Calculated based on number of publications stored in Pure and citations from Scopus
20112024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    A Stealth Security Hardening Method Based on SSD Firmware Function Extension

    Yu, X., Li, Z., Qiao, X., Tan, Y., Li, Y. & Zhang, L., 2024, Neural Information Processing - 30th International Conference, ICONIP 2023, Proceedings. Luo, B., Cheng, L., Wu, Z.-G., Li, H. & Li, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 362-375 14 p. (Communications in Computer and Information Science; vol. 1963 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • DFaP: Data Filtering and Purification Against Backdoor Attacks

    Wang, H., Mu, T., Feng, G., Wu, S. B. & Li, Y., 2024, Artificial Intelligence Security and Privacy - 1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023, Proceedings. Vaidya, J., Gabbouj, M. & Li, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 81-97 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14509 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Enhancing the Transferability of Adversarial Examples with Random Patch

    Zhang, Y., Tan, Y. A., Chen, T., Liu, X., Zhang, Q. & Li, Y., 2022, Proceedings of the 31st International Joint Conference on Artificial Intelligence, IJCAI 2022. De Raedt, L. & De Raedt, L. (eds.). International Joint Conferences on Artificial Intelligence, p. 1672-1678 7 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Citations (Scopus)
  • Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture

    Zhang, J., Zheng, J., Zhang, Z., Chen, T., Qiu, K., Zhang, Q. & Li, Y., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 104-123 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Towards Interpreting Vulnerability of Object Detection Models via Adversarial Distillation

    Zhang, Y., Tan, Y. A., Lu, M., Liu, L., Zhang, Q., Li, Y. & Wang, D., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 53-65 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Universal Physical Adversarial Attack via Background Image

    Xu, Y., Wang, J., Li, Y., Wang, Y., Xu, Z. & Wang, D., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-14 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2021

    A Classic Multi-method Collaborative Obfuscation Strategy

    Ma, Y., Li, Y., Zhang, Z., Zhang, R., Liu, L. & Zhang, X., 2021, Data Mining and Big Data - 6th International Conference, DMBD 2021, Proceedings. Tan, Y., Shi, Y., Zomaya, A., Yan, H. & Cai, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 90-97 8 p. (Communications in Computer and Information Science; vol. 1454 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement Learning

    Tong, X., Ma, Y., Xue, Y., Zhang, Q., Li, Y. & Tan, Y. A., 2021, Data Mining and Big Data - 6th International Conference, DMBD 2021, Proceedings. Tan, Y., Shi, Y., Zomaya, A., Yan, H. & Cai, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 61-68 8 p. (Communications in Computer and Information Science; vol. 1454 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • A Random Multi-target Backdooring Attack on Deep Neural Networks

    Liu, X., Yu, X., Zhang, Z., Zhang, Q., Li, Y. & Tan, Y. A., 2021, Data Mining and Big Data - 6th International Conference, DMBD 2021, Proceedings. Tan, Y., Shi, Y., Zomaya, A., Yan, H. & Cai, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 45-52 8 p. (Communications in Computer and Information Science; vol. 1454 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Building a Covert Timing Channel over VoIP via Packet Length

    Zhang, Z., Zhang, X., Xue, Y. & Li, Y., 2021, Data Mining and Big Data - 6th International Conference, DMBD 2021, Proceedings. Tan, Y., Shi, Y., Zomaya, A., Yan, H. & Cai, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 81-88 8 p. (Communications in Computer and Information Science; vol. 1453 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Code Decoupling Execution Isolating Based on TF Card Firmware Extension

    Shi, Z., Chen, T., Xue, Y., Li, Y., Zhang, Q., Tan, Y. A. & Hu, J., 2021, Proceedings - 2021 IEEE 6th International Conference on Data Science in Cyberspace, DSC 2021. Institute of Electrical and Electronics Engineers Inc., p. 403-408 6 p. (Proceedings - 2021 IEEE 6th International Conference on Data Science in Cyberspace, DSC 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Free Adversarial Training with Layerwise Heuristic Learning

    Zhang, H., Shi, Y., Dong, B., Han, Y., Li, Y. & Kuang, X., 2021, Image and Graphics - 11th International Conference, ICIG 2021, Proceedings. Peng, Y., Hu, S.-M., Gabbouj, M., Zhou, K., Elad, M. & Xu, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 120-131 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12889 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles

    Li, Z., Ma, Y., Zhang, Z., Yu, X., Zhang, Q. & Li, Y., 2021, Data Mining and Big Data - 6th International Conference, DMBD 2021, Proceedings. Tan, Y., Shi, Y., Zomaya, A., Yan, H. & Cai, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 53-60 8 p. (Communications in Computer and Information Science; vol. 1454 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Offensive and Defensive Countermeasure Technology of Return-Oriented Programming

    Xu, Z., Zhang, J., Ai, S., Liang, C., Liu, L. & Li, Y., 2021, Proceedings - IEEE Congress on Cybermatics: 2021 IEEE International Conferences on Internet of Things, iThings 2021, IEEE Green Computing and Communications, GreenCom 2021, IEEE Cyber, Physical and Social Computing, CPSCom 2021 and IEEE Smart Data, SmartData 2021. Zheng, J., Liu, X., Luan, T. H., Jayaraman, P. P., Dai, H., Mitra, K., Qin, K., Ranjan, R. & Wen, S. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 224-228 5 p. (Proceedings - IEEE Congress on Cybermatics: 2021 IEEE International Conferences on Internet of Things, iThings 2021, IEEE Green Computing and Communications, GreenCom 2021, IEEE Cyber, Physical and Social Computing, CPSCom 2021 and IEEE Smart Data, SmartData 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Research on Off-Path Exploits of Network Protocols

    Hou, F., Yu, X., Qiu, K., Liu, J., Shi, Z. & Li, Y., 2021, Data Mining and Big Data - 6th International Conference, DMBD 2021, Proceedings. Tan, Y., Shi, Y., Zomaya, A., Yan, H. & Cai, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 73-80 8 p. (Communications in Computer and Information Science; vol. 1453 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2020

    A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline

    Jiang, X., Ma, Y., Zhao, G., Kuang, X., Li, Y. & Zhang, R., 2020, Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Proceedings. Chen, X., Yan, H., Yan, Q. & Zhang, X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 519-529 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12486 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Building Undetectable Covert Channels Over Mobile Networks with Machine Learning

    Zhang, X., Pang, L., Guo, L. & Li, Y., 2020, Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Proceedings. Chen, X., Yan, H., Yan, Q. & Zhang, X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 331-339 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12486 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2019

    An RTP extension for reliable user-data transmission over VoIP Traffic

    Gao, J., Li, Y., Jiang, H., Liu, L. & Zhang, X., 2019, Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Revised Selected Papers. Meng, W. & Furnell, S. (eds.). Springer, p. 74-86 13 p. (Communications in Computer and Information Science; vol. 1095 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Citations (Scopus)
  • A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles

    Yu, X., Wang, K., Zhang, Q. & Li, Y., 2019, Smart Computing and Communication - 4th International Conference, SmartCom 2019, Proceedings. Qiu, M. (ed.). Springer, p. 34-41 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11910 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Boosting training for PDF malware classifier via active learning

    Wang, X., Li, Y., Zhang, Q. & Kuang, X., 2019, Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Proceedings. Vaidya, J., Zhang, X. & Li, J. (eds.). Springer, p. 101-110 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11983 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Evading PDF malware classifiers with generative adversarial network

    Wang, Y., Li, Y., Zhang, Q., Hu, J. & Kuang, X., 2019, Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Proceedings. Vaidya, J., Zhang, X. & Li, J. (eds.). Springer, p. 374-387 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11982 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Research and application of trusted service evaluation model in social network

    Ge, R., Zheng, Y., Li, F., Wang, D. & Li, Y., 2019, Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Proceedings. Vaidya, J., Zhang, X. & Li, J. (eds.). Springer, p. 313-317 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11983 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    Acquiring hidden space via modifying block bitmap for android devices

    Lianfang, W., Hong, H., Yuanzhang, L. & Li, Z., 2018, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 651-660 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11336 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • An isolated data encryption experiment method by utilizing baseband processors

    Bai, X., Liu, L., Hu, S. & Li, Y., 13 Jan 2018, Proceedings of 2018 2nd International Conference on Management Engineering, Software Engineering and Service Sciences, ICMSS 2018. Association for Computing Machinery, p. 176-181 6 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • A VoLTE Encryption Experiment for Android Smartphones

    Liu, S., Wang, Y., Zhang, Q. & Li, Y., 2018, Geo-Spatial Knowledge and Intelligence - 5th International Conference, GSKI 2017, Revised Selected Papers. Bian, F., Yuan, H., Geng, J., Liu, C. & Surapunt, T. (eds.). Springer Verlag, p. 115-125 11 p. (Communications in Computer and Information Science; vol. 848).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Maintaining root via custom android kernel across over-the-air upgrade

    Zucheng, H., Lu, L., Yuanzhang, L., Yu, Z. & Qikun, Z., 2018, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 299-309 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11334 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2017

    A code self-relocation method for embedded system

    Xinyu, T., Changyou, Z., Chen, L., Aourra, K. & Yuanzhang, L., 8 Aug 2017, Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017. Institute of Electrical and Electronics Engineers Inc., p. 688-691 4 p. 8005883. (Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • A transparent encryption scheme of video data for android devices

    Pang, P., Aourra, K., Xue, Y., Li, Y. & Zhang, Q., 8 Aug 2017, Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017. Institute of Electrical and Electronics Engineers Inc., p. 817-822 6 p. 8005914. (Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2014

    A smart watch-based password input extension for android

    Gao, B., Mu, Q., Zhang, Q., Li, Y. & Tan, Y., 2014, 2014 International Conference on Mechatronics, Electronic, Industrial and Control Engineering, MEIC 2014. Atlantis Press, p. 255-259 5 p. (2014 International Conference on Mechatronics, Electronic, Industrial and Control Engineering, MEIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Citation (Scopus)
  • Code protection technology on iOS

    Weng, J. T., Mu, Q., Liao, X. Y., Li, Y. Z., Zhang, Q. X. & Tan, Y., 2014, Machine Tool Technology, Mechatronics and Information Engineering. Wang, Z., Guo, L., Tan, J., Yang, D., Yang, D., Yang, K., Yang, D., Yang, D. & Yang, D. (eds.). Trans Tech Publications Ltd., p. 3371-3374 4 p. (Applied Mechanics and Materials; vol. 644-650).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    Hybrid S-RAID: A power-aware archival storage architecture

    Liu, J., Li, Y., Jia, S., Hong, J., Yan, J. & Guo, Y., 2012, Proceedings - 13th International Conference on Parallel and Distributed Computing, Applications, and Technologies, PDCAT 2012. p. 404-409 6 p. 6589312. (Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2011

    A method of deduplication for data remote backup

    Liu, J., Tan, Y. A., Li, Y., Zhang, X. & Zhou, Z., 2011, Computer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 Conference, CCTA 2010, Selected Papers. PART 1 ed. p. 68-75 8 p. (IFIP Advances in Information and Communication Technology; vol. 344 AICT, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Citations (Scopus)