default search action
Zhan Qin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j47]Ruitong Liu, Yanbin Wang, Haitao Xu, Zhan Qin, Fan Zhang, Yiwei Liu, Zheng Cao:
PMANet: Malicious URL detection via post-trained language model guided multi-level feature attention network. Inf. Fusion 113: 102638 (2025) - 2024
- [j46]Ruitong Liu, Yanbin Wang, Zhenhao Guo, Haitao Xu, Zhan Qin, Wenrui Ma, Fan Zhang:
TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features. Comput. Networks 253: 110707 (2024) - [j45]Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren:
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory. Proc. ACM Manag. Data 2(1): 30:1-30:27 (2024) - [j44]Leqian Zheng, Lei Xu, Cong Wang, Sheng Wang, Yuke Hu, Zhan Qin, Feifei Li, Kui Ren:
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores. Proc. VLDB Endow. 17(10): 2445-2458 (2024) - [j43]Xiaochen Li, Weiran Liu, Hanwen Feng, Kunzhe Huang, Yuke Hu, Jinfei Liu, Kui Ren, Zhan Qin:
Privacy Enhancement Via Dummy Points in the Shuffle Model. IEEE Trans. Dependable Secur. Comput. 21(3): 1001-1016 (2024) - [j42]Zhibo Wang, Wenxin Liu, Jiahui Hu, Hengchang Guo, Zhan Qin, Jian Liu, Kui Ren:
Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation. IEEE Trans. Dependable Secur. Comput. 21(4): 1572-1586 (2024) - [j41]Hongwei Yao, Zheng Li, Kunzhe Huang, Jian Lou, Zhan Qin, Kui Ren:
RemovalNet: DNN Fingerprint Removal Attacks. IEEE Trans. Dependable Secur. Comput. 21(4): 2645-2658 (2024) - [j40]Guodong Cao, Zhibo Wang, Yunhe Feng, Xiaowei Dong, Zhifei Zhang, Zhan Qin, Kui Ren:
Task-Free Fairness-Aware Bias Mitigation for Black-Box Deployed Models. IEEE Trans. Dependable Secur. Comput. 21(4): 3390-3405 (2024) - [j39]Yang Wei, Zhuo Ma, Zhuoran Ma, Zhan Qin, Yang Liu, Bin Xiao, Xiuli Bi, Jianfeng Ma:
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack. IEEE Trans. Dependable Secur. Comput. 21(4): 4206-4219 (2024) - [c41]Yue Xu, Xiuyuan Qi, Zhan Qin, Wenjie Wang:
Cross-modality Information Check for Detecting Jailbreaking in Multimodal Large Language Models. EMNLP (Findings) 2024: 13715-13726 - [c40]Hongwei Yao, Jian Lou, Zhan Qin:
PoisonPrompt: Backdoor Attack on Prompt-Based Large Language Models. ICASSP 2024: 7745-7749 - [c39]Xiong Xu, Kunzhe Huang, Yiming Li, Zhan Qin, Kui Ren:
Towards Reliable and Efficient Backdoor Trigger Inversion via Decoupling Benign Features. ICLR 2024 - [c38]Hongwei Yao, Jian Lou, Zhan Qin, Kui Ren:
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification. SP 2024: 845-861 - [c37]Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong:
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. SP 2024: 1009-1027 - [c36]Zhuo Ma, Yilong Yang, Yang Liu, Tong Yang, Xinjing Liu, Teng Li, Zhan Qin:
Need for Speed: Taming Backdoor Attacks with Speed and Precision. SP 2024: 1217-1235 - [c35]Tiantian Liu, Feng Lin, Zhongjie Ba, Li Lu, Zhan Qin, Kui Ren:
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices. USENIX Security Symposium 2024 - [c34]Lijin Wang, Jingjing Wang, Jie Wan, Lin Long, Ziqi Yang, Zhan Qin:
Property Existence Inference against Generative Models. USENIX Security Symposium 2024 - [i38]Zhixuan Chu, Yan Wang, Qing Cui, Longfei Li, Wenqing Chen, Sheng Li, Zhan Qin, Kui Ren:
LLM-Guided Multi-View Hypergraph Learning for Human-Centric Explainable Recommendation. CoRR abs/2401.08217 (2024) - [i37]Zhihao Liu, Jian Lou, Wenjie Bao, Yuke Hu, Bo Li, Zhan Qin, Kui Ren:
Differentially Private Zeroth-Order Methods for Scalable Large Language Model Finetuning. CoRR abs/2402.07818 (2024) - [i36]Yiling He, Junchi Lei, Zhan Qin, Kui Ren:
Going Proactive and Explanatory Against Malware Concept Drift. CoRR abs/2405.04095 (2024) - [i35]Zhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang, Zhan Qin, Kui Ren:
A Causal Explainable Guardrails for Large Language Models. CoRR abs/2405.04160 (2024) - [i34]Zhixuan Chu, Lei Zhang, Yichen Sun, Siqiao Xue, Zhibo Wang, Zhan Qin, Kui Ren:
Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models. CoRR abs/2405.04180 (2024) - [i33]Shuo Shao, Yiming Li, Hongwei Yao, Yiling He, Zhan Qin, Kui Ren:
Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution. CoRR abs/2405.04825 (2024) - [i32]Lei Liu, Xiaoyan Yang, Junchi Lei, Xiaoyang Liu, Yue Shen, Zhiqiang Zhang, Peng Wei, Jinjie Gu, Zhixuan Chu, Zhan Qin, Kui Ren:
A Survey on Medical Large Language Models: Technology, Application, Trustworthiness, and Future Directions. CoRR abs/2406.03712 (2024) - [i31]Yichen Sun, Zhixuan Chu, Zhan Qin, Kui Ren:
Prompt-Consistency Image Generation (PCIG): A Unified Framework Integrating LLMs, Knowledge Graphs, and Controllable Diffusion Models. CoRR abs/2406.16333 (2024) - [i30]Binhao Ma, Tianhang Zheng, Hongsheng Hu, Di Wang, Shuo Wang, Zhongjie Ba, Zhan Qin, Kui Ren:
Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning. CoRR abs/2407.05112 (2024) - [i29]Yuchen Yang, Hongwei Yao, Bingrun Yang, Yiling He, Yiming Li, Tianwei Zhang, Zhan Qin, Kui Ren:
TAPI: Towards Target-Specific and Adversarial Prompt Injection against Code LLMs. CoRR abs/2407.09164 (2024) - [i28]Yue Xu, Xiuyuan Qi, Zhan Qin, Wenjie Wang:
Defending Jailbreak Attack in VLMs via Cross-modality Information Detector. CoRR abs/2407.21659 (2024) - [i27]Cheng Wei, Yang Wang, Kuofeng Gao, Shuo Shao, Yiming Li, Zhibo Wang, Zhan Qin:
PointNCBW: Towards Dataset Ownership Verification for Point Clouds via Negative Clean-label Backdoor Watermark. CoRR abs/2408.05500 (2024) - 2023
- [j38]Zhibo Wang, Jingjing Ma, Xue Wang, Jiahui Hu, Zhan Qin, Kui Ren:
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems. ACM Comput. Surv. 55(7): 134:1-134:36 (2023) - [j37]Haocheng Xia, Jinfei Liu, Jian Lou, Zhan Qin, Kui Ren, Yang Cao, Li Xiong:
Equitable Data Valuation Meets the Right to Be Forgotten in Model Markets. Proc. VLDB Endow. 16(11): 3349-3362 (2023) - [j36]Yiling He, Yiping Li, Lei Wu, Ziqi Yang, Kui Ren, Zhan Qin:
MsDroid: Identifying Malicious Snippets for Android Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(3): 2025-2039 (2023) - [j35]Zhuo Ma, Xinjing Liu, Yang Liu, Ximeng Liu, Zhan Qin, Kui Ren:
DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer. IEEE Trans. Dependable Secur. Comput. 20(6): 4810-4822 (2023) - [c33]Yiling He, Jian Lou, Zhan Qin, Kui Ren:
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis. CCS 2023: 416-430 - [c32]Yanbin Wang, Weifan Zhu, Haitao Xu, Zhan Qin, Kui Ren, Wenrui Ma:
A Large-Scale Pretrained Deep Model for Phishing URL Detection. ICASSP 2023: 1-5 - [c31]Junxu Liu, Mingsheng Xue, Jian Lou, Xiaoyu Zhang, Li Xiong, Zhan Qin:
MUter: Machine Unlearning on Adversarially Trained Models. ICCV 2023: 4869-4879 - [c30]Zhuo Chen, Jie Liu, Yubo Hu, Lei Wu, Yajin Zhou, Yiling He, Xianhao Liao, Ke Wang, Jinku Li, Zhan Qin:
DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity. ISSTA 2023: 223-235 - [c29]Qiheng Sun, Xiang Li, Jiayao Zhang, Li Xiong, Weiran Liu, Jinfei Liu, Zhan Qin, Kui Ren:
ShapleyFL: Robust Federated Learning Based on Shapley Value. KDD 2023: 2096-2108 - [c28]Jiaqi Liu, Jian Lou, Zhan Qin, Kui Ren:
Certified Minimax Unlearning with Generalization Rates and Deletion Capacity. NeurIPS 2023 - [c27]Yuke Hu, Wei Liang, Ruofan Wu, Kai Xiao, Weiqiang Wang, Xiaochen Li, Jinfei Liu, Zhan Qin:
Quantifying and Defending against Privacy Threats on Federated Knowledge Graph Embedding. WWW 2023: 2306-2317 - [i26]Yuke Hu, Wei Liang, Ruofan Wu, Kai Xiao, Weiqiang Wang, Xiaochen Li, Jinfei Liu, Zhan Qin:
Quantifying and Defending against Privacy Threats on Federated Knowledge Graph Embedding. CoRR abs/2304.02932 (2023) - [i25]Hongwei Yao, Zheng Li, Haiqin Weng, Feng Xue, Kui Ren, Zhan Qin:
FDINet: Protecting against DNN Model Extraction via Feature Distortion Index. CoRR abs/2306.11338 (2023) - [i24]Leqian Zheng, Lei Xu, Cong Wang, Sheng Wang, Yuke Hu, Zhan Qin, Feifei Li, Kui Ren:
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores. CoRR abs/2306.16851 (2023) - [i23]Hongwei Yao, Jian Lou, Kui Ren, Zhan Qin:
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification. CoRR abs/2308.02816 (2023) - [i22]Yiling He, Jian Lou, Zhan Qin, Kui Ren:
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis. CoRR abs/2308.05362 (2023) - [i21]Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren:
SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution. CoRR abs/2309.14122 (2023) - [i20]Hongwei Yao, Jian Lou, Zhan Qin:
PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models. CoRR abs/2310.12439 (2023) - [i19]Xinyu She, Yue Liu, Yanjie Zhao, Yiling He, Li Li, Chakkrit Tantithamthavorn, Zhan Qin, Haoyu Wang:
Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey. CoRR abs/2310.17903 (2023) - [i18]Ruitong Liu, Yanbin Wang, Haitao Xu, Zhan Qin, Yiwei Liu, Zheng Cao:
Malicious URL Detection via Pretrained Language Model Guided Multi-Level Feature Attention Network. CoRR abs/2311.12372 (2023) - [i17]Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren:
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory. CoRR abs/2311.16062 (2023) - [i16]Yuke Hu, Jian Lou, Jiaqi Liu, Feng Lin, Zhan Qin, Kui Ren:
ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach. CoRR abs/2311.16136 (2023) - [i15]Ruitong Liu, Yanbin Wang, Zhenhao Guo, Haitao Xu, Zhan Qin, Wenrui Ma, Fan Zhang:
PyraTrans: Attention-Enriched Pyramid Transformer for Malicious URL Detection. CoRR abs/2312.00508 (2023) - [i14]Yiming Li, Mingyan Zhu, Junfeng Guo, Tao Wei, Shu-Tao Xia, Zhan Qin:
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger. CoRR abs/2312.04584 (2023) - [i13]Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong:
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. CoRR abs/2312.04738 (2023) - [i12]Jiaqi Liu, Jian Lou, Zhan Qin, Kui Ren:
Certified Minimax Unlearning with Generalization Rates and Deletion Capacity. CoRR abs/2312.10336 (2023) - 2022
- [j34]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. Proc. VLDB Endow. 16(2): 202-215 (2022) - [j33]Yanbin Wang, Haitao Xu, Zhenhao Guo, Zhan Qin, Kui Ren:
snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning. IEEE Trans. Inf. Forensics Secur. 17: 1214-1226 (2022) - [c26]Han Wang, Hanbin Hong, Li Xiong, Zhan Qin, Yuan Hong:
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response. CCS 2022: 2809-2823 - [c25]Xinjing Liu, Zhuo Ma, Yang Liu, Zhan Qin, Junwei Zhang, Zhuzhu Wang:
SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection. ESORICS (1) 2022: 610-630 - [c24]Kunzhe Huang, Yiming Li, Baoyuan Wu, Zhan Qin, Kui Ren:
Backdoor Defense via Decoupling the Training Process. ICLR 2022 - [i11]Kunzhe Huang, Yiming Li, Baoyuan Wu, Zhan Qin, Kui Ren:
Backdoor Defense via Decoupling the Training Process. CoRR abs/2202.03423 (2022) - [i10]Guodong Cao, Zhibo Wang, Xiaowei Dong, Zhifei Zhang, Hengchang Guo, Zhan Qin, Kui Ren:
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training. CoRR abs/2206.02158 (2022) - [i9]Han Wang, Hanbin Hong, Li Xiong, Zhan Qin, Yuan Hong:
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response. CoRR abs/2209.15091 (2022) - [i8]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. CoRR abs/2210.01318 (2022) - [i7]Shuo Shao, Wenyuan Yang, Hanlin Gu, Jian Lou, Zhan Qin, Lixin Fan, Qiang Yang, Kui Ren:
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model. CoRR abs/2211.07160 (2022) - 2021
- [j32]Minghui Li, Yuejing Yan, Qian Wang, Minxin Du, Zhan Qin, Cong Wang:
Secure Prediction of Neural Network in the Cloud. IEEE Netw. 35(1): 251-257 (2021) - [j31]Bo Wang, Mengnan Zhao, Wei Wang, Fei Wei, Zhan Qin, Kui Ren:
Are You Confident That You Have Successfully Generated Adversarial Examples? IEEE Trans. Circuits Syst. Video Technol. 31(6): 2089-2099 (2021) - [j30]Xinrui Ge, Jia Yu, Hanlin Zhang, Chengyu Hu, Zengpeng Li, Zhan Qin, Rong Hao:
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. IEEE Trans. Dependable Secur. Comput. 18(1): 490-504 (2021) - [j29]Shengshan Hu, Leo Yu Zhang, Qian Wang, Zhan Qin, Cong Wang:
Towards Private and Scalable Cross-Media Retrieval. IEEE Trans. Dependable Secur. Comput. 18(3): 1354-1368 (2021) - [j28]Chengjun Cai, Yifeng Zheng, Yuefeng Du, Zhan Qin, Cong Wang:
Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains. IEEE Trans. Dependable Secur. Comput. 18(4): 1893-1907 (2021) - [j27]Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen:
e-PoS: Making Proof-of-Stake Decentralized and Fair. IEEE Trans. Parallel Distributed Syst. 32(8): 1961-1973 (2021) - [c23]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Wenxin Liu, Zhan Qin, Kui Ren:
Feature Importance-aware Transferable Adversarial Attacks. ICCV 2021: 7619-7628 - [c22]Yiwei Liu, Jiamou Liu, Kaibin Wan, Zhan Qin, Zijian Zhang, Bakhadyr Khoussainov, Liehuang Zhu:
From Local to Global Norm Emergence: Dissolving Self-reinforcing Substructures with Incremental Social Instruments. ICML 2021: 6871-6881 - [i6]Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen:
e-PoS: Making Proof-of-Stake Decentralized and Fair. CoRR abs/2101.00330 (2021) - [i5]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Wenxin Liu, Zhan Qin, Kui Ren:
Feature Importance-aware Transferable Adversarial Attacks. CoRR abs/2107.14185 (2021) - 2020
- [j26]Kui Ren, Qian Wang, Cong Wang, Zhan Qin, Xiaodong Lin:
The Security of Autonomous Driving: Threats, Defenses, and Future Directions. Proc. IEEE 108(2): 357-372 (2020) - [j25]Liehuang Zhu, Meng Li, Zijian Zhang, Zhan Qin:
ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 17(4): 703-715 (2020) - [j24]Pu Zhao, Jia Yu, Hanlin Zhang, Zhan Qin, Cong Wang:
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs. IEEE Trans. Inf. Forensics Secur. 15: 315-328 (2020) - [j23]Jun Zhou, Zhenfu Cao, Zhan Qin, Xiaolei Dong, Kui Ren:
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. IEEE Trans. Inf. Forensics Secur. 15: 420-434 (2020) - [j22]Mussadiq Abdul Rahim, Liehuang Zhu, Xin Li, Jiamou Liu, Zijian Zhang, Zhan Qin, Salabat Khan, Keke Gai:
Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable Driver Identification Scheme. IEEE Trans. Veh. Technol. 69(1): 163-171 (2020) - [c21]Fan Zhang, Bin Shao, Guorui Xu, Bolin Yang, Ziqi Yang, Zhan Qin, Kui Ren:
From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices. DAC 2020: 1-6 - [c20]Yaliang Li, Houping Xiao, Zhan Qin, Chenglin Miao, Lu Su, Jing Gao, Kui Ren, Bolin Ding:
Towards Differentially Private Truth Discovery for Crowd Sensing Systems. ICDCS 2020: 1156-1166 - [c19]Zhongjie Ba, Tianhang Zheng, Zhan Qin, Hanlin Yu, Liu Liu, Baochun Li, Xue Liu, Kui Ren:
Accelerometer-based smartphone eavesdropping. MobiCom 2020: 73:1-73:2 - [c18]Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, Kui Ren:
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. NDSS 2020 - [i4]Xiaochen Li, Weiran Liu, Ziyi Chen, Kunzhe Huang, Zhan Qin, Lei Zhang, Kui Ren:
DUMP: A Dummy-Point-Based Framework for Histogram Estimation in Shuffle Model. CoRR abs/2009.13738 (2020)
2010 – 2019
- 2019
- [j21]Shengshan Hu, Xingcan Shang, Zhan Qin, Minghui Li, Qian Wang, Cong Wang:
Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures. IEEE Commun. Mag. 57(10): 120-126 (2019) - [j20]Chugui Xu, Ju Ren, Liang She, Yaoxue Zhang, Zhan Qin, Kui Ren:
EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics. IEEE Internet Things J. 6(3): 5140-5151 (2019) - [j19]Tao Lei, Zhan Qin, Zhibo Wang, Qi Li, Dengpan Ye:
EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices. IEEE Internet Things J. 6(4): 6668-6680 (2019) - [j18]Chugui Xu, Ju Ren, Deyu Zhang, Yaoxue Zhang, Zhan Qin, Kui Ren:
GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy. IEEE Trans. Inf. Forensics Secur. 14(9): 2358-2371 (2019) - [j17]Zhongjie Ba, Zhan Qin, Xinwen Fu, Kui Ren:
CIM: Camera in Motion for Smartphone Authentication. IEEE Trans. Inf. Forensics Secur. 14(11): 2987-3002 (2019) - [j16]Chenglin Miao, Wenjun Jiang, Lu Su, Yaliang Li, Suxin Guo, Zhan Qin, Houping Xiao, Jing Gao, Kui Ren:
Privacy-Preserving Truth Discovery in Crowd Sensing Systems. ACM Trans. Sens. Networks 15(1): 9:1-9:32 (2019) - [j15]Kui Ren, Zhan Qin, Zhongjie Ba:
Toward Hardware-Rooted Smartphone Authentication. IEEE Wirel. Commun. 26(1): 114-119 (2019) - [j14]Man Zhou, Zhan Qin, Xiu Lin, Shengshan Hu, Qian Wang, Kui Ren:
Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars. IEEE Wirel. Commun. 26(5): 128-133 (2019) - [c17]Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang, Ting Yu:
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy. CCS 2019: 703-717 - [c16]Helei Cui, Huayi Duan, Zhan Qin, Cong Wang, Yajin Zhou:
SPEED: Accelerating Enclave Applications Via Secure Deduplication. ICDCS 2019: 1072-1082 - [c15]Zhongjie Ba, Xinyu Zhang, Zhan Qin, Kui Ren:
CFP: Enabling Camera Fingerprint Concealment for Privacy-Preserving Image Sharing. ICDCS 2019: 1094-1105 - 2018
- [j13]Zhan Qin, Jian Weng, Yong Cui, Kui Ren:
Privacy-Preserving Image Processing in the Cloud. IEEE Cloud Comput. 5(2): 48-57 (2018) - [j12]Zhihua Xia, Yi Zhu, Xingming Sun, Zhan Qin, Kui Ren:
Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing. IEEE Trans. Cloud Comput. 6(1): 276-286 (2018) - [j11]Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren:
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy. IEEE Trans. Dependable Secur. Comput. 15(4): 591-606 (2018) - [j10]Jia Zhao, Jiqiang Liu, Zhan Qin, Kui Ren:
Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters. IEEE Trans. Smart Grid 9(4): 3313-3320 (2018) - [c14]Haipei Sun, Boxiang Dong, Wendy Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. IEEE BigData 2018: 488-497 - [c13]Zihao Shan, Zhan Qin, Leslie Ying, Kui Ren:
SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction. AsiaCCS 2018: 537-550 - [c12]Yaliang Li, Chenglin Miao, Lu Su, Jing Gao, Qi Li, Bolin Ding, Zhan Qin, Kui Ren:
An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery. KDD 2018: 1705-1714 - [i3]Haipei Sun, Boxiang Dong, Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. CoRR abs/1808.08181 (2018) - [i2]Yaliang Li, Houping Xiao, Zhan Qin, Chenglin Miao, Lu Su, Jing Gao, Kui Ren, Bolin Ding:
Towards Differentially Private Truth Discovery for Crowd Sensing Systems. CoRR abs/1810.04760 (2018) - 2017
- [j9]Liehuang Zhu, Zijian Zhang, Zhan Qin, Jian Weng, Kui Ren:
Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids. IEEE Netw. 31(1): 59-63 (2017) - [j8]Chugui Xu, Ju Ren, Yaoxue Zhang, Zhan Qin, Kui Ren:
DPPro: Differentially Private High-Dimensional Data Release via Random Projection. IEEE Trans. Inf. Forensics Secur. 12(12): 3081-3093 (2017) - [j7]Zijian Zhang, Zhan Qin, Liehuang Zhu, Jian Weng, Kui Ren:
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise. IEEE Trans. Smart Grid 8(2): 619-626 (2017) - [c11]Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao, Kui Ren:
Generating Synthetic Decentralized Social Graphs with Local Differential Privacy. CCS 2017: 425-438 - [c10]Zijian Zhang, Wenqiang Cao, Zhan Qin, Liehuang Zhu, Zhengtao Yu, Kui Ren:
When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid. IWQoS 2017: 1-9 - [c9]Zihao Shan, Kui Ren, Zhan Qin:
Privacy-Preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction. PAC 2017: 204-205 - 2016
- [j6]Si Chen, Zhan Qin, Guoliang Xing, Kui Ren:
Securing acoustics-based short-range communication systems: an overview. J. Commun. Inf. Networks 1(4): 44-51 (2016) - [j5]Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, Kui Ren:
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 11(11): 2594-2608 (2016) - [j4]Shengshan Hu, Qian Wang, Jingjun Wang, Zhan Qin, Kui Ren:
Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data. IEEE Trans. Image Process. 25(7): 3411-3425 (2016) - [j3]Zhan Qin, Kui Ren, Ting Yu, Jian Weng:
DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud. IEEE Trans. Multim. 18(5): 929-939 (2016) - [j2]Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang:
SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing. ACM Trans. Multim. Comput. Commun. Appl. 12(4s): 65:1-65:24 (2016) - [c8]Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, Kui Ren:
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy. CCS 2016: 192-203 - [c7]Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren:
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy. INFOCOM 2016: 1-9 - [c6]Qian Wang, Xiao Lu, Yan Zhang, Zhibo Wang, Zhan Qin, Kui Ren:
SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy. SecureComm 2016: 454-474 - 2015
- [c5]Chenglin Miao, Wenjun Jiang, Lu Su, Yaliang Li, Suxin Guo, Zhan Qin, Houping Xiao, Jing Gao, Kui Ren:
Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems. SenSys 2015: 183-196 - 2014
- [j1]Bingsheng Zhang, Zhan Qin, Si Chen, Muyuan Li, Kui Ren, Cong Wang, Di Ma:
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. IEEE Internet Things J. 1(1): 33-45 (2014) - [c4]Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang, Xinwen Fu:
Privacy-preserving outsourcing of image global feature detection. GLOBECOM 2014: 710-715 - [c3]Zhan Qin, Jingbo Yan, Kui Ren:
Private image computation: The case of cloud based privacy-preserving SIFT. INFOCOM Workshops 2014: 179-180 - [c2]Si Chen, Muyuan Li, Zhan Qin, Bingsheng Zhang, Kui Ren:
AcousAuth: An acoustic-based mobile application for user authentication. INFOCOM Workshops 2014: 215-216 - [c1]Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang:
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing. ACM Multimedia 2014: 497-506 - 2013
- [i1]Bingsheng Zhang, Zhan Qin, Junfei Wang, Kui Ren, Cong Wang, Di Ma:
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. IACR Cryptol. ePrint Arch. 2013: 581 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint