


default search action
Zheng Qin 0001
Person information
- affiliation: Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
- affiliation: Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Information Engineering, Beijing, China
- affiliation (2010 - 2011): Michigan State University, East Lansing, MI, USA
- affiliation (PhD 2001): Chongqing University, Department of computer software and theory, China
Other persons with the same name
- Zheng Qin — disambiguation page
- Zheng Qin 0002
— National University of Defense Technology, Science and Technology on Parallel and Distributed Laboratory, Changsha, China
- Zheng Qin 0003
— Tsinghua University, School of Software, Beijing, China
- Zheng Qin 0004
— A*STAR, Institute of High Performance Computing, Singapore (and 2 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j90]Hui Yin
, Yin Zhu
, Hua Deng, Lu Ou
, Zheng Qin
, Keqin Li
:
Privacy-Preservation Enhanced and Efficient Attribute-Based Access Control for Smart Health in Cloud-Assisted Internet of Things. IEEE Internet Things J. 12(1): 894-903 (2025) - 2024
- [j89]Dan Tang, Hongbo Cao, Jiliang Zhang, Zheng Qin, Wei Liang, Xiaopu Ma:
EXCLF: A LDoS attack detection & mitigation model based on programmable data plane. Comput. Networks 252: 110666 (2024) - [j88]Dan Tang
, Zhiqing Zheng
, Chao Yin
, Bing Xiong, Zheng Qin, Qiuwei Yang
:
FTODefender: An efficient flow table overflow attacks defending system in SDN. Expert Syst. Appl. 237(Part B): 121460 (2024) - [j87]Jiwei Liu
, Zheng Qin
, Zixing Zhang
, Jixin Zhang
:
An Angle-Oriented Approach to Transferring Speech to Gesture for Highly Anthropomorphized Embodied Conversational Agents. Int. J. Comput. Intell. Appl. 23(2): 2450006:1-2450006:22 (2024) - [j86]Hua Deng
, Hui Yin
, Zheng Qin
, Lu Ou
, Fangmin Li
, Ningchao Ge:
Toward Fine-Grained and Forward-Secure Access Control in Cloud-Assisted IoT. IEEE Internet Things J. 11(22): 36569-36580 (2024) - [j85]Wei Liang
, Yuhui Li, Jianlong Xu
, Zheng Qin
, Dafang Zhang, Kuan-Ching Li
:
QoS Prediction and Adversarial Attack Protection for Distributed Services Under DLaaS. IEEE Trans. Computers 73(3): 669-682 (2024) - [j84]Zhu Xiao
, Linshan Wu
, Hongbo Jiang
, Zheng Qin
, Chengxi Gao
, You Li, Hongyang Chen
, Jiangchuan Liu
:
Exploring Intercity Mobility in Urban Agglomeration: Evidence from Private Car Trajectory Data. IEEE Trans. Comput. Soc. Syst. 11(2): 2940-2954 (2024) - [j83]Fuyuan Song
, Jinwen Liang
, Chuan Zhang
, Zhangjie Fu
, Zheng Qin
, Song Guo
:
Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing. IEEE Trans. Dependable Secur. Comput. 21(4): 4006-4023 (2024) - [j82]Jinhui Ouyang
, Mingxia Yu
, Weiren Yu, Zheng Qin
, Amelia C. Regan
, Di Wu
:
TPGraph: A Spatial-Temporal Graph Learning Framework for Accurate Traffic Prediction on Arterial Roads. IEEE Trans. Intell. Transp. Syst. 25(5): 3911-3926 (2024) - [j81]Wangchen Long
, Zhu Xiao
, Hongbo Jiang
, Yong Xiong
, Zheng Qin
, You Li, Schahram Dustdar
:
Learning Semantic Behavior for Human Mobility Trajectory Recovery. IEEE Trans. Intell. Transp. Syst. 25(8): 8849-8864 (2024) - [j80]Hangyu Zheng
, Youhuan Li
, Fang Xiong
, Xiaosen Li
, Lei Zou
, Peifan Shi
, Zheng Qin
:
Vertex Encoding for Edge Nonexistence Determination With SIMD Acceleration. IEEE Trans. Knowl. Data Eng. 36(7): 3600-3614 (2024) - [j79]Yu Liu
, Zejun Xu
, Zheng Qin
, Lu Ou
, Wenqiang Jin
:
TouchAccess: Unlock IoT Devices on Touching by Leveraging Human-Induced EM Emanations. IEEE Trans. Mob. Comput. 23(12): 12587-12602 (2024) - [j78]Jiajia Xie
, Sheng Zhang
, Beihao Xia
, Zhu Xiao
, Hongbo Jiang
, Siwang Zhou
, Zheng Qin
, Hongyang Chen
:
Pedestrian Trajectory Prediction Based on Social Interactions Learning With Random Weights. IEEE Trans. Multim. 26: 7503-7515 (2024) - [j77]Zejun Xu, Wenqiang Jin, Changwei Yao, Xinyi Liu, Shuang Ma, Yu Liu, Zheng Qin, Iman Vakilinia, Daibo Liu:
EM-Rhythm: An Authentication Method for Heterogeneous IoT Devices. ACM Trans. Sens. Networks 20(6): 125:1-125:21 (2024) - [c56]Yajing Zhai, Yawen Zeng, Zhiyong Huang, Zheng Qin, Xin Jin, Da Cao:
Multi-Prompts Learning with Cross-Modal Alignment for Attribute-Based Person Re-identification. AAAI 2024: 6979-6987 - [c55]Yue Li, Zhenxiong Yan, Wenqiang Jin, Zhenyu Ning, Daibo Liu, Zheng Qin, Yu Liu, Huadi Zhu, Ming Li:
GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic Radiations. CCS 2024: 3302-3316 - [c54]Mingdao Li, Peng Peng, Zheyuan Hu, Lei Zou, Zheng Qin:
Variable-Length Path Query Evaluation Based on Worst-Case Optimal Joins. ICDE 2024: 3311-3323 - [c53]Jiaxin Chen, Xin Liao, Zhenxing Qian, Zheng Qin:
Multi-domain Probability Estimation Network for Forgery Detection over Online Social Network Shared Images. ICME 2024: 1-6 - [c52]Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Qian Wang, Zheng Qin, Mike Zheng Shou:
Delocate: Detection and Localization for Deepfake Videos with Randomly-Located Tampered Traces. IJCAI 2024: 5862-5871 - [c51]Xiaoshuai Wu, Xin Liao, Bo Ou, Yuling Liu, Zheng Qin:
Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics. IJCAI 2024: 6089-6097 - [c50]Zhenyu Ye
, Lei Zhou
, Fengwei Zhang
, Wenqiang Jin
, Zhenyu Ning
, Yupeng Hu
, Zheng Qin
:
FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor. ISSTA 2024: 38-50 - [c49]Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning, Kenli Li, Zheng Qin, Mingxing Duan, Yong Xie, Daibo Liu, Ming Li:
Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMR. NDSS 2024 - [i7]Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Qian Wang, Zheng Qin, Mike Zheng Shou:
Delocate: Detection and Localization for Deepfake Videos with Randomly-Located Tampered Traces. CoRR abs/2401.13516 (2024) - [i6]Xiaoshuai Wu, Xin Liao, Bo Ou, Yuling Liu, Zheng Qin:
Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics. CoRR abs/2404.17867 (2024) - [i5]Lu Ou, Shaolin Liao, Shihui Gao, Guandong Huang, Zheng Qin:
RDP: Ranked Differential Privacy for Facial Feature Protection in Multiscale Sparsified Subspace. CoRR abs/2408.00294 (2024) - 2023
- [j76]Lu Ou
, Yi He
, Shaolin Liao
, Zheng Qin
, Yuan Hong
, Dafang Zhang, Xiaohua Jia
:
FaceIDP: Face Identification Differential Privacy via Dictionary Learning Neural Networks. IEEE Access 11: 31829-31841 (2023) - [j75]Yupeng Hu, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wenjia Li, Keqin Li:
Artificial Intelligence Security: Threats and Countermeasures. ACM Comput. Surv. 55(2): 20:1-20:36 (2023) - [j74]Hui Yin
, Wei Zhang
, Hua Deng, Zheng Qin
, Keqin Li
:
An Attribute-Based Searchable Encryption Scheme for Cloud-Assisted IIoT. IEEE Internet Things J. 10(12): 11014-11023 (2023) - [j73]Jiaxin Chen
, Xin Liao
, Wei Wang, Zheng Qin:
Identification of image global processing operator chain based on feature decoupling. Inf. Sci. 637: 118961 (2023) - [j72]Dan Tang, Dongshuo Zhang, Zheng Qin, Qiuwei Yang, Sheng Xiao:
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks. J. Netw. Comput. Appl. 213: 103597 (2023) - [j71]Ningchao Ge
, Zheng Qin
, Peng Peng
, Mingdao Li
, Lei Zou
, Keqin Li
:
A Cost-Driven Top-K Queries Optimization Approach on Federated RDF Systems. IEEE Trans. Big Data 9(2): 665-676 (2023) - [j70]Mingdao Li, Peng Peng, Zhen Tian, Zheng Qin, Zheng Huang, Yi Liu:
Optimizing Keyword Search Over Federated RDF Systems. IEEE Trans. Big Data 9(3): 918-935 (2023) - [j69]Dan Tang
, Siyuan Wang
, Siqi Zhang
, Zheng Qin
, Wei Liang
, Sheng Xiao
:
Real-Time Monitoring and Mitigation of SDoS Attacks Using the SDN and New Metrics. IEEE Trans. Cogn. Commun. Netw. 9(6): 1721-1733 (2023) - [j68]Jiaxin Chen
, Xin Liao
, Wei Wang
, Zhenxing Qian
, Zheng Qin
, Yaonan Wang
:
SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection. IEEE Trans. Circuits Syst. Video Technol. 33(2): 935-951 (2023) - [j67]Hua Deng
, Zheng Qin
, Qianhong Wu, Robert H. Deng
, Zhenyu Guan
, Yupeng Hu
, Fangmin Li
:
Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds. IEEE Trans. Dependable Secur. Comput. 20(2): 1364-1377 (2023) - [j66]Hui Yin
, Yangfan Li
, Hua Deng
, Wei Zhang, Zheng Qin
, Keqin Li
:
An Attribute-Based Keyword Search Scheme for Multiple Data Owners in Cloud-Assisted Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(4): 5763-5773 (2023) - [j65]Songshang Zou, Hao Chen
, Hui Feng, Guangyi Xiao
, Zheng Qin
, Weiwei Cai
:
Traffic Flow Video Image Recognition and Analysis Based on Multi-Target Tracking Algorithm and Deep Learning. IEEE Trans. Intell. Transp. Syst. 24(8): 8762-8775 (2023) - [j64]Hui Yin
, Yangfan Li
, Hua Deng, Wei Zhang
, Zheng Qin
, Keqin Li
:
Practical and Dynamic Attribute-Based Keyword Search Supporting Numeric Comparisons Over Encrypted Cloud Data. IEEE Trans. Serv. Comput. 16(4): 2855-2867 (2023) - [c48]Mingdao Li, Bo Zhai, Yuntao Jiang, Yunjian Li, Zheng Qin, Peng Peng:
Locality Sensitive Hashing for Data Placement to Optimize Parallel Subgraph Query Evaluation. APWeb-WAIM (1) 2023: 32-47 - [c47]Mingdao Li, Peng Peng, Zheng Qin:
Feds: A Highly Efficient Keyword Search System Operating on Federated RDF Systems. APWeb/WAIM (4) 2023: 483-488 - [c46]Jing Long, Cuiting Luo, Ruxin Chen, Wei Liang, Zheng Qin:
Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-Things. ISPA/BDCloud/SocialCom/SustainCom 2023: 207-212 - [c45]Shengyi Ji
, Peng Peng, Jian Hu, Lei Zou, Zhen Huang, Zheng Qin:
PEG: A Partial Evaluation-based Distributed RDF Graph System. DASFAA (4) 2023: 658-662 - [i4]Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Zheng Qin, Mike Zheng Shou:
DeepfakeMAE: Facial Part Consistency Aware Masked Autoencoder for Deepfake Video Detection. CoRR abs/2303.01740 (2023) - [i3]Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Qian Wang, Zheng Qin, Mike Zheng Shou:
Mover: Mask and Recovery based Facial Part Consistency Aware Method for Deepfake Video Detection. CoRR abs/2305.05943 (2023) - [i2]Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Qian Wang, Zheng Qin, Mike Zheng Shou:
Recap: Detecting Deepfake Video with Unpredictable Tampered Traces via Recovering Faces and Mapping Recovered Faces. CoRR abs/2308.09921 (2023) - [i1]Yajing Zhai, Yawen Zeng, Zhiyong Huang, Zheng Qin, Xin Jin, Da Cao:
Multi-Prompts Learning with Cross-Modal Alignment for Attribute-based Person Re-Identification. CoRR abs/2312.16797 (2023) - 2022
- [j63]Dan Tang, Yudong Yan
, Rui Dai, Zheng Qin, Jingwen Chen, Dongshuo Zhang:
A novel LDoS attack detection method based on reconstruction anomaly. Clust. Comput. 25(2): 1373-1392 (2022) - [j62]Wei Shi, Dan Tang, Sijia Zhan, Zheng Qin, Xiyin Wang:
An approach for detecting LDoS attack based on cloud model. Frontiers Comput. Sci. 16(6): 166821 (2022) - [j61]Qiao Hu
, Jingyi Zhang, Gerhard P. Hancke
, Yupeng Hu
, Wenjia Li
, Hongbo Jiang, Zheng Qin
:
Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices. IEEE Internet Things J. 9(2): 1326-1338 (2022) - [j60]Fuyuan Song
, Zheng Qin
, Liang Xue
, Jixin Zhang
, Xiaodong Lin
, Xuemin Shen
:
Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing. IEEE Internet Things J. 9(8): 6184-6198 (2022) - [j59]Dan Tang
, Yudong Yan
, Siqi Zhang
, Jingwen Chen, Zheng Qin
:
Performance and Features: Mitigating the Low-Rate TCP-Targeted DoS Attack via SDN. IEEE J. Sel. Areas Commun. 40(1): 428-444 (2022) - [j58]Juan Hu
, Xin Liao
, Wei Wang
, Zheng Qin
:
Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network. IEEE Trans. Circuits Syst. Video Technol. 32(3): 1089-1102 (2022) - [j57]Xin Liao
, Jiaojiao Yin, Mingliang Chen
, Zheng Qin
:
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features. IEEE Trans. Dependable Secur. Comput. 19(2): 897-911 (2022) - [j56]Hua Deng
, Jixin Zhang
, Zheng Qin
, Qianhong Wu, Hui Yin
, Aniello Castiglione
:
Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 3024-3037 (2022) - [j55]Yawen Zeng, Da Cao, Shaofei Lu
, Hanling Zhang, Jiao Xu, Zheng Qin:
Moment is Important: Language-Based Video Moment Retrieval via Adversarial Learning. ACM Trans. Multim. Comput. Commun. Appl. 18(2): 56:1-56:21 (2022) - [j54]Hua Deng
, Zheng Qin
, Qianhong Wu, Zhenyu Guan, Hui Yin
:
Revocable Attribute-Based Data Storage in Mobile Clouds. IEEE Trans. Serv. Comput. 15(2): 1130-1142 (2022) - [j53]Dan Tang
, Siqi Zhang
, Yudong Yan
, Jingwen Chen, Zheng Qin
:
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm. IEEE Trans. Serv. Comput. 15(6): 3471-3484 (2022) - [c44]Juan Hu, Xin Liao
, Jinwen Liang, Wenbo Zhou, Zheng Qin:
FInfer: Frame Inference-Based Deepfake Detection for High-Visual-Quality Videos. AAAI 2022: 951-959 - 2021
- [j52]Jinwen Liang
, Zheng Qin
, Liang Xue
, Xiaodong Lin
, Xuemin Shen
:
Efficient and Privacy-Preserving Decision Tree Classification for Health Monitoring Systems. IEEE Internet Things J. 8(16): 12528-12539 (2021) - [j51]Jinwen Liang
, Zheng Qin
, Liang Xue
, Xiaodong Lin
, Xuemin Shen
:
Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services. IEEE Internet Things J. 8(23): 17029-17042 (2021) - [j50]Jiacheng Hou, Bo Ou
, Huawei Tian, Zheng Qin:
Reversible data hiding based on multiple histograms modification and deep neural networks. Signal Process. Image Commun. 92: 116118 (2021) - [j49]Jiaxin Chen
, Xin Liao
, Zheng Qin:
Identifying tampering operations in image operator chains based on decision fusion. Signal Process. Image Commun. 95: 116287 (2021) - [j48]Jinwen Liang
, Zheng Qin
, Jianbing Ni
, Xiaodong Lin
, Xuemin Shen
:
Practical and Secure SVM Classification for Cloud-Based Remote Clinical Decision Services. IEEE Trans. Computers 70(10): 1612-1625 (2021) - [j47]Hui Yin
, Zheng Qin
, Jixin Zhang
, Lu Ou
, Keqin Li
:
Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 9(1): 27-39 (2021) - [j46]Yupeng Hu
, Yonghe Liu
, Wenjia Li
, Keqin Li
, Kenli Li
, Nong Xiao, Zheng Qin
:
Unequal Failure Protection Coding Technique for Distributed Cloud Storage Systems. IEEE Trans. Cloud Comput. 9(1): 386-400 (2021) - [j45]Lu Ou
, Zheng Qin
, Shaolin Liao
, Jian Weng
, Xiaohua Jia
:
An Optimal Noise Mechanism for Cross-Correlated IoT Data Releasing. IEEE Trans. Dependable Secur. Comput. 18(4): 1528-1540 (2021) - [j44]Jinwen Liang
, Zheng Qin
, Sheng Xiao, Lu Ou
, Xiaodong Lin
:
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services. IEEE Trans. Dependable Secur. Comput. 18(4): 1632-1644 (2021) - [j43]Yang Xu
, Cheng Zhang
, Guojun Wang
, Zheng Qin
, Quanrun Zeng:
A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services. IEEE Trans. Emerg. Top. Comput. 9(3): 1421-1432 (2021) - [j42]Dan Tang, Ye Feng
, Siqi Zhang
, Zheng Qin
:
FR-RED: Fractal Residual Based Real-Time Detection of the LDoS Attack. IEEE Trans. Reliab. 70(3): 1143-1157 (2021) - [j41]Fuyuan Song
, Zheng Qin
, Dongxiao Liu
, Jixin Zhang
, Xiaodong Lin
, Xuemin Shen
:
Privacy-Preserving Task Matching With Threshold Similarity Search via Vehicular Crowdsourcing. IEEE Trans. Veh. Technol. 70(7): 7161-7175 (2021) - [c43]Yawen Zeng, Da Cao, Xiaochi Wei, Meng Liu, Zhou Zhao, Zheng Qin:
Multi-Modal Relational Graph for Cross-Modal Video Moment Retrieval. CVPR 2021: 2215-2224 - [c42]Wenjie Li, Lei Zou, Peng Peng, Zheng Qin:
NREngine: A Graph-Based Query Engine for Network Reachability. DASFAA (Workshops) 2021: 90-106 - [c41]Ningchao Ge, Zheng Qin, Peng Peng, Lei Zou:
FedTopK: Top-K Queries Optimization over Federated RDF Systems. DASFAA (3) 2021: 595-599 - [c40]Jiaxin Chen
, Xin Liao
, Wei Wang, Zheng Qin:
A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains. ICASSP 2021: 2505-2509 - [c39]Fuyuan Song, Zheng Qin, Jinwen Liang
, Xiaodong Lin:
An Efficient and Privacy-Preserving Multi-User Multi-Keyword Search Scheme without Key Sharing. ICC 2021: 1-6 - [c38]Xinmeng Li, Nengguang Luo, Dan Tang, Zhiqing Zheng, Zheng Qin, Xinxiang Gao:
BA-BNN: Detect LDoS Attacks in SDN Based on Bat Algorithm and BP Neural Network. ISPA/BDCloud/SocialCom/SustainCom 2021: 300-307 - [c37]Fuyuan Song, Zheng Qin, Jinwen Liang
, Pulei Xiong, Xiaodong Lin:
Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing. PST 2021: 1-9 - [c36]Xinmeng Li, Kai Zheng, Dan Tang, Zheng Qin, Zhiqing Zheng, Shihan Zhang:
LDoS Attack Detection Based on ASNNC-OFA Algorithm. WCNC 2021: 1-6 - [c35]Ningchao Ge, Peng Peng, Zheng Qin, Mingdao Li:
FedAggs: Optimizing Aggregate Queries Evaluation in Federated RDF Systems. WISE (2) 2021: 527-535 - 2020
- [j40]Jin Yuan
, Chao Pan
, Yan Zheng
, Xianyi Zhu
, Zheng Qin
, Yi Xiao
:
Gradient-Guided Residual Learning for Inverse Halftoning and Image Expanding. IEEE Access 8: 50995-51007 (2020) - [j39]Qing Wang, Shengyi Ji
, Peng Peng
, Mingdao Li, Ping Huang, Zheng Qin
:
Optimizing Distance Computation in Distributed Graph Systems. IEEE Access 8: 191673-191682 (2020) - [j38]Yu Liu
, Zheng Qin, Xiaofeng Liao, Jiahui Wu
:
A Chaotic Image Encryption Scheme Based on Hénon-Chebyshev Modulation Map and Genetic Operations. Int. J. Bifurc. Chaos 30(6): 2050090:1-2050090:22 (2020) - [j37]Hui Yin, Jixin Zhang, Zheng Qin:
A malware variants detection methodology with an opcode-based feature learning method and a fast density-based clustering algorithm. Int. J. Comput. Sci. Eng. 21(1): 19-29 (2020) - [j36]Lu Ou
, Zheng Qin
, Shaolin Liao
, Tao Li, Dafang Zhang:
Singular Spectrum Analysis for Local Differential Privacy of Classifications in the Smart Grid. IEEE Internet Things J. 7(6): 5246-5255 (2020) - [j35]Hua Deng
, Zheng Qin
, Letian Sha, Hui Yin
:
A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT. IEEE Internet Things J. 7(12): 11601-11611 (2020) - [j34]Hua Deng
, Zheng Qin, Qianhong Wu
, Zhenyu Guan, Yunya Zhou:
Flexible attribute-based proxy re-encryption for efficient data sharing. Inf. Sci. 511: 94-113 (2020) - [j33]Hui Yin, Zheng Qin, Jixin Zhang, Hua Deng, Fangmin Li, Keqin Li:
A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing. J. Parallel Distributed Comput. 135: 56-69 (2020) - [j32]Jinwen Liang
, Zheng Qin, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li:
Privacy-preserving range query over multi-source electronic health records in public clouds. J. Parallel Distributed Comput. 135: 127-139 (2020) - [j31]Cheng Zhang
, Bo Ou
, Huawei Tian, Zheng Qin:
Reversible data hiding in JPEG bitstream using optimal VLC mapping. J. Vis. Commun. Image Represent. 71: 102821 (2020) - [j30]Da Cao, Lianhai Miao, Huigui Rong, Zheng Qin, Liqiang Nie:
Hashtag our stories: Hashtag recommendation for micro-videos via harnessing multiple modalities. Knowl. Based Syst. 203: 106114 (2020) - [j29]Xin Liao
, Yingbo Yu, Bin Li
, Zhongpeng Li, Zheng Qin
:
A New Payload Partition Strategy in Color Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 30(3): 685-696 (2020) - [j28]Lu Ou
, Zheng Qin
, Shaolin Liao
, Yuan Hong
, Xiaohua Jia
:
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy. IEEE Trans. Dependable Secur. Comput. 17(5): 1109-1123 (2020) - [j27]Hua Deng
, Zheng Qin
, Qianhong Wu, Zhenyu Guan
, Robert H. Deng
, Yujue Wang
, Yunya Zhou:
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud. IEEE Trans. Inf. Forensics Secur. 15: 3168-3180 (2020) - [j26]Lu Ou, Shaolin Liao
, Zheng Qin, Hui Yin:
Millimeter Wave Wireless Hadamard Image Transmission for MIMO Enabled 5G and Beyond. IEEE Wirel. Commun. 27(6): 134-139 (2020) - [c34]Qing Wang, Peng Peng, Tianyao Tong, Zhen Tian, Zheng Qin:
Keyword Search over Federated RDF Systems. DASFAA (2) 2020: 613-622 - [c33]Fuyuan Song, Zheng Qin, Jixin Zhang, Dongxiao Liu, Jinwen Liang
, Xuemin Sherman Shen
:
Efficient and Privacy-preserving Outsourced Image Retrieval in Public Clouds. GLOBECOM 2020: 1-6 - [c32]Da Cao, Yawen Zeng
, Xiaochi Wei, Liqiang Nie, Richang Hong, Zheng Qin:
Adversarial Video Moment Retrieval by Jointly Modeling Ranking and Localization. ACM Multimedia 2020: 898-906 - [c31]Da Cao, Yawen Zeng, Meng Liu, Xiangnan He, Meng Wang, Zheng Qin:
STRONG: Spatio-Temporal Reinforcement Learning for Cross-Modal Video Moment Localization. ACM Multimedia 2020: 4162-4170
2010 – 2019
- 2019
- [j25]Wenjie Li
, Zheng Qin
, Keqin Li
, Hui Yin, Lu Ou
:
A Novel Approach to Rule Placement in Software-Defined Networks Based on OPTree. IEEE Access 7: 8689-8700 (2019) - [j24]Yu Liu
, Zheng Qin
, Jiahui Wu
:
Cryptanalysis and Enhancement of an Image Encryption Scheme Based on Bit-Plane Extraction and Multiple Chaotic Maps. IEEE Access 7: 74070-74080 (2019) - [j23]Heng Li
, Yonghe Liu, Zheng Qin
, Huigui Rong
, Qin Liu:
A Large-Scale Urban Vehicular Network Framework for IoT in Smart Cities. IEEE Access 7: 74437-74449 (2019) - [j22]Jixin Zhang, Zheng Qin, Hui Yin
, Lu Ou
, Kehuan Zhang:
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding. Comput. Secur. 84: 376-392 (2019) - [j21]Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Fangmin Li, Keqin Li:
Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners. Future Gener. Comput. Syst. 100: 689-700 (2019) - [j20]Jiliang Zhang
, Binhang Qi, Zheng Qin
, Gang Qu
:
HCIC: Hardware-Assisted Control-Flow Integrity Checking. IEEE Internet Things J. 6(1): 458-471 (2019) - [c30]Mingdao Li, Peng Peng, Yang Xu, Hao Xia, Zheng Qin:
Distributed Landmark Selection for Lower Bound Estimation of Distances in Large Graphs. APWeb/WAIM (1) 2019: 223-239 - [c29]Qi Ge, Peng Peng, Zhiwei Xu, Lei Zou, Zheng Qin:
FMQO: A Federated RDF System Supporting Multi-query Optimization. APWeb/WAIM (2) 2019: 397-401 - [c28]Fan Wang
, Zheng Qin
, Hui Yin
:
A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing. CSS (2) 2019: 432-447 - [c27]Jixin Zhang, Mohammad Faham Khan, Xiaodong Lin, Zheng Qin:
An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants. DSC 2019: 1-8 - [c26]Jinwen Liang
, Zheng Qin, Jianbing Ni, Xiaodong Lin, Xuemin Sherman Shen
:
Efficient and Privacy-Preserving Outsourced SVM Classification in Public Cloud. ICC 2019: 1-6 - [c25]Fuyuan Song, Zheng Qin, Qin Liu, Jinwen Liang
, Lu Ou:
Efficient and Secure k-Nearest Neighbor Search Over Encrypted Data in Public Cloud. ICC 2019: 1-6 - [c24]Xiaocan Li
, Kun Xie, Xin Wang, Gaogang Xie, Jigang Wen, Guangxing Zhang, Zheng Qin:
Online Internet Anomaly Detection With High Accuracy: A Fast Tensor Factorization Solution. INFOCOM 2019: 1900-1908 - [c23]Wenjie Li, Peng Peng, Zheng Qin, Lei Zou:
NRGQP: A Graph-Based Query Platform for Network Reachability. WISE Workshops 2019: 55-63 - [p1]Yupeng Hu, Linjun Wu, Wenjia Li, Keqin Li, Yonghe Liu, Zheng Qin:
Toward Complex Search for Encrypted Mobile Cloud Data via Index Blind Storage. Smart Data 2019: 41-62 - 2018
- [j19]Jiliang Zhang
, Xiao Tan, Xiangqi Wang, Aibin Yan, Zheng Qin:
T2FA: Transparent Two-Factor Authentication. IEEE Access 6: 32677-32686 (2018) - [j18]Lu Ou
, Zheng Qin
, Shaolin Liao
, Hui Yin, Xiaohua Jia:
An Optimal Pufferfish Privacy Mechanism for Temporally Correlated Trajectories. IEEE Access 6: 37150-37165 (2018) - [j17]Jixin Zhang
, Zheng Qin
, Kehuan Zhang, Hui Yin, Jingfu Zou:
Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features. IEEE Access 6: 51964-51974 (2018) - [j16]Jixin Zhang, Kehuan Zhang, Zheng Qin, Hui Yin, Qixin Wu:
Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks. Cybersecur. 1(1): 10 (2018) - [j15]Lu Ou
, Hui Yin
, Zheng Qin
, Sheng Xiao
, Guangyi Yang, Yupeng Hu:
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme. Secur. Commun. Networks 2018: 4724815:1-4724815:11 (2018) - [j14]Xianglian Shi, Bo Ou
, Zheng Qin:
Tailoring reversible data hiding for 3D synthetic images. Signal Process. Image Commun. 64: 46-58 (2018) - [j13]Jiliang Zhang
, Xiao Tan, Yuanjing Zhang
, Weizheng Wang, Zheng Qin
:
Frequency Offset-Based Ring Oscillator Physical Unclonable Function. IEEE Trans. Multi Scale Comput. Syst. 4(4): 711-721 (2018) - [j12]Kun Xie
, Can Peng, Xin Wang, Gaogang Xie
, Jigang Wen, Jiannong Cao
, Dafang Zhang, Zheng Qin:
Accurate Recovery of Internet Traffic Data Under Variable Rate Measurements. IEEE/ACM Trans. Netw. 26(3): 1137-1150 (2018) - [j11]Kun Xie
, Xiaocan Li
, Xin Wang
, Jiannong Cao
, Gaogang Xie
, Jigang Wen, Dafang Zhang, Zheng Qin:
On-Line Anomaly Detection With High Accuracy. IEEE/ACM Trans. Netw. 26(3): 1222-1235 (2018) - [c22]Yi Xiao, Chao Pan, Yan Zheng, Xianyi Zhu, Zheng Qin, Jin Yuan:
Gradient-Guided DCNN for Inverse Halftoning and Image Expanding. ACCV (4) 2018: 207-222 - [c21]Kun Xie, Heng Tao, Xin Wang, Gaogang Xie, Jigang Wen, Jiannong Cao, Zheng Qin:
Divide and Conquer for Fast SRLG Disjoint Routing. DSN 2018: 622-633 - 2017
- [j10]Peng Peng, Lei Zou, Zheng Qin:
Answering top-K query combined keywords and structural queries on RDF graphs. Inf. Syst. 67: 19-35 (2017) - [j9]Kun Xie, Xueping Ning
, Xin Wang, Shiming He, Zuoting Ning, Xiaoxiao Liu, Jigang Wen, Zheng Qin:
An efficient privacy-preserving compressive data gathering scheme in WSNs. Inf. Sci. 390: 82-94 (2017) - [j8]Hui Yin, Zheng Qin, Lu Ou, Keqin Li:
A query privacy-enhanced and secure search scheme over encrypted data in cloud computing. J. Comput. Syst. Sci. 90: 14-27 (2017) - [j7]Xin Liao
, Zheng Qin, Liping Ding:
Data embedding in digital images using critical functions. Signal Process. Image Commun. 58: 146-156 (2017) - [c20]Qixin Wu, Zheng Qin, Jinxin Zhang, Hui Yin, Guangyi Yang, Kuangsheng Hu:
Android Malware Detection Using Local Binary Pattern and Principal Component Analysis. ICPCSEE (1) 2017: 262-275 - [c19]Guanchao Wen, Yupeng Hu, Chen Jiang, Na Cao, Zheng Qin:
A image texture and BP neural network basec malicious files detection technique for cloud storage systems. INFOCOM Workshops 2017: 426-431 - [c18]Yupeng Hu, Wenjia Li, Mengyi Ma, Na Cao, Yonghe Liu, Zheng Qin, Jia Wang:
Toward Complex Search for Encrypted Cloud Data via Blind Index Storage. ISPA/IUCC 2017: 1-8 - [c17]Jinwen Liang
, Zheng Qin
, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li:
MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy. SecureComm 2017: 808-822 - [c16]Zejun Niu, Zheng Qin, Jixin Zhang, Hui Yin:
Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix. SpaCCS Workshops 2017: 757-766 - 2016
- [j6]Jie Zhang, Dafang Zhang, Kun Huang, Zheng Qin:
Minimizing datacenter flow completion times with server-based flow scheduling. Comput. Networks 94: 360-374 (2016) - [c15]Yupeng Hu, Yonghe Liu, Wenjia Li
, Nong Xiao, Zheng Qin, Shu Yin:
Unequal Failure Protection Coding Technology for Cloud Storage Systems. CLUSTER 2016: 231-240 - [c14]Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Sheng Xiao, Yupeng Hu:
Malware Variant Detection Using Opcode Image Recognition with Small Training Sets. ICCCN 2016: 1-9 - [c13]Cheng Wang, Zheng Qin, Jixin Zhang, Hui Yin:
A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm. ICNC-FSKD 2016: 481-487 - [c12]Rui Li, Wenjie Li, Bruhadeshwar Bezawada
, Zheng Qin:
Topological ordering based iterative TCAM rule compression using bi-partite graphs. ICNP 2016: 1-2 - [c11]Lu Ou, Zheng Qin, Yonghe Liu, Hui Yin, Yupeng Hu, Hao Chen:
Multi-User Location Correlation Protection with Differential Privacy. ICPADS 2016: 422-429 - [c10]Hui Yin, Zheng Qin, Jixin Zhang, Wenjie Li, Lu Ou, Yupeng Hu, Keqin Li:
Secure Conjunctive Multi-Keyword Search for Multiple Data Owners in Cloud Computing. ICPADS 2016: 761-768 - [c9]Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Yupeng Hu:
IRMD: Malware Variant Detection Using Opcode Image Recognition. ICPADS 2016: 1175-1180 - [c8]Wenjie Li, Zheng Qin, Hui Yin, Rui Li, Lu Ou, Heng Li:
An Approach to Rule Placement in Software-Defined Networks. MSWiM 2016: 115-118 - [c7]You Liao, Yupeng Hu, Linjun Wu, Zheng Qin:
A Weighted Frequency Based Cache Memory Replacement Policy for Named Data Networking. SpaCCS Workshops 2016: 361-370 - 2015
- [j5]Yupeng Hu, Shun Song, Sheng Xiao, Quan Xu, Nong Xiao, Zheng Qin:
A Dominating Error Region Strategy for Improving the Bit-Flipping LDPC Decoder of SSDs. IEEE Trans. Circuits Syst. II Express Briefs 62-II(6): 578-582 (2015) - [c6]Huigui Rong, Liang Gong, Zheng Qin, Yupeng Hu, Chunhua Hu:
A Personalized Recommendation Approach Based on Content Similarity Calculation in Large-Scale Data. ICA3PP (1) 2015: 460-477 - [c5]Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Qin Liu, Yupeng Hu, Huigui Rong:
A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data. ICA3PP (3) 2015: 667-681 - 2013
- [j4]Muhammad Zubair Shafiq, Chad R. Meiners, Zheng Qin, Ke Shen, Alex X. Liu:
TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems. J. Netw. Syst. Manag. 21(3): 335-352 (2013) - [j3]Dajiang Chen, Zheng Qin, XuFei Mao, Panlong Yang, Zhiguang Qin, Ruijin Wang:
SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference. IEEE Trans. Inf. Forensics Secur. 8(11): 1731-1745 (2013) - [c4]Dajiang Chen, XuFei Mao, Zheng Qin, Zhiguang Qin, Panlong Yang, Yunhao Liu:
SmokeGrenade: A Key Generation Protocol with Artificial Interference in Wireless Networks. MASS 2013: 200-208 - 2012
- [j2]Zheng Qin, Fei Chen, Qiang Wang, Alex X. Liu, Zhiguang Qin:
Towards high performance security policy evaluation. J. Supercomput. 59(3): 1577-1595 (2012) - 2010
- [j1]Kun Huang, Dafang Zhang, Zheng Qin:
Accelerating the bit-split string matching algorithm using Bloom filters. Comput. Commun. 33(15): 1785-1794 (2010)
2000 – 2009
- 2007
- [c3]Hengfu Yang, Xingming Sun, Bin Wang, Zheng Qin:
An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection. ICCSA (3) 2007: 1066-1075 - 2005
- [c2]Zheng Qin, Na Li, Dafang Zhang, Nai-Zheng Bian:
Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. ISPA Workshops 2005: 387-396 - 2004
- [c1]Jinmin Yang, Dafang Zhang, Zheng Qin, Xue Dong Yang:
WINDAR: A Multithreaded Rollback-Recovery Toolkit on Windows. PRDC 2004: 395-400
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-20 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint