What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhihong Tian
Google Scholar
ORCID:
0000-0002-9409-5359
16
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Differential-Trust-Mechanism-Based Trade-Off Method Between Privacy and Accuracy in Recommender Systems.
Guangquan Xu
Shicheng Feng
Hao Xi
Qingyang Yan
Wenshan Li
Cong Wang
Wei Wang
Shaoying Liu
Zhihong Tian
James Xi Zheng
2025
journals/tifs
Query-Efficient Model Inversion Attacks: An Information Flow View.
Yixiao Xu
Binxing Fang
Mohan Li
Xiaolei Liu
Zhihong Tian
2025
journals/tifs
Enhancing Networked Control Systems Resilience Against DoS Attacks: A Data-Driven Approach With Adaptive Sampled-Data and Compression.
Xiao Cai
Yanbin Sun
Xiangpeng Xie
Nan Wei
Kaibo Shi
Huaicheng Yan
Zhihong Tian
2025
journals/tifs
MalFSCIL: A Few-Shot Class-Incremental Learning Approach for Malware Detection.
Yuhan Chai
Ximing Chen
Jing Qiu
Lei Du
Yanjun Xiao
Qiying Feng
Shouling Ji
Zhihong Tian
2025
conf/dsn
Semantically Improved Adversarial Attack Based on Masked Language Model via Context Preservation.
Hao Tian
Hao-Tian Wu
Yiu-Ming Cheung
Junhui He
Zhihong Tian
2025
journals/tifs
Robust and Unstigmatized Imperceptible Perturbations for Rendering Face Manipulation Ineffective.
Yibo Zhang
Weiguo Lin
Zhihong Tian
Geyong Min
Junfeng Xu
Yikun Xu
2025
conf/uss
Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers.
Zhaofeng Yu
Dongyang Zhan
Lin Ye
Haining Yu
Hongli Zhang
Zhihong Tian
2024
journals/tifs
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision.
Xiao Cai
Kaibo Shi
Yanbin Sun
Jinde Cao
Shiping Wen
Cheng Qiao
Zhihong Tian
2024
journals/tifs
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation.
Hao-Tian Wu
Yiu-Ming Cheung
Zhihong Tian
Dingcai Liu
Xiangyang Luo
Jiankun Hu
2022
conf/uss
StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing.
Bodong Zhao
Zheming Li
Shisong Qin
Zheyu Ma
Ming Yuan
Wenyu Zhu
Zhihong Tian
Chao Zhang
2021
journals/istr
Multi-party transaction framework for drone services based on alliance blockchain in smart cities.
Lingling Lv
Zhipeng Yang
Lei Zhang
Quanzhen Huang
Zhihong Tian
2020
journals/compsec
IoT malicious traffic identification using wrapper-based feature selection mechanisms.
Muhammad Shafiq
Zhihong Tian
Ali Kashif Bashir
Xiaojiang Du
Mohsen Guizani
2020
journals/compsec
The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach.
Zhe Sun
Lihua Yin
Chao Li
Weizhe Zhang
Ang Li
Zhihong Tian
2020
journals/istr
AFLPro: Direction sensitive fuzzing.
Tiantian Ji
Zhongru Wang
Zhihong Tian
Binxing Fang
Qiang Ruan
Haichen Wang
Wei Shi
2018
conf/icics
Study on Advanced Botnet Based on Publicly Available Resources.
Jie Yin
Heyang Lv
Fangjiao Zhang
Zhihong Tian
Xiang Cui
2009
journals/compsec
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms.
Yang Li
Jun-Li Wang
Zhihong Tian
Tianbo Lu
Chen Young
Coauthors
Ali Kashif Bashir
(1)
Ang Li
(1)
Binxing Fang
(2)
Bodong Zhao
(1)
Chao Li
(1)
Chao Zhang
(1)
Chen Young
(1)
Cheng Qiao
(1)
Cong Wang
(1)
Dingcai Liu
(1)
Dongyang Zhan
(1)
Fangjiao Zhang
(1)
Geyong Min
(1)
Guangquan Xu
(1)
Haichen Wang
(1)
Haining Yu
(1)
Hao Tian
(1)
Hao Xi
(1)
Hao-Tian Wu
(2)
Heyang Lv
(1)
Hongli Zhang
(1)
Huaicheng Yan
(1)
James Xi Zheng
(1)
Jiankun Hu
(1)
Jie Yin
(1)
Jinde Cao
(1)
Jing Qiu
(1)
Jun-Li Wang
(1)
Junfeng Xu
(1)
Junhui He
(1)
Kaibo Shi
(2)
Lei Du
(1)
Lei Zhang
(1)
Lihua Yin
(1)
Lin Ye
(1)
Lingling Lv
(1)
Ming Yuan
(1)
Mohan Li
(1)
Mohsen Guizani
(1)
Muhammad Shafiq
(1)
Nan Wei
(1)
Qiang Ruan
(1)
Qingyang Yan
(1)
Qiying Feng
(1)
Quanzhen Huang
(1)
Shaoying Liu
(1)
Shicheng Feng
(1)
Shiping Wen
(1)
Shisong Qin
(1)
Shouling Ji
(1)
Tianbo Lu
(1)
Tiantian Ji
(1)
Wei Shi
(1)
Wei Wang
(1)
Weiguo Lin
(1)
Weizhe Zhang
(1)
Wenshan Li
(1)
Wenyu Zhu
(1)
Xiang Cui
(1)
Xiangpeng Xie
(1)
Xiangyang Luo
(1)
Xiao Cai
(2)
Xiaojiang Du
(1)
Xiaolei Liu
(1)
Ximing Chen
(1)
Yanbin Sun
(2)
Yang Li
(1)
Yanjun Xiao
(1)
Yibo Zhang
(1)
Yikun Xu
(1)
Yiu-Ming Cheung
(2)
Yixiao Xu
(1)
Yuhan Chai
(1)
Zhaofeng Yu
(1)
Zhe Sun
(1)
Zheming Li
(1)
Zheyu Ma
(1)
Zhihong Tian
(16)
Zhipeng Yang
(1)
Zhongru Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to