Qiang Zeng
Orcid: 0000-0001-9432-6017Affiliations:
- George Mason University, Fairfax, VA, USA
- University of South Carolina, Columbia, SC, USA (2018 - 2022)
- Temple University, Department of Computer and Information Sciences (former)
- Pennsylvania State University, University Park, PA, USA (former)
According to our database1,
Qiang Zeng
authored at least 60 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Turning Noises to Fingerprint-Free "Credentials": Secure and Usable Drone Authentication.
IEEE Trans. Mob. Comput., October, 2024
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
Do You See How I Pose? Using Poses as an Implicit Authentication Factor for QR Code Payment.
Proceedings of the 33rd USENIX Security Symposium, 2024
From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Turning Noises to Fingerprint-Free "Credentials": Secure and Usable Authentication for Drone Delivery.
CoRR, 2023
Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023
Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes.
Proceedings of the 32nd USENIX Security Symposium, 2023
No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023
2022
IEEE Trans. Cloud Comput., 2022
Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
G2Auth: secure mutual authentication for drone delivery without special user-side hardware.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020
Erase and Restore: Simple, Accurate and Resilient Detection of L<sub>2</sub> Adversarial Examples.
CoRR, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access.
CoRR, 2019
PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems.
CoRR, 2019
IEEE Access, 2019
POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
CoRR, 2018
A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code Analysis.
CoRR, 2018
Countermeasures Against L0 Adversarial Examples Using Image Processing and Siamese Networks.
CoRR, 2018
CoRR, 2018
CoRR, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018
2017
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
2015
Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation.
IEEE Trans. Knowl. Data Eng., 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
2014
Extracting important information from Chinese Operation Notes with natural language processing methods.
J. Biomed. Informatics, 2014
Proceedings of the 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2014
Proceedings of the Secure Cloud Computing, 2014
2012
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
2011
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011
2010
Extracting clinical information from free-text of pathology and operation notes via Chinese natural language processing.
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2010