What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhiqiang Lin
Google Scholar
ORCID:
0000-0001-6527-5994
102
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Code Speaks Louder: Exploring Security and Privacy Relevant Regional Variations in Mobile Applications.
Jiawei Guo
Yu Nong
Zhiqiang Lin
Haipeng Cai
2025
conf/sp
GoSonar: Detecting Logical Vulnerabilities in Memory Safe Language Using Inductive Constraint Reasoning.
Md Sakib Anwar
Carter Yagemann
Zhiqiang Lin
2025
conf/ndss
Understanding Miniapp Malware: Identification, Dissection, and Characterization.
Yuqing Yang
Yue Zhang
Zhiqiang Lin
2025
conf/ndss
Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs.
Linxi Jiang
Xin Jin
Zhiqiang Lin
2025
conf/ndss
Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation.
Christopher Ellis
Yue Zhang
Mohit Kumar Jangid
Shixuan Zhao
Zhiqiang Lin
2025
conf/ndss
Repurposing Neural Networks for Efficient Cryptographic Computation.
Xin Jin
Shiqing Ma
Zhiqiang Lin
2025
conf/wisec
ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space.
Yan Long
Jiancong Cui
Yuqing Yang
Tobias Alam
Zhiqiang Lin
Kevin Fu
2025
conf/asiaccs
An Empirical Study of C Decompilers: Performance Metrics and Error Taxonomy.
Melih Sirlanci
Carter Yagemann
Zhiqiang Lin
2025
conf/uss
AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps.
John Y. Kim
Chaoshun Zuo
Yanjie Zhao
Zhiqiang Lin
2024
conf/ccs
When Compiler Optimizations Meet Symbolic Execution: An Empirical Study.
Yue Zhang
Melih Sirlanci
Ruoyu Wang
Zhiqiang Lin
2024
conf/ccs
SaTS '24: The 2nd ACM Workshop on Secure and Trustworthy Superapps.
Zhiqiang Lin
Luyi Xing
2024
conf/ccs
BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android's Radio Interface Layer.
Wenqiang Li
Haohuang Wen
Zhiqiang Lin
2024
conf/sp
From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover.
Xingli Zhang
Yazhou Tu
Yan Long
Liqun Shan
Mohamed A Elsaadani
Kevin Fu
Zhiqiang Lin
Xiali Hei
2024
conf/asiaccs
RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop.
Chao Wang
Yue Zhang
Zhiqiang Lin
2024
conf/ndss
5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service.
Haohuang Wen
Phillip A. Porras
Vinod Yegneswaran
Ashish Gehani
Zhiqiang Lin
2024
conf/acsac
Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions.
Mengya Zhang
Xingyu Lyu
Jianyu Niu
Xiaokuan Zhang
Yinqian Zhang
Zhiqiang Lin
2023
conf/ccs
Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs.
Yue Zhang
Yuqing Yang
Zhiqiang Lin
2023
conf/ccs
Uncovering and Exploiting Hidden APIs in Mobile Super Apps.
Chao Wang
Yue Zhang
Zhiqiang Lin
2023
conf/ccs
SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps.
Zhiqiang Lin
Xiaojing Liao
2023
conf/uss
Controlled Data Races in Enclaves: Attacks and Detection.
Sanchuan Chen
Zhiqiang Lin
Yinqian Zhang
2023
conf/uss
Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract.
Zhuo Zhang
Zhiqiang Lin
Marcelo Morales
Xiangyu Zhang
Kaiyuan Zhang
2023
conf/uss
A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games.
Chaoshun Zuo
Chao Wang
Zhiqiang Lin
2023
conf/uss
One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat.
Chao Wang
Yue Zhang
Zhiqiang Lin
2023
conf/uss
Reusable Enclaves for Confidential Serverless Computing.
Shixuan Zhao
Pinshen Xu
Guoxing Chen
Mengya Zhang
Yinqian Zhang
Zhiqiang Lin
2023
conf/uss
Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries.
Haohuang Wen
Zhiqiang Lin
2023
conf/asiaccs
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide.
Pallavi Sivakumaran
Chaoshun Zuo
Zhiqiang Lin
Jorge Blasco
2023
conf/ndss
Thwarting Smartphone SMS Attacks at the Radio Interface Layer.
Haohuang Wen
Phillip A. Porras
Vinod Yegneswaran
Zhiqiang Lin
2023
conf/ndss
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.
Mohit Kumar Jangid
Yue Zhang
Zhiqiang Lin
2022
journals/popets
Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing.
Christopher Ellis
Haohuang Wen
Zhiqiang Lin
Anish Arora
2022
conf/ccs
SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings.
Xin Jin
Kexin Pei
Jun Yeon Won
Zhiqiang Lin
2022
conf/ccs
Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection.
Yuqing Yang
Yue Zhang
Zhiqiang Lin
2022
conf/ccs
Understanding IoT Security from a Market-Scale Perspective.
Xin Jin
Sunil Manandhar
Kaushal Kafle
Zhiqiang Lin
Adwait Nadkarni
2022
conf/ccs
Detecting and Measuring Misconfigured Manifests in Android Apps.
Yuqing Yang
Mohamed Elsabagh
Chaoshun Zuo
Ryan Johnson
Angelos Stavrou
Zhiqiang Lin
2022
conf/ccs
When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure.
Yue Zhang
Zhiqiang Lin
2022
conf/uss
Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games.
Chaoshun Zuo
Zhiqiang Lin
2022
conf/sp
vSGX: Virtualizing SGX Enclaves on AMD SEV.
Shixuan Zhao
Mengyuan Li
Yinqian Zhang
Zhiqiang Lin
2022
conf/asiaccs
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals.
Qingchuan Zhao
Chaoshun Zuo
Jorge Blasco
Zhiqiang Lin
2022
conf/ndss
Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures.
Huibo Wang
Guoxing Chen
Yinqian Zhang
Zhiqiang Lin
2021
conf/ccs
CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV.
Mengyuan Li
Yinqian Zhang
Zhiqiang Lin
2021
conf/uss
Towards Formal Verification of State Continuity for Enclave Programs.
Mohit Kumar Jangid
Guoxing Chen
Yinqian Zhang
Zhiqiang Lin
2021
conf/uss
Automatic Policy Generation for Inter-Service Access Control of Microservices.
Xing Li
Yan Chen
Zhiqiang Lin
Xiao Wang
Jim Hao Chen
2021
conf/uss
SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting.
Sanchuan Chen
Zhiqiang Lin
Yinqian Zhang
2020
conf/ccs
FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware.
Haohuang Wen
Zhiqiang Lin
Yinqian Zhang
2020
conf/uss
TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
Mengya Zhang
Xiaokuan Zhang
Yinqian Zhang
Zhiqiang Lin
2020
conf/uss
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.
Haohuang Wen
Qi Alfred Chen
Zhiqiang Lin
2020
conf/uss
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.
Yue Zhang
Jian Weng
Rajib Dey
Yier Jin
Zhiqiang Lin
Xinwen Fu
2020
conf/uss
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Mohamed Elsabagh
Ryan Johnson
Angelos Stavrou
Chaoshun Zuo
Qingchuan Zhao
Zhiqiang Lin
2020
conf/uss
SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants.
Raul Quinonez
Jairo Giraldo
Luis E. Salazar
Erick Bauman
Alvaro A. Cárdenas
Zhiqiang Lin
2020
conf/sp
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps.
Qingchuan Zhao
Chaoshun Zuo
Brendan Dolan-Gavitt
Giancarlo Pellegrino
Zhiqiang Lin
2020
conf/ndss
Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps.
Haohuang Wen
Qingchuan Zhao
Qi Alfred Chen
Zhiqiang Lin
2020
conf/acsac
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.
Paul Muntean
Matthias Neumayer
Zhiqiang Lin
Gang Tan
Jens Grossklags
Claudia Eckert
2019
conf/ccs
Towards Memory Safe Enclave Programming with Rust-SGX.
Huibo Wang
Pei Wang
Yu Ding
Mingshen Sun
Yiming Jing
Ran Duan
Long Li
Yulong Zhang
Tao Wei
Zhiqiang Lin
2019
conf/ccs
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps.
Chaoshun Zuo
Haohuang Wen
Zhiqiang Lin
Yinqian Zhang
2019
conf/ccs
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Huibo Wang
Erick Bauman
Vishal Karande
Zhiqiang Lin
Yueqiang Cheng
Yinqian Zhang
2019
conf/uss
Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization.
Mengyuan Li
Yinqian Zhang
Zhiqiang Lin
Yan Solihin
2019
conf/uss
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends.
Omar Alrawi
Chaoshun Zuo
Ruian Duan
Ranjita Pai Kasturi
Zhiqiang Lin
Brendan Saltaformaggio
2019
conf/uss
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software.
Xiaoyang Xu
Masoud Ghaffarinia
Wenhao Wang
Kevin W. Hamlen
Zhiqiang Lin
2019
conf/sp
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps.
Chaoshun Zuo
Zhiqiang Lin
Yinqian Zhang
2019
conf/eurosp
SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution.
Guoxing Chen
Sanchuan Chen
Yuan Xiao
Yinqian Zhang
Zhiqiang Lin
Ten-Hwang Lai
2019
conf/ndss
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Qingchuan Zhao
Chaoshun Zuo
Giancarlo Pellegrino
Zhiqiang Lin
2019
conf/dsn
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users.
Jiongyi Chen
Chaoshun Zuo
Wenrui Diao
Shuaike Dong
Qingchuan Zhao
Menghan Sun
Zhiqiang Lin
Yinqian Zhang
Kehuan Zhang
2019
conf/acsac
Analyzing control flow integrity with LLVM-CFI.
Paul Muntean
Matthias Neumayer
Zhiqiang Lin
Gang Tan
Jens Grossklags
Claudia Eckert
2018
conf/ccs
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.
Vishal Karande
Swarup Chandra
Zhiqiang Lin
Juan Caballero
Latifur Khan
Kevin W. Hamlen
2018
conf/ccs
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.
Juanru Li
Zhiqiang Lin
Juan Caballero
Yuanyuan Zhang
Dawu Gu
2018
conf/uss
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors.
Yazhou Tu
Zhiqiang Lin
Insup Lee
Xiali Hei
2018
conf/uss
Guarder: A Tunable Secure Allocator.
Sam Silvestro
Hongyu Liu
Tianyi Liu
Zhiqiang Lin
Tongping Liu
2018
conf/ndss
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Jiongyi Chen
Wenrui Diao
Qingchuan Zhao
Chaoshun Zuo
Zhiqiang Lin
XiaoFeng Wang
Wing Cheong Lau
Menghan Sun
Ronghai Yang
Kehuan Zhang
2018
conf/ndss
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
Erick Bauman
Zhiqiang Lin
Kevin W. Hamlen
2018
conf/acsac
A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites.
Bo Lu
Xiaokuan Zhang
Ziman Ling
Yinqian Zhang
Zhiqiang Lin
2017
conf/ccs
SGX-Log: Securing System Logs With SGX.
Vishal Karande
Erick Bauman
Zhiqiang Lin
Latifur Khan
2017
conf/ccs
SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors.
Fahad Shaon
Murat Kantarcioglu
Zhiqiang Lin
Latifur Khan
2017
conf/ccs
FreeGuard: A Faster Secure Heap Allocator.
Sam Silvestro
Hongyu Liu
Corey Crosser
Zhiqiang Lin
Tongping Liu
2017
conf/ccs
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services.
Chaoshun Zuo
Qingchuan Zhao
Zhiqiang Lin
2017
conf/ccs
CCS'17 Tutorial Abstract / SGX Security and Privacy.
Taesoo Kim
Zhiqiang Lin
Chia-Che Tsai
2017
conf/esorics
Securing Data Analytics on SGX with Randomization.
Swarup Chandra
Vishal Karande
Zhiqiang Lin
Latifur Khan
Murat Kantarcioglu
Bhavani Thuraisingham
2016
conf/ndss
Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services.
Chaoshun Zuo
Wubing Wang
Zhiqiang Lin
Rui Wang
2016
conf/acsac
Adaptive encrypted traffic fingerprinting with bi-directional dependence.
Khaled Al-Naami
Swarup Chandra
Ahmad Mustafa
Latifur Khan
Zhiqiang Lin
Kevin W. Hamlen
Bhavani Thuraisingham
2015
conf/uss
You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps.
Jin Chen
Haibo Chen
Erick Bauman
Zhiqiang Lin
Binyu Zang
Haibing Guan
2015
conf/esorics
A Practical Approach for Adaptive Data Structure Layout Randomization.
Ping Chen
Jun Xu
Zhiqiang Lin
Dongyan Xu
Bing Mao
Peng Liu
2015
conf/dsn
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization.
Seung-Hun Kim
Lei Xu
Ziyi Liu
Zhiqiang Lin
Won Woo Ro
Weidong Shi
2014
journals/tifs
Data-Centric OS Kernel Malware Characterization.
Junghwan Rhee
Ryan D. Riley
Zhiqiang Lin
Xuxian Jiang
Dongyan Xu
2014
conf/uss
Preventing Cryptographic Key Leakage in Cloud Virtual Machines.
Erman Pattuk
Murat Kantarcioglu
Zhiqiang Lin
Huseyin Ulusoy
2014
conf/uss
X-Force: Force-Executing Binary Programs for Security Applications.
Fei Peng
Zhui Deng
Xiangyu Zhang
Dongyan Xu
Zhiqiang Lin
Zhendong Su
2014
conf/esorics
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification.
David I. Urbina
Yufei Gu
Juan Caballero
Zhiqiang Lin
2014
conf/ndss
Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization.
Alireza Saberi
Yangchun Fu
Zhiqiang Lin
2014
conf/ndss
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps.
David Sounthiraraj
Justin Sahs
Garret Greenwood
Zhiqiang Lin
Latifur Khan
2014
conf/acsac
MACE: high-coverage and robust memory analysis for commodity operating systems.
Qian Feng
Aravind Prakash
Heng Yin
Zhiqiang Lin
2013
conf/ccs
Obfuscation resilient binary code reuse through trace-oriented programming.
Junyuan Zeng
Yangchun Fu
Kenneth A. Miller
Zhiqiang Lin
Xiangyu Zhang
Dongyan Xu
2013
conf/dsn
Manipulating semantic values in kernel data structures: Attack assessments and implications.
Aravind Prakash
Eknath Venkataramani
Heng Yin
Zhiqiang Lin
2013
conf/acsac
Subverting system authentication with context-aware, reactive virtual machine introspection.
Yangchun Fu
Zhiqiang Lin
Kevin W. Hamlen
2012
conf/ccs
Binary stirring: self-randomizing instruction addresses of legacy x86 binary code.
Richard Wartell
Vishwath Mohan
Kevin W. Hamlen
Zhiqiang Lin
2012
conf/ccs
Automatic generation of vaccines for malware immunization.
Zhaoyan Xu
Jialong Zhang
Guofei Gu
Zhiqiang Lin
2012
conf/sp
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.
Yangchun Fu
Zhiqiang Lin
2012
conf/ndss
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
Zhiqiang Lin
Junghwan Rhee
Chao Wu
Xiangyu Zhang
Dongyan Xu
2012
conf/acsac
Securing untrusted code via compiler-agnostic binary rewriting.
Richard Wartell
Vishwath Mohan
Kevin W. Hamlen
Zhiqiang Lin
2011
conf/ccs
Characterizing kernel malware behavior with kernel data access patterns.
Junghwan Rhee
Zhiqiang Lin
Dongyan Xu
2011
conf/ndss
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Zhiqiang Lin
Junghwan Rhee
Xiangyu Zhang
Dongyan Xu
Xuxian Jiang
2010
conf/ndss
Automatic Reverse Engineering of Data Structures from Binary Execution.
Zhiqiang Lin
Xiangyu Zhang
Dongyan Xu
2010
conf/dsn
Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction.
Zhiqiang Lin
Xiangyu Zhang
Dongyan Xu
2009
conf/ndss
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Tielei Wang
Tao Wei
Zhiqiang Lin
Wei Zou
2008
conf/ndss
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Zhiqiang Lin
Xuxian Jiang
Dongyan Xu
Xiangyu Zhang
2008
conf/dsn
Convicting exploitable software vulnerabilities: An efficient input provenance based approach.
Zhiqiang Lin
Xiangyu Zhang
Dongyan Xu
Coauthors
Adwait Nadkarni
(1)
Ahmad Mustafa
(1)
Alireza Saberi
(1)
Alvaro A. Cárdenas
(1)
Angelos Stavrou
(2)
Anish Arora
(1)
Aravind Prakash
(2)
Ashish Gehani
(1)
Bhavani Thuraisingham
(2)
Bing Mao
(1)
Binyu Zang
(1)
Bo Lu
(1)
Brendan Dolan-Gavitt
(1)
Brendan Saltaformaggio
(1)
Carter Yagemann
(2)
Chao Wang
(4)
Chao Wu
(1)
Chaoshun Zuo
(16)
Chia-Che Tsai
(1)
Christopher Ellis
(2)
Claudia Eckert
(2)
Corey Crosser
(1)
David I. Urbina
(1)
David Sounthiraraj
(1)
Dawu Gu
(1)
Dongyan Xu
(11)
Eknath Venkataramani
(1)
Erick Bauman
(5)
Erman Pattuk
(1)
Fahad Shaon
(1)
Fei Peng
(1)
Gang Tan
(2)
Garret Greenwood
(1)
Giancarlo Pellegrino
(2)
Guofei Gu
(1)
Guoxing Chen
(4)
Haibing Guan
(1)
Haibo Chen
(1)
Haipeng Cai
(1)
Haohuang Wen
(9)
Heng Yin
(2)
Hongyu Liu
(2)
Huibo Wang
(3)
Huseyin Ulusoy
(1)
Insup Lee
(1)
Jairo Giraldo
(1)
Jens Grossklags
(2)
Jialong Zhang
(1)
Jian Weng
(1)
Jiancong Cui
(1)
Jianyu Niu
(1)
Jiawei Guo
(1)
Jim Hao Chen
(1)
Jin Chen
(1)
Jiongyi Chen
(2)
John Y. Kim
(1)
Jorge Blasco
(2)
Juan Caballero
(3)
Juanru Li
(1)
Jun Xu
(1)
Jun Yeon Won
(1)
Junghwan Rhee
(4)
Junyuan Zeng
(1)
Justin Sahs
(1)
Kaiyuan Zhang
(1)
Kaushal Kafle
(1)
Kehuan Zhang
(2)
Kenneth A. Miller
(1)
Kevin Fu
(2)
Kevin W. Hamlen
(7)
Kexin Pei
(1)
Khaled Al-Naami
(1)
Latifur Khan
(6)
Lei Xu
(1)
Linxi Jiang
(1)
Liqun Shan
(1)
Long Li
(1)
Luis E. Salazar
(1)
Luyi Xing
(1)
Marcelo Morales
(1)
Masoud Ghaffarinia
(1)
Matthias Neumayer
(2)
Md Sakib Anwar
(1)
Melih Sirlanci
(2)
Menghan Sun
(2)
Mengya Zhang
(3)
Mengyuan Li
(3)
Mingshen Sun
(1)
Mohamed A Elsaadani
(1)
Mohamed Elsabagh
(2)
Mohit Kumar Jangid
(3)
Murat Kantarcioglu
(3)
Omar Alrawi
(1)
Pallavi Sivakumaran
(1)
Paul Muntean
(2)
Pei Wang
(1)
Peng Liu
(1)
Phillip A. Porras
(2)
Ping Chen
(1)
Pinshen Xu
(1)
Qi Alfred Chen
(2)
Qian Feng
(1)
Qingchuan Zhao
(8)
Rajib Dey
(1)
Ran Duan
(1)
Ranjita Pai Kasturi
(1)
Raul Quinonez
(1)
Richard Wartell
(2)
Ronghai Yang
(1)
Rui Wang
(1)
Ruian Duan
(1)
Ruoyu Wang
(1)
Ryan D. Riley
(1)
Ryan Johnson
(2)
Sam Silvestro
(2)
Sanchuan Chen
(3)
Seung-Hun Kim
(1)
Shiqing Ma
(1)
Shixuan Zhao
(3)
Shuaike Dong
(1)
Sunil Manandhar
(1)
Swarup Chandra
(3)
Taesoo Kim
(1)
Tao Wei
(2)
Ten-Hwang Lai
(1)
Tianyi Liu
(1)
Tielei Wang
(1)
Tobias Alam
(1)
Tongping Liu
(2)
Vinod Yegneswaran
(2)
Vishal Karande
(4)
Vishwath Mohan
(2)
Wei Zou
(1)
Weidong Shi
(1)
Wenhao Wang
(1)
Wenqiang Li
(1)
Wenrui Diao
(2)
Wing Cheong Lau
(1)
Won Woo Ro
(1)
Wubing Wang
(1)
Xiali Hei
(2)
Xiangyu Zhang
(9)
Xiao Wang
(1)
XiaoFeng Wang
(1)
Xiaojing Liao
(1)
Xiaokuan Zhang
(3)
Xiaoyang Xu
(1)
Xin Jin
(4)
Xing Li
(1)
Xingli Zhang
(1)
Xingyu Lyu
(1)
Xinwen Fu
(1)
Xuxian Jiang
(3)
Yan Chen
(1)
Yan Long
(2)
Yan Solihin
(1)
Yangchun Fu
(4)
Yanjie Zhao
(1)
Yazhou Tu
(2)
Yier Jin
(1)
Yiming Jing
(1)
Yinqian Zhang
(17)
Yu Ding
(1)
Yu Nong
(1)
Yuan Xiao
(1)
Yuanyuan Zhang
(1)
Yue Zhang
(11)
Yueqiang Cheng
(1)
Yufei Gu
(1)
Yulong Zhang
(1)
Yuqing Yang
(5)
Zhaoyan Xu
(1)
Zhendong Su
(1)
Zhiqiang Lin
(102)
Zhui Deng
(1)
Zhuo Zhang
(1)
Ziman Ling
(1)
Ziyi Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to