What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jie Zhang
Google Scholar
ORCID:
0000-0002-4230-1077
7
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
CamLopa: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis.
Xiang Zhang
Jie Zhang
Zehua Ma
Jinyang Huang
Meng Li
Huan Yan
Peng Zhao
Zijian Zhang
Bin Liu
Qing Guo
Tianwei Zhang
Nenghai Yu
2025
conf/sp
Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models.
Boheng Li
Yanhao Wei
Yankai Fu
Zhenting Wang
Yiming Li
Jie Zhang
Run Wang
Tianwei Zhang
2025
conf/uss
The Ghost Navigator: Revisiting the Hidden Vulnerability of Localization in Autonomous Driving.
Junqi Zhang
Shaoyin Cheng
Linqing Hu
Jie Zhang
Chengyu Shi
Xingshuo Han
Tianwei Zhang
Yueqiang Cheng
Weiming Zhang
2025
conf/uss
When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems.
Haolin Wu
Chang Liu
Jing Chen
Ruiying Du
Kun He
Yu Zhang
Cong Wu
Tianwei Zhang
Qing Guo
Jie Zhang
2025
conf/uss
DiffLoc: WiFi Hidden Camera Localization Based on Electromagnetic Diffraction.
Xiang Zhang
Jie Zhang
Huan Yan
Jinyang Huang
Zehua Ma
Bin Liu
Meng Li
Kejiang Chen
Qing Guo
Tianwei Zhang
Zhi Liu
2024
conf/ccs
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models.
Kunsheng Tang
Wenbo Zhou
Jie Zhang
Aishan Liu
Gelei Deng
Shuai Li
Peigui Qi
Weiming Zhang
Tianwei Zhang
Nenghai Yu
2024
conf/ndss
Detecting Voice Cloning Attacks via Timbre Watermarking.
Chang Liu
Jie Zhang
Tianwei Zhang
Xi Yang
Weiming Zhang
Nenghai Yu
Coauthors
Aishan Liu
(1)
Bin Liu
(2)
Boheng Li
(1)
Chang Liu
(2)
Chengyu Shi
(1)
Cong Wu
(1)
Gelei Deng
(1)
Haolin Wu
(1)
Huan Yan
(1)
Huan Yan
(1)
Jie Zhang
(7)
Jing Chen
(1)
Jinyang Huang
(2)
Junqi Zhang
(1)
Kejiang Chen
(1)
Kun He
(1)
Kunsheng Tang
(1)
Linqing Hu
(1)
Meng Li
(2)
Nenghai Yu
(3)
Peigui Qi
(1)
Peng Zhao
(1)
Qing Guo
(3)
Ruiying Du
(1)
Run Wang
(1)
Shaoyin Cheng
(1)
Shuai Li
(1)
Tianwei Zhang
(7)
Weiming Zhang
(3)
Wenbo Zhou
(1)
Xi Yang
(1)
Xiang Zhang
(2)
Xingshuo Han
(1)
Yanhao Wei
(1)
Yankai Fu
(1)
Yiming Li
(1)
Yu Zhang
(1)
Yueqiang Cheng
(1)
Zehua Ma
(2)
Zhenting Wang
(1)
Zhi Liu
(1)
Zijian Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to