What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Deqing Zou
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
MalPacDetector: An LLM-Based Malicious NPM Package Detector.
Jian Wang
Zhen Li
Jixiang Qu
Deqing Zou
Shouhuai Xu
Ziteng Xu
Zhenwei Wang
Hai Jin
2025
journals/tifs
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System.
Weiqi Dai
Yang Zhou
Xiaohai Dai
Kim-Kwang Raymond Choo
Xia Xie
Deqing Zou
Hai Jin
2025
conf/uss
SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments.
Yiwei Hu
Zhen Li
Kedie Shu
Shenghua Guan
Deqing Zou
Shouhuai Xu
Bin Yuan
Hai Jin
2024
journals/tifs
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor.
Weiqi Dai
Jinkai Liu
Yang Zhou
Kim-Kwang Raymond Choo
Xia Xie
Deqing Zou
Hai Jin
2024
conf/uss
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
Siyue Feng
Yueming Wu
Wenjie Xue
Sikui Pan
Deqing Zou
Yang Liu
Hai Jin
2024
conf/sp
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations.
Bin Yuan
Zhanxiang Song
Yan Jia
Zhenyu Lu
Deqing Zou
Hai Jin
Luyi Xing
2024
conf/esorics
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks.
Weijie Chen
Yu Zhao
Yinqian Zhang
Weizhong Qiang
Deqing Zou
Hai Jin
2024
conf/dsn
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications.
Yu Zhao
Wenjie Xue
Weijie Chen
Weizhong Qiang
Deqing Zou
Hai Jin
2023
journals/compsec
Network intrusion detection based on the temporal convolutional model.
Ivandro Ortet Lopes
Deqing Zou
Ihsan H. Abdulqadder
Saeed Akbar
Zhen Li
Francis A. Ruambo
Wagner Pereira
2023
conf/dsn
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation.
Kunlun Ren
Weizhong Qiang
Yueming Wu
Yi Zhou
Deqing Zou
Hai Jin
2022
conf/sp
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
Zhi Li
Weijie Liu
Hongbo Chen
XiaoFeng Wang
Xiaojing Liao
Luyi Xing
Mingming Zha
Hai Jin
Deqing Zou
2022
conf/acsac
StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance.
Zhechang Zhang
Bin Yuan
Kehan Yang
Deqing Zou
Hai Jin
2021
journals/tifs
CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships.
Weiqi Dai
Yan Lv
Kim-Kwang Raymond Choo
Zhongze Liu
Deqing Zou
Hai Jin
2021
conf/ccs
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
Yan Jia
Bin Yuan
Luyi Xing
Dongfang Zhao
Yifan Zhang
XiaoFeng Wang
Yijing Liu
Kaimin Zheng
Peyton Crnjak
Yuqing Zhang
Deqing Zou
Hai Jin
2020
journals/compsec
Static detection of real-world buffer overflow induced by loop.
Peng Luo
Deqing Zou
Yajuan Du
Hai Jin
Changming Liu
Jinan Shen
2020
journals/tifs
SDTE: A Secure Blockchain-Based Data Trading Ecosystem.
Weiqi Dai
Chunkai Dai
Kim-Kwang Raymond Choo
Changze Cui
Deqing Zou
Hai Jin
2020
conf/uss
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Bin Yuan
Yan Jia
Luyi Xing
Dongfang Zhao
XiaoFeng Wang
Deqing Zou
Hai Jin
Yuqing Zhang
2018
conf/acisp
Automatically Identifying Security Bug Reports via Multitype Features Analysis.
Deqing Zou
Zhijun Deng
Zhen Li
Hai Jin
2018
conf/ndss
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.
Zhen Li
Deqing Zou
Shouhuai Xu
Xinyu Ou
Hai Jin
Sujuan Wang
Zhijun Deng
Yuyi Zhong
2018
conf/acsac
A Heuristic Framework to Detect Concurrency Vulnerabilities.
Changming Liu
Deqing Zou
Peng Luo
Bin B. Zhu
Hai Jin
2017
conf/acisp
Fully Context-Sensitive CFI for COTS Binaries.
Weizhong Qiang
Yingda Huang
Deqing Zou
Hai Jin
Shizhen Wang
Guozhong Sun
2016
conf/ccs
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Peng Xu
Jun Xu
Wei Wang
Hai Jin
Willy Susilo
Deqing Zou
2016
conf/acsac
VulPecker: an automated vulnerability detection system based on code similarity analysis.
Zhen Li
Deqing Zou
Shouhuai Xu
Hai Jin
Hanchao Qi
Jie Hu
2015
conf/wisec
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Daibin Wang
Haixia Yao
Yingjiu Li
Hai Jin
Deqing Zou
Robert H. Deng
2010
conf/ccs
TEE: a virtual DRTM based execution environment for secure cloud-end computing.
Weiqi Dai
Hai Jin
Deqing Zou
Shouhuai Xu
Weide Zheng
Lei Shi
2006
conf/iwsec
A New Approach to Hide Policy for Automated Trust Negotiation.
Hai Jin
Zhensong Liao
Deqing Zou
Weizhong Qiang
2005
conf/acisp
VO-Sec: An Access Control Framework for Dynamic Virtual Organization.
Hai Jin
Weizhong Qiang
Xuanhua Shi
Deqing Zou
Coauthors
Bin B. Zhu
(1)
Bin Yuan
(5)
Changming Liu
(2)
Changze Cui
(1)
Chunkai Dai
(1)
Daibin Wang
(1)
Deqing Zou
(27)
Dongfang Zhao
(2)
Francis A. Ruambo
(1)
Guozhong Sun
(1)
Hai Jin
(26)
Haixia Yao
(1)
Hanchao Qi
(1)
Hongbo Chen
(1)
Ihsan H. Abdulqadder
(1)
Ivandro Ortet Lopes
(1)
Jian Wang
(1)
Jie Hu
(1)
Jinan Shen
(1)
Jinkai Liu
(1)
Jixiang Qu
(1)
Jun Xu
(1)
Kaimin Zheng
(1)
Kedie Shu
(1)
Kehan Yang
(1)
Kim-Kwang Raymond Choo
(4)
Kunlun Ren
(1)
Lei Shi
(1)
Luyi Xing
(4)
Mingming Zha
(1)
Peng Luo
(2)
Peng Xu
(1)
Peyton Crnjak
(1)
Robert H. Deng
(1)
Saeed Akbar
(1)
Shenghua Guan
(1)
Shizhen Wang
(1)
Shouhuai Xu
(5)
Sikui Pan
(1)
Siyue Feng
(1)
Sujuan Wang
(1)
Wagner Pereira
(1)
Wei Wang
(1)
Weide Zheng
(1)
Weijie Chen
(2)
Weijie Liu
(1)
Weiqi Dai
(5)
Weizhong Qiang
(6)
Wenjie Xue
(2)
Willy Susilo
(1)
Xia Xie
(2)
XiaoFeng Wang
(3)
Xiaohai Dai
(1)
Xiaojing Liao
(1)
Xinyu Ou
(1)
Xuanhua Shi
(1)
Yajuan Du
(1)
Yan Jia
(3)
Yan Lv
(1)
Yang Liu
(1)
Yang Zhou
(2)
Yi Zhou
(1)
Yifan Zhang
(1)
Yijing Liu
(1)
Yingda Huang
(1)
Yingjiu Li
(1)
Yinqian Zhang
(1)
Yiwei Hu
(1)
Yu Zhao
(2)
Yueming Wu
(2)
Yuqing Zhang
(2)
Yuyi Zhong
(1)
Zhanxiang Song
(1)
Zhechang Zhang
(1)
Zhen Li
(6)
Zhensong Liao
(1)
Zhenwei Wang
(1)
Zhenyu Lu
(1)
Zhi Li
(1)
Zhijun Deng
(2)
Zhongze Liu
(1)
Ziteng Xu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to