


default search action
Qian Wang 0002
Person information
- affiliation: Wuhan University, School of Cyber Science and Engineering, Hubei, China
- affiliation: Wuhan University, State Key Laboratory of Software Engineering, School of Computer Science, China
- affiliation (former): Illinois Institute of Technology, Department of Electrical and Computer Engineering, Chicago, IL, USA
Other persons with the same name
- Qian Wang — disambiguation page
- Qian Wang 0001
— ShanghaiTech University, School of Biomedical Engineering, State Key Laboratory of Advanced Medical Materials and Devices, Shanghai, China (and 3 more)
- Qian Wang 0003
— Texas A&M University, Department of Electrical and Computer Engineering, College Station, TX, USA
- Qian Wang 0004
— University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China
- Qian Wang 0005
— Xi'an Jiaotong University, School of Mathematics and Statistics, China
- Qian Wang 0006
— University of South Carolina, Department of Chemistry and Biochemistry, Columbia, SC, USA
- Qian Wang 0007
— The Hong Kong University of Science and Technology, Department of Civil and Environmental Engineering, Hong Kong (and 1 more)
- Qian Wang 0008
— University of Alberta, Edmonton, AB, Canada
- Qian Wang 0009
— Yanshan University, College of Information Science and Engineering, Qianhuangdao, China (and 2 more)
- Qian Wang 0010
— Clemson University, International Center for Automotive Research, Applied Dynamics and Control Group, Greenville, SC, USA
- Qian Wang 0011 — Southeast University, School of Computer Science and Engineering, MOE, Key Laboratory of Computer Network and Information Integration, Nanjing, China
- Qian Wang 0012
— Hangzhou Dianzi University, Institute of Information and Control, China (and 1 more)
- Qian Wang 0013
— Information Science and Technology Institute, Zhengzhou, China
- Qian Wang 0014
— Zhongnan University of Economics and Law, School of Information and Safety Engineering, Wuhan, China (and 2 more)
- Qian Wang 0015
— Beijing University of Posts and Telecommunications, Network Management Center, China
- Qian Wang 0016
— Aalborg University, Department of Energy Technology, Denmark (and 1 more)
- Qian Wang 0017
— Durham University, UK (and 1 more)
- Qian Wang 0018 — University of Bath, Department of Mechanical Engineering, UK (and 1 more)
- Qian Wang 0019
— Xi'an University of Posts and Telecommunications, School of Telecommunication and Information Engineering, China (and 3 more)
- Qian Wang 0020 — Harbin Institute of Technology, School of Mechatronics Engineering, China
- Qian Wang 0021
— EPFL, Computational Mathematics and Simulation Science, Lausanne, Switzerland (and 1 more)
- Qian Wang 0022
— University of Maryland, College Park, USA (and 1 more)
- Qian Wang 0023 — Zhengzhou University of Light Industry, Zhengzhou, China
- Qian Wang 0024 — University of Texas at Dallas, Department of Computer Science, Richardson, TX, USA
- Qian Wang 0025
— Peking University, School of Computer Science, China
- Qian Wang 0026 — Xi'an University of Architecture and Technology, School of Management, China
- Qian Wang 0027
— University of Electronic Science and Technology of China, School of Aeronautics and Astronautics, Chengdu, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j151]Ningping Mou, Xinli Yue, Lingchen Zhao, Qian Wang:
Fairness is essential for robustness: fair adversarial training by identifying and augmenting hard examples. Frontiers Comput. Sci. 19(3): 193803 (2025) - [j150]Xueluan Gong
, Shuaike Li
, Yanjiao Chen
, Mingzhe Li
, Rubin Wei, Qian Wang
, Kwok-Yan Lam
:
Augmenting Model Extraction Attacks Against Disruption-Based Defenses. IEEE Trans. Inf. Forensics Secur. 20: 531-546 (2025) - [c103]Geling Liu, Yunzhi Tan, Ruichao Zhong, Yuanzhen Xie, Lingchen Zhao, Qian Wang, Bo Hu, Zang Li:
Solid-SQL: Enhanced Schema-linking based In-context Learning for Robust Text-to-SQL. COLING 2025: 9793-9803 - [c102]Wentao Dong, Peipei Jiang, Huayi Duan, Cong Wang, Lingchen Zhao, Qian Wang:
Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared Shuffle. NDSS 2025 - [i57]Chen Chen, Mengyuan Sun, Xueluan Gong, Yanjiao Chen, Qian Wang:
A Survey on Facial Image Privacy Preservation in Cloud-Based Services. CoRR abs/2501.08665 (2025) - [i56]Xueluan Gong, Yuji Wang, Yanjiao Chen, Haocheng Dong, Yiming Li, Mengyuan Sun, Shuaike Li, Qian Wang, Chen Chen:
ARMOR: Shielding Unlearnable Examples against Data Augmentation. CoRR abs/2501.08862 (2025) - [i55]Shenyi Zhang, Yuchen Zhai, Keyan Guo, Hongxin Hu, Shengnan Guo, Zheng Fang, Lingchen Zhao, Chao Shen, Cong Wang, Qian Wang:
JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation. CoRR abs/2502.07557 (2025) - 2024
- [j149]Xueluan Gong
, Yanjiao Chen
, Huayang Huang
, Weihan Kong
, Ziyao Wang, Chao Shen
, Qian Wang
:
KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework. IEEE Trans. Dependable Secur. Comput. 21(4): 1605-1620 (2024) - [j148]Lei Xu
, Anxin Zhou
, Huayi Duan
, Cong Wang
, Qian Wang
, Xiaohua Jia
:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. IEEE Trans. Dependable Secur. Comput. 21(4): 1918-1934 (2024) - [j147]Xueluan Gong
, Zheng Fang
, Bowen Li
, Tao Wang
, Yanjiao Chen
, Qian Wang
:
Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models. IEEE Trans. Dependable Secur. Comput. 21(4): 2672-2685 (2024) - [j146]Jingyi Deng
, Chenhao Lin
, Pengbin Hu
, Chao Shen
, Qian Wang
, Qi Li
, Qiming Li
:
Towards Benchmarking and Evaluating Deepfake Detection. IEEE Trans. Dependable Secur. Comput. 21(6): 5112-5127 (2024) - [j145]Xiaoxue Hu, Geling Liu, Baolin Zheng, Lingchen Zhao
, Qian Wang
, Yufei Zhang, Minxin Du
:
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency. IEEE Trans. Inf. Forensics Secur. 19: 2398-2411 (2024) - [j144]Shenyi Zhang
, Baolin Zheng, Peipei Jiang
, Lingchen Zhao
, Chao Shen
, Qian Wang
:
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models. IEEE Trans. Inf. Forensics Secur. 19: 3164-3177 (2024) - [j143]Zuomin Qu
, Zuping Xi
, Wei Lu
, Xiangyang Luo, Qian Wang
, Bin Li
:
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios. IEEE Trans. Inf. Forensics Secur. 19: 3943-3957 (2024) - [j142]Yinghua Gao
, Yiming Li
, Xueluan Gong
, Zhifeng Li
, Shu-Tao Xia
, Qian Wang
:
Backdoor Attack With Sparse and Invisible Trigger. IEEE Trans. Inf. Forensics Secur. 19: 6364-6376 (2024) - [j141]Ningping Mou
, Binqing Guo
, Lingchen Zhao
, Cong Wang
, Yue Zhao
, Qian Wang
:
No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures. IEEE Trans. Inf. Forensics Secur. 19: 9803-9818 (2024) - [j140]Bingyi Liu
, Weizhen Han
, Enshu Wang
, Shengwu Xiong
, Libing Wu, Qian Wang
, Jianping Wang
, Chunming Qiao:
Multi-Agent Attention Double Actor-Critic Framework for Intelligent Traffic Light Control in Urban Scenarios With Hybrid Traffic. IEEE Trans. Mob. Comput. 23(1): 660-672 (2024) - [j139]Man Zhou
, Yuting Zhou
, Shuao Su
, Qian Wang
, Qi Li
, Shengshan Hu, Chunwu Yu
, Zhengxiong Li
:
FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction Sound. IEEE Trans. Mob. Comput. 23(6): 7210-7224 (2024) - [j138]Man Zhou
, Qian Wang
, Qi Li
, Wenyu Zhou
, Jingxiao Yang
, Chao Shen
:
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns. IEEE Trans. Mob. Comput. 23(10): 9772-9788 (2024) - [j137]Xiaozhen Lu
, Liang Xiao
, Yilin Xiao, Wei Wang
, Nan Qi
, Qian Wang
:
Risk-Aware Federated Reinforcement Learning-Based Secure IoV Communications. IEEE Trans. Mob. Comput. 23(12): 14656-14671 (2024) - [c101]Zheng Fang
, Tao Wang
, Lingchen Zhao
, Shenyi Zhang
, Bowen Li
, Yunjie Ge
, Qi Li
, Chao Shen
, Qian Wang
:
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems. CCS 2024: 630-644 - [c100]Xueluan Gong
, Rubin Wei
, Ziyao Wang
, Yuchen Sun
, Jiawen Peng
, Yanjiao Chen
, Qian Wang
:
Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions. CCS 2024: 3838-3852 - [c99]Zihao Li
, Xuekong Xu
, Zuoli Tang
, Lixin Zou
, Qian Wang
, Chenliang Li
:
Spectral and Geometric Spaces Representation Regularization for Multi-Modal Sequential Recommendation. CIKM 2024: 1336-1345 - [c98]Xinli Yue, Ningping Mou
, Qian Wang, Lingchen Zhao:
Revisiting Adversarial Training Under Long-Tailed Distributions. CVPR 2024: 24492-24501 - [c97]Junyan Wu
, Wei Lu
, Xiangyang Luo
, Rui Yang
, Qian Wang
, Xiaochun Cao
:
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization. ACM Multimedia 2024: 7395-7403 - [c96]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. NDSS 2024 - [c95]Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, Zhengxiong Li:
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound. NDSS 2024 - [c94]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang:
Hijacking Attacks against Neural Network by Analyzing Training Data. USENIX Security Symposium 2024 - [c93]Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen:
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor. USENIX Security Symposium 2024 - [c92]Haitao Mao
, Lixin Zou
, Yujia Zheng
, Jiliang Tang
, Xiaokai Chu
, Jiashu Zhao
, Qian Wang
, Dawei Yin
:
Whole Page Unbiased Learning to Rank. WWW 2024: 1431-1440 - [i54]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang
:
Hijacking Attacks against Neural Networks by Analyzing Training Data. CoRR abs/2401.09740 (2024) - [i53]Xinli Yue, Ningping Mou, Qian Wang, Lingchen Zhao:
Revisiting Adversarial Training under Long-Tailed Distributions. CoRR abs/2403.10073 (2024) - [i52]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. CoRR abs/2403.15271 (2024) - [i51]Xiaoyu Zhang, Weipeng Jiang, Chao Shen, Qi Li, Qian Wang, Chenhao Lin, Xiaohong Guan:
A Survey of Deep Learning Library Testing Methods. CoRR abs/2404.17871 (2024) - [i50]Chunlin Qiu, Yiheng Duan, Lingchen Zhao, Qian Wang:
Enhancing Adversarial Transferability Through Neighborhood Conditional Sampling. CoRR abs/2405.16181 (2024) - [i49]Chen Ma, Ningfei Wang, Zhengyu Zhao, Qian Wang, Qi Alfred Chen, Chao Shen:
ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving. CoRR abs/2406.05810 (2024) - [i48]Zheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang
, Bowen Li, Yunjie Ge, Qi Li, Chao Shen, Qian Wang:
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems. CoRR abs/2406.19311 (2024) - [i47]Jingyi Deng, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Qian Wang, Chao Shen:
A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication. CoRR abs/2407.10575 (2024) - [i46]Junyan Wu, Wei Lu, Xiangyang Luo, Rui Yang, Qian Wang, Xiaochun Cao:
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization. CoRR abs/2407.16554 (2024) - [i45]Jikang Cheng, Jiaxin Ai, Zhen Han, Chao Liang, Qin Zou, Zhongyuan Wang, Qian Wang:
IDRetracor: Towards Visual Forensics Against Malicious Face Swapping. CoRR abs/2408.06635 (2024) - [i44]Zuomin Qu, Wei Lu, Xiangyang Luo, Qian Wang, Xiaochun Cao:
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification. CoRR abs/2409.13349 (2024) - [i43]Xinli Yue, Jianhui Sun, Liangchao Yao, Fan Xia, Yuetang Deng, Tianyi Wang, Lei Li, Fengyun Rao, Jing Lv, Qian Wang, Lingchen Zhao:
Revisiting Video Quality Assessment from the Perspective of Generalization. CoRR abs/2409.14847 (2024) - [i42]Xueluan Gong, Mingzhe Li, Yilin Zhang, Fengyuan Ran, Chen Chen, Yanjiao Chen, Qian Wang, Kwok-Yan Lam:
Effective and Evasive Fuzz Testing-Driven Jailbreaking Attacks against LLMs. CoRR abs/2409.14866 (2024) - [i41]Xinli Yue, Jianhui Sun, Han Kong, Liangchao Yao, Tianyi Wang, Lei Li, Fengyun Rao, Jing Lv, Fan Xia, Yuetang Deng, Qian Wang, Lingchen Zhao:
Advancing Video Quality Assessment for AIGC. CoRR abs/2409.14888 (2024) - [i40]Xueluan Gong, Yuji Wang, Shuaike Li, Mengyuan Sun, Songze Li, Qian Wang, Kwok-Yan Lam, Chen Chen:
Hidden Data Privacy Breaches in Federated Learning. CoRR abs/2411.18269 (2024) - [i39]Xueluan Gong, Bowei Tian, Meng Xue, Shuike Li, Yanjiao Chen, Qian Wang:
Megatron: Evasive Clean-Label Backdoor Attacks against Vision Transformer. CoRR abs/2412.04776 (2024) - [i38]Xueluan Gong, Bowei Tian, Meng Xue, Yuan Wu, Yanjiao Chen, Qian Wang:
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers. CoRR abs/2412.06149 (2024) - [i37]Geling Liu, Yunzhi Tan, Ruichao Zhong, Yuanzhen Xie, Lingchen Zhao, Qian Wang, Bo Hu, Zang Li:
Solid-SQL: Enhanced Schema-linking based In-context Learning for Robust Text-to-SQL. CoRR abs/2412.12522 (2024) - 2023
- [j136]Yuanhao Yue, Qin Zou, Hongkai Yu, Qian Wang, Zhongyuan Wang, Song Wang:
An end-to-end network for co-saliency detection in one single image. Sci. China Inf. Sci. 66(11) (2023) - [j135]Yunjie Ge, Qian Wang, Jiayuan Yu, Chao Shen, Qi Li:
Data Poisoning and Backdoor Attacks on Audio Intelligence Systems. IEEE Commun. Mag. 61(12): 176-182 (2023) - [j134]Zheng Zheng, Qian Wang, Cong Wang:
Spoofing Attacks and Anti-Spoofing Methods for Face Authentication Over Smartphones. IEEE Commun. Mag. 61(12): 213-219 (2023) - [j133]Sicong Han
, Chenhao Lin, Chao Shen, Qian Wang, Xiaohong Guan:
Interpreting Adversarial Examples in Deep Learning: A Review. ACM Comput. Surv. 55(14s): 328:1-328:38 (2023) - [j132]Yanling Wang
, Qian Wang
, Lingchen Zhao, Cong Wang:
Differential privacy in deep learning: Privacy and beyond. Future Gener. Comput. Syst. 148: 408-424 (2023) - [j131]Buyun Liang, Zhongyuan Wang, Baojin Huang, Qin Zou, Qian Wang, Jingjing Liang:
Depth map guided triplet network for deepfake face detection. Neural Networks 159: 34-42 (2023) - [j130]Dongheng Zhang
, Jia Meng, Jian Zhang, Xinzhe Deng, Shouhong Ding, Man Zhou, Qian Wang
, Qi Li
, Yan Chen
:
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices. IEEE Trans. Circuits Syst. Video Technol. 33(8): 4401-4414 (2023) - [j129]Huayi Duan
, Yuefeng Du
, Leqian Zheng
, Cong Wang
, Man Ho Au
, Qian Wang
:
Towards Practical Auditing of Dynamic Data in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 20(1): 708-723 (2023) - [j128]Man Zhou
, Qian Wang
, Xiu Lin, Yi Zhao
, Peipei Jiang
, Qi Li
, Chao Shen
, Cong Wang
:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. IEEE Trans. Dependable Secur. Comput. 20(2): 1228-1242 (2023) - [j127]Dan Liu, Qian Wang
, Man Zhou
, Peipei Jiang
, Qi Li
, Chao Shen
, Cong Wang
:
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals. IEEE Trans. Dependable Secur. Comput. 20(2): 1687-1701 (2023) - [j126]Peipei Jiang
, Qian Wang
, Xiu Lin, Man Zhou
, Wenbing Ding, Cong Wang
, Chao Shen
, Qi Li
:
Securing Liveness Detection for Voice Authentication via Pop Noises. IEEE Trans. Dependable Secur. Comput. 20(2): 1702-1718 (2023) - [j125]Chenhao Lin
, Jingyi He
, Chao Shen
, Qi Li
, Qian Wang
:
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics. IEEE Trans. Dependable Secur. Comput. 20(3): 2314-2327 (2023) - [j124]Yuefeng Du
, Huayi Duan
, Lei Xu
, Helei Cui
, Cong Wang
, Qian Wang
:
${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services. IEEE Trans. Dependable Secur. Comput. 20(5): 4343-4358 (2023) - [j123]Xueluan Gong
, Ziyao Wang, Yanjiao Chen
, Meng Xue
, Qian Wang
, Chao Shen
:
Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters. IEEE Trans. Dependable Secur. Comput. 20(6): 4993-5004 (2023) - [j122]Minxin Du
, Peipei Jiang
, Qian Wang
, Sherman S. M. Chow
, Lingchen Zhao
:
Shielding Graph for eXact Analytics With SGX. IEEE Trans. Dependable Secur. Comput. 20(6): 5102-5112 (2023) - [j121]Zhuangzhuang Zhang
, Libing Wu, Chuanguo Ma, Jianxin Li
, Jing Wang, Qian Wang
, Shui Yu
:
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing. IEEE Trans. Inf. Forensics Secur. 18: 365-379 (2023) - [j120]Zheng Zheng
, Qian Wang
, Cong Wang
, Man Zhou, Yi Zhao
, Qi Li
, Chao Shen
:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. IEEE Trans. Inf. Forensics Secur. 18: 1295-1308 (2023) - [j119]Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Qian Wang
, Cong Wang
:
MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs. IEEE Trans. Inf. Forensics Secur. 18: 2929-2944 (2023) - [j118]Yunjie Ge
, Lingchen Zhao
, Qian Wang
, Yiheng Duan, Minxin Du
:
AdvDDoS: Zero-Query Adversarial Attacks Against Commercial Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 18: 3647-3661 (2023) - [j117]Xueluan Gong
, Ziyao Wang, Shuaike Li
, Yanjiao Chen
, Qian Wang
:
A GAN-Based Defense Framework Against Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 18: 4475-4487 (2023) - [j116]Xueluan Gong
, Yanjiao Chen
, Wenbin Yang
, Huayang Huang
, Qian Wang
:
B3: Backdoor Attacks against Black-box Machine Learning Models. ACM Trans. Priv. Secur. 26(4): 43:1-43:24 (2023) - [j115]Zhibo Wang
, Jingxin Li, Jiahui Hu
, Ju Ren
, Qian Wang
, Zhetao Li
, Yanjun Li
:
Towards Privacy-Driven Truthful Incentives for Mobile Crowdsensing Under Untrusted Platform. IEEE Trans. Mob. Comput. 22(2): 1198-1212 (2023) - [j114]Xueluan Gong
, Yanjiao Chen, Qian Wang, Weihan Kong
:
Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions. IEEE Wirel. Commun. 30(2): 114-121 (2023) - [c91]Peipei Jiang
, Qian Wang
, Yihao Wu
, Cong Wang
:
Poster: Metadata-private Messaging without Coordination. CCS 2023: 3615-3617 - [c90]Baojin Huang, Zhongyuan Wang, Jifan Yang
, Jiaxin Ai, Qin Zou, Qian Wang, Dengpan Ye:
Implicit Identity Driven Deepfake Face Swapping Detection. CVPR 2023: 4490-4499 - [c89]Yi Zhao, Ningping Mou
, Yunjie Ge, Qian Wang:
Improving Adversarial Transferability with Ghost Samples. ECAI 2023: 3107-3114 - [c88]Xinlu Zhuang, Yunjie Ge, Baolin Zheng, Qian Wang:
Adversarial Network Pruning by Filter Robustness Estimation. ICASSP 2023: 1-5 - [c87]Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou
, Hai Jin:
Downstream-agnostic Adversarial Examples. ICCV 2023: 4322-4332 - [c86]Huayang Huang, Qian Wang, Xueluan Gong, Tao Wang:
Orion: Online Backdoor Sample Detection via Evolution Deviance. IJCAI 2023: 864-874 - [c85]Xinli Yue, Ningping Mou, Qian Wang, Lingchen Zhao:
Revisiting Adversarial Robustness Distillation from the Perspective of Robust Fairness. NeurIPS 2023 - [c84]Peipei Jiang, Qian Wang, Jianhao Cheng, Cong Wang, Lei Xu, Xinyu Wang, Yihao Wu, Xiaoyuan Li, Kui Ren:
Boomerang: Metadata-Private Messaging under Hardware Trust. NSDI 2023: 877-899 - [c83]Yanling Wang
, Yuchen Liu
, Qian Wang
, Cong Wang
, Chenliang Li
:
Poisoning Self-supervised Learning Based Sequential Recommendations. SIGIR 2023: 300-310 - [c82]Yu Tian
, Bofang Li
, Si Chen
, Xubin Li
, Hongbo Deng
, Jian Xu
, Bo Zheng
, Qian Wang
, Chenliang Li
:
Multi-Scenario Ranking with Adaptive Feature Learning. SIGIR 2023: 517-526 - [c81]Xueluan Gong, Yanjiao Chen, Wang Yang, Qian Wang, Yuzhe Gu, Huayang Huang, Chao Shen:
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation. SP 2023: 755-772 - [c80]Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao:
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. USENIX Security Symposium 2023: 247-264 - [c79]Xueluan Gong
, Ziyao Wang
, Yanjiao Chen
, Qian Wang
, Cong Wang
, Chao Shen
:
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples. WWW 2023: 2045-2053 - [i36]Yinghua Gao, Yiming Li, Xueluan Gong, Shu-Tao Xia, Qian Wang:
Backdoor Attack with Sparse and Invisible Trigger. CoRR abs/2306.06209 (2023) - [i35]Yu Tian, Bofang Li, Si Chen, Xubin Li, Hongbo Deng, Jian Xu, Bo Zheng, Qian Wang, Chenliang Li:
Multi-Scenario Ranking with Adaptive Feature Learning. CoRR abs/2306.16732 (2023) - [i34]Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin:
Downstream-agnostic Adversarial Examples. CoRR abs/2307.12280 (2023) - 2022
- [j113]Xueluan Gong
, Yanjiao Chen, Qian Wang, Meng Wang, Shuyang Li:
Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions. IEEE Commun. Mag. 60(9): 46-52 (2022) - [j112]Jie Sun
, Lingchen Zhao, Zhuotao Liu, Qi Li, Xinhao Deng
, Qian Wang
, Yong Jiang:
Practical differentially private online advertising. Comput. Secur. 112: 102504 (2022) - [j111]Xueluan Gong
, Yanjiao Chen, Huayang Huang, Yuqing Liao, Shuai Wang, Qian Wang:
Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers. IEEE Netw. 36(1): 84-90 (2022) - [j110]Minghui Li
, Sherman S. M. Chow
, Shengshan Hu
, Yuejing Yan, Chao Shen, Qian Wang
:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. IEEE Trans. Dependable Secur. Comput. 19(3): 1592-1604 (2022) - [j109]Yanjiao Chen
, Xin Tian, Qian Wang
, Jianlin Jiang
, Minghui Li
, Qian Zhang
:
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation. IEEE Trans. Dependable Secur. Comput. 19(3): 2038-2053 (2022) - [j108]Yuefeng Du
, Huayi Duan
, Anxin Zhou
, Cong Wang
, Man Ho Au
, Qian Wang
:
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain. IEEE Trans. Dependable Secur. Comput. 19(5): 3038-3054 (2022) - [j107]Xinyu Wang
, Yuefeng Du
, Cong Wang
, Qian Wang
, Liming Fang
:
WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave. IEEE Trans. Dependable Secur. Comput. 19(5): 3055-3070 (2022) - [j106]Lingchen Zhao
, Jianlin Jiang
, Bo Feng
, Qian Wang
, Chao Shen
, Qi Li
:
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning. IEEE Trans. Dependable Secur. Comput. 19(5): 3329-3342 (2022) - [j105]Qilei Yin
, Zhuotao Liu
, Qi Li
, Tao Wang, Qian Wang
, Chao Shen
, Yixiao Xu:
An Automated Multi-Tab Website Fingerprinting Attack. IEEE Trans. Dependable Secur. Comput. 19(6): 3656-3670 (2022) - [j104]Qi Li
, Xinhao Deng
, Zhuotao Liu
, Yuan Yang, Xiaoyue Zou
, Qian Wang
, Mingwei Xu
, Jianping Wu:
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling. IEEE Trans. Inf. Forensics Secur. 17: 486-499 (2022) - [j103]Xiaozhen Lu
, Liang Xiao
, Guohang Niu, Xiangyang Ji
, Qian Wang
:
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure. IEEE Trans. Inf. Forensics Secur. 17: 732-743 (2022) - [j102]Minxin Du
, Shuangke Wu, Qian Wang
, Dian Chen, Peipei Jiang
, Aziz Mohaisen
:
GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy. IEEE Trans. Knowl. Data Eng. 34(7): 3295-3308 (2022) - [j101]Zhibo Wang
, Tengda Zhao, Jinxin Ma
, Hongkai Chen, Kaixin Liu, Huajie Shao
, Qian Wang
, Ju Ren
:
Hear Sign Language: A Real-Time End-to-End Sign Language Recognition System. IEEE Trans. Mob. Comput. 21(7): 2398-2410 (2022) - [j100]Zhuangzhuang Zhang
, Libing Wu, Debiao He, Qian Wang
, Dan Wu, Xiaochuan Shi
, Chao Ma
:
G-VCFL: Grouped Verifiable Chained Privacy-Preserving Federated Learning. IEEE Trans. Netw. Serv. Manag. 19(4): 4219-4231 (2022) - [j99]Xiaoyi Pang
, Zhibo Wang
, Defang Liu, John C. S. Lui
, Qian Wang
, Ju Ren
:
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams. IEEE/ACM Trans. Netw. 30(1): 327-340 (2022) - [c78]Chengjun Cai
, Yichen Zang
, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. CCS 2022: 441-454 - [c77]Peiyang Li, Ye Wang
, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Qi Li:
Verifying the Quality of Outsourced Training on Clouds. ESORICS (2) 2022: 126-144 - [c76]Yike Zhan, Baolin Zheng, Qian Wang, Ningping Mou
, Binqing Guo, Qi Li, Chao Shen, Cong Wang:
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems. ICME 2022: 1-6 - [c75]Xuanqi Gao, Juan Zhai
, Shiqing Ma, Chao Shen, Yufei Chen
, Qian Wang:
Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. ICSE 2022: 921-933 - [c74]Ningping Mou
, Baolin Zheng, Qian Wang, Yunjie Ge, Binqing Guo:
A Few Seconds Can Change Everything: Fast Decision-based Attacks against DNNs. IJCAI 2022: 3342-3350 - [c73]Xueluan Gong, Yanjiao Chen, Jianshuo Dong, Qian Wang:
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks. NDSS 2022 - [c72]Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li:
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. USENIX Security Symposium 2022: 2225-2242 - [i33]Chenhao Lin, Jingyi Deng, Pengbin Hu, Chao Shen, Qian Wang, Qi Li:
Towards Benchmarking and Evaluating Deepfake Detection. CoRR abs/2203.02115 (2022) - [i32]Yunjie Ge, Qian Wang, Jingfeng Zhang, Juntao Zhou, Yunzhu Zhang, Chao Shen:
WaveFuzz: A Clean-Label Poisoning Attack to Protect Your Voice. CoRR abs/2203.13497 (2022) - [i31]Xuanqi Gao, Juan Zhai
, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang:
FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. CoRR abs/2204.02567 (2022) - [i30]Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. IACR Cryptol. ePrint Arch. 2022: 894 (2022) - [i29]Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. IACR Cryptol. ePrint Arch. 2022: 1115 (2022) - 2021
- [j98]Yanjiao Chen
, Baolin Zheng, Zihan Zhang, Qian Wang
, Chao Shen
, Qian Zhang
:
Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions. ACM Comput. Surv. 53(4): 84:1-84:37 (2021) - [j97]Xueluan Gong
, Yanjiao Chen
, Qian Wang
, Huayang Huang, Lingshuo Meng
, Chao Shen
, Qian Zhang
:
Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment. IEEE J. Sel. Areas Commun. 39(8): 2617-2631 (2021) - [j96]Minghui Li
, Yuejing Yan, Qian Wang
, Minxin Du
, Zhan Qin, Cong Wang:
Secure Prediction of Neural Network in the Cloud. IEEE Netw. 35(1): 251-257 (2021) - [j95]Peipei Jiang
, Qian Wang
, Muqi Huang, Cong Wang
, Qi Li
, Chao Shen
, Kui Ren
:
Building In-the-Cloud Network Functions: Security and Privacy Challenges. Proc. IEEE 109(12): 1888-1919 (2021) - [j94]Shengshan Hu
, Leo Yu Zhang
, Qian Wang
, Zhan Qin, Cong Wang:
Towards Private and Scalable Cross-Media Retrieval. IEEE Trans. Dependable Secur. Comput. 18(3): 1354-1368 (2021) - [j93]Zhibo Wang
, Mengkai Song
, Siyan Zheng
, Zhifei Zhang
, Yang Song
, Qian Wang
:
Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach. IEEE Trans. Dependable Secur. Comput. 18(3): 1474-1488 (2021) - [j92]Helei Cui
, Yajin Zhou
, Cong Wang
, Xinyu Wang
, Yuefeng Du
, Qian Wang
:
PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing. IEEE Trans. Dependable Secur. Comput. 18(4): 1762-1778 (2021) - [j91]Lingchen Zhao
, Shengshan Hu
, Qian Wang
, Jianlin Jiang
, Chao Shen, Xiangyang Luo
, Pengfei Hu
:
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2029-2041 (2021) - [j90]Shengshan Hu, Chengjun Cai
, Qian Wang
, Cong Wang
, Zhibo Wang
, Dengpan Ye
:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. IEEE Trans. Dependable Secur. Comput. 18(6): 2569-2581 (2021) - [j89]Qian Wang
, Baolin Zheng, Qi Li
, Chao Shen
, Zhongjie Ba
:
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 896-908 (2021) - [j88]Xiaofeng Chen
, Hui Li
, Jin Li
, Qian Wang
, Xinyi Huang
, Willy Susilo
, Yang Xiang
:
Publicly Verifiable Databases With All Efficient Updating Operations. IEEE Trans. Knowl. Data Eng. 33(12): 3729-3740 (2021) - [j87]Man Zhou
, Qian Wang
, Jingxiao Yang
, Qi Li
, Peipei Jiang
, Yanjiao Chen, Zhibo Wang
:
Stealing Your Android Patterns via Acoustic Signals. IEEE Trans. Mob. Comput. 20(4): 1656-1671 (2021) - [j86]Zhibo Wang
, Yuting Huang
, Xinkai Wang
, Ju Ren
, Qian Wang
, Libing Wu
:
SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment With Social Networks. IEEE Trans. Mob. Comput. 20(5): 2055-2066 (2021) - [j85]Zhibo Wang
, Jing Zhao
, Jiahui Hu
, Tianqing Zhu
, Qian Wang
, Ju Ren
, Chao Li:
Towards Personalized Task-Oriented Worker Recruitment in Mobile Crowdsensing. IEEE Trans. Mob. Comput. 20(5): 2080-2093 (2021) - [j84]Dian Chen, Haobo Yuan
, Shengshan Hu
, Qian Wang
, Cong Wang
:
BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication. IEEE Trans. Parallel Distributed Syst. 32(4): 786-798 (2021) - [j83]Yanjiao Chen
, Long Lin, Baochun Li
, Qian Wang
, Qian Zhang
:
Silhouette: Efficient Cloud Configuration Exploration for Large-Scale Analytics. IEEE Trans. Parallel Distributed Syst. 32(8): 2049-2061 (2021) - [j82]Lingchen Zhao
, Qian Wang
, Cong Wang
, Qi Li
, Chao Shen
, Bo Feng:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. IEEE Trans. Parallel Distributed Syst. 32(10): 2524-2540 (2021) - [c71]Baolin Zheng, Peipei Jiang
, Qian Wang
, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang
:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CCS 2021: 86-107 - [c70]Wei Song, Mengfei Tang, Qiben Yan, Yuan Shen, Yang Cao, Qian Wang
, Zhiyong Peng:
Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server. DASFAA (1) 2021: 474-490 - [c69]Sicong Han
, Chenhao Lin, Chao Shen, Qian Wang
:
Rethinking Adversarial Examples Exploiting Frequency-Based Analysis. ICICS (2) 2021: 73-89 - [c68]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. ICML 2021: 1640-1650 - [c67]Xueluan Gong
, Yanjiao Chen, Wenbin Yang, Guanghao Mei, Qian Wang:
InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion. IJCAI 2021: 2439-2447 - [c66]Tao Bai, Jinqi Luo, Jun Zhao, Bihan Wen
, Qian Wang:
Recent Advances in Adversarial Training for Adversarial Robustness. IJCAI 2021: 4312-4321 - [c65]Yunjie Ge, Qian Wang
, Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, Cong Wang:
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. ACM Multimedia 2021: 826-834 - [c64]Yu Tian
, Yuhao Yang
, Xudong Ren, Pengfei Wang, Fangzhao Wu
, Qian Wang
, Chenliang Li:
Joint Knowledge Pruning and Recurrent Graph Convolution for News Recommendation. SIGIR 2021: 51-60 - [i28]Tao Bai, Jinqi Luo, Jun Zhao, Bihan Wen, Qian Wang:
Recent Advances in Adversarial Training for Adversarial Robustness. CoRR abs/2102.01356 (2021) - [i27]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. CoRR abs/2106.06667 (2021) - [i26]Man Zhou, Qian Wang, Qi Li, Peipei Jiang, Jingxiao Yang, Chao Shen, Cong Wang, Shouhong Ding:
Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns. CoRR abs/2106.08013 (2021) - [i25]Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CoRR abs/2110.09714 (2021) - 2020
- [j81]Xingliang Yuan
, Chengjun Cai
, Cong Wang, Qian Wang:
A scalable ledger-assisted architecture for secure query processing over distributed IoT data. CCF Trans. Netw. 3(2): 97-111 (2020) - [j80]Xueluan Gong
, Qian Wang
, Yanjiao Chen, Wang Yang, Xinchang Jiang:
Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models. IEEE Commun. Mag. 58(12): 83-89 (2020) - [j79]Mengkai Song
, Zhibo Wang
, Zhifei Zhang, Yang Song, Qian Wang
, Ju Ren
, Hairong Qi:
Analyzing User-Level Privacy Attack Against Federated Learning. IEEE J. Sel. Areas Commun. 38(10): 2430-2444 (2020) - [j78]Yanjiao Chen, Xueluan Gong
, Qian Wang
, Xing Di, Huayang Huang:
Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments. IEEE Netw. 34(5): 141-147 (2020) - [j77]Kui Ren
, Qian Wang
, Cong Wang
, Zhan Qin, Xiaodong Lin
:
The Security of Autonomous Driving: Threats, Defenses, and Future Directions. Proc. IEEE 108(2): 357-372 (2020) - [j76]Dong Yuan, Qi Li
, Guoliang Li
, Qian Wang
, Kui Ren:
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing. IEEE Trans. Inf. Forensics Secur. 15: 299-314 (2020) - [j75]Lingchen Zhao, Qian Wang
, Qin Zou
, Yan Zhang, Yanjiao Chen
:
Privacy-Preserving Collaborative Deep Learning With Unreliable Participants. IEEE Trans. Inf. Forensics Secur. 15: 1486-1500 (2020) - [j74]Libing Wu
, Jingxiao Yang, Man Zhou
, Yanjiao Chen
, Qian Wang
:
LVID: A Multimodal Biometrics Authentication System on Smartphones. IEEE Trans. Inf. Forensics Secur. 15: 1572-1585 (2020) - [j73]Qian Wang
, Zixi Li, Qin Zou
, Lingchen Zhao, Song Wang
:
Deep Domain Adaptation With Differential Privacy. IEEE Trans. Inf. Forensics Secur. 15: 3093-3106 (2020) - [j72]Qin Zou
, Yanling Wang
, Qian Wang
, Yi Zhao, Qingquan Li
:
Deep Learning-Based Gait Recognition Using Smartphones in the Wild. IEEE Trans. Inf. Forensics Secur. 15: 3197-3212 (2020) - [j71]Qin Zou
, Hanwen Jiang, Qiyu Dai
, Yuanhao Yue, Long Chen
, Qian Wang
:
Robust Lane Detection From Continuous Driving Scenes Using Deep Neural Networks. IEEE Trans. Veh. Technol. 69(1): 41-54 (2020) - [j70]Jiahui Hu
, Zhibo Wang
, Jian Wei, Ruizhao Lv, Jing Zhao, Qian Wang
, Honglong Chen, Dejun Yang
:
Towards Demand-Driven Dynamic Incentive for Mobile Crowdsensing Systems. IEEE Trans. Wirel. Commun. 19(7): 4907-4918 (2020) - [c63]Zhibo Wang, Jinxin Ma
, Yongquan Zhang, Qian Wang, Ju Ren, Peng Sun:
Attention-over-Attention Field-Aware Factorization Machine. AAAI 2020: 6323-6330 - [c62]Yuefeng Du
, Huayi Duan
, Anxin Zhou
, Cong Wang, Man Ho Au, Qian Wang
:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. ICDCS 2020: 201-211 - [c61]Chengjun Cai
, Lei Xu
, Anxin Zhou
, Ruochen Wang, Cong Wang, Qian Wang
:
EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves. INFOCOM 2020: 1887-1896 - [c60]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Mengkai Song, Siyan Zheng, Qian Wang
, Ben Niu:
Towards compression-resistant privacy-preserving photo sharing on social networks. MobiHoc 2020: 81-90 - [p1]Lingjuan Lyu, Xinyi Xu, Qian Wang
, Han Yu
:
Collaborative Fairness in Federated Learning. Federated Learning 2020: 189-204 - [i24]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. CoRR abs/2005.05531 (2020)
2010 – 2019
- 2019
- [j69]Zhibo Wang, Jiahui Hu
, Qian Wang
, Ruizhao Lv, Jian Wei, Honglong Chen, Xiaoguang Niu:
Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing. IEEE Commun. Mag. 57(2): 54-59 (2019) - [j68]Zhibo Wang, Jiahui Hu, Qian Wang
, Ruizhao Lv, Jian Wei, Honglong Chen, Xiaoguang Niu:
Task Bundling Based Incentive for Location-Dependent Mobile Crowdsourcing. IEEE Commun. Mag. 57(3): 132-137 (2019) - [j67]Zhibo Wang, Xiaoyi Pang, Jiahui Hu
, Wenxin Liu, Qian Wang
, Yanjun Li, Honglong Chen:
When Mobile Crowdsensing Meets Privacy. IEEE Commun. Mag. 57(9): 72-78 (2019) - [j66]Shengshan Hu, Xingcan Shang, Zhan Qin, Minghui Li
, Qian Wang
, Cong Wang:
Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures. IEEE Commun. Mag. 57(10): 120-126 (2019) - [j65]Yongdong Wu
, Dengpan Ye, Zhuo Wei
, Qian Wang
, William Tan, Robert H. Deng
:
Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks. IEEE Internet Things J. 6(2): 1617-1627 (2019) - [j64]Zhibo Wang
, Yijie Li, Bonan Jin, Qian Wang
, Yunhe Feng, Yanjun Li
, Huajie Shao:
AirMouse: Turning a Pair of Glasses Into a Mouse in the Air. IEEE Internet Things J. 6(5): 7473-7483 (2019) - [j63]Cheng Tan, Qian Wang
, Lina Wang, Lei Zhao:
Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions. IEEE Netw. 33(2): 174-180 (2019) - [j62]Qian Wang
, Jing Huang, Yanjiao Chen
, Cong Wang
, Fu Xiao
, Xiangyang Luo:
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation. IEEE Trans. Inf. Forensics Secur. 14(2): 374-386 (2019) - [j61]Shuangke Wu, Yanjiao Chen
, Qian Wang
, Minghui Li
, Cong Wang
, Xiangyang Luo
:
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction. IEEE Trans. Inf. Forensics Secur. 14(7): 1687-1701 (2019) - [j60]Qin Zou
, Zheng Zhang, Qingquan Li
, Xianbiao Qi, Qian Wang
, Song Wang
:
DeepCrack: Learning Hierarchical Convolutional Features for Crack Detection. IEEE Trans. Image Process. 28(3): 1498-1512 (2019) - [j59]Man Zhou
, Qian Wang
, Kui Ren, Dimitrios Koutsonikolas, Lu Su
, Yanjiao Chen
:
Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones. IEEE Trans. Mob. Comput. 18(3): 560-573 (2019) - [j58]Zhibo Wang
, Jiahui Hu
, Ruizhao Lv, Jian Wei, Qian Wang
, Dejun Yang
, Hairong Qi:
Personalized Privacy-Preserving Task Allocation for Mobile Crowdsensing. IEEE Trans. Mob. Comput. 18(6): 1330-1341 (2019) - [j57]Zhibo Wang
, Xiaoyi Pang, Yahong Chen, Huajie Shao, Qian Wang
, Libing Wu
, Honglong Chen
, Hairong Qi:
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server. IEEE Trans. Mob. Comput. 18(6): 1356-1367 (2019) - [j56]Yanjiao Chen
, Xin Tian, Qian Wang
, Minghui Li
, Minxin Du
, Qi Li
:
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum. IEEE Trans. Mob. Comput. 18(10): 2270-2284 (2019) - [j55]Libing Wu
, Cong Quan, Chenliang Li
, Qian Wang
, Bolong Zheng, Xiangyang Luo:
A Context-Aware User-Item Representation Learning for Item Recommendation. ACM Trans. Inf. Syst. 37(2): 22:1-22:29 (2019) - [j54]Qian Wang
, Jing Huang, Yanjiao Chen
, Xin Tian, Qian Zhang
:
Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum. IEEE/ACM Trans. Netw. 27(2): 848-861 (2019) - [j53]Man Zhou
, Zhan Qin, Xiu Lin, Shengshan Hu
, Qian Wang
, Kui Ren:
Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars. IEEE Wirel. Commun. 26(5): 128-133 (2019) - [j52]Yanjiao Chen, Zhuo Ma, Qian Wang
, Jing Huang, Xin Tian, Qian Zhang
:
Privacy-Preserving Spectrum Auction Design: Challenges, Solutions, and Research Directions. IEEE Wirel. Commun. 26(5): 142-150 (2019) - [c59]Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang
, Xiao Liang:
Detecting Fake Accounts in Online Social Networks at the Time of Registrations. CCS 2019: 1423-1438 - [c58]Huayi Duan
, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang
, Kui Ren:
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed. CCS 2019: 2351-2367 - [c57]Xingliang Yuan, Chengjun Cai
, Qian Wang
, Qi Li:
Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data. DSC 2019: 1-8 - [c56]Zhibo Wang, Siyan Zheng, Mengkai Song, Qian Wang
, Alireza Rahimpour, Hairong Qi:
advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns. ICCV 2019: 8340-8349 - [c55]Qian Wang
, Xiu Lin, Man Zhou
, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo:
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. INFOCOM 2019: 2062-2070 - [c54]Lei Xu
, Xingliang Yuan, Cong Wang, Qian Wang
, Chungen Xu
:
Hardening Database Padding for Searchable Encryption. INFOCOM 2019: 2503-2511 - [c53]Zhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang
, Hairong Qi:
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning. INFOCOM 2019: 2512-2520 - [i23]Qin Zou, Hanwen Jiang, Qiyu Dai, Yuanhao Yue, Long Chen, Qian Wang:
Robust Lane Detection from Continuous Driving Scenes Using Deep Neural Networks. CoRR abs/1903.02193 (2019) - [i22]Zhibo Wang, Siyan Zheng, Mengkai Song, Qian Wang, Alireza Rahimpour, Hairong Qi:
advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns. CoRR abs/1908.09327 (2019) - [i21]Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. CoRR abs/1909.06961 (2019) - [i20]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Minghui Li, Zhibo Wang, Dengpan Ye:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. CoRR abs/1909.09472 (2019) - [i19]Yuanhao Yue, Qin Zou, Hongkai Yu, Qian Wang, Song Wang:
An End-to-End Network for Co-Saliency Detection in One Single Image. CoRR abs/1910.11819 (2019) - [i18]Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo:
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection. CoRR abs/1910.13111 (2019) - 2018
- [j51]Tengfei Yang
, Jianfeng Ma, Qian Wang, Yinbin Miao, Xuan Wang
, Qian Meng:
Image Feature Extraction in Encrypted Domain With Privacy-Preserving Hahn Moments. IEEE Access 6: 47521-47534 (2018) - [j50]Qingquan Li
, Qin Zou
, De Ma, Qian Wang
, Song Wang
:
Dating ancient paintings of Mogao Grottoes using deeply learnt visual codes. Sci. China Inf. Sci. 61(9): 092105:1-092105:14 (2018) - [j49]Zhibo Wang, Ran Tan
, Jiahui Hu
, Jing Zhao, Qian Wang
, Feng Xia
, Xiaoguang Niu:
Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals. Comput. Networks 131: 96-109 (2018) - [j48]Chang Su
, Xiaohong Guan, Youtian Du
, Qian Wang, Fei Wang:
A fast multi-level algorithm for community detection in directed online social networks. J. Inf. Sci. 44(3): 392-407 (2018) - [j47]Tao Xu, Yutao Ma, Qian Wang
:
Cross-Urban Point-of-Interest Recommendation for Non-Natives. Int. J. Web Serv. Res. 15(3): 82-102 (2018) - [j46]Qin Zou
, Lihao Ni, Qian Wang
, Qingquan Li, Song Wang
:
Robust Gait Recognition by Integrating Inertial and RGBD Sensors. IEEE Trans. Cybern. 48(4): 1136-1150 (2018) - [j45]Qian Wang
, Meiqi He, Minxin Du
, Sherman S. M. Chow
, Russell W. F. Lai, Qin Zou
:
Searchable Encryption over Feature-Rich Data. IEEE Trans. Dependable Secur. Comput. 15(3): 496-510 (2018) - [j44]Qian Wang
, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren:
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy. IEEE Trans. Dependable Secur. Comput. 15(4): 591-606 (2018) - [j43]Meixia Miao, Jianfeng Ma, Xinyi Huang, Qian Wang
:
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions. IEEE Trans. Inf. Forensics Secur. 13(2): 511-520 (2018) - [j42]Minxin Du
, Qian Wang
, Meiqi He, Jian Weng
:
Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage. IEEE Trans. Inf. Forensics Secur. 13(9): 2320-2332 (2018) - [j41]Shengshan Hu
, Minghui Li
, Qian Wang
, Sherman S. M. Chow
, Minxin Du
:
Outsourced Biometric Identification With Privacy. IEEE Trans. Inf. Forensics Secur. 13(10): 2448-2463 (2018) - [j40]Chencheng Li
, Pan Zhou, Li Xiong
, Qian Wang
, Ting Wang
:
Differentially Private Distributed Online Learning. IEEE Trans. Knowl. Data Eng. 30(8): 1440-1453 (2018) - [j39]Qian Wang
, Minxin Du
, Xiuying Chen, Yanjiao Chen
, Pan Zhou
, Xiaofeng Chen
, Xinyi Huang
:
Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training. IEEE Trans. Knowl. Data Eng. 30(12): 2381-2393 (2018) - [j38]Yanjiao Chen
, Yuxuan Xiong, Qian Wang
, Xiaoyan Yin
, Baochun Li
:
Ensuring Minimum Spectrum Requirement in Matching-Based Spectrum Allocation. IEEE Trans. Mob. Comput. 17(9): 2028-2040 (2018) - [j37]Jie Zhu, Qi Li
, Cong Wang
, Xingliang Yuan
, Qian Wang
, Kui Ren:
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Trans. Parallel Distributed Syst. 29(8): 1721-1735 (2018) - [j36]Zhengwei Ren, Lina Wang, Qian Wang
, Mingdi Xu:
Dynamic Proofs of Retrievability for Coded Cloud Storage Systems. IEEE Trans. Serv. Comput. 11(4): 685-698 (2018) - [j35]Honglong Chen
, Guolei Ma, Zhibo Wang
, Qian Wang
, Jiguo Yu
:
MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems. IEEE Trans. Veh. Technol. 67(10): 9947-9958 (2018) - [j34]Man Zhou
, Qian Wang
, Tao Lei, Zhibo Wang
, Kui Ren:
Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback. IEEE Trans. Wirel. Commun. 17(12): 8063-8076 (2018) - [c52]Man Zhou
, Qian Wang
, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. CCS 2018: 1775-1787 - [c51]Zhibo Wang, Jiahui Hu
, Jing Zhao, Dejun Yang
, Honglong Chen, Qian Wang
:
Pay On-Demand: Dynamic Incentive and Task Selection for Location-Dependent Mobile Crowdsensing Systems. ICDCS 2018: 611-621 - [c50]Shengshan Hu
, Chengjun Cai
, Qian Wang
, Cong Wang, Xiangyang Luo, Kui Ren:
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization. INFOCOM 2018: 792-800 - [c49]Xiaoting Tang, Cong Wang, Xingliang Yuan, Qian Wang
:
Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications. INFOCOM 2018: 1988-1996 - [c48]Minghui Li
, Mingxue Zhang, Qian Wang
, Sherman S. M. Chow
, Minxin Du
, Yanjiao Chen, Chenliang Li:
InstantCryptoGram: Secure Image Retrieval Service. INFOCOM 2018: 2222-2230 - [e1]Aziz Mohaisen, Qian Wang:
Proceedings of the 6th International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - [i17]Zheng Zhang, Qin Zou, Qian Wang, Yuewei Lin, Qingquan Li:
Instance Similarity Deep Hashing for Multi-Label Image Retrieval. CoRR abs/1803.02987 (2018) - [i16]Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. CoRR abs/1810.02242 (2018) - [i15]Qingquan Li, Qin Zou, De Ma, Qian Wang, Song Wang:
Dating Ancient Paintings of Mogao Grottoes Using Deeply Learnt Visual Codes. CoRR abs/1810.09168 (2018) - [i14]Qin Zou, Yanling Wang, Yi Zhao, Qian Wang, Chao Shen, Qingquan Li:
Deep Learning Based Gait Recognition Using Smartphones in the Wild. CoRR abs/1811.00338 (2018) - [i13]Zhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang, Hairong Qi:
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning. CoRR abs/1812.00535 (2018) - [i12]Lingchen Zhao, Qian Wang, Qin Zou, Yan Zhang, Yanjiao Chen:
Privacy-Preserving Collaborative Deep Learning with Unreliable Participants. CoRR abs/1812.10113 (2018) - 2017
- [j33]Zhibo Wang, Qing Cao, Hairong Qi, Honglong Chen, Qian Wang
:
Cost-effective barrier coverage formation in heterogeneous wireless sensor networks. Ad Hoc Networks 64: 65-79 (2017) - [j32]Zhibo Wang
, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang, Qian Wang
:
Achieving location error tolerant barrier coverage for wireless sensor networks. Comput. Networks 112: 314-328 (2017) - [j31]Wei Song, Bing Wang
, Qian Wang
, Zhiyong Peng, Wenjing Lou:
Tell me the truth: Practically public authentication for outsourced databases with multi-user modification. Inf. Sci. 387: 221-237 (2017) - [j30]Wei Song
, Bing Wang, Qian Wang
, Zhiyong Peng, Wenjing Lou, Yihui Cui:
A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications. J. Parallel Distributed Comput. 99: 14-27 (2017) - [j29]Pan Zhou
, Wenqi Wei, Kaigui Bian, Dapeng Oliver Wu
, Yuchong Hu, Qian Wang:
Private and Truthful Aggregative Game for Large-Scale Spectrum Sharing. IEEE J. Sel. Areas Commun. 35(2): 463-477 (2017) - [j28]Jingjun Wang, Shengshan Hu, Qian Wang
, Yutao Ma:
Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey. IEEE Netw. 31(5): 36-41 (2017) - [j27]Wei Song, Bing Wang, Qian Wang
, Chengliang Shi, Wenjing Lou, Zhiyong Peng:
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources. IEEE Trans. Inf. Forensics Secur. 12(10): 2334-2347 (2017) - [j26]Pan Zhou, Qian Wang
, Wei Wang, Yuchong Hu, Dapeng Wu
:
Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications. IEEE Trans. Inf. Forensics Secur. 12(11): 2807-2822 (2017) - [j25]Zhangjie Fu, Xinle Wu, Qian Wang
, Kui Ren:
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data. IEEE Trans. Inf. Forensics Secur. 12(12): 2986-2997 (2017) - [j24]Qian Wang
, Qihang Sun, Kui Ren
, Xiaohua Jia:
THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply. IEEE Trans. Mob. Comput. 16(7): 2051-2064 (2017) - [j23]Qin Zou
, Lihao Ni, Qian Wang
, Zhongwen Hu
, Qingquan Li, Song Wang
:
Local Pattern Collocations Using Regional Co-occurrence Factorization. IEEE Trans. Multim. 19(3): 492-505 (2017) - [c47]Qian Wang
, Kui Ren, Minxin Du
, Qi Li, Aziz Mohaisen:
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates. Financial Cryptography 2017: 79-97 - [c46]Si Chen
, Kui Ren, Sixu Piao, Cong Wang, Qian Wang
, Jian Weng
, Lu Su, Aziz Mohaisen:
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones. ICDCS 2017: 183-195 - [c45]Qian Wang
, Shengshan Hu
, Minxin Du
, Jingjun Wang, Kui Ren:
Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval. INFOCOM 2017: 1-9 - [c44]Zhibo Wang, Yongquan Zhang, Yijie Li, Qian Wang
, Feng Xia
:
Exploiting social influence for context-aware event recommendation in event-based social networks. INFOCOM 2017: 1-9 - [c43]Feng Xiao, Man Zhou, Youcheng Liye, Jingxiao Yang, Qian Wang
:
Poster: Enabling Secure Location Authentication in Drone. MobiCom 2017: 600-602 - [c42]Yanjiao Chen, Yuxuan Xiong, Qian Wang
, Xiaoyan Yin, Baochun Li:
Stable Matching for Spectrum Market with Guaranteed Minimum Requirement. MobiHoc 2017: 4:1-4:10 - [i11]Qian Wang, Feng Xiao, Man Zhou, Zhibo Wang, Hongyu Ding:
Mitigating Link-flooding Attacks With Active Link Obfuscation. CoRR abs/1703.09521 (2017) - [i10]Libing Wu, Cong Quan, Chenliang Li, Qian Wang, Bolong Zheng:
A Context-Aware User-Item Representation Learning for Item Recommendation. CoRR abs/1712.02342 (2017) - 2016
- [j22]Shengshan Hu
, Qian Wang
, Jingjun Wang, Zhan Qin, Kui Ren
:
Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data. IEEE Trans. Image Process. 25(7): 3411-3425 (2016) - [j21]Zhihua Xia
, Xinhui Wang, Xingming Sun, Qian Wang
:
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans. Parallel Distributed Syst. 27(2): 340-352 (2016) - [j20]Honglong Chen, Wei Lou
, Zhibo Wang, Qian Wang
:
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs. IEEE Trans. Veh. Technol. 65(8): 6377-6388 (2016) - [j19]Qian Wang
, Kui Ren
, Peng Ning, Shengshan Hu
:
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks. IEEE Trans. Veh. Technol. 65(10): 8331-8344 (2016) - [c41]Qian Wang
, Jingjun Wang, Shengshan Hu, Qin Zou
, Kui Ren
:
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud. AsiaCCS 2016: 257-268 - [c40]Qin Zou
, Zhongwen Hu, Long Chen, Qian Wang
, Qingquan Li:
Geodesic-based pavement shadow removal revisited. ICASSP 2016: 1761-1765 - [c39]Qian Wang
, Shengshan Hu
, Jingjun Wang, Kui Ren
:
Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor. ICDCS 2016: 700-710 - [c38]Qin Zou
, Qingquan Li, Fan Zhang, Zhimin Xiong, Qian Wang
:
Path voting based pavement crack detection from laser range images. DSP 2016: 432-436 - [c37]Qian Wang
, Shengshan Hu
, Kui Ren
, Jingjun Wang, Zhibo Wang, Minxin Du
:
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data. INFOCOM 2016: 1-9 - [c36]Qian Wang
, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren
:
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy. INFOCOM 2016: 1-9 - [c35]Qian Wang
, Kui Ren
, Man Zhou, Tao Lei, Dimitrios Koutsonikolas, Lu Su:
Messages behind the sound: real-time hidden acoustic signal capture with smartphones. MobiCom 2016: 29-41 - [c34]Qian Wang
, Kui Ren
, Man Zhou, Tao Lei, Dimitrios Koutsonikolas, Lu Su:
Real-time hidden acoustic signal capture with smartphones: demo. MobiCom 2016: 493-494 - [c33]Qian Wang
, Xiao Lu, Yan Zhang, Zhibo Wang, Zhan Qin, Kui Ren:
SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy. SecureComm 2016: 454-474 - [c32]Shengshan Hu
, Qian Wang
, Jingjun Wang, Sherman S. M. Chow
, Qin Zou
:
Securing Fast Learning! Ridge Regression over Encrypted Big Data. Trustcom/BigDataSE/ISPA 2016: 19-26 - [i9]Qin Zou, Zheng Zhang, Qian Wang, Qingquan Li, Long Chen, Song Wang:
Who Leads the Clothing Fashion: Style, Color, or Texture? A Computational Study. CoRR abs/1608.07444 (2016) - [i8]Qin Zou, Lihao Ni, Qian Wang, Qingquan Li, Song Wang:
Robust Gait Recognition by Integrating Inertial and RGBD Sensors. CoRR abs/1610.09816 (2016) - 2015
- [j18]Yun Rui, Lei Deng
, Qian Wang
, Jing Li, Guoming Qian, Mingqi Li, Yingguan Wang:
Robust energy-efficient power loading for MIMO system under imperfect CSI. Int. J. Sens. Networks 18(3/4): 140-147 (2015) - [j17]Qin Zou
, Lihao Ni, Tong Zhang, Qian Wang
:
Deep Learning Based Feature Selection for Remote Sensing Scene Classification. IEEE Geosci. Remote. Sens. Lett. 12(11): 2321-2325 (2015) - [c31]Qian Wang
, Kui Ren
, Guancheng Li, Chenbo Xia, Xiaobing Chen, Zhibo Wang, Qin Zou
:
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice. CCS 2015: 376-387 - [c30]Qian Wang
, Shengshan Hu
, Kui Ren
, Meiqi He, Minxin Du
, Zhibo Wang:
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. ESORICS (2) 2015: 186-205 - [c29]Qian Wang
, Man Zhou
, Kui Ren
, Tao Lei, Jikun Li, Zhibo Wang:
Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes. ICDCS 2015: 537-546 - [i7]Chi-Kin Chau, Qian Wang, Dah-Ming Chiu:
Economic Viability of Paris Metro Pricing for Digital Services. CoRR abs/1507.02132 (2015) - 2014
- [j16]Qian Wang, Meiqi He, Wei Song, Yun Rui:
Energy efficient opportunistic cooperative transmission with different ratio combinings: from a new perspective. Sci. China Inf. Sci. 57(4): 1-14 (2014) - [j15]Wei Song, Zhiyong Peng, Qian Wang
, Fangquan Cheng, Xiaoxin Wu, Yihui Cui:
Efficient privacy-preserved data query over ciphertext in cloud computing. Secur. Commun. Networks 7(6): 1049-1065 (2014) - [j14]Chi-Kin Chau
, Qian Wang, Dah-Ming Chiu:
Economic Viability of Paris Metro Pricing for Digital Services. ACM Trans. Internet Techn. 14(2-3): 12:1-12:21 (2014) - [j13]Kui Ren
, Qian Wang
, Di Ma
, Xiaohua Jia
:
Securing emerging short range wireless communications: the state of the art. IEEE Wirel. Commun. 21(6): 153-159 (2014) - [c28]Qihang Sun, Qian Wang
, Kui Ren
, Xiaohua Jia
:
Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply. ICNP 2014: 245-256 - [c27]Fangquan Cheng, Qian Wang
, Qianwen Zhang, Zhiyong Peng:
Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data. WAIM 2014: 348-359 - 2013
- [j12]Cong Wang
, Sherman S. M. Chow
, Qian Wang
, Kui Ren
, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans. Computers 62(2): 362-375 (2013) - [j11]Cong Wang
, Kui Ren
, Jia Wang, Qian Wang
:
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations. IEEE Trans. Parallel Distributed Syst. 24(6): 1172-1181 (2013) - [j10]Kui Ren
, Qian Wang
:
Opportunistic spectrum access: from stochastic channels to non-stochastic channels. IEEE Wirel. Commun. 20(3): 1-0 (2013) - [c26]Liang Tang, Yun Rui, Qian Wang
, Husheng Li, Zhiyong Bu:
A reverse transmission mechanism for surveillance network in smart grid. INFOCOM Workshops 2013: 61-66 - [c25]Zhen Xu, Cong Wang
, Qian Wang
, Kui Ren
, Lingyu Wang:
Proof-carrying cloud computation: The case of convex optimization. INFOCOM 2013: 610-614 - [c24]Xuan Liu, Kui Ren
, Yanling Yuan, Zuyi Li
, Qian Wang
:
Optimal budget deployment strategy against power grid interdiction. INFOCOM 2013: 1160-1168 - [c23]Liang Tang, Yun Rui, Qian Wang
, Husheng Li, Zhiyong Bu:
A reverse transmission mechanism for surveillance network in smart grid. INFOCOM 2013: 3435-3440 - 2012
- [j9]Kui Ren
, Cong Wang
, Qian Wang
:
Security Challenges for the Public Cloud. IEEE Internet Comput. 16(1): 69-73 (2012) - [j8]Qian Wang
, Ping Xu, Kui Ren
, Xiang-Yang Li:
Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication. IEEE J. Sel. Areas Commun. 30(1): 16-30 (2012) - [j7]Qian Wang
, Kaihe Xu, Kui Ren
:
Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels. IEEE J. Sel. Areas Commun. 30(9): 1666-1674 (2012) - [j6]Kui Ren
, Cong Wang
, Qian Wang
:
Toward secure and effective data utilization in public cloud. IEEE Netw. 26(6): 69-74 (2012) - [j5]Cong Wang
, Qian Wang
, Kui Ren
, Ning Cao, Wenjing Lou:
Toward Secure and Dependable Storage Services in Cloud Computing. IEEE Trans. Serv. Comput. 5(2): 220-232 (2012) - [c22]Kaihe Xu, Qian Wang
, Kui Ren
:
Joint UFH and power control for effective wireless anti-jamming communication. INFOCOM 2012: 738-746 - [c21]Qian Wang
, Kui Ren
, Xiaoqiao Meng:
When cloud meets eBay: Towards effective pricing for cloud computing. INFOCOM 2012: 936-944 - [c20]XiaoHua Xu, Qian Wang
, Jiannong Cao
, Peng-Jun Wan, Kui Ren
, Yuanfang Chen:
Locating malicious nodes for data aggregation in wireless networks. INFOCOM 2012: 3056-3060 - 2011
- [j4]Jin Li, Qian Wang
, Cong Wang
, Kui Ren
:
Enhancing Attribute-Based Encryption with Attribute Hierarchy. Mob. Networks Appl. 16(5): 553-561 (2011) - [j3]Qian Wang
, Kui Ren
, Shucheng Yu
, Wenjing Lou:
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. ACM Trans. Sens. Networks 8(1): 9:1-9:24 (2011) - [j2]Qian Wang
, Cong Wang
, Kui Ren
, Wenjing Lou, Jin Li:
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distributed Syst. 22(5): 847-859 (2011) - [j1]Kui Ren
, Hai Su, Qian Wang
:
Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel. Commun. 18(4): 6-12 (2011) - [c19]Hai Su, Qian Wang
, Kui Ren
, Kai Xing:
Jamming-Resilient Dynamic Spectrum Access for Cognitive Radio Networks. ICC 2011: 1-5 - [c18]Cong Wang
, Qian Wang
, Kui Ren
:
Towards Secure and Effective Utilization over Encrypted Cloud Data. ICDCS Workshops 2011: 282-286 - [c17]Qian Wang
, Kui Ren
, Peng Ning:
Anti-jamming communication in cognitive radio networks with unknown channel statistics. ICNP 2011: 393-402 - [c16]Qian Wang
, Ping Xu, Kui Ren
, Xiang-Yang Li:
Delay-bounded adaptive UFH-based anti-jamming wireless communication. INFOCOM 2011: 1413-1421 - [c15]Qian Wang
, Hai Su, Kui Ren
, Kwangjo Kim:
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. INFOCOM 2011: 1422-1430 - [c14]Kaihe Xu, Qian Wang
, Kui Ren
:
Wireless key establishment with asynchronous clocks. MILCOM 2011: 1410-1415 - [c13]Hai Su, Qian Wang
, Kui Ren
:
Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks. WASA 2011: 280-291 - [i6]Qian Wang, Kaihe Xu, Kui Ren:
Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels. CoRR abs/1109.0766 (2011) - 2010
- [c12]Ning Cao, Qian Wang
, Kui Ren
, Wenjing Lou:
Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks. ICC 2010: 1-5 - [c11]Jin Li, Qian Wang
, Cong Wang
, Ning Cao, Kui Ren
, Wenjing Lou:
Fuzzy Keyword Search over Encrypted Data in Cloud Computing. INFOCOM 2010: 441-445 - [c10]Cong Wang
, Qian Wang
, Kui Ren
, Wenjing Lou:
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. INFOCOM 2010: 525-533 - [c9]Chi-Kin Chau
, Qian Wang, Dah-Ming Chiu:
On the Viability of Paris Metro Pricing for Communication and Service Networks. INFOCOM 2010: 929-937
2000 – 2009
- 2009
- [c8]Qian Wang
, Cong Wang
, Jin Li, Kui Ren
, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. ESORICS 2009: 355-370 - [c7]Qian Wang
, Kui Ren
, Wenjing Lou, Yanchao Zhang:
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. INFOCOM 2009: 954-962 - [c6]Cong Wang
, Qian Wang
, Kui Ren
, Wenjing Lou:
Ensuring data storage security in Cloud Computing. IWQoS 2009: 1-9 - [i5]Cong Wang, Qian Wang, Kui Ren, Wenjing Lou:
Ensuring Data Storage Security in Cloud Computing. IACR Cryptol. ePrint Arch. 2009: 81 (2009) - [i4]Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security. IACR Cryptol. ePrint Arch. 2009: 281 (2009) - [i3]Jin Li, Qian Wang, Cong Wang, Kui Ren:
Enhancing Attribute-based Encryption with Attribute Hierarchy. IACR Cryptol. ePrint Arch. 2009: 293 (2009) - [i2]Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IACR Cryptol. ePrint Arch. 2009: 579 (2009) - [i1]Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing. IACR Cryptol. ePrint Arch. 2009: 593 (2009) - 2008
- [c5]Qian Wang
, Kui Ren
:
Time-Slotted Round-Trip Carrier Synchronization in Large-Scale Wireless Networks. ICC 2008: 5087-5091 - [c4]Qian Wang, Dah Ming Chiu, John C. S. Lui:
ISP uplink pricing in a competitive market. ICT 2008: 1-6 - [c3]Qian Wang
, Kui Ren, Yanchao Zhang, Bo Zhu:
Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy. WASA 2008: 361-372 - 2006
- [c2]Qian Wang
, Dan Xu, Jing Xu, Zhiyong Bu:
A grouped and proportional-fair subcarrier allocation scheme for multiuser OFDM systems. IPCCC 2006 - 2005
- [c1]Dan Xu, Fangyu Hu, Qian Wang
, Zhisheng Niu:
A Low-Complexity Power Allocation Scheme for Distributed Wireless Links in Rayleigh Fading Channels with Capacity Optimization. MSN 2005: 518-527
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-28 00:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint