What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Qian Wang
Google Scholar
ORCID:
0000-0002-8967-8525
53
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Augmenting Model Extraction Attacks Against Disruption-Based Defenses.
Xueluan Gong
Shuaike Li
Yanjiao Chen
Mingzhe Li
Rubin Wei
Qian Wang
Kwok-Yan Lam
2025
journals/tifs
Do Not Skip Over the Offline: Verifiable Silent Preprocessing From Small Security Hardware.
Wentao Dong
Lei Xu
Leqian Zheng
Huayi Duan
Cong Wang
Qian Wang
2025
conf/ndss
Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared Shuffle.
Wentao Dong
Peipei Jiang
Huayi Duan
Cong Wang
Lingchen Zhao
Qian Wang
2024
journals/tifs
Backdoor Attack With Sparse and Invisible Trigger.
Yinghua Gao
Yiming Li
Xueluan Gong
Zhifeng Li
Shu-Tao Xia
Qian Wang
2024
journals/tifs
No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures.
Ningping Mou
Binqing Guo
Lingchen Zhao
Cong Wang
Yue Zhao
Qian Wang
2024
journals/tifs
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models.
Shenyi Zhang
Baolin Zheng
Peipei Jiang
Lingchen Zhao
Chao Shen
Qian Wang
2024
journals/tifs
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios.
Zuomin Qu
Zuping Xi
Wei Lu
Xiangyang Luo
Qian Wang
Bin Li
2024
journals/tifs
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency.
Xiaoxue Hu
Geling Liu
Baolin Zheng
Lingchen Zhao
Qian Wang
Yufei Zhang
Minxin Du
2024
conf/ccs
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
Zheng Fang
Tao Wang
Lingchen Zhao
Shenyi Zhang
Bowen Li
Yunjie Ge
Qi Li
Chao Shen
Qian Wang
2024
conf/ccs
Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions.
Xueluan Gong
Rubin Wei
Ziyao Wang
Yuchen Sun
Jiawen Peng
Yanjiao Chen
Qian Wang
2024
conf/uss
Hijacking Attacks against Neural Network by Analyzing Training Data.
Yunjie Ge
Qian Wang
Huayang Huang
Qi Li
Cong Wang
Chao Shen
Lingchen Zhao
Peipei Jiang
Zheng Fang
Shenyi Zhang
2024
conf/uss
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
Yunjie Ge
Pinji Chen
Qian Wang
Lingchen Zhao
Ningping Mou
Peipei Jiang
Cong Wang
Qi Li
Chao Shen
2024
conf/ndss
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound.
Man Zhou
Shuao Su
Qian Wang
Qi Li
Yuting Zhou
Xiaojing Ma
Zhengxiong Li
2024
conf/ndss
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
Yue Xiao
Yi He
Xiaoli Zhang
Qian Wang
Renjie Xie
Kun Sun
Ke Xu
Qi Li
2023
journals/tifs
MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs.
Songlei Wang
Yifeng Zheng
Xiaohua Jia
Qian Wang
Cong Wang
2023
journals/tifs
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing.
Zhuangzhuang Zhang
Libing Wu
Chuanguo Ma
Jianxin Li
Jing Wang
Qian Wang
Shui Yu
2023
journals/tifs
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
Zheng Zheng
Qian Wang
Cong Wang
Man Zhou
Yi Zhao
Qi Li
Chao Shen
2023
journals/tifs
AdvDDoS: Zero-Query Adversarial Attacks Against Commercial Speech Recognition Systems.
Yunjie Ge
Lingchen Zhao
Qian Wang
Yiheng Duan
Minxin Du
2023
journals/tifs
A GAN-Based Defense Framework Against Model Inversion Attacks.
Xueluan Gong
Ziyao Wang
Shuaike Li
Yanjiao Chen
Qian Wang
2023
conf/ccs
Poster: Metadata-private Messaging without Coordination.
Peipei Jiang
Qian Wang
Yihao Wu
Cong Wang
2023
conf/uss
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
Xinghui Wu
Shiqing Ma
Chao Shen
Chenhao Lin
Qian Wang
Qi Li
Yuan Rao
2023
conf/sp
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation.
Xueluan Gong
Yanjiao Chen
Wang Yang
Qian Wang
Yuzhe Gu
Huayang Huang
Chao Shen
2022
journals/compsec
Practical differentially private online advertising.
Jie Sun
Lingchen Zhao
Zhuotao Liu
Qi Li
Xinhao Deng
Qian Wang
Yong Jiang
2022
journals/tifs
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
Qi Li
Xinhao Deng
Zhuotao Liu
Yuan Yang
Xiaoyue Zou
Qian Wang
Mingwei Xu
Jianping Wu
2022
journals/tifs
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure.
Xiaozhen Lu
Liang Xiao
Guohang Niu
Xiangyang Ji
Qian Wang
2022
conf/ccs
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls.
Chengjun Cai
Yichen Zang
Cong Wang
Xiaohua Jia
Qian Wang
2022
conf/uss
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Yi He
Zhenhua Zou
Kun Sun
Zhuotao Liu
Ke Xu
Qian Wang
Chao Shen
Zhi Wang
Qi Li
2022
conf/esorics
Verifying the Quality of Outsourced Training on Clouds.
Peiyang Li
Ye Wang
Zhuotao Liu
Ke Xu
Qian Wang
Chao Shen
Qi Li
2022
conf/ndss
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks.
Xueluan Gong
Yanjiao Chen
Jianshuo Dong
Qian Wang
2021
journals/tifs
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
Qian Wang
Baolin Zheng
Qi Li
Chao Shen
Zhongjie Ba
2021
conf/ccs
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Baolin Zheng
Peipei Jiang
Qian Wang
Qi Li
Chao Shen
Cong Wang
Yunjie Ge
Qingyang Teng
Shenyi Zhang
2021
conf/icics
Rethinking Adversarial Examples Exploiting Frequency-Based Analysis.
Sicong Han
Chenhao Lin
Chao Shen
Qian Wang
2020
journals/tifs
Deep Learning-Based Gait Recognition Using Smartphones in the Wild.
Qin Zou
Yanling Wang
Qian Wang
Yi Zhao
Qingquan Li
2020
journals/tifs
LVID: A Multimodal Biometrics Authentication System on Smartphones.
Libing Wu
Jingxiao Yang
Man Zhou
Yanjiao Chen
Qian Wang
2020
journals/tifs
Privacy-Preserving Collaborative Deep Learning With Unreliable Participants.
Lingchen Zhao
Qian Wang
Qin Zou
Yan Zhang
Yanjiao Chen
2020
journals/tifs
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing.
Dong Yuan
Qi Li
Guoliang Li
Qian Wang
Kui Ren
2020
journals/tifs
Deep Domain Adaptation With Differential Privacy.
Qian Wang
Zixi Li
Qin Zou
Lingchen Zhao
Song Wang
2019
journals/tifs
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction.
Shuangke Wu
Yanjiao Chen
Qian Wang
Minghui Li
Cong Wang
Xiangyang Luo
2019
journals/tifs
: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
Qian Wang
Jing Huang
Yanjiao Chen
Cong Wang
Fu Xiao
Xiangyang Luo
2019
conf/ccs
Detecting Fake Accounts in Online Social Networks at the Time of Registrations.
Dong Yuan
Yuanli Miao
Neil Zhenqiang Gong
Zheng Yang
Qi Li
Dawn Song
Qian Wang
Xiao Liang
2019
conf/ccs
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.
Huayi Duan
Cong Wang
Xingliang Yuan
Yajin Zhou
Qian Wang
Kui Ren
2018
journals/tifs
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
Meixia Miao
Jianfeng Ma
Xinyi Huang
Qian Wang
2018
journals/tifs
Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage.
Minxin Du
Qian Wang
Meiqi He
Jian Weng
2018
journals/tifs
Outsourced Biometric Identification With Privacy.
Shengshan Hu
Minghui Li
Qian Wang
Sherman S. M. Chow
Minxin Du
2018
conf/ccs
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Man Zhou
Qian Wang
Jingxiao Yang
Qi Li
Feng Xiao
Zhibo Wang
Xiaofeng Chen
2017
journals/tifs
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources.
Wei Song
Bing Wang
Qian Wang
Chengliang Shi
Wenjing Lou
Zhiyong Peng
2017
journals/tifs
Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications.
Pan Zhou
Qian Wang
Wei Wang
Yuchong Hu
Dapeng Wu
2017
journals/tifs
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data.
Zhangjie Fu
Xinle Wu
Qian Wang
Kui Ren
2017
conf/fc
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Qian Wang
Kui Ren
Minxin Du
Qi Li
Aziz Mohaisen
2016
conf/ccs
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud.
Qian Wang
Jingjun Wang
Shengshan Hu
Qin Zou
Kui Ren
2015
conf/ccs
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Qian Wang
Kui Ren
Guancheng Li
Chenbo Xia
Xiaobing Chen
Zhibo Wang
Qin Zou
2015
conf/esorics
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Qian Wang
Shengshan Hu
Kui Ren
Meiqi He
Minxin Du
Zhibo Wang
2009
conf/esorics
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Qian Wang
Cong Wang
Jin Li
Kui Ren
Wenjing Lou
Coauthors
Aziz Mohaisen
(1)
Baolin Zheng
(4)
Bin Li
(1)
Bing Wang
(1)
Binqing Guo
(1)
Bowen Li
(1)
Chao Shen
(12)
Chenbo Xia
(1)
Chengjun Cai
(1)
Chengliang Shi
(1)
Chenhao Lin
(2)
Chuanguo Ma
(1)
Cong Wang
(14)
Dapeng Wu
(1)
Dawn Song
(1)
Dong Yuan
(2)
Feng Xiao
(1)
Fu Xiao
(1)
Geling Liu
(1)
Guancheng Li
(1)
Guohang Niu
(1)
Guoliang Li
(1)
Huayang Huang
(2)
Huayi Duan
(3)
Jian Weng
(1)
Jianfeng Ma
(1)
Jianping Wu
(1)
Jianshuo Dong
(1)
Jianxin Li
(1)
Jiawen Peng
(1)
Jie Sun
(1)
Jin Li
(1)
Jing Huang
(1)
Jing Wang
(1)
Jingjun Wang
(1)
Jingxiao Yang
(2)
Ke Xu
(3)
Kui Ren
(8)
Kun Sun
(2)
Kwok-Yan Lam
(1)
Lei Xu
(1)
Leqian Zheng
(1)
Liang Xiao
(1)
Libing Wu
(2)
Lingchen Zhao
(11)
Man Zhou
(4)
Meiqi He
(2)
Meixia Miao
(1)
Minghui Li
(2)
Mingwei Xu
(1)
Mingzhe Li
(1)
Minxin Du
(6)
Neil Zhenqiang Gong
(1)
Ningping Mou
(2)
Pan Zhou
(1)
Peipei Jiang
(6)
Peiyang Li
(1)
Pinji Chen
(1)
Qi Li
(17)
Qian Wang
(53)
Qin Zou
(5)
Qingquan Li
(1)
Qingyang Teng
(1)
Renjie Xie
(1)
Rubin Wei
(2)
Shengshan Hu
(3)
Shenyi Zhang
(4)
Sherman S. M. Chow
(1)
Shiqing Ma
(1)
Shu-Tao Xia
(1)
Shuaike Li
(2)
Shuangke Wu
(1)
Shuao Su
(1)
Shui Yu
(1)
Sicong Han
(1)
Song Wang
(1)
Songlei Wang
(1)
Tao Wang
(1)
Wang Yang
(1)
Wei Lu
(1)
Wei Song
(1)
Wei Wang
(1)
Wenjing Lou
(2)
Wentao Dong
(2)
Xiangyang Ji
(1)
Xiangyang Luo
(3)
Xiao Liang
(1)
Xiaobing Chen
(1)
Xiaofeng Chen
(1)
Xiaohua Jia
(2)
Xiaojing Ma
(1)
Xiaoli Zhang
(1)
Xiaoxue Hu
(1)
Xiaoyue Zou
(1)
Xiaozhen Lu
(1)
Xinghui Wu
(1)
Xingliang Yuan
(1)
Xinhao Deng
(2)
Xinle Wu
(1)
Xinyi Huang
(1)
Xueluan Gong
(6)
Yajin Zhou
(1)
Yan Zhang
(1)
Yanjiao Chen
(9)
Yanling Wang
(1)
Ye Wang
(1)
Yi He
(2)
Yi Zhao
(2)
Yichen Zang
(1)
Yifeng Zheng
(1)
Yihao Wu
(1)
Yiheng Duan
(1)
Yiming Li
(1)
Yinghua Gao
(1)
Yong Jiang
(1)
Yuan Rao
(1)
Yuan Yang
(1)
Yuanli Miao
(1)
Yuchen Sun
(1)
Yuchong Hu
(1)
Yue Xiao
(1)
Yue Zhao
(1)
Yufei Zhang
(1)
Yunjie Ge
(5)
Yuting Zhou
(1)
Yuzhe Gu
(1)
Zhangjie Fu
(1)
Zheng Fang
(2)
Zheng Yang
(1)
Zheng Zheng
(1)
Zhengxiong Li
(1)
Zhenhua Zou
(1)
Zhi Wang
(1)
Zhibo Wang
(3)
Zhifeng Li
(1)
Zhiyong Peng
(1)
Zhongjie Ba
(1)
Zhuangzhuang Zhang
(1)
Zhuotao Liu
(4)
Zixi Li
(1)
Ziyao Wang
(2)
Zuomin Qu
(1)
Zuping Xi
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to