What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tianqing Zhu
Google Scholar
ORCID:
0000-0003-0702-7102
30
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/istr
A survey on machine unlearning: Techniques and new emerged privacy risks.
Hengzhu Liu
Ping Xiong
Tianqing Zhu
Philip S. Yu
2025
journals/istr
Federated Unlearning With Reinforcement Learning: Adaptive Privacy Preservation for Clients.
Kun Gao
Tianqing Zhu
Dayong Ye
Longxiang Gao
Wanlei Zhou
2025
journals/tifs
QUEEN: Query Unlearning Against Model Extraction.
Huajie Chen
Tianqing Zhu
Lefeng Zhang
Bo Liu
Derui Wang
Wanlei Zhou
Minhui Xue
2025
conf/acisp
Robust and Privacy-Preserving Dynamic Average Consensus with Individual Weight.
Yuanyuan Zhang
Yu Liu
Yahui Wang
Tianqing Zhu
Mingwu Zhang
2025
conf/acisp
RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models.
Kaiyue Feng
Guangsheng Zhang
Huan Tian
Heng Xu
Yanjun Zhang
Tianqing Zhu
Ming Ding
Bo Liu
2025
conf/sp
Codebreaker: Dynamic Extraction Attacks on Code Language Models.
Changzhou Han
Zehang Deng
Wanlun Ma
Xiaogang Zhu
Minhui Xue
Tianqing Zhu
Sheng Wen
Yang Xiang
2025
conf/ndss
Reinforcement Unlearning.
Dayong Ye
Tianqing Zhu
Congcong Zhu
Derui Wang
Kun Gao
Zewei Shi
Sheng Shen
Wanlei Zhou
Minhui Xue
2025
conf/asiaccs
BRC20 Snipping Attack.
Minfeng Qi
Qin Wang
Ningran Li
Shiping Chen
Tianqing Zhu
2025
conf/uss
Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI.
Dayong Ye
Tianqing Zhu
Shang Wang
Bo Liu
Leo Yu Zhang
Wanlei Zhou
Yang Zhang
2025
conf/uss
Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models.
Dayong Ye
Tianqing Zhu
Feng He
Bo Liu
Minhui Xue
Wanlei Zhou
2025
conf/uss
Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning.
Dayong Ye
Tianqing Zhu
Jiayang Li
Kun Gao
Bo Liu
Leo Yu Zhang
Wanlei Zhou
Yang Zhang
2024
journals/compsec
A two-stage model extraction attack on GANs with a small collected dataset.
Hui Sun
Tianqing Zhu
Wenhan Chang
Wanlei Zhou
2024
journals/compsec
Gradient-based defense methods for data leakage in vertical federated learning.
Wenhan Chang
Tianqing Zhu
2024
journals/istr
AdvEWM: Generating image adversarial examples by embedding digital watermarks.
Yuexin Xiang
Tiantian Li
Wei Ren
Jie He
Tianqing Zhu
Kim-Kwang Raymond Choo
2024
journals/tifs
Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting.
Shuai Zhou
Tianqing Zhu
Dayong Ye
Wanlei Zhou
Wei Zhao
2024
journals/tifs
Defending Against Label-Only Attacks via Meta-Reinforcement Learning.
Dayong Ye
Tianqing Zhu
Kun Gao
Wanlei Zhou
2024
conf/uss
How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers.
Guangsheng Zhang
Bo Liu
Huan Tian
Tianqing Zhu
Ming Ding
Wanlei Zhou
2023
journals/compsec
Preserving data privacy in federated learning through large gradient pruning.
Zhiqiu Zhang
Tianqing Zhu
Wei Ren
Ping Xiong
Kim-Kwang Raymond Choo
2023
journals/compsec
Improve individual fairness in federated learning via adversarial training.
Jie Li
Tianqing Zhu
Wei Ren
Kim-Kwang Raymond Choo
2023
journals/tifs
Label-Only Model Inversion Attacks: Attack With the Least Information.
Tianqing Zhu
Dayong Ye
Shuai Zhou
Bo Liu
Wanlei Zhou
2023
journals/tifs
A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems.
Lefeng Zhang
Tianqing Zhu
Farookh Khadeer Hussain
Dayong Ye
Wanlei Zhou
2023
journals/tifs
FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks.
Lefeng Zhang
Tianqing Zhu
Haibin Zhang
Ping Xiong
Wanlei Zhou
2022
journals/compsec
Fairness and privacy preservation for facial images: GAN-based methods.
Huan Tian
Tianqing Zhu
Wanlei Zhou
2022
journals/compsec
A privacy preservation method for multiple-source unstructured data in online social networks.
Chenguang Wang
Tianqing Zhu
Ping Xiong
Wei Ren
Kim-Kwang Raymond Choo
2022
journals/compsec
Privacy, accuracy, and model fairness trade-offs in federated learning.
Xiuting Gu
Tianqing Zhu
Jie Li
Tao Zhang
Wei Ren
Kim-Kwang Raymond Choo
2022
journals/tifs
One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy.
Dayong Ye
Sheng Shen
Tianqing Zhu
Bo Liu
Wanlei Zhou
2021
journals/compsec
An optimized differential privacy scheme with reinforcement learning in VANET.
Xin Chen
Tao Zhang
Sheng Shen
Tianqing Zhu
Ping Xiong
2021
journals/tifs
A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries.
Dayong Ye
Tianqing Zhu
Sheng Shen
Wanlei Zhou
2020
journals/compsec
Secure and efficient sharing of authenticated energy usage data with privacy preservation.
Jianghua Liu
Jingyu Hou
Xinyi Huang
Yang Xiang
Tianqing Zhu
2015
journals/tifs
Correlated Differential Privacy: Hiding Information in Non-IID Data Set.
Tianqing Zhu
Ping Xiong
Gang Li
Wanlei Zhou
Coauthors
Bo Liu
(8)
Changzhou Han
(1)
Chenguang Wang
(1)
Congcong Zhu
(1)
Dayong Ye
(11)
Derui Wang
(2)
Farookh Khadeer Hussain
(1)
Feng He
(1)
Gang Li
(1)
Guangsheng Zhang
(2)
Haibin Zhang
(1)
Heng Xu
(1)
Hengzhu Liu
(1)
Huajie Chen
(1)
Huan Tian
(3)
Hui Sun
(1)
Jianghua Liu
(1)
Jiayang Li
(1)
Jie He
(1)
Jie Li
(2)
Jingyu Hou
(1)
Kaiyue Feng
(1)
Kim-Kwang Raymond Choo
(5)
Kun Gao
(4)
Lefeng Zhang
(3)
Leo Yu Zhang
(2)
Longxiang Gao
(1)
Minfeng Qi
(1)
Ming Ding
(2)
Mingwu Zhang
(1)
Minhui Xue
(4)
Ningran Li
(1)
Philip S. Yu
(1)
Ping Xiong
(6)
Qin Wang
(1)
Shang Wang
(1)
Sheng Shen
(4)
Sheng Wen
(1)
Shiping Chen
(1)
Shuai Zhou
(2)
Tao Zhang
(2)
Tianqing Zhu
(30)
Tiantian Li
(1)
Wanlei Zhou
(17)
Wanlun Ma
(1)
Wei Ren
(5)
Wei Zhao
(1)
Wenhan Chang
(2)
Xiaogang Zhu
(1)
Xin Chen
(1)
Xinyi Huang
(1)
Xiuting Gu
(1)
Yahui Wang
(1)
Yang Xiang
(2)
Yang Zhang
(2)
Yanjun Zhang
(1)
Yu Liu
(1)
Yuanyuan Zhang
(1)
Yuexin Xiang
(1)
Zehang Deng
(1)
Zewei Shi
(1)
Zhiqiu Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to