What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Haojin Zhu
Google Scholar
ORCID:
0000-0001-5079-4556
41
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services.
Haoyang Wang
Kai Fan
Chong Yu
Kuan Zhang
Fenghua Li
Haojin Zhu
2025
journals/tifs
Silent Penetrator: Breaching Cross-Domain Federated Fine-Tuning via Feature Shift-Induced Backdoor.
Wenkai Huang
Gaolei Li
Mingzhe Chen
Jianhua Li
Haojin Zhu
2025
journals/tifs
Hide Yourself: Multi-Dimensional Range Queries for Responses-Hiding Over Outsourced Data.
Haoyang Wang
Kai Fan
Chong Yu
Kuan Zhang
Fenghua Li
Haojin Zhu
2025
conf/ndss
A Formal Approach to Multi-Layered Privileges for Enclaves.
Ganxiang Yang
Chenyang Liu
Zhen Huang
Guoxing Chen
Hongfei Fu
Yuanyuan Zhang
Haojin Zhu
2025
conf/ndss
The Philosopher's Stone: Trojaning Plugins of Large Language Models.
Tian Dong
Minhui Xue
Guoxing Chen
Rayne Holland
Yan Meng
Shaofeng Li
Zhen Liu
Haojin Zhu
2025
journals/tifs
Synergistic Multi-Modal Keystroke Eavesdropping in Virtual Reality With Vision and Wi-Fi.
Jiachun Li
Yan Meng
Fazhong Liu
Tian Dong
Suguo Du
Guoxing Chen
Yuling Chen
Haojin Zhu
2025
conf/eurosp
Latte: Layered Attestation for Portable Enclaved Applications.
Haoxuan Xu
Jia Xiang
Zhen Huang
Guoxing Chen
Yan Meng
Haojin Zhu
2025
conf/uss
Depth Gives a False Sense of Privacy: LLM Internal States Inversion.
Tian Dong
Yan Meng
Shaofeng Li
Guoxing Chen
Zhen Liu
Haojin Zhu
2024
journals/tifs
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables.
Jiachun Li
Yan Meng
Yuxia Zhan
Le Zhang
Haojin Zhu
2024
conf/ccs
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications.
Tong Zhu
Chaofan Shou
Zhen Huang
Guoxing Chen
Xiaokuan Zhang
Yan Meng
Shuang Hao
Haojin Zhu
2024
conf/ccs
VPVet: Vetting Privacy Policies of Virtual Reality Apps.
Yuxia Zhan
Yan Meng
Lu Zhou
Yichang Xiong
Xiaokuan Zhang
Lichuan Ma
Guoxing Chen
Qingqi Pei
Haojin Zhu
2024
conf/uss
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection.
Shaofeng Li
Xinyu Wang
Minhui Xue
Haojin Zhu
Zhi Zhang
Yansong Gao
Wen Wu
Xuemin (Sherman) Shen
2024
conf/ndss
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services.
Hongsheng Hu
Shuo Wang
Jiamin Chang
Haonan Zhong
Ruoxi Sun
Shuang Hao
Haojin Zhu
Minhui Xue
2023
conf/uss
POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices.
Lu Zhou
Chengyongxiao Wei
Tong Zhu
Guoxing Chen
Xiaokuan Zhang
Suguo Du
Hui Cao
Haojin Zhu
2023
conf/ndss
RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
Tian Dong
Shaofeng Li
Guoxing Chen
Minhui Xue
Haojin Zhu
Zhen Liu
2022
journals/istr
WiCapose: Multi-modal fusion based transparent authentication in mobile environments.
Zhuo Chang
Yan Meng
Wenyuan Liu
Haojin Zhu
Lin Wang
2022
conf/uss
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Yan Meng
Jiachun Li
Matthew Pillari
Arjun Deopujari
Liam Brennan
Hafsah Shamsie
Haojin Zhu
Yuan Tian
2022
conf/esorics
Secure Hierarchical Deterministic Wallet Supporting Stealth Address.
Xin Yin
Zhen Liu
Guomin Yang
Guoxing Chen
Haojin Zhu
2021
conf/ccs
Dissecting Click Fraud Autonomy in the Wild.
Tong Zhu
Yan Meng
Haotian Hu
Xiaokuan Zhang
Minhui Xue
Haojin Zhu
2021
conf/ccs
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic.
Suibin Sun
Le Yu
Xiaokuan Zhang
Minhui Xue
Ren Zhou
Haojin Zhu
Shuang Hao
Xiaodong Lin
2021
conf/ccs
Hidden Backdoors in Human-Centric Language Models.
Shaofeng Li
Hui Liu
Tian Dong
Benjamin Zi Hao Zhao
Minhui Xue
Haojin Zhu
Jialiang Lu
2021
conf/ccs
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures.
Brandon Falk
Yan Meng
Yuxia Zhan
Haojin Zhu
2020
conf/uss
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Zhushou Tang
Ke Tang
Minhui Xue
Yuan Tian
Sen Chen
Muhammad Ikram
Tielei Wang
Haojin Zhu
2019
journals/compsec
Securing android applications via edge assistant third-party library detection.
Zhushou Tang
Minhui Xue
Guozhu Meng
Chengguo Ying
Yugeng Liu
Jianan He
Haojin Zhu
Yang Liu
2019
journals/tifs
Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures.
Lu Zhou
Suguo Du
Haojin Zhu
Cailian Chen
Kaoru Ota
Mianxiong Dong
2019
conf/sp
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.
Matthew Joslin
Neng Li
Shuang Hao
Minhui Xue
Haojin Zhu
2019
conf/cns
Dynamic Traffic Feature Camouflaging via Generative Adversarial Networks.
Jie Li
Lu Zhou
Huaxin Li
Lu Yan
Haojin Zhu
2018
journals/compsec
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Sen Chen
Minhui Xue
Lingling Fan
Shuang Hao
Lihua Xu
Haojin Zhu
Bo Li
2018
journals/tifs
Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices.
Zi Li
Qingqi Pei
Ian D. Markwood
Yao Liu
Haojin Zhu
2018
journals/tifs
Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817].
Zi Li
Qingqi Pei
Ian D. Markwood
Yao Liu
Haojin Zhu
2018
conf/ccs
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.
Song Fang
Ian D. Markwood
Yao Liu
Shangqing Zhao
Zhuo Lu
Haojin Zhu
2018
conf/ccs
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic.
Wei Zhang
Yan Meng
Yugeng Liu
Xiaokuan Zhang
Yinqian Zhang
Haojin Zhu
2018
conf/ndss
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Haizhong Zheng
Minhui Xue
Hao Lu
Shuang Hao
Haojin Zhu
Xiaohui Liang
Keith W. Ross
2017
conf/ccs
A Functional Co-Design towards Safe and Secure Vehicle Platooning.
Jiafa Liu
Di Ma
André Weimerskirch
Haojin Zhu
2016
conf/ccs
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware.
Sen Chen
Minhui Xue
Zhushou Tang
Lihua Xu
Haojin Zhu
2016
conf/ccs
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Mengyuan Li
Yan Meng
Junyi Liu
Haojin Zhu
Xiaohui Liang
Yao Liu
Na Ruan
2016
conf/ccs
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning.
Lingling Fan
Minhui Xue
Sen Chen
Lihua Xu
Haojin Zhu
2014
conf/ccs
POSTER: LocMask: A Location Privacy Protection Framework in Android System.
Qiuyu Xiao
Jiayi Chen
Le Yu
Huaxin Li
Haojin Zhu
Muyuan Li
Kui Ren
2012
conf/ccs
Location privacy leaking from spectrum utilization information in database-driven cognitive radio network.
Zhaoyu Gao
Haojin Zhu
Yao Liu
Muyuan Li
Zhenfu Cao
2011
conf/ccs
How to design space efficient revocable IBE from non-monotonic ABE.
Huang Lin
Zhenfu Cao
Yuguang Fang
Muxin Zhou
Haojin Zhu
2010
conf/acns
How to Construct Interval Encryption from Binary Tree Encryption.
Huang Lin
Zhenfu Cao
Xiaohui Liang
Muxin Zhou
Haojin Zhu
Dongsheng Xing
Coauthors
André Weimerskirch
(1)
Arjun Deopujari
(1)
Benjamin Zi Hao Zhao
(1)
Bo Li
(1)
Brandon Falk
(1)
Cailian Chen
(1)
Chaofan Shou
(1)
Chengguo Ying
(1)
Chengyongxiao Wei
(1)
Chenyang Liu
(1)
Chong Yu
(2)
Di Ma
(1)
Dongsheng Xing
(1)
Fazhong Liu
(1)
Fenghua Li
(2)
Ganxiang Yang
(1)
Gaolei Li
(1)
Guomin Yang
(1)
Guoxing Chen
(10)
Guozhu Meng
(1)
Hafsah Shamsie
(1)
Haizhong Zheng
(1)
Hao Lu
(1)
Haojin Zhu
(41)
Haonan Zhong
(1)
Haotian Hu
(1)
Haoxuan Xu
(1)
Haoyang Wang
(2)
Hongfei Fu
(1)
Hongsheng Hu
(1)
Huang Lin
(2)
Huaxin Li
(2)
Hui Cao
(1)
Hui Liu
(1)
Ian D. Markwood
(3)
Jia Xiang
(1)
Jiachun Li
(3)
Jiafa Liu
(1)
Jialiang Lu
(1)
Jiamin Chang
(1)
Jianan He
(1)
Jianhua Li
(1)
Jiayi Chen
(1)
Jie Li
(1)
Junyi Liu
(1)
Kai Fan
(2)
Kaoru Ota
(1)
Ke Tang
(1)
Keith W. Ross
(1)
Kuan Zhang
(2)
Kui Ren
(1)
Le Yu
(2)
Le Zhang
(1)
Liam Brennan
(1)
Lichuan Ma
(1)
Lihua Xu
(3)
Lin Wang
(1)
Lingling Fan
(2)
Lu Yan
(1)
Lu Zhou
(4)
Matthew Joslin
(1)
Matthew Pillari
(1)
Mengyuan Li
(1)
Mianxiong Dong
(1)
Mingzhe Chen
(1)
Minhui Xue
(14)
Muhammad Ikram
(1)
Muxin Zhou
(2)
Muyuan Li
(2)
Na Ruan
(1)
Neng Li
(1)
Qingqi Pei
(3)
Qiuyu Xiao
(1)
Rayne Holland
(1)
Ren Zhou
(1)
Ruoxi Sun
(1)
Sen Chen
(4)
Shangqing Zhao
(1)
Shaofeng Li
(5)
Shuang Hao
(6)
Shuo Wang
(1)
Song Fang
(1)
Suguo Du
(3)
Suibin Sun
(1)
Tian Dong
(5)
Tielei Wang
(1)
Tong Zhu
(3)
Wei Zhang
(1)
Wen Wu
(1)
Wenkai Huang
(1)
Wenyuan Liu
(1)
Xiaodong Lin
(1)
Xiaohui Liang
(3)
Xiaokuan Zhang
(6)
Xin Yin
(1)
Xinyu Wang
(1)
Xuemin (Sherman) Shen
(1)
Yan Meng
(13)
Yang Liu
(1)
Yansong Gao
(1)
Yao Liu
(5)
Yichang Xiong
(1)
Yinqian Zhang
(1)
Yuan Tian
(2)
Yuanyuan Zhang
(1)
Yugeng Liu
(2)
Yuguang Fang
(1)
Yuling Chen
(1)
Yuxia Zhan
(3)
Zhaoyu Gao
(1)
Zhen Huang
(3)
Zhen Liu
(4)
Zhenfu Cao
(3)
Zhi Zhang
(1)
Zhuo Chang
(1)
Zhuo Lu
(1)
Zhushou Tang
(3)
Zi Li
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to