zhang, W Zhou, H Cui, N Yu
Proceedings of the AAAI conference on artificial intelligence 34 (07), 12805 …, 2020
1382020
Deep model intellectual property protection via deep watermarking
J Zhang, D Chen, J Liao, W Zhang, H Feng, G Hua, N Yu
IEEE Transactions on Pattern Analysis and Machine Intelligence 44 (8), 4005-4020, 2021
1332021
Deep template-based watermarking
H Fang, D Chen, Q Huang, J Zhang, Z Ma, W Zhang, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 31 (4), 1436-1451, 2020
902020
Poison ink: Robust and invisible backdoor attack
J Zhang, C Dongdong, Q Huang, J Liao, W Zhang, H Feng, G Hua, N Yu
IEEE Transactions on Image Processing 31, 5691-5705, 2022
752022
Passport-aware normalization for deep model protection
J Zhang, D Chen, J Liao, W Zhang, G Hua, N Yu
Advances in Neural Information Processing Systems 33, 22619-22628, 2020
742020
Initiative defense against facial manipulation
Q Huang, J Zhang, W Zhou, W Zhang, N Yu
Proceedings of the AAAI Conference on Artificial Intelligence 35 (2), 1619-1627, 2021
662021
Reversible watermarking in deep convolutional neural networks for integrity authentication
X Guan, H Feng, W Zhang, H Zhou, J Zhang, N Yu
Proceedings of the 28th ACM International Conference on Multimedia, 2273-2280, 2020
602020
Tracing text provenance via context-aware lexical substitution
X Yang, J Zhang, K Chen, W Zhang, Z Ma, F Wang, N Yu
Proceedings of the AAAI Conference on Artificial Intelligence 36 (10), 11613 …, 2022
532022
Watermarking text generated by black-box language models
X Yang, K Chen, W Zhang, C Liu, Y Qi, J Zhang, H Fang, N Yu
arXiv preprint arXiv:2305.08883, 2023
342023
Pseudo label-guided model inversion attack via conditional generative adversarial network
X Yuan, K Chen, J Zhang, W Zhang, N Yu, Y Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 37 (3), 3349-3357, 2023
282023
Personalization as a shortcut for few-shot backdoor attack against text-to-image diffusion models
Y Huang, F Juefei-Xu, Q Guo, J Zhang, Y Wu, M Hu, T Li, G Pu, Y Liu
Proceedings of the AAAI Conference on Artificial Intelligence 38 (19), 21169 …, 2024
27*2024
JailGuard: A Universal Detection Framework for LLM Prompt-based Attacks
X Zhang, C Zhang, T Li, Y Huang, X Jia, M Hu, J Zhang, Y Liu, C Shen
arXiv preprint arXiv:2312.10766, 2023
26*2023
Dear: A deep-learning-based audio re-recording resilient watermarking
C Liu, J Zhang, H Fang, Z Ma, W Zhang, N Yu
Proceedings of the AAAI Conference on Artificial Intelligence 37 (11), 13201 …, 2023
242023
Perceptual hashing of deep convolutional neural networks for model copy detection
H Chen, H Zhou, J Zhang, D Chen, W Zhang, K Chen, G Hua, N Yu
ACM Transactions on Multimedia Computing, Communications and Applications 19 …, 2023
172023
JPEG robust invertible grayscale
K Liu, D Chen, J Liao, W Zhang, H Zhou, J Zhang, W Zhou, N Yu
IEEE Transactions on Visualization and Computer Graphics 28 (12), 4403-4417, 2021
152021
Improving adversarial transferability by stable diffusion
J Liu, S Zhu, S Liang, J Zhang, H Fang, W Zhang, EC Chang
arXiv preprint arXiv:2311.11017, 2023
122023
Ada3diff: Defending against 3d adversarial point clouds via adaptive diffusion
K Zhang, H Zhou, J Zhang, Q Huang, W Zhang, N Yu
Proceedings of the 31st ACM International Conference on Multimedia, 8849-8859, 2023
112023
Robust Model Watermarking for Image Processing Networks via Structure Consistency
J Zhang, D Chen, J Liao, Z Ma, H Fang, W Zhang, H Feng, G Hua, N Yu
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2024
10*2024
Detecting Voice Cloning Attacks via Timbre Watermarking
C Liu, J Zhang, T Zhang, X Yang, W Zhang, N Yu
arXiv preprint arXiv:2312.03410, 2023
82023
THEMIS: Regulating Textual Inversion for Personalized Concept Censorship
Y Wu, J Zhang, F Kerschbaum, T Zhang
Network and Distributed System Security (NDSS) Symposium, 2025
6*2025
The system can't perform the operation now. Try again later.
Articles 1–20