Qingchuan Zhao
Orcid: 0000-0003-0163-2846
According to our database1,
Qingchuan Zhao
authored at least 28 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ITPatch: An Invisible and Triggered Physical Adversarial Patch against Traffic Sign Recognition.
CoRR, 2024
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph.
CoRR, 2024
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR, 2024
L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks.
CoRR, 2024
PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks.
CoRR, 2024
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
L-AutoDA: Large Language Models for Automatically Evolving Decision-based Adversarial Attacks.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024
2023
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
XPorter: A Study of the Multi-Port Charger Security on Privacy Leakage and Voice Injection.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the Security and Privacy in Communication Networks, 2022
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2020
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2013
Proceedings of the Advances in Conceptual Modeling, 2013