no code implementations • 5 Aug 2022 • Sai Xu, Yanan Du, Jiliang Zhang, Jie Zhang
This letter proposes to employ intelligent reflecting surface (IRS) as an information media to display a microwave quick response (QR) code for Internet-of-Things applications.
no code implementations • 20 Jul 2022 • Sai Xu, Yanan Du, Jiliang Zhang, Jiangzhou Wang, Jie Zhang
This paper proposes to leverage intelligent reflecting surface (IRS) backscatter to realize radio-frequency-chain-free uplink-transmissions (RFCF-UT).
no code implementations • 1 Jul 2022 • Haonan Hu, Yan Jiang, Jiliang Zhang, Yanan Zheng, Qianbin Chen, Jie Zhang
The fog-radio-access-network (F-RAN) has been proposed to address the strict latency requirements, which offloads computation tasks generated in user equipments (UEs) to the edge to reduce the processing latency.
no code implementations • 13 Apr 2022 • Songjiang Yang, Zitian Zhang, Jiliang Zhang, Xiaoli Chu, Jie Zhang
Based on the designed detectors, we propose an adaptive modulation scheme to maximize the average transmission rate under imperfect CSI by optimizing the data transmission time subject to the maximum tolerable BEP.
no code implementations • 14 Jul 2021 • Songjiang Yang, Zitian Zhang, Jiliang Zhang, Jie Zhang
Our contributions of this paper lie in: i) modeling the wobbling process of a hovering RW UAV; ii) developing an analytical model to derive the channel temporal autocorrelation function (ACF) for the millimeter-wave RW UAV A2G link in a closed-form expression; and iii) investigating how RW UAV wobbling impacts the Doppler effect on the millimeter-wave RW UAV A2G link.
1 code implementation • 21 Jul 2020 • Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim
We have also reviewed the flip side of backdoor attacks, which are explored for i) protecting intellectual property of deep learning models, ii) acting as a honeypot to catch adversarial example attacks, and iii) verifying data deletion requested by the data contributor. Overall, the research on defense is far behind the attack, and there is no single defense that can prevent all types of backdoor attacks.
no code implementations • 20 Jul 2020 • Jiliang Zhang, Andrés Alayón Glazunov, Jie Zhang
This paper presents a part of our ground-breaking work on evaluation of buildings in terms of wireless friendliness in the building-design stage.
no code implementations • 6 May 2019 • Jiliang Zhang, Wuqiao Chen, Yuqi Niu
Code reuse attack (CRA) is a powerful attack that reuses existing codes to hijack the program control flow.
no code implementations • 13 Sep 2018 • Jiliang Zhang, Chen Li
Deep neural networks (DNNs) have shown huge superiority over humans in image recognition, speech processing, autonomous vehicles and medical diagnosis.
no code implementations • 5 Aug 2018 • Xinbo Liu, Yapin Lin, He Li, Jiliang Zhang
As the threat of malicious software (malware) becomes urgently serious, automatic malware detection techniques have received increasing attention recently, where the machine learning (ML)-based visualization detection plays a significant role. However, this leads to a fundamental problem whether such detection methods can be robust enough against various potential attacks. Even though ML algorithms show superiority to conventional ones in malware detection in terms of high efficiency and accuracy, this paper demonstrates that such ML-based malware detection methods are vulnerable to adversarial examples (AE) attacks. We propose the first AE-based attack framework, named Adversarial Texture Malware Perturbation Attacks (ATMPA), based on the gradient descent or L-norm optimization method. By introducing tiny perturbations on the transformed dataset, ML-based malware detection methods completely fail. The experimental results on the MS BIG malware dataset show that a small interference can reduce the detection rate of convolutional neural network (CNN), support vector machine (SVM) and random forest(RF)-based malware detectors down to 0 and the attack transferability can achieve up to 88. 7% and 74. 1% on average in different ML-based detection methods.
Cryptography and Security
no code implementations • 6 Jun 2018 • Jiliang Zhang, Chaoqun Shen
In order to address these issues, we propose a Random Set-based Obfuscation (RSO) for Strong PUFs to resist machine learning attacks.
Cryptography and Security Hardware Architecture