Personal information

China

Activities

Employment (2)

Shandong University: Jinan, CN

2025-01-01 to present | Full Professor (School of Cyber Science And Technology)
Employment
Source: Self-asserted source
Zheng Li

Helmholtz Center for Information Security: Saarbrücken, DE

2023-11-01 to 2024-12-31 | postdoc
Employment
Source: Self-asserted source
Zheng Li

Education and qualifications (3)

Helmholtz Center for Information Security: Saarbrücken, DE

2021-02-01 to 2023-10-05 | PhD (Information Security)
Education
Source: Self-asserted source
Zheng Li

Shandong University: Jinan, Shandong, CN

2017-09-01 to 2020-06-01 | Master (School of Computer Science and Technology)
Education
Source: Self-asserted source
Zheng Li

Shandong University: Jinan, Shandong, CN

2013-09-01 to 2017-06-24 | bachelor (School of Computer Science and Technology)
Education
Source: Self-asserted source
Zheng Li

Works (9)

Advancing membership inference attacks: The present and the future

Security and Safety
2025 | Journal article
Contributors: Zheng Li; Dengguo Feng; Yang Zhang; Jian Ren; Yang Zhang
Source: check_circle
Crossref

Trajectory-user linking via supervised encoding

Security and Safety
2025 | Journal article
Contributors: Chengrui Hu; Dengguo Feng; Zheng Li; Siyuan Wu; Bowen Shu; Min Zhang; Hao Li; Jian Ren; Yang Zhang
Source: check_circle
Crossref

Safe Driving Adversarial Trajectory Can Mislead: Toward More Stealthy Adversarial Attack Against Autonomous Driving Prediction Module

ACM Transactions on Privacy and Security
2025-05-31 | Journal article
Contributors: Yingkai Dong; Li Wang; Zheng Li; Hao Li; Peng Tang; Chengyu Hu; Shanqing Guo
Source: check_circle
Crossref

BadMerging: Backdoor Attacks Against Model Merging

2024-12-02 | Conference paper
Contributors: Jinghuai Zhang; Jianfeng Chi; Zheng Li; Kunlin Cai; Yang Zhang; Yuan Tian
Source: check_circle
Crossref

Membership Inference Attacks Against In-Context Learning

2024-12-02 | Conference paper
Contributors: Rui Wen; Zheng Li; Michael Backes; Yang Zhang
Source: check_circle
Crossref

SeqMIA: Sequential-Metric Based Membership Inference Attack

2024-12-02 | Conference paper
Contributors: Hao Li; Zheng Li; Siyuan Wu; Chengrui Hu; Yutong Ye; Min Zhang; Dengguo Feng; Yang Zhang
Source: check_circle
Crossref

DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models

2023-11-15 | Conference paper
Contributors: Zeyang Sha; Zheng Li; Ning Yu; Yang Zhang
Source: check_circle
Crossref

DeepKeyStego: Protecting Communication by Key-Dependent Steganography with Deep Networks

2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
2019-08 | Conference paper
Source: Self-asserted source
Zheng Li

How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN

Source: Self-asserted source
Zheng Li