default search action
Yuqing Zhang 0001
Person information
- affiliation: University of Chinese Academy of Sciences, National Computer Network Intrusion Protection Center, Beijing, China
- affiliation: Hainan University, School of Computer Science and Cyberspace Security, Haikou, China
- affiliation: Xi'an University of Posts and Telecommunications, School of Cyberspace Security, Xi'an, China
- affiliation: Xidian University, School of Cyber Engineering, Xi'an, China
Other persons with the same name
- Yuqing Zhang — disambiguation page
- Yuqing Zhang 0002 — Liaoning Normal University, Dalian, China
- Yuqing Zhang 0003 — Beijing Language and Culture University, Beijing, China
- Yuqing Zhang 0004 — Northeastern University, Boston, MA, USA
- Yuqing Zhang 0005 — Zhejiang University, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j85]Kai Huang, Zhengzi Xu, Su Yang, Hongyu Sun, Xuejun Li, Zheng Yan, Yuqing Zhang:
Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities. ACM Comput. Surv. 57(2): 36:1-36:43 (2025) - 2024
- [j84]Yiyu Yang, Jice Wang, Peng Liu, Anmin Fu, Yuqing Zhang:
Uncovering Access Token Security Flaws in Multiuser Scenario of Smart Home Platforms. IEEE Internet Things J. 11(22): 36841-36857 (2024) - [j83]Rakib Ul Haque, A. S. M. Touhidul Hasan, Mohammed Ali Mohammed Al-Hababi, Yuqing Zhang, Dianxiang Xu:
SSI-FL: Self-sovereign identity based privacy-preserving federated learning. J. Parallel Distributed Comput. 191: 104907 (2024) - [j82]Yaling Zhu, Jia Zeng, Fangchen Weng, Dan Han, Yiyu Yang, Xiaoqi Li, Yuqing Zhang:
Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles. Sensors 24(7): 2153 (2024) - [c93]Yiheng Chen, Kai Huang, He Wang, Yuqing Zhang:
NMT vs MLM: Which is the Best Paradigm for APR? CEC 2024: 1-7 - [c92]Chen Ji, Su Yang, Hongyu Sun, Yuqing Zhang:
Applying Contrastive Learning to Code Vulnerability Type Classification. EMNLP 2024: 11942-11952 - [c91]Fannv He, Jice Wang, Yuhang Huang, Xiancui Peng, Yuqing Zhang:
LibGuard: Protecting Sensitive Data In Android Third-Party Libraries From XLDH Attacks. ICCCN 2024: 1-6 - [c90]Peng Liu, He Wang, Chen Zheng, Yuqing Zhang:
Prompt Fix: Vulnerability Automatic Repair Technology Based on Prompt Engineering. ICNC 2024: 116-120 - [c89]Ziqiu Zheng, Xuejun Li, He Wang, Gaofei Wu, Yuqing Zhang:
Research on SSL/TLS Security Differences Based on RFC Documents. ICNC 2024: 147-151 - [c88]Fannv He, Yan Jia, Jiayu Zhao, Yue Fang, Jice Wang, Mengyue Feng, Peng Liu, Yuqing Zhang:
Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps. NDSS 2024 - [c87]Tao Liu, Chengwei Liu, Tianwei Liu, He Wang, Gaofei Wu, Yang Liu, Yuqing Zhang:
Catch the Butterfly: Peeking into the Terms and Conflicts Among SPDX Licenses. SANER 2024: 477-488 - [c86]Wenkai Li, Xiaoqi Li, Yuqing Zhang, Zongwei Li:
DeFiTail: DeFi Protocol Inspection through Cross-Contract Execution Analysis. WWW (Companion Volume) 2024: 786-789 - [c85]Zongwei Li, Wenkai Li, Xiaoqi Li, Yuqing Zhang:
StateGuard: Detecting State Derailment Defects in Decentralized Exchange Smart Contract. WWW (Companion Volume) 2024: 810-813 - [i21]Tao Liu, Chengwei Liu, Tianwei Liu, He Wang, Gaofei Wu, Yang Liu, Yuqing Zhang:
Catch the Butterfly: Peeking into the Terms and Conflicts among SPDX Licenses. CoRR abs/2401.10636 (2024) - [i20]Zongwei Li, Wenkai Li, Xiaoqi Li, Yuqing Zhang:
StateGuard: Detecting State Derailment Defects in Decentralized Exchange Smart Contract. CoRR abs/2405.09181 (2024) - [i19]Wenkai Li, Xiaoqi Li, Yuqing Zhang, Zongwei Li:
DeFiTail: DeFi Protocol Inspection through Cross-Contract Execution Analysis. CoRR abs/2405.11035 (2024) - [i18]Gaofei Wu, Zhuohui You, Zhengbang Zha, Yuqing Zhang:
Several new classes of optimal ternary cyclic codes with two or three zeros. CoRR abs/2407.07332 (2024) - 2023
- [j81]Hongyu Sun, Guoliang Ou, Ziqiu Zheng, Lei Liao, He Wang, Yuqing Zhang:
Inconsistent measurement and incorrect detection of software names in security vulnerability reports. Comput. Secur. 135: 103477 (2023) - [j80]Gaofei Wu, Huan Liu, Yuqing Zhang:
Several classes of optimal p-ary cyclic codes with minimum distance four. Finite Fields Their Appl. 92: 102275 (2023) - [j79]Rakib Ul Haque, A. S. M. Touhidul Hasan, Apubra Daria, Abdur Rasool, Hui Chen, Qingshan Jiang, Yuqing Zhang:
A novel secure and distributed architecture for privacy-preserving healthcare system. J. Netw. Comput. Appl. 217: 103696 (2023) - [j78]Boyu Kuang, Anmin Fu, Yansong Gao, Yuqing Zhang, Jianying Zhou, Robert H. Deng:
FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices. IEEE Trans. Dependable Secur. Comput. 20(4): 2954-2969 (2023) - [c84]Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. AsiaCCS 2023: 938-950 - [c83]Su Yang, Yang Xiao, Zhengzi Xu, Chengyi Sun, Chen Ji, Yuqing Zhang:
Enhancing OSS Patch Backporting with Semantics. CCS 2023: 2366-2380 - [c82]Anni Peng, Dongliang Fang, Wei Zhou, Erik van der Kouwe, Yin Li, Yuqing Zhang:
CEFI: Command Execution Flow Integrity for Embedded Devices. DIMVA 2023: 235-255 - [c81]Hui Ma, Yucong Wei, Xuejun Li, Yuqing Zhang:
Malicious Random-index PIR and its Application. ISCAI 2023: 72-75 - [c80]Cuilan Liu, Ziyi Yuan, Jingxin Zhao, Jingfeng Rong, Yuqing Zhang:
Research on Named Entity Recognition in the Steel Industry Based on MacBERT. ISCAI 2023: 87-90 - [c79]Na Wang, Gaofei Wu, Jingfeng Rong, Zheng Yan, Qiuling Yue, Jinglu Hu, Yuqing Zhang:
Cross-Border Data Security from the Perspective of Risk Assessment. ISPEC 2023: 91-104 - [c78]Ying Li, Yuhao Lin, Yongchao Zhong, Qiuling Yue, Jinglu Hu, Wenjie Wang, Huiyang Shi, Yuqing Zhang:
Multimodal Software Defect Severity Prediction Based on Sentiment Probability. ISPEC 2023: 250-265 - [c77]Kai Huang, Xiangxin Meng, Jian Zhang, Yang Liu, Wenjie Wang, Shuhao Li, Yuqing Zhang:
An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair. ASE 2023: 1162-1174 - [c76]Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. NDSS 2023 - [c75]Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer:
FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets. USENIX Security Symposium 2023: 1343-1360 - [i17]Kai Huang, Zhengzi Xu, Su Yang, Hongyu Sun, Xuejun Li, Zheng Yan, Yuqing Zhang:
A Survey on Automated Program Repair Techniques. CoRR abs/2303.18184 (2023) - 2022
- [j77]Tao Liu, He Wang, Yuqing Zhang:
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network. Comput. Secur. 112: 102467 (2022) - [j76]Anmin Fu, Weijia Ding, Boyu Kuang, Qianmu Li, Willy Susilo, Yuqing Zhang:
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices. Comput. Secur. 116: 102666 (2022) - [j75]Xixun He, Yiyu Yang, Wei Zhou, Wenjie Wang, Peng Liu, Yuqing Zhang:
Fingerprinting Mainstream IoT Platforms Using Traffic Analysis. IEEE Internet Things J. 9(3): 2083-2093 (2022) - [j74]Wenkai Li, Jiuyang Bu, Xiaoqi Li, Hongli Peng, Yuanzheng Niu, Yuqing Zhang:
A survey of DeFi security: Challenges and opportunities. J. King Saud Univ. Comput. Inf. Sci. 34(10, Part B): 10378-10404 (2022) - [j73]Anmin Fu, Shui Yu, Yuqing Zhang, Huaqun Wang, Chanying Huang:
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users. IEEE Trans. Big Data 8(1): 14-24 (2022) - [j72]Yanghua Zhang, Jice Wang, Hexiang Huang, Yuqing Zhang, Peng Liu:
Understanding and Conquering the Difficulties in Identifying Third-Party Libraries From Millions of Android Apps. IEEE Trans. Big Data 8(6): 1511-1523 (2022) - [j71]Lei Zhou, Anmin Fu, Guomin Yang, Huaqun Wang, Yuqing Zhang:
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics. IEEE Trans. Dependable Secur. Comput. 19(2): 1118-1132 (2022) - [c74]Zelin Yang, Hui Ma, Mingchao Ai, Meijie Zhan, Gaofei Wu, Yuqing Zhang:
A Minimal Disclosure Signature Authentication Scheme Based on Consortium Blockchain. Blockchain 2022: 516-521 - [c73]Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. CCS 2022: 3269-3283 - [c72]Qintao Shen, Hongyu Sun, Guozhu Meng, Kai Chen, Yuqing Zhang:
Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns. Inscrypt 2022: 391-407 - [c71]Kai Huang, Su Yang, Hongyu Sun, Chengyi Sun, Xuejun Li, Yuqing Zhang:
Repairing Security Vulnerabilities Using Pre-trained Programming Language Models. DSN Workshops 2022: 111-116 - [c70]Haonan Yang, Yongchao Zhong, Bo Yang, Yiyu Yang, Zifeng Xu, Longjuan Wang, Yuqing Zhang:
An Overview of Sybil Attack Detection Mechanisms in VFC. DSN Workshops 2022: 117-122 - [c69]Xudong Cao, Tianwei Liu, Jiayuan Zhang, Mengyue Feng, Xin Zhang, Wanying Cao, Hongyu Sun, Yuqing Zhang:
SbrPBert: A BERT-Based Model for Accurate Security Bug Report Prediction. DSN Workshops 2022: 129-134 - [c68]Yuhao Lin, Ying Li, Mianxue Gu, Hongyu Sun, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang:
Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey. DSN Workshops 2022: 141-146 - [c67]Xin Zhang, Hongyu Sun, Zhipeng He, Mianxue Gu, Jingyu Feng, Yuqing Zhang:
VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep Learning. DSN Workshops 2022: 186-190 - [c66]Cong Liu, Yiyu Yang, Yuhui Zhang, Yuqing Zhang:
Unfettered Access Tokens: Discovering Security Flaws of the Access Token in Smart Home Platforms. ICC 2022: 5391-5396 - [c65]Mianxue Gu, Hantao Feng, Hongyu Sun, Peng Liu, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang:
Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection. INFOCOM Workshops 2022: 1-6 - [c64]Mingming Zha, Jice Wang, Yuhong Nan, Xiaofeng Wang, Yuqing Zhang, Zelin Yang:
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems. NDSS 2022 - [e4]Chunjie Cao, Yuqing Zhang, Yuan Hong, Ding Wang:
Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers. Communications in Computer and Information Science 1558, Springer 2022, ISBN 978-981-19-0522-3 [contents] - [i16]Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. CoRR abs/2202.04856 (2022) - [i15]Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo:
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences. CoRR abs/2206.00145 (2022) - [i14]Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer:
FishFuzz: Throwing Larger Nets to Catch Deeper Bugs. CoRR abs/2207.13393 (2022) - [i13]Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. CoRR abs/2208.07833 (2022) - [i12]Shenhui Zhang, Wenkai Li, Xiaoqi Li, Boyi Liu, Yuqing Zhang, Chunjue Cao:
A Secure Data Sharing Framework for Robot Operating Systems Leveraging Ethereum. CoRR abs/2208.14269 (2022) - [i11]Gaofei Wu, Huan Liu, Yuqing Zhang:
Several classes of optimal p-ary cyclic codes with minimal distance four. CoRR abs/2208.14404 (2022) - [i10]Peiyang Jia, Chengwei Liu, Hongyu Sun, Chengyi Sun, Mianxue Gu, Yang Liu, Yuqing Zhang:
Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study. CoRR abs/2210.07482 (2022) - 2021
- [j70]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yan Jia, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE Internet Things J. 8(14): 11621-11639 (2021) - [j69]Ling Liu, Yuqing Zhang, Xuejun Li:
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption. IEEE Trans. Cloud Comput. 9(2): 670-681 (2021) - [c63]Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang, XiaoFeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin:
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels. CCS 2021: 1289-1305 - [c62]Zhiqiu Huang, Yuqing Zhang, Wengjie Wang, Haitao He:
Ant Hole: Data Poisoning Attack Breaking out the Boundary of Face Cluster. DSN Workshops 2021: 71-77 - [c61]Xiao Yu, Yiyu Yang, Wengjie Wang, Yuqing Zhang:
Whether the sensitive information statement of the IoT privacy policy is consistent with the actual behavior. DSN Workshops 2021: 85-92 - [c60]Hansong Ren, Xuejun Li, Liao Lei, Guoliang Ou, Hongyu Sun, Gaofei Wu, Xiao Tian, Jinglu Hu, Yuqing Zhang:
Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports. FCS 2021: 78-99 - [c59]Na Wang, Gaofei Wu, Qiuling Yue, Jinglu Hu, Yuqing Zhang:
Research on Security Assessment of Cross Border Data Flow. FCS 2021: 327-341 - [c58]Ying Li, Mianxue Gu, Hongyu Sun, Yuhao Lin, Qiuling Yue, Zhen Guo, Jinglu Hu, He Wang, Yuqing Zhang:
A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning. FCS 2021: 342-351 - [c57]Jingxue Sun, Zhiqiu Huang, Ting Yang, Wengjie Wang, Yuqing Zhang:
A system for detecting third-party tracking through the combination of dynamic analysis and static analysis. INFOCOM Workshops 2021: 1-6 - [c56]Jingxue Sun, Ting Yang, Zhiqiu Huang, Wengjie Wang, Yuqing Zhang:
Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the Web. INFOCOM Workshops 2021: 1-6 - [c55]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. USENIX Security Symposium 2021: 2007-2024 - [c54]Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, Jinwei Dong, Nicolás Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang:
Understanding Malicious Cross-library Data Harvesting on Android. USENIX Security Symposium 2021: 4133-4150 - [i9]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version). CoRR abs/2107.07759 (2021) - 2020
- [j68]Ling Liu, He Wang, Yuqing Zhang:
Secure IoT Data Outsourcing With Aggregate Statistics and Fine-Grained Access Control. IEEE Access 8: 95057-95067 (2020) - [j67]Boyu Kuang, Anmin Fu, Lu Zhou, Willy Susilo, Yuqing Zhang:
DO-RA: Data-oriented runtime attestation for IoT devices. Comput. Secur. 97: 101945 (2020) - [j66]Chunyi Zhou, Anmin Fu, Shui Yu, Wei Yang, Huaqun Wang, Yuqing Zhang:
Privacy-Preserving Federated Learning in Fog Computing. IEEE Internet Things J. 7(11): 10782-10793 (2020) - [j65]Yongkai Fan, Jianrong Bai, Xia Lei, Yuqing Zhang, Bin Zhang, Kuan-Ching Li, Gang Tan:
Privacy preserving based logistic regression on big data. J. Netw. Comput. Appl. 171: 102769 (2020) - [j64]Mingxin Sun, Wenjie Wang, Hantao Feng, Hongu Sun, Yuqing Zhang:
Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network. EAI Endorsed Trans. Security Safety 7(23): e2 (2020) - [j63]Yuan He, Wengjie Wang, Hongyu Sun, Yuqing Zhang:
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone. EAI Endorsed Trans. Security Safety 7(23): e4 (2020) - [c53]Michail Maniatakos, Yuqing Zhang:
CPSIOTSEC'20: 2020 Joint Workshop on CPS&IoT Security and Privacy. CCS 2020: 2135-2136 - [c52]Hantao Feng, Xiaotong Fu, Hongyu Sun, He Wang, Yuqing Zhang:
Efficient Vulnerability Detection based on abstract syntax tree and Deep Learning. INFOCOM Workshops 2020: 722-727 - [c51]Weiqiang Xie, Xiao Yu, Yuqing Zhang, He Wang:
An Improved Shapley Value Benefit Distribution Mechanism in Cooperative Game of Cyber Threat Intelligence Sharing. INFOCOM Workshops 2020: 810-815 - [c50]Yan Jia, Luyi Xing, Yuhang Mao, Dongfang Zhao, XiaoFeng Wang, Shangru Zhao, Yuqing Zhang:
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds. SP 2020: 465-481 - [c49]Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang:
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. USENIX Security Symposium 2020: 1183-1200 - [e3]Michail Maniatakos, Yuqing Zhang:
CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, Virtual Event, USA, November 9, 2020. ACM 2020, ISBN 978-1-4503-8087-4 [contents]
2010 – 2019
- 2019
- [j62]Lili Zhang, Wenjie Wang, Yuqing Zhang:
Privacy Preserving Association Rule Mining: Taxonomy, Techniques, and Metrics. IEEE Access 7: 45032-45047 (2019) - [j61]Chensi Wu, Tao Wen, Yuqing Zhang:
A revised CVSS-based system to improve the dispersion of vulnerability risk scores. Sci. China Inf. Sci. 62(3): 39102:1-39102:3 (2019) - [j60]Yongkai Fan, Xiaodong Lin, Gang Tan, Yuqing Zhang, Wei Dong, Jing Lei:
One secure data integrity verification scheme for cloud storage. Future Gener. Comput. Syst. 96: 376-385 (2019) - [j59]Wei Zhou, Yan Jia, Anni Peng, Yuqing Zhang, Peng Liu:
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet Things J. 6(2): 1606-1616 (2019) - [j58]Boyu Kuang, Anmin Fu, Shui Yu, Guomin Yang, Mang Su, Yuqing Zhang:
ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms. IEEE Internet Things J. 6(5): 8372-8383 (2019) - [j57]Jingyu Feng, Nan Liu, Jie Cao, Yuqing Zhang, Guangyue Lu:
Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks. IEEE Internet Things J. 6(6): 9979-9992 (2019) - [j56]Xiaowei Li, Dengqi Yang, Xing Zeng, Benhui Chen, Yuqing Zhang:
Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model". IEEE Trans. Inf. Forensics Secur. 14(12): 3344-3345 (2019) - [c48]Peng Liu, Yuqing Zhang:
IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy. CCS 2019: 2713-2714 - [c47]Hanyu Quan, Hao Liu, Boyang Wang, Ming Li, Yuqing Zhang:
Randex: Mitigating Range Injection Attacks on Searchable Encryption. CNS 2019: 133-141 - [c46]Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Peng Liu, Yuqing Zhang:
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution. ESORICS (1) 2019: 638-657 - [c45]Xudong Cao, Shangru Zhao, Yuqing Zhang:
0-RTT Attack and Defense of QUIC Protocol. GLOBECOM Workshops 2019: 1-6 - [c44]Su Yang, Weiqiang Xie, Chensi Wu, Wenjie Wang, Yuqing Zhang:
A Hybrid Model for Optimal Defense Strategy Generation. ICCCN 2019: 1-6 - [c43]Lili Zhang, Wenjie Wang, Yuqing Zhang:
Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing. ML4CS 2019: 203-223 - [c42]Yue Lin, He Wang, Bowen Yang, Mingrui Liu, Yin Li, Yuqing Zhang:
A Blackboard Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System. ML4CS 2019: 253-270 - [c41]Lipeng Zhu, Xiaotong Fu, Yao Yao, Yuqing Zhang, He Wang:
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware. TrustCom/BigDataSE 2019: 248-255 - [c40]Ziyi Jia, Chensi Wu, Yuqing Zhang:
Research on the Destructive Capability Metrics of Common Network Attacks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1419-1424 - [c39]Yuhang Mao, Xuejun Li, Yan Jia, Shangru Zhao, Yuqing Zhang:
Security Analysis of Smart Home Based on Life Cycle. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1444-1449 - [c38]Chensi Wu, Weiqiang Xie, Su Yang, Shangru Zhao, Huiyang Shi, Yuqing Zhang, Ziyi Jia:
Research on the Impact of Attacks on Security Characteristics. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1450-1455 - [c37]Su Yang, Chensi Wu, Yuqing Zhang, Wenjie Wang, Weiqiang Xie:
Attack-Defense Utility Quantification And Security Risk Assessment. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1456-1461 - [c36]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. USENIX Security Symposium 2019: 1133-1150 - [e2]Peng Liu, Yuqing Zhang:
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, IoT S&P@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6838-4 [contents] - [i8]Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded Systems. CoRR abs/1908.03638 (2019) - [i7]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Logic Bugs in IoT Platforms and Systems: A Review. CoRR abs/1912.13410 (2019) - 2018
- [j55]Xiaofei Wang, Yuqing Zhang:
E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm. IEEE Access 6: 3358-3375 (2018) - [j54]Hanyu Quan, Boyang Wang, Yuqing Zhang, Gaofei Wu:
Efficient and Secure Top-k Queries With Top Order-Preserving Encryption. IEEE Access 6: 31525-31540 (2018) - [j53]Lili Zhang, Yuqing Zhang, Hua Ma:
Privacy-Preserving and Dynamic Multi-Attribute Conjunctive Keyword Search Over Encrypted Cloud Data. IEEE Access 6: 34214-34225 (2018) - [j52]Ying Dong, Yuqing Zhang, Hua Ma, Qianru Wu, Qixu Liu, Kai Wang, Wenjie Wang:
An adaptive system for detecting malicious queries in web attacks. Sci. China Inf. Sci. 61(3): 032114:1-032114:16 (2018) - [j51]Gaofei Wu, Nian Li, Yuqing Zhang, Xuefeng Liu:
Several classes of negabent functions over finite fields. Sci. China Inf. Sci. 61(3): 038102:1-038102:3 (2018) - [j50]Anmin Fu, Shuai Li, Shui Yu, Yuqing Zhang, Yinxia Sun:
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server. J. Netw. Comput. Appl. 118: 102-112 (2018) - [j49]Zheng Yan, Yuqing Zhang, Kim-Kwang Raymond Choo, Yang Xiang:
Security Measurements of Cyber Networks. Secur. Commun. Networks 2018: 6545314:1-6545314:3 (2018) - [c35]Fannv He, Yuqing Zhang, Huizheng Liu, Wei Zhou:
SCPN-based Game Model for Security Situational Awareness in the Intenet of Things. CNS 2018: 1-5 - [c34]Tao Wen, Yuqing Zhang, Bo Zhang, Jing Lei, Yunxiang Yang, Jing Guo:
A Novel Improved System Based on CVSS. CSPS (3) 2018: 1015-1021 - [i6]Wei Zhou, Yuqing Zhang, Peng Liu:
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. CoRR abs/1802.03110 (2018) - [i5]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps. CoRR abs/1811.03241 (2018) - 2017
- [j48]Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang, Qianru Wu:
A static technique for detecting input validation vulnerabilities in Android apps. Sci. China Inf. Sci. 60(5): 052111:1-052111:16 (2017) - [j47]Jingyu Feng, Guangyue Lu, Yuqing Zhang, Honggang Wang:
Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing. Sci. China Inf. Sci. 60(5): 59101 (2017) - [j46]Hongzhou Yue, Yuqing Zhang, Wenjie Wang, Qixu Liu:
Driving Android apps to trigger target API invocations based on activity and GUI filtering. Sci. China Inf. Sci. 60(7): 78102 (2017) - [j45]Xuefeng Liu, Wenhai Sun, Hanyu Quan, Wenjing Lou, Yuqing Zhang, Hui Li:
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys. IEEE Trans. Serv. Comput. 10(5): 826-838 (2017) - [c33]Caiyun Liu, Wenjie Wang, Yuqing Zhang, Ying Dong, Fannv He, Chensi Wu:
Predicting the Popularity of Online News Based on Multivariate Analysis. CIT 2017: 9-15 - [c32]Theophilus Benson, Peng Liu, Srikanth Sundaresan, Yuqing Zhang:
IoT S&P 2017: First Workshop on Internet of Things Security and Privacy. CCS 2017: 2647-2648 - [c31]Xuefeng Liu, Wenhai Sun, Wenjing Lou, Qingqi Pei, Yuqing Zhang:
One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. INFOCOM 2017: 1-9 - [c30]Fannv He, Yuqing Zhang, Donghang Liu, Ying Dong, Caiyun Liu, Chensi Wu:
Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis. NSS 2017: 99-111 - [c29]Chensi Wu, Yuqing Zhang, Ying Dong:
Application Research on Network Attacks and Defenses with Zachman Framework. NSS 2017: 439-449 - [c28]Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu, Yuqing Zhang, Hua Ma:
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence. NSS 2017: 450-463 - [e1]Peng Liu, Yuqing Zhang, Theophilus Benson, Srikanth Sundaresan:
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, IoT S&P@CCS, Dallas, TX, USA, November 03, 2017. ACM 2017, ISBN 978-1-4503-5396-0 [contents] - [i4]Xiaofei Wang, Qianhong Wu, Yuqing Zhang:
T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework. CoRR abs/1708.08191 (2017) - [i3]Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang:
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. IACR Cryptol. ePrint Arch. 2017: 737 (2017) - 2016
- [j44]Gaofei Wu, Yuqing Zhang, Xuefeng Liu:
New complementary sets of length 2m and size 4. Adv. Math. Commun. 10(4): 825-845 (2016) - [j43]Xuefeng Liu, Hanyu Quan, Yuqing Zhang, Qianqian Zhao, Ling Liu:
SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area. KSII Trans. Internet Inf. Syst. 10(3): 1229-1248 (2016) - [j42]Xiaowei Li, Dengqi Yang, Benhui Chen, Yuqing Zhang:
One-round Secure Key Exchange Protocol With Strong Forward Secrecy. KSII Trans. Internet Inf. Syst. 10(11): 5639-5653 (2016) - [j41]He Wang, Yuqing Zhang, Xuefeng Liu, YuPu Hu:
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage. Quantum Inf. Process. 15(6): 2593-2603 (2016) - [j40]Anmin Fu, Jianye Song, Shuai Li, Gongxuan Zhang, Yuqing Zhang:
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks. Secur. Commun. Networks 9(13): 2002-2014 (2016) - [c27]Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang:
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. CANS 2016: 419-434 - [c26]Kai Wang, Yuqing Zhang, Peng Liu:
Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback. CCS 2016: 92-103 - [c25]Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu, Guanxing Wen:
A Machine Learning Approach for Detecting Third-Party Trackers on the Web. ESORICS (1) 2016: 238-258 - [c24]Fabo Wang, Yuqing Zhang, Kai Wang, Peng Liu, Wenjie Wang:
Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android. ESORICS (1) 2016: 458-476 - [c23]Benhui Chen, Weite Li, Yuqing Zhang, Jinglu Hu:
Enhancing multi-label classification based on local label constraints and classifier chains. IJCNN 2016: 1458-1463 - [i2]Gaofei Wu, Nian Li, Yuqing Zhang, Xuefeng Liu:
Several Classes of Negabent Functions over Finite Fields. CoRR abs/1606.08952 (2016) - 2015
- [j39]Yuqing Zhang, Qixu Liu, Qihan Luo, Xiali Wang:
XAS: Cross-API scripting attacks in social ecosystems. Sci. China Inf. Sci. 58(1): 1-14 (2015) - [j38]Qianru Wu, Qixu Liu, Yuqing Zhang, Guanxing Wen:
TrackerDetector: A system to detect third-party trackers through machine learning. Comput. Networks 91: 164-173 (2015) - [j37]Ling Liu, Hanyu Quan, Xuefeng Liu, Yuqing Zhang:
Lightweight handover authentication with location privacy-preserving in mobile wireless networks. Int. J. Embed. Syst. 7(3/4): 280-288 (2015) - [j36]Gefei Zhang, Dan Fan, Yuqing Zhang, Xiaowei Li, Xuefeng Liu:
A privacy preserving authentication scheme for roaming services in global mobility networks. Secur. Commun. Networks 8(16): 2850-2859 (2015) - [j35]Jingyu Feng, Yuqing Zhang, Guangyue Lu, Wenxiu Zheng:
Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks. Secur. Commun. Networks 8(17): 3157-3166 (2015) - [j34]Tingpei Huang, Haiming Chen, Yuqing Zhang, Li Cui:
EasiND: Effective Neighbor Discovery Algorithms for Asynchronous and Asymmetric-Duty-Cycle Multi-channel Mobile WSNs. Wirel. Pers. Commun. 84(4): 3031-3055 (2015) - [c22]Kai Wang, Yuqing Zhang, Qixu Liu, Dan Fan:
A fuzzing test for dynamic vulnerability detection on Android Binder mechanism. CNS 2015: 709-710 - [c21]Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang:
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication. ISPEC 2015: 378-392 - 2014
- [j33]Gaofei Wu, Nian Li, Tor Helleseth, Yuqing Zhang:
Some classes of monomial complete permutation polynomials over finite fields of characteristic two. Finite Fields Their Appl. 28: 148-165 (2014) - [j32]Jingyu Feng, Yuqing Zhang, Guangyue Lu, Liang Zhang:
Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks. KSII Trans. Internet Inf. Syst. 8(1): 1-17 (2014) - [j31]Zhejun Fang, Yuqing Zhang, Ying Kong, Qixu Liu:
Static detection of logic vulnerabilities in Java web applications. Secur. Commun. Networks 7(3): 519-531 (2014) - [j30]Xuefeng Liu, Yuqing Zhang, Boyang Wang, Huaqun Wang:
An anonymous data aggregation scheme for smart grid systems. Secur. Commun. Networks 7(3): 602-610 (2014) - [j29]Guanghua Zhang, Yuqing Zhang, Xuefeng Liu:
Using fuzzy comprehensive evaluation method to establish a credible spectrum sensing and allocation model. Secur. Commun. Networks 7(11): 1912-1920 (2014) - [j28]Huaqun Wang, Yuqing Zhang:
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage. IEEE Trans. Parallel Distributed Syst. 25(1): 264-267 (2014) - [j27]Anmin Fu, Gongxuan Zhang, Zhenchao Zhu, Yuqing Zhang:
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks. Wirel. Pers. Commun. 79(2): 1277-1299 (2014) - [c20]Jingyu Feng, Yuqing Zhang, Guangyue Lu:
A Soft Decision Scheme against Intermittent SSDF Attack in Cooperative Spectrum Sensing. CIT 2014: 293-298 - [c19]Qixu Liu, Qianru Wu, Yuqing Zhang, Xiali Wang:
POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization. CCS 2014: 1472-1474 - [c18]Chen Cao, Yuqing Zhang, Qixu Liu, Kai Wang:
Function Escalation Attack. SecureComm (1) 2014: 481-497 - 2013
- [j26]Tingpei Huang, Haiming Chen, Li Cui, Yuqing Zhang:
EasiND: Neighbor Discovery in Duty-Cycled Asynchronous Multichannel Mobile WSNs. Int. J. Distributed Sens. Networks 9 (2013) - [j25]Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao:
A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card. KSII Trans. Internet Inf. Syst. 7(5): 1313-1327 (2013) - [j24]Zhiqiang Wang, Yuqing Zhang, Qixu Liu:
RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing. KSII Trans. Internet Inf. Syst. 7(8): 1989-2009 (2013) - [j23]Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao, Qianqian Zhao:
A New Roaming Authentication Framework For Wireless Communication. KSII Trans. Internet Inf. Syst. 7(8): 2061-2080 (2013) - [j22]Xuefeng Liu, Yuqing Zhang:
A privacy-preserving acceleration authentication protocol for mobile pay-TV systems. Secur. Commun. Networks 6(3): 361-372 (2013) - [j21]Xiaowei Li, Yuqing Zhang, Geifei Zhang:
A new certificateless authenticated key agreement protocol for SIP with different KGCs. Secur. Commun. Networks 6(5): 631-643 (2013) - [j20]Xiaowei Li, Yuqing Zhang:
A simple and robust anonymous two-factor authenticated key exchange protocol. Secur. Commun. Networks 6(6): 711-722 (2013) - [j19]Huan Yang, Yuqing Zhang, Yu-pu Hu, Qixu Liu:
IKE vulnerability discovery based on fuzzing. Secur. Commun. Networks 6(7): 889-901 (2013) - [j18]Yan-Xiao Liu, Yuqing Zhang, Lein Harn, Yu-pu Hu:
Verifiable symmetric polynomial-based key distribution schemes. Secur. Commun. Networks 6(8): 1028-1034 (2013) - [j17]Jingbo Yan, Yuqing Zhang, Dingning Yang:
Structurized grammar-based fuzz testing for programs with highly structured inputs. Secur. Commun. Networks 6(11): 1319-1330 (2013) - [j16]Xuefeng Liu, Yuqing Zhang, Boyang Wang, Jingbo Yan:
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Parallel Distributed Syst. 24(6): 1182-1191 (2013) - [j15]Anmin Fu, Gongxuan Zhang, Yuqing Zhang, Zhenchao Zhu:
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks. Wirel. Pers. Commun. 70(4): 1793-1810 (2013) - [c17]Guanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang:
Fuzzing the ActionScript virtual machine. AsiaCCS 2013: 457-468 - [c16]Wenming Zhou, Yuqing Zhang, Xuefeng Liu:
A new framework against privilege escalation attacks on android. CCS 2013: 1411-1414 - [c15]Qixu Liu, Yuqing Zhang, Huan Yang:
trend of online flash XSS vulnerabilities. CCS 2013: 1421-1424 - [c14]Jingyu Feng, Yuqing Zhang, Guangyue Lu, Liang Zhang:
Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment. TrustCom/ISPA/IUCC 2013: 1656-1661 - [i1]Gaofei Wu, Nian Li, Tor Helleseth, Yuqing Zhang:
More Classes of Complete Permutation Polynomials over $\F_q$. CoRR abs/1312.4716 (2013) - 2012
- [j14]Shenlong Chen, Yuqing Zhang, Qixu Liu, Jingyu Feng:
Dealing with dishonest recommendation: The trials in reputation management court. Ad Hoc Networks 10(8): 1603-1618 (2012) - [j13]Anmin Fu, Yuqing Zhang, Zhenchao Zhu, Qi Jing, Jingyu Feng:
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. Comput. Secur. 31(6): 741-749 (2012) - [j12]Anmin Fu, Shaohua Lan, Bo Huang, Zhenchao Zhu, Yuqing Zhang:
A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks. IEEE Commun. Lett. 16(11): 1744-1747 (2012) - [j11]Gaofei Wu, Yuqing Zhang, Zilong Wang:
Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(11): 1881-1887 (2012) - [j10]Yan-Xiao Liu, Lein Harn, Ching-Nung Yang, Yuqing Zhang:
Efficient (n, t, n) secret sharing schemes. J. Syst. Softw. 85(6): 1325-1332 (2012) - [j9]Qixu Liu, Yuqing Zhang, Ying Kong, Qianru Wu:
Improving VRSS-based vulnerability prioritization using analytic hierarchy process. J. Syst. Softw. 85(8): 1699-1708 (2012) - [j8]Huaqun Wang, Yuqing Zhang:
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks. IEEE Trans. Dependable Secur. Comput. 9(3): 443-446 (2012) - [c13]Zhiqiang Wang, Yuqing Zhang, Qixu Liu:
A research on vulnerability discovering for router protocols based on fuzzing. CHINACOM 2012: 245-250 - [c12]Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao, Qianqian Zhao:
A lightweight roaming authentication protocol for anonymous wireless communication. GLOBECOM 2012: 1029-1034 - [c11]Qi Jing, Yuqing Zhang, Xuefeng Liu, Anmin Fu:
An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks. ICC 2012: 857-862 - [c10]Ying Cai, Xiaofei Wang, Yuqing Zhang:
The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm. INCoS 2012: 229-236 - [c9]Huaqun Wang, Yuqing Zhang, Bo Qin:
Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers. TrustCom 2012: 1057-1062 - [c8]Dingning Yang, Yuqing Zhang, Qixu Liu:
BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs. TrustCom 2012: 1070-1076 - [c7]Ying Kong, Yuqing Zhang, Zhejun Fang, Qixu Liu:
Static Detection of Logic Vulnerabilities in Java Web Applications. TrustCom 2012: 1083-1088 - 2011
- [j7]Qixu Liu, Yuqing Zhang:
VRSS: A new system for rating and scoring vulnerabilities. Comput. Commun. 34(3): 264-273 (2011) - [j6]Anmin Fu, Yuqing Zhang, Jingyu Feng:
Security Issues and Solutions of the Key Management Protocols in IEEE 802.16j Multi-Hop Relay Network. IEICE Trans. Commun. 94-B(5): 1295-1302 (2011) - [j5]Huaqun Wang, Yuqing Zhang:
Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme. IEEE Trans. Wirel. Commun. 10(1): 1-4 (2011) - [c6]Qi Jing, Yuqing Zhang, Anmin Fu, Xuefeng Liu:
A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks. GLOBECOM 2011: 1-6 - [c5]Huaqun Wang, Yuqing Zhang:
Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model. MSN 2011: 451-455 - [c4]Anmin Fu, Yuqing Zhang, Zhenchao Zhu, Jingyu Feng:
EKMP: An enhanced key management protocol for IEEE 802.16m. WCNC 2011: 1137-1142 - 2010
- [j4]Anmin Fu, Yuqing Zhang, Zhenchao Zhu, Xuefeng Liu:
A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m. IEEE Commun. Lett. 14(12): 1134-1136 (2010) - [j3]Jingyu Feng, Yuqing Zhang, Hong Wang:
A Trust Management Model Based on Bi-evaluation in P2P Networks. IEICE Trans. Inf. Syst. 93-D(3): 466-472 (2010) - [c3]Shenlong Chen, Yuqing Zhang, Peng Liu, Jingyu Feng:
Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks. GLOBECOM 2010: 1-6 - [c2]Ying Kong, Yuqing Zhang, Qixu Liu:
Eliminating Human Specification in Static Analysis. RAID 2010: 494-495
2000 – 2009
- 2008
- [j2]Qixu Liu, Yuqing Zhang:
TFTP vulnerability finding technique based on fuzzing. Comput. Commun. 31(14): 3420-3426 (2008) - 2006
- [c1]Yuqing Zhang, Suping Jia:
Common Program Analysis of Two-Party Security Protocols Using SMV. APWeb Workshops 2006: 923-930
1990 – 1999
- 1999
- [j1]Yuqing Zhang, Jihong Li, Guozhen Xiao:
An Approach to the Formal Verification of the Two-Party Crypographic Protocols. ACM SIGOPS Oper. Syst. Rev. 33(4): 48-51 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint