


default search action
Zecheng He
2020 – today
- 2025
- [i18]Feng Liang, Haoyu Ma, Zecheng He, Tingbo Hou, Ji Hou, Kunpeng Li, Xiaoliang Dai, Felix Juefei-Xu, Samaneh Azadi, Animesh Sinha, Peizhao Zhang, Peter Vajda, Diana Marculescu:
Movie Weaver: Tuning-Free Multi-Concept Video Personalization with Anchored Prompts. CoRR abs/2502.07802 (2025) - 2024
- [j2]Qingsong Yao
, Zecheng He
, Yuexiang Li
, Yi Lin
, Kai Ma
, Yefeng Zheng
, S. Kevin Zhou
:
Adversarial Medical Image With Hierarchical Feature Hiding. IEEE Trans. Medical Imaging 43(4): 1296-1307 (2024) - [c14]Qingsong Yao, Zecheng He, Xiaodong Yu, S. Kevin Zhou:
Nowhere to Hide: Toward Robust Reactive Medical Adversarial Defense. ISBI 2024: 1-5 - [i17]Zecheng He, Bo Sun, Felix Juefei-Xu, Haoyu Ma, Ankit Ramchandani, Vincent Cheung, Siddharth Shah, Anmol Kalia, Harihar Subramanyam, Alireza Zareian, Li Chen, Ankit Jain, Ning Zhang, Peizhao Zhang, Roshan Sumbaly, Peter Vajda, Animesh Sinha:
Imagine yourself: Tuning-Free Personalized Image Generation. CoRR abs/2409.13346 (2024) - [i16]Adam Polyak, Amit Zohar, Andrew Brown, Andros Tjandra, Animesh Sinha, Ann Lee, Apoorv Vyas, Bowen Shi, Chih-Yao Ma, Ching-Yao Chuang, David Yan, Dhruv Choudhary, Dingkang Wang, Geet Sethi, Guan Pang, Haoyu Ma, Ishan Misra, Ji Hou, Jialiang Wang, Kiran Jagadeesh, Kunpeng Li, Luxin Zhang, Mannat Singh, Mary Williamson, Matt Le, Matthew Yu, Mitesh Kumar Singh, Peizhao Zhang, Peter Vajda, Quentin Duval, Rohit Girdhar, Roshan Sumbaly, Sai Saketh Rambhatla, Sam S. Tsai, Samaneh Azadi, Samyak Datta, Sanyuan Chen, Sean Bell, Sharadh Ramaswamy, Shelly Sheynin, Siddharth Bhattacharya, Simran Motwani, Tao Xu, Tianhe Li, Tingbo Hou, Wei-Ning Hsu, Xi Yin, Xiaoliang Dai, Yaniv Taigman, Yaqiao Luo, Yen-Cheng Liu, Yi-Chiao Wu, Yue Zhao, Yuval Kirstain, Zecheng He, Zijian He, Albert Pumarola, Ali K. Thabet, Artsiom Sanakoyeu, Arun Mallya, Baishan Guo, Boris Araya, Breena Kerr, Carleigh Wood, Ce Liu, Cen Peng, Dmitry Vengertsev, Edgar Schönfeld, Elliot Blanchard, Felix Juefei-Xu, Fraylie Nord, Jeff Liang, John Hoffman
, Jonas Kohler, Kaolin Fire, Karthik Sivakumar, Lawrence Chen, Licheng Yu, Luya Gao, Markos Georgopoulos, Rashel Moritz, Sara K. Sampson, Shikai Li, Simone Parmeggiani, Steve Fine, Tara Fowler, Vladan Petrovic, Yuming Du:
Movie Gen: A Cast of Media Foundation Models. CoRR abs/2410.13720 (2024) - [i15]Kunpeng Song, Tingbo Hou, Zecheng He, Haoyu Ma, Jialiang Wang, Animesh Sinha, Sam S. Tsai, Yaqiao Luo, Xiaoliang Dai, Li Chen, Xide Xia, Peizhao Zhang, Peter Vajda, Ahmed Elgammal, Felix Juefei-Xu:
DirectorLLM for Human-Centric Video Generation. CoRR abs/2412.14484 (2024) - 2023
- [c13]Zecheng He
, Guangyuan Hu
, Ruby B. Lee
:
CloudShield: Real-time Anomaly Detection in the Cloud. CODASPY 2023: 91-102 - [c12]Junjiao Tian, Xiaoliang Dai, Chih-Yao Ma, Zecheng He, Yen-Cheng Liu, Zsolt Kira:
Trainable Projected Gradient Method for Robust Fine-Tuning. CVPR 2023: 7836-7845 - [i14]Guangyuan Hu, Zecheng He, Ruby B. Lee:
SoK: Hardware Defenses Against Speculative Execution Attacks. CoRR abs/2301.03724 (2023) - [i13]Junjiao Tian, Xiaoliang Dai, Chih-Yao Ma, Zecheng He, Yen-Cheng Liu, Zsolt Kira:
Trainable Projected Gradient Method for Robust Fine-tuning. CoRR abs/2303.10720 (2023) - [i12]Qingsong Yao, Zecheng He, Yuexiang Li, Yi Lin, Kai Ma, Yefeng Zheng, S. Kevin Zhou:
Adversarial Medical Image with Hierarchical Feature Hiding. CoRR abs/2312.01679 (2023) - 2021
- [b1]Zecheng He:
Security Meets Deep Learning. Princeton University, USA, 2021 - [j1]Zecheng He
, Tianwei Zhang
, Ruby B. Lee
:
Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems. IEEE Internet Things J. 8(12): 9706-9716 (2021) - [c11]Zecheng He, Srinivas Sunkara, Xiaoxue Zang, Ying Xu, Lijuan Liu, Nevan Wichers, Gabriel Schubiner, Ruby B. Lee, Jindong Chen:
ActionBert: Leveraging User Actions for Semantic Understanding of User Interfaces. AAAI 2021: 5931-5938 - [c10]Zecheng He, Guangyuan Hu
, Ruby B. Lee:
New Models for Understanding and Reasoning about Speculative Execution Attacks. HPCA 2021: 40-53 - [c9]Qingsong Yao, Zecheng He, Yi Lin, Kai Ma, Yefeng Zheng, S. Kevin Zhou:
A Hierarchical Feature Constraint to Camouflage Medical Adversarial Attacks. MICCAI (3) 2021: 36-47 - [c8]Guangyuan Hu
, Zecheng He, Ruby B. Lee:
SoK: Hardware Defenses Against Speculative Execution Attacks. SEED 2021: 108-120 - [i11]Guangyuan Hu, Zecheng He, Ruby B. Lee:
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support. CoRR abs/2103.06453 (2021) - [i10]Zecheng He, Ruby B. Lee:
CloudShield: Real-time Anomaly Detection in the Cloud. CoRR abs/2108.08977 (2021) - [i9]Qingsong Yao, Zecheng He, S. Kevin Zhou:
Medical Aegis: Robust adversarial protectors for medical images. CoRR abs/2111.10969 (2021) - 2020
- [c7]Qingsong Yao
, Zecheng He, Hu Han
, S. Kevin Zhou:
Miss the Point: Targeted Adversarial Attack on Multiple Landmark Detection. MICCAI (4) 2020: 692-702 - [i8]Guangyuan Hu, Zecheng He, Ruby B. Lee:
Smartphone Impostor Detection with Built-in Sensors and Deep Learning. CoRR abs/2002.03914 (2020) - [i7]Qingsong Yao, Zecheng He, Hu Han, S. Kevin Zhou:
Miss the Point: Targeted Adversarial Attack on Multiple Landmark Detection. CoRR abs/2007.05225 (2020) - [i6]Zecheng He, Guangyuan Hu, Ruby B. Lee:
New Models for Understanding and Reasoning about Speculative Execution Attacks. CoRR abs/2009.07998 (2020) - [i5]Qingsong Yao, Zecheng He, Yi Lin, Kai Ma, Yefeng Zheng, S. Kevin Zhou:
A Hierarchical Feature Constraint to Camouflage Medical Adversarial Attacks. CoRR abs/2012.09501 (2020) - [i4]Zecheng He, Srinivas Sunkara, Xiaoxue Zang, Ying Xu, Lijuan Liu, Nevan Wichers, Gabriel Schubiner, Ruby B. Lee, Jindong Chen:
ActionBert: Leveraging User Actions for Semantic Understanding of User Interfaces. CoRR abs/2012.12350 (2020)
2010 – 2019
- 2019
- [c6]Zecheng He, Tianwei Zhang, Ruby B. Lee:
Model inversion attacks against collaborative inference. ACSAC 2019: 148-162 - [c5]Zecheng He, Tianwei Zhang, Ruby B. Lee:
Sensitive-Sample Fingerprinting of Deep Neural Networks. CVPR 2019: 4729-4737 - [c4]Zecheng He, Aswin Raghavan, Guangyuan Hu, Sek M. Chai, Ruby B. Lee:
Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning. TrustCom/BigDataSE 2019: 160-167 - 2018
- [i3]Zecheng He, Aswin Raghavan, Sek M. Chai, Ruby B. Lee:
Detecting Zero-day Controller Hijacking Attacks on the Power-Grid with Enhanced Deep Learning. CoRR abs/1806.06496 (2018) - [i2]Tianwei Zhang, Zecheng He, Ruby B. Lee:
Privacy-preserving Machine Learning through Data Obfuscation. CoRR abs/1807.01860 (2018) - [i1]Zecheng He, Tianwei Zhang, Ruby B. Lee:
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting. CoRR abs/1808.03277 (2018) - 2017
- [c3]Zecheng He, Tianwei Zhang, Ruby B. Lee:
Machine Learning Based DDoS Attack Detection from Source Side in Cloud. CSCloud 2017: 114-120 - [c2]Zecheng He, Ketan Tang, Lu Fang:
Cross-scale color image restoration under high density Salt-and-Pepper Noise. ICIP 2017: 3780-3784 - [c1]Zecheng He, Ruby B. Lee:
How secure is your cache against side-channel attacks? MICRO 2017: 341-353

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-13 20:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint