Calculated based on number of publications stored in Pure and citations from Scopus
20202022

Research activity per year

If you made any changes in Pure these will be visible here soon.

Personal profile

Biography

B.Sc. (2013) (电院) at Shanghai Jiao Tong University  Ph.D. (2018) in the Department of Electrical and Computer Engineering at Michigan State University  Postdoctoral Research Associate (2018 - 2020) in the Department of Computer Science and Engineering at Washington University in St. Louis  AP (2020) in the Department of Computing at The Hong Kong Polytechnic University, where I founded and direct STiL.

Education/Academic qualification

Doctor of Philosophy, Michigan State University

Bachelor of Science, Shanghai Jiao Tong University

Fingerprint

Dive into the research topics where Kai Zhou is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Network

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection

    Zhu, Y., Lai, Y., Zhao, K., Luo, X., Yuan, M., Ren, J. & Zhou, K., 6 Jan 2022, Proc. of the 38th IEEE International Conference on Data Engineering. p. 1-12

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Attacking Similarity-Based Sign Prediction

    Godziszewski, M. T., Michalak, T. P., Waniek, M., Rahwan, T., Zhou, K. & Zhu, Y., Dec 2021, Proceedings - 21st IEEE International Conference on Data Mining, ICDM 2021. Bailey, J., Miettinen, P., Koh, Y. S., Tao, D. & Wu, X. (eds.). IEEE, p. 1072-1077 6 p. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2021-December).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Cost-aware secure outsourcing

    Ren, J. & Zhou, K., 26 Jan 2021, Patent No. US10901693B2

    Research output: Patents, agreements, assignments and companiesPatents granted

    Open Access
  • Structural Attack against Graph Based Android Malware Detection

    Zhao, K., Zhou, H., Zhu, Y., Zhou, K., Zhan, X., Li, J., Yu, L., Yuan, W. & Luo, X., 12 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3218-3235 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    4 Citations (Scopus)
  • Blocking Adversarial Influence in Social Networks

    Jia, F., Zhou, K., Kamhoua, C. & Vorobeychik, Y., 2020, Decision and Game Theory for Security - 11th International Conference, GameSec 2020, Proceedings. Zhu, Q., Baras, J. S., Poovendran, R. & Chen, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 257-276 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12513 LNCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    7 Citations (Scopus)