Qiang Zeng

Orcid: 0000-0001-9432-6017

Affiliations:
  • George Mason University, Fairfax, VA, USA
  • University of South Carolina, Columbia, SC, USA (2018 - 2022)
  • Temple University, Department of Computer and Information Sciences (former)
  • Pennsylvania State University, University Park, PA, USA (former)


According to our database1, Qiang Zeng authored at least 61 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Turning Noises to Fingerprint-Free "Credentials": Secure and Usable Drone Authentication.
IEEE Trans. Mob. Comput., October, 2024

BinSimDB: Benchmark Dataset Construction for Fine-Grained Binary Code Similarity Analysis.
CoRR, 2024

T2Pair++: Secure and Usable IoT Pairing with Zero Information Loss.
CoRR, 2024

Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

Do You See How I Pose? Using Poses as an Implicit Authentication Factor for QR Code Payment.
Proceedings of the 33rd USENIX Security Symposium, 2024

From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Turning Noises to Fingerprint-Free "Credentials": Secure and Usable Authentication for Drone Delivery.
CoRR, 2023

Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023

Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes.
Proceedings of the 32nd USENIX Security Symposium, 2023

No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

2022
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising.
IEEE Trans. Cloud Comput., 2022

Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

G2Auth: secure mutual authentication for drone delivery without special user-side hardware.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Authentication for drone delivery through a novel way of using face biometrics.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021

HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes.
Proceedings of the 30th USENIX Security Symposium, 2021

SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Exploiting the Sensitivity of L2 Adversarial Examples to Erase-and-Restore.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

Erase and Restore: Simple, Accurate and Resilient Detection of L<sub>2</sub> Adversarial Examples.
CoRR, 2020

A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Attacking Graph-Based Classification without Changing Existing Connections.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access.
CoRR, 2019

PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems.
CoRR, 2019

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
CoRR, 2019

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
IEEE Access, 2019

POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices.
Proceedings of the Security and Privacy in Communication Networks, 2019

Exploiting the Inherent Limitation of L0 Adversarial Examples.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
CoRR, 2018

A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code Analysis.
CoRR, 2018

Countermeasures Against L0 Adversarial Examples Using Image Processing and Siamese Networks.
CoRR, 2018

Code-less Patching for Heap Vulnerabilities Using Targeted Calling Context Encoding.
CoRR, 2018

POKs Based Low Energy Authentication Scheme for Implantable Medical Devices.
CoRR, 2018

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Resilient decentralized Android application repackaging detection using logic bombs.
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018

2017
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

SolMiner: mining distinct solutions in programs.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation.
IEEE Trans. Knowl. Data Eng., 2015

HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Extracting important information from Chinese Operation Notes with natural language processing methods.
J. Biomed. Informatics, 2014

DeltaPath: Precise and Scalable Calling Context Encoding.
Proceedings of the 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2014

Software Cruising: A New Technology for Building Concurrent Software Monitor.
Proceedings of the Secure Cloud Computing, 2014

2012
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Remote rehabilitation model based on BAN and cloud computing technology.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

2011
Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures.
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011

2010
Extracting clinical information from free-text of pathology and operation notes via Chinese natural language processing.
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2010


  Loading...