(Selected Publications)
2024
Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared Shuffle
Wentao Dong, Peipei Jiang, Huayi Duan, Cong Wang, Lingchen Zhao, and Qian Wang
NDSS 2025
(Accepted to appear)
No-box Universal Adversarial Perturbations against Image Classifiers via Artificial Textures
Ningping Mou, Binqing Guo, Lingchen Zhao, Cong Wang, Yue Zhao, and Qian Wang
IEEE Transactions on Information Forensics and Security 2024
(Accepted to appear)
ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization
Huayang Huang, Yu Wu, and Qian Wang
NeurIPS 2024
(Accepted to appear)
BEOWULF: Mitigating Model Extraction Attacks Via Reshaping Decision Regions
Xueluan Gong, Rubin Wei, Ziyao Wang, Yuchen Sun, Jiawen Peng, Yanjiao Chen, and Qian Wang
CCS 2024
(Accepted to appear)
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems
Zheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang, Bowen Li, Yunjie Ge, Qi Li, Chao Shen, and Qian Wang
CCS 2024
(Accepted to appear)
ClusterPoison: Poisoning Attacks on Recommender Systems with Limited Fake Users
Yanling Wang, Yuchen Liu, Qian Wang , and Cong Wang
IEEE Communications Magazine 2024
(Accepted to appear)
Revisiting Adversarial Training under Long-Tailed Distributions
Xinli Yue, Ningping Mou, Qian Wang , and Lingchen Zhao
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns
Man Zhou, Qian Wang , Qi Li, Wenyu Zhou, Jingxiao Yang, and Chao Shen
IEEE Transactions on Mobile Computing 2024
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor
Yunjie Ge, Pinji Chen, Qian Wang , Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, and Chao Shen
Perception-driven Imperceptible Adversarial Attack against Decision-based Black-box Models
Shenyi Zhang, Baolin Zheng, Peipei Jiang, Lingchen Zhao, Chao Shen, and Qian Wang
IEEE Transactions on Information Forensics and Security 2024
From Hardware Fingerprint to Access Token:
Enhancing the Authentication on IoT Devices
Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang , Renjie Xie, Kun Sun, Ke Xu, and Qi Li
Hijacking Attacks against Neural Network by Analyzing Training Data
Yunjie Ge, Qian Wang , Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, and Shenyi Zhang
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
Man Zhou, Shuao Su, Qian Wang , Qi Li, Yuting Zhou, Xiaojing Ma, and Zhengxiong Li
PALETTE: Physically-Realizable Backdoor Attacks Against Video Recognition Models
Xueluan Gong, Zheng Fang, Bowen Li, Yanjiao Chen, and Qian Wang
IEEE Transactions on Dependable and Secure Computing 2024
KerbNet: A QoE-aware Kernel-Based Backdoor Attack Framework
Xueluan Gong, Yanjiao Chen, Huayang Huang, Weihan Kong, Ziyao Wang, Chao Shen, and Qian Wang
IEEE Transactions on Dependable and Secure Computing 2024
FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction Sound
Man Zhou, Yuting Zhou, Shuao Su, Qian Wang , Qi Li, Shengshan Hu, Chunwu Yu, and Zhengxiong Li
IEEE Transactions on Mobile Computing 2023
FastTextDodger: Decision-based Adversarial Attack against Black-box NLP Models with Extremely High Efficiency
Xiaoxue Hu, Geling Liu, Baolin Zheng, Lingchen Zhao, Qian Wang , Yufei Zhang, and Minxin Du
IEEE Transactions on Information Forensics and Security 2024
2023
Revisiting Adversarial Robustness Distillation from the Perspective of Robust Fairness
Xinli Yue, Ningping Mou, Qian Wang , and Lingchen Zhao
Downstream-agnostic Adversarial Examples
Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang , LEO YU ZHANG, Junhui Hou, and Hai Jin
Improving Adversarial Transferability with Ghost
Samples
Yi Zhao, Ningping Mou, Yunjie Ge, and Qian Wang
Interpreting Adversarial Examples in Deep Learning: A Review
Sicong Han, Chenhao Lin, Chao Shen, Qian Wang , and Xiaohong Guan
ACM Computing Surveys 2023
A GAN-based Defense Framework against Model Inversion Attacks
Xueluan Gong, Ziyao Wang, Shuaike Li, Yanjiao Chen, and Qian Wang
IEEE Transactions on Information Forensics and Security 2023
AdvDDoS: Zero-Query Adversarial Attacks against Commercial Speech Recognition Systems
Yunjie Ge, Lingchen Zhao, Qian Wang , Yiheng Duan, and Minxin Du
IEEE Transactions on Information Forensics and Security 2023
Orion: Online Backdoor Sample Detection via Evolution Deviance
Huayang Huang, Qian Wang , Xueluan Gong, and Tao Wang
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems
Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang , Qi Li, and Yuan Rao
Poisoning Self-supervised Learning Based Sequential Recommendations
Yanling Wang, Yuchen Liu, Qian Wang , Cong Wang, and Chenliang Li
MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs
Songlei Wang, Yifeng Zheng, Xiaohua Jia, Qian Wang , and Cong Wang
IEEE Transactions on Information Forensics and Security 2023
Multi-Scenario Ranking with Adaptive Feature Learning
Yu Tian, Bofang Li, Si Chen, Xubin Li, Hongbo Deng, Jian Xu, Bo Zheng, Qian Wang , and Chenliang Li
SwiftTheft: A Time-efficient Model Extraction Attack Framework against Cloud-based Deep Neural Networks
Wenbin Yang, Xueluan Gong, Yanjiao Chen, Qian Wang , and Jianshuo Dong
Chinese Journal of Electronics 2023
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation
Xueluan Gong, Yanjiao Chen, Wang Yang, Qian Wang , Yuzhe Gu, Huayang Huang, and Chao Shen
Implicit Identity Driven Deepfake Face Swapping Detection
Baojin Huang, Zhongyuan Wang, Jiaxin Ai, Jifan Yang, Qin Zou, Qian Wang , and Dengpan Ye
Data Poisoning and Backdoor Attacks on Audio Intelligence Systems
Yunjie Ge, Qian Wang , Jiayuan Yu, Chao Shen, and Qi Li
IEEE Communications Magazine 2023
Spoofing Attacks and Anti-Spoofing Methods for Face Authentication over Smartphones
Zheng Zheng, Qian Wang , and Cong Wang
IEEE Communications Magazine 2023
Adversarial Network Pruning by Filter Robustness Estimation
Xinlu Zhuang, Yunjie Ge, Baolin Zheng, and Qian Wang
ICASSP 2023
(Top 3% Paper Recognition) (Best Student Paper Nomination)
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples
Xueluan Gong, Ziyao Wang, Yanjiao Chen, Qian Wang , Cong Wang, and Chao Shen
TheWebConf 2023 (WWW 2023)
Kaleidoscope: Physical Backdoor Attacks against Deep Neural Networks with RGB Filters
Xueluan Gong, Ziyao Wang, Yanjiao Chen, Qian Wang , Yuzhe Gu, and Meng Xue
IEEE Transactions on Dependable and Secure Computing 2023
Boomerang: Metadata-Private Messaging under Hardware Trust
Peipei Jiang, Qian Wang , Jianhao Cheng, Cong Wang, Lei Xu, Xinyu Wang, Yihao Wu, Xiaoyuan Li, and Kui Ren
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds
Man Zhou, Qian Wang , Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, and Cong Wang
IEEE Transactions on Dependable and Secure Computing 2023
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals
Dan Liu, Qian Wang , Man Zhou, Peipei Jiang, Qi Li, Chao Shen, and Cong Wang
IEEE Transactions on Dependable and Secure Computing 2023
Where Are The Dots: Hardening Face Authentication on Smartphones with Unforgeable Eye Movement Patterns
Zheng Zheng, Qian Wang , Cong Wang, Man Zhou, Yi Zhao, Qi Li, and Chao Shen
IEEE Transactions on Information Forensics and Security 2023
Securing Liveness Detection for Voice Authentication via Pop Noises
Peipei Jiang, Qian Wang , Xiu Lin, Man Zhou, Wenbing Ding, Cong Wang, Chao Shen, and Qi Li
IEEE Transactions on Dependable and Secure Computing 2023
2022
面向机器学习模型安全的测试与修复
张笑宇, 沈超, 蔺琛皓, 李前, 王骞 , 李琦, 管晓宏
电子学报 (Acta Electronica Sinica) 2022
Verifying the Quality of Outsourced Training on Clouds
Peiyang Li, Ye Wang, Zhuotao Liu, Ke Xu, Qian Wang , Chao Shen, and Qi Li
A Few Seconds Can Change Everything: Fast Decision-based Attacks against DNNs
Ningping Mou, Baolin Zheng, Qian Wang , Yunjie Ge, and Binqing Guo
Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions
Xueluan Gong, Yanjiao Chen, Qian Wang , Meng Wang, and Shuyang Li
IEEE Communications Magazine 2022
Vizard: A Metadata-hiding Data Analytic System
with End-to-End Policy Controls
Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, and Qian Wang
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems
Yike Zhan, Baolin Zheng, Qian Wang , Ningping Mou, Binqing Guo, Qi Li, Chao Shen, and Cong Wang
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm with Hierarchical Structure
Xiaozhen Lu, Liang Xiao, Guohang Niu, Xiangyang Ji, and Qian Wang
IEEE Transactions on Information Forensics and Security 2022
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks
Xueluan Gong, Yanjiao Chen, Jianshuo Dong, and Qian Wang
FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons
Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, and Qian Wang
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices
Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang , Chao Shen, Zhi Wang, and Qi Li
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams
Xiaoyi Pang, Zhibo Wang, Defang Liu, John C. S. Lui, Qian Wang , and Ju Ren
IEEE/ACM Transactions on Networking 2022
Dynamic Network Function Enforcement via Joint Flow and Function Scheduling
Qi Li, Xinhao Deng, Zhuotao Liu, Yuan Yang, Xiaoyue Zou, Qian Wang , Mingwei Xu, and Jianping Wu
IEEE Transactions on Information Forensics and Security 2022
GraphShield: Dynamic Large Graphs for Secure Queries with Forward Privacy
Minxin Du, Shuangke Wu, Qian Wang , Dian Chen, Peipei Jiang, and Aziz Mohaisen
IEEE Transactions on Knowledge and Data Engineering 2022
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions
Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, and Qian Wang
IEEE Transactions on Dependable and Secure Computing 2022
Hear Sign Language: A Real-time End-to-End Sign Language Recognition System
Zhibo Wang, Tengda Zhao, Jinxin Ma, Hongkai Chen, Kaixin Liu, Huajie Shao, Qian Wang , and Ju Ren
IEEE Transactions on Mobile Computing 2022
Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers
Xueluan Gong, Yanjiao Chen, Huayang Huang, Yuqing Liao, Shuai Wang, and Qian Wang
2021
Rethinking Adversarial Examples Exploiting
Frequency-Based Analysis
Sicong Han, Chenhao Lin, Chao Shen, and Qian Wang
ICICS 2021
(Won the Best Paper Award)
Building In-the-Cloud Network Functions: Security and Privacy Challenges
Peipei Jiang, Qian Wang , Muqi Huang, Cong Wang, Qi Li, Chao Shen, and Kui Ren
Proceedings of the IEEE 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information
Baolin Zheng, Peipei Jiang, Qian Wang , Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, and Shenyi Zhang
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation
Yunjie Ge, Qian Wang , Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, and Cong Wang
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning
Lingchen Zhao, Jianlin Jiang, Bo Feng, Qian Wang , Chao Shen, and Qi Li
IEEE Transactions on Dependable and Secure Computing 2021
CARTL: Cooperative Adversarially-Robust Transfer Learning
Dian Chen, Hongxin Hu, Qian Wang , Yinli Li, Cong Wang, Chao Shen, and Qi Li
ICML 2021 (Long Oral Presentation)
Defense-Resistant Backdoor Attacks against Deep Neural Networks in Outsourced Cloud Environment
Xueluan Gong, Yanjiao Chen, Qian Wang , Huayang Huang, Lingshuo Meng, Chao Shen, and Qian Zhang
IEEE Journal on Selected Areas in Communications 2021
微信恶意账号检测研究
杨征, 殷其雷, 李浩然, 苗园莉, 元东, 王骞 , 沈超, 李琦
计算机研究与发展 (Journal of Computer Research and Development) 2021
INVERSENET: Augmenting Model Extraction Attacks with Training Data Inversion
Xueluan Gong, Yanjiao Chen, Wenbin Yang, Guanghao Mei, and Qian Wang
Recent Advances in Adversarial Training for Adversarial Robustness
Tao Bai, Jinqi Luo, Jun Zhao, Bihan Wen, and Qian Wang
Joint Knowledge Pruning and Recurrent Graph Convolution for News Recommendation
Yu Tian, Yuhao Yang, Xudong Ren, Pengfei Wang, Fangzhao Wu, Qian Wang , and Chenliang Li
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service
Lingchen Zhao, Qian Wang , Cong Wang, Qi Li, Chao Shen, and Bo Feng
IEEE Transactions on Parallel and Distributed Systems 2021
区块链网络安全保障:攻击与防御
江沛佩, 王骞 , 陈艳姣, 李琦, 沈超
通信学报 (Journal on Communications) 2021
针对深度学习模型的对抗性攻击与防御
李明慧, 江沛佩, 王骞 , 沈超, 李琦
计算机研究与发展 (Journal of Computer Research and Development) 2021
Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on An Untrusted Cloud Server
Wei Song, Mengfei Tang, Qiben Yan, Yuan Shen, Yang Cao, Qian Wang , and Zhiyong Peng
BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication
Dian Chen, Haobo Yuan, Shengshan Hu, Qian Wang , and Cong Wang
IEEE Transactions on Parallel and Distributed Systems 2021
Stealing Your Android Patterns via Acoustic Signals
Man Zhou, Qian Wang , Jingxiao Yang, Qi Li, Peipei Jiang, Yanjiao Chen, and Zhibo Wang
IEEE Transactions on Mobile Computing 2021
Towards Query-efficient Adversarial Attacks against Automatic Speech Recognition Systems
Qian Wang , Baolin Zheng, Qi Li, Chao Shen, and Zhongjie Ba
IEEE Transactions on Information Forensics and Security 2021
Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach
Zhibo Wang, Mengkai Song, Siyan Zheng, Zhifei Zhang, Yang Song, and Qian Wang
IEEE Transactions on Dependable and Secure Computing 2021
Towards Private and Scalable Cross-Media Retrieval
Shengshan Hu, Leo Yu Zhang, Qian Wang , Zhan Qin, and Cong Wang
IEEE Transactions on Dependable and Secure Computing 2021
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution
Shengshan Hu, Chengjun Cai, Qian Wang , Cong Wang, Zhibo Wang, and Dengpan Ye
IEEE Transactions on Dependable and Secure Computing 2021
2020
Silhouette: Efficient Cloud Configuration Exploration for Large-Scale Analytics
Yanjiao Chen, Long Lin, Baochun Li, Qian Wang , and Qian Zhang
IEEE Transactions on Parallel and Distributed Systems 2020
ELLG: Explainable Lesion Learning and Generation for Diabetic Retinopathy Detection
Chenhao Lin, Jiongli Zhu, Chao Shen, Pengwei Hu, and Qian Wang
IJCAI-DCM 2020
(Won the Best Paper Award)
Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models
Xueluan Gong, Yanjiao Chen, Qian Wang , Wang Yang, and Xinchang Jiang
IEEE Communications Magazine 2020
Secure Prediction of Neural Network in the Cloud
Minghui Li, Yuejing Yan, Qian Wang , Minxin Du, Zhan Qin, and Cong Wang
Collaborative Fairness in Federated Learning
Lingjuan Lyu, Xinyi Xu, and Qian Wang
FL-IJCAI 2020
(Won the Best Paper Award)
Deep Learning on Mobile and Embedded Devices: State-of-the-Art, Challenges and Future Directions
Yanjiao Chen, Baolin Zheng, Zihan Zhang, Qian Wang , Chao Shen, and Qian Zhang
ACM Computing Surveys 2020
Towards Compression-Resistant Privacy-Preserving Photo Sharing on Social Networks
Zhibo Wang, Hengchang Guo, Zhifei Zhang, Mengkai Song, Siyan Zheng, Qian Wang , and Ben Niu
Towards Demand-driven Dynamic Incentive for Mobile Crowdsensing Systems
Jiahui Hu, Zhibo Wang, Jian Wei, Ruizhao Lv, Jing Zhao, Qian Wang , Honglong Chen, and Dejun Yang
IEEE Transactions on Wireless Communications 2020
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection
Lingchen Zhao, Shengshan Hu, Qian Wang , Jianlin Jiang, Chao Shen, Xiangyang Luo, and Pengfei Hu
IEEE Transactions on Dependable and Secure Computing 2020
Deep Learning-Based Gait Recognition Using Smartphones in the Wild
Qin Zou, Yanling Wang, Qian Wang , Yi Zhao, and Qingquan Li
IEEE Transactions on Information Forensics and Security 2020
Deep Domain Adaptation with Differential Privacy
Qian Wang , Zixi Li, Qin Zou, Lingchen Zhao, and Song Wang
IEEE Transactions on Information Forensics and Security 2020
Analyzing User-Level Privacy Attack Against Federated Learning
Mengkai Song, Zhibo Wang, Zhifei Zhang, Yang Song, Qian Wang , Ju Ren, and Hairong Qi
IEEE Journal on Selected Areas in Communications 2020
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage
Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, and Qian Wang
Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments
Yanjiao Chen, Xueluan Gong, Qian Wang , Xing Di, and Huayang Huang
SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment with Social Networks
Zhibo Wang, Yuting Huang, Xinkai Wang, Ju Ren, Qian Wang , and Libing Wu
IEEE Transactions on Mobile Computing 2020
Towards Personalized Task-Oriented Worker Recruitment in Mobile Crowdsensing
Zhibo Wang, Jing Zhao, Jiahui Hu, Tianqing Zhu, Qian Wang , Ju Ren, and Chao Li
IEEE Transactions on Mobile Computing 2020
EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves
Chengjun Cai, Lei Xu, Anxin Zhou, Ruochen Wang, Cong Wang, and Qian Wang
Attention-over-Attention Field-aware Factorization Machine
ZhiboWang, Jinxin Ma, Yongquan Zhang, Qian Wang , Ju Ren, and Peng Sun
AAAI 2020
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing
Dong Yuan, Qi Li, Guoliang Li, Qian Wang , and Kui Ren
IEEE Transactions on Information Forensics and Security 2020
The Security of Autonomous Driving: Threats, Defenses, and Future Directions
Kui Ren, Qian Wang , Cong Wang, Zhan Qin, and Xiaodong Lin
Proceedings of the IEEE 2020
(ESI Highly Cited Paper)
Privacy-Preserving Collaborative Deep Learning with Unreliable Participants
Lingchen Zhao, Qian Wang , Qin Zou, Yan Zhang, and Yanjiao Chen
IEEE Transactions on Information Forensics and Security 2020
2019
False Data Injection Attacks against Smart Gird State Estimation: Construction, Detection and Defense
Meng Zhang, Chao Shen, Ning He, SiCong Han, Qi Li, Qian Wang , and XiaoHong Guan
Science China Technological Sciences 2019
Robust Lane Detection from Continuous Driving Scenes Using Deep Neural Networks
Qin Zou, Hanwen Jiang, Qiyu Dai, Yuanhao Yue, Long Chen, and Qian Wang
IEEE Transactions on Vehicular Technology 2019
Towards A Ledger-assisted Architecture for Secure
Query Processing over Distributed IoT Data
Xingliang Yuan, Chengjun Cai, Qian Wang , and Qi Li
DSC 2019
(Won the Best Paper Award)
人工智能系统安全与隐私风险
陈宇飞, 沈超, 王骞 , 李琦, 王聪, 纪守领, 李康, 管晓宏
计算机研究与发展 (Journal of Computer Research and Development) 2019
Detecting Fake Accounts in Online Social Networks at the Time of Registrations
Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Qi Li, Dawn Song, Qian Wang , and Xiao Liang
CCS 2019
LVID: A Multimodal Biometrics Authentication System on Smartphones
Libing Wu, Jingxiao Yang, Man Zhou, Yanjiao Chen, and Qian Wang
IEEE Transactions on Information Forensics and Security 2019
When Mobile Crowdsensing Meets Privacy
Zhibo Wang, Xiaoyi Pang, Jiahui Hu, Wenxin Liu, Qian Wang , Yanjun Li, and Honglong Chen
IEEE Communications Magazine 2019
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang , and Kui Ren
CCS 2019
advPattern: Physical-world Attacks on Deep Person Re-identification via Adversarially Transformable Patterns
Zhibo Wang, Siyan Zheng, Mengkai Song, Qian Wang , Alireza Rahimpour, and Hairong Qi
ICCV 2019
Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures
Shengshan Hu, Xingcan Shang, Zhan Qin, Minghui Li, Qian Wang , and Cong Wang
IEEE Communications Magazine 2019
Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars
Man Zhou, Zhan Qin, Xiu Lin, Shengshan Hu, Qian Wang , and Kui Ren
IEEE Wireless Communications 2019
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum
Yanjiao Chen, Xin Tian, Qian Wang , Minghui Li, Minxin Du, and Qi Li
IEEE Transactions on Mobile Computing 2019
Note:
has corrected some typos of the journal version published in IEEE TMC 2019.
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction
Shuangke Wu, Yanjiao Chen, Qian Wang , Minghui Li, Cong Wang, and Xiangyang Luo
IEEE Transactions on Information Forensics and Security 2019
Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server
Zhibo Wang, Xiaoyi Pang, Yahong Chen, Huajie Shao, Qian Wang , Libing Wu, Honglong Chen, and Hairong Qi
IEEE Transactions on Mobile Computing 2019
Personalized Privacy-preserving Task Allocation for Mobile Crowdsensing
Zhibo Wang, Jiahui Hu, Ruizhao Lv, Jian Wei, Qian Wang , Dejun Yang, and Hairong Qi
IEEE Transactions on Mobile Computing 2019
Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum
Qian Wang , Jing Huang, Yanjiao Chen, Xin Tian, and Qian Zhang
IEEE/ACM Transactions on Networking 2019
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones
Qian Wang , Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, and Xiangyang Luo
Hardening Database Padding for Searchable Encryption
Lei Xu, Xingliang Yuan, Cong Wang, Qian Wang , and Chungen Xu
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning
Zhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang , and Hairong Qi
A Context-Aware User-Item Representation Learning for Item Recommendation
Libing Wu, Cong Quan, Chenliang Li, Qian Wang , Bolong Zheng, and Xiangyang Luo
ACM Transactions on Information Systems 2019
DeepCrack: Learning Hierarchical Convolutional Features for Crack Detection
Qin Zou, Zheng Zhang, Qingquan Li, Xianbiao Qi, Qian Wang , and Song Wang
IEEE Transactions on Image Processing 2019
[
PDF ,
BIB ]
(ESI Highly Cited Paper)
Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones
Man Zhou, Qian Wang , Kui Ren, Dimitrios Koutsonikolas, Lu Su, and Yanjiao Chen
IEEE Transactions on Mobile Computing 2019
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation
Qian Wang , Jing Huang, Yanjiao Chen, Cong Wang, Fu Xiao, and Xiangyang Luo
IEEE Transactions on Information Forensics and Security 2019
Task Bundling Based Incentive for Location-dependent Mobile Crowdsourcing
Zhibo Wang, Jiahui Hu, Qian Wang , Ruizhao Lv, Jian Wei, Honglong Chen, and Xiaoguang Niu
IEEE Communications Magazine 2019
2018
Enabling Online Robust Barcode-based Visible Light Communication with Realtime Feedback
Man Zhou, Qian Wang , Tao Lei, Zhibo Wang, and Kui Ren
IEEE Transactions on Wireless Communications 2018
Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training
Qian Wang , Minxin Du, Xiuying Chen, Yanjiao Chen, Pan Zhou, Xiaofeng Chen, and Xinyi Huang
IEEE Transactions on Knowledge and Data Engineering 2018
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals
Man Zhou, Qian Wang , Jingxiao Yang, Qi Li, Xiao Feng, Zhibo Wang, and Xiaofeng Chen
CCS 2018
Outsourced Biometric Identification with Privacy
Shengshan Hu, Minghui Li, Qian Wang , Sherman S. M. Chow, and Minxin Du
IEEE Transactions on Information Forensics and Security 2018
Privacy-preserving Indexing and Query Processing for Secure Dynamic Cloud Storage
Minxin Du, Qian Wang , Meiqi He, and Jian Weng
IEEE Transactions on Information Forensics and Security 2018
Ensuring Minimum Requirement in Matching-based Spectrum Allocation
Yanjiao Chen, Yuxuan Xiong, Qian Wang , Xiaoyan Yin, and Baochun Li
IEEE Transactions on Mobile Computing 2018
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services
Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang , and Kui Ren
IEEE Transactions on Parallel and Distributed Systems 2018
Differentially Private Distributed Online Learning
Chencheng Li, Pan Zhou, Li Xiong, Qian Wang and Ting Wang
IEEE Transactions on Knowledge and Data Engineering 2018
Dating Ancient Paintings of Mogao Grottoes Using Deeply Learnt Visual Codes
Qingquan Li, Qin Zou, De Ma, Qian Wang , and Song Wang
SCIENCE CHINA Information Sciences 2018
Pay On-demand: Dynamic Incentive and Task Selection for Location-dependent Mobile Crowdsensing Systems
Zhibo Wang, Jiahui Hu, Jing Zhao, Dejun Yang, Honglong Chen, and Qian Wang
ICDCS 2018
Real-time and Spatio-temporal Crowd-sourced Social Network Data Publishing with Differential Privacy
Qian Wang , Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, and Kui Ren
IEEE Transactions on Dependable and Secure Computing 2018
[
PDF ,
BIB ]
(ESI Highly Cited Paper)
Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
Zhengwei Ren, Lina Wang, Qian Wang , and Mingdi Xu
IEEE Transactions on Services Computing 2018
Searchable Encryption over Feature-Rich Data
Qian Wang , Meiqi He, Minxin Du, Sherman S. M. Chow, Russell W. F. Lai, and Qin Zou
IEEE Transactions on Dependable and Secure Computing 2018
[
PDF ,
BIB ]
(ESI Highly Cited Paper)
Robust Gait Recognition by Integrating Inertial and RGBD Sensors
Qin Zou, Lihao Ni, Qian Wang , Qingquan Li, and Song Wang
IEEE Transactions on Cybernetics 2018
InstantCryptoGram: Secure Image Retrieval Service
Minghui Li, Mingxue Zhang, Qian Wang , Sherman S. M. Chow, Minxin Du, Yanjiao Chen, and Chenliang Li
INFOCOM 2018
(Won the Best-in-Session Presentation Award)
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization
Shengshan Hu, Chengjun Cai, Qian Wang , Cong Wang, Xiangyang Luo, and Kui Ren
INFOCOM 2018
InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential Privacy
Lingchen Zhao, Lihao Ni, Shengshan Hu, Yanjiao Chen, Fu Xiao, Pan Zhou, and Libing Wu
INFOCOM 2018
Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks
Zhibo Wang, Yongquan Zhang, Honglong Chen, Zhetao Li, and Feng Xia
INFOCOM 2018
Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications
Xiaoting Tang, Cong Wang, Xingliang Yuan, and Qian Wang
INFOCOM 2018
2017
POSTER: Enabling Secure Location Authentication in Drone
Feng Xiao, Man Zhou, Youcheng Liye, Jingxiao Yang, and Qian Wang
MobiCom 2017 (Poster Session)
Publicly Verifiable Computation of Polynomials over Outsourced Data with Multiple Sources
Wei Song, Bing Wang, Qian Wang , Chengliang Shi, Wenjing Lou, and Zhiyong Peng
IEEE Transactions on Information Forensics and Security 2017
Stable Matching for Spectrum Market with Guaranteed Minimum Requirement
Yanjiao Chen, Yuxuang Xiong, Qian Wang , Xiaoyuan Yin, and Baochun Li
MobiHoc 2017
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang , Jian Weng, Lu Su, and Aziz Mohaisen
ICDCS 2017
(Won the Best Student Paper Award)
THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply
Qian Wang , Qihang Sun, and Kui Ren
IEEE Transactions on Mobile Computing 2017
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
Qian Wang , Kui Ren, Minxin Du, Qi Li, and Aziz Mohaisen
Financial Cryptography and Data Security 2017
Learning Privately: Privacy-Preserving Canonical Correlation Analysis for Cross-Media Retrieval
Qian Wang , Shengshan Hu, Minxin Du, Jingjun Wang, and Kui Ren
INFOCOM 2017
Exploiting Social Influence for Context-Aware Event Recommendation in Event-based Social Networks
Zhibo Wang, Yongquan Zhang, Yijie Li, Qian Wang , and Feng Xia
INFOCOM 2017
Local Pattern Collocations Using Regional Co-occurrence Factorization
Qin Zou, Lihao Ni, Qian Wang , Qingquan Li, and Song Wang
IEEE Transactions on Multimedia 2017
2016
Messages Behind the Sound: Real-Time Hidden Acoustic Signal Capture with Smartphones
Qian Wang , Kui Ren, Man Zhou, Tao Lei, Dimitrios Koutsonikolas, and Lu Su
MobiCom 2016
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks
Qian Wang , Kui Ren, Peng Ning, and Shengshan Hu
IEEE Transactions on Vehicular Technology 2016
Securing Fast Learning! Ridge Regression over Encrypted Big Data
Shengshan Hu, Qian Wang , Jingjun Wang, Sherman S. M. Chow, and Qin Zou
TrustCom 2016
(Won the Best Paper Award)
Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
Shengshan Hu, Qian Wang , Jingjun Wang, Zhan Qin, and Kui Ren
IEEE Transactions on Image Processing 2016
Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor
Qian Wang , Shengshan Hu, Jingjun Wang, and Kui Ren
ICDCS 2016
Catch Me in the Dark: Effective Privacy-preserving Outsourcing of Feature Extractions over Image Data
Qian Wang , Shengshan Hu, Kui Ren, Jingjun Wang, Zhibo Wang, and Minxin Du
INFOCOM 2016
RescueDP: Real-time Spatio-temporal Crowd-sourced Data Publishing with Differential Privacy
Qian Wang , Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, and Kui Ren
INFOCOM 2016
2015
Deep Learning Based Feature Selection for Remote Sensing Scene Classification
Qin Zou, Lihao Ni, Tong Zhang, and Qian Wang
IEEE Geoscience and Remote Sensing Letters 2015
(ESI Highly Cited Paper)
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud
Qian Wang , Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, and Zhibo Wang
ESORICS 2015
Note: the
has appeared in IEEE TIFS 2018, and presents significantly improved constructions
(for single-server and multi-server solutions) and a complete rewrite and evaluation.
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice
Qian Wang , Kui Ren, Guancheng Li, Chengbo Xia, Zhibo Wang, and Qin Zou
CCS 2015
RainBar: Robust Application-Driven Visual Communication Using Color Barcodes
Qian Wang , Man Zhou, Kui Ren, Tao Lei, Jikun Li, and Zhibo Wang
ICDCS 2015
2014
Securing Emerging Short Range Wireless Communications: The State of the Art
Kui Ren, Qian Wang , and Di Ma
IEEE Wireless Communications 2014
Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply
Qihang Sun, Qian Wang , and Kui Ren
ICNP 2014
2013
Opportunistic Spectrum Access: from Stochastic Channels to Non-Stochastic Channels
Kui Ren, and Qian Wang
IEEE Wireless Communications 2013
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Cong Wang, Kui Ren, Jia Wang, and Qian Wang
IEEE Transactions on Parallel and Distributed Systems 2013
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang, Sherman S. M. Chow, Qian Wang , Kui Ren, and Wenjing Lou
IEEE Transactions on Computers 2013
(ESI Highly Cited Paper)
Popular Articles of IEEE TC (Top 1 most frequently downloaded articles, as of Nov. 2016) Most Cited Articles of IEEE TC (Top 4 most frequently cited articles, as of Nov. 2016)
Proof-carrying Cloud Computation: The Case of Convex Optimization
Zhen Xu, Cong Wang, Qian Wang , Kui Ren, and Lingyu Wang
INFOCOM MINI 2013
2012
Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels
Qian Wang , Kaihe Xu, and Kui Ren
IEEE Journal on Selected Areas in Communications 2012
Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication
Qian Wang , Ping Xu, Kui Ren, and Xiang-Yang Li
IEEE Journal on Selected Areas in Communications 2012
When Cloud Meets eBay: Towards Effective Pricing for Cloud Computing
Qian Wang , Kui Ren, and Xiaoqiao Meng
INFOCOM 2012
Toward Secure and Dependable Storage Services in Cloud Computing
Cong Wang, Qian Wang , Kui Ren, and Wenjing Lou
IEEE Transactions on Service Computing 2012
(ESI Highly Cited Paper)
Toward Secure and Effective Data Utilization in Public Cloud
Kui Ren, Cong Wang, and Qian Wang
IEEE Network 2012
Security Challenges for the Public Cloud
Kui Ren, Cong Wang, and Qian Wang
IEEE Internet Computing 2012
(ESI Highly Cited Paper)
2011
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang , Cong Wang, Kui Ren, Wenjing Lou, and Jin Li
IEEE Transactions on Parallel and Distributed Systems 2011
(ESI Highly Cited Paper)
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Qian Wang , Kui Ren, Shucheng Yu, and Wenjing Lou
ACM Transactions on Sensor Networks 2011
Anti-Jamming Communication in Cognitive Radio Networks with Unknown Channel Statistics
Qian Wang , Kui Ren, and Peng Ning
ICNP 2011
(Won the Best Paper Award)
Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks
Qian Wang , Hai Su, Kui Ren, and Kwangjo Kim
INFOCOM 2011
Delay-Bounded Adaptive UFH-based Anti-Jamming Wireless Communication
Qian Wang , Ping Xu, Kui Ren, and Xiang-Yang Li
INFOCOM 2011
Secret Key Generation Exploiting Channel Characteristics in Wireless Communications
Kui Ren, Hai Su, and Qian Wang
IEEE Wireless Communications 2011
2010
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Cong Wang, Qian Wang , Kui Ren, and Wenjing Lou
INFOCOM 2010
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jin Li, Qian Wang , Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou
INFOCOM MINI 2010
2009
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang , Cong Wang, Jin Li, Kui Ren, and Wenjing Lou
ESORICS 2009
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Qian Wang , Kui Ren, Wenjing Lou, and Yanchao Zhang
INFOCOM 2009
Ensuring Data Storage Security in Cloud Computing
Cong Wang, Qian Wang , Kui Ren, and Wenjing Lou
IWQoS 2009