Shangqing Zhao

Orcid: 0000-0001-8543-2977

According to our database1, Shangqing Zhao authored at least 40 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense.
IEEE Trans. Dependable Secur. Comput., 2024

Self-supervised BGP-graph reasoning enhanced complex KBQA via SPARQL generation.
Inf. Process. Manag., 2024

Quantum Machine Learning: Performance and Security Implications in Real-World Applications.
CoRR, 2024

Pancreatic Tumor Segmentation as Anomaly Detection in CT Images Using Denoising Diffusion Models.
CoRR, 2024

Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space.
CoRR, 2024

Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics.
CoRR, 2024

BIBench: Benchmarking Data Analysis Knowledge of Large Language Models.
CoRR, 2024

Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics.
Proceedings of the IEEE INFOCOM 2024, 2024

A Lightweight and Effective Multi-View Knowledge Distillation Framework for Text-Image Retrieval.
Proceedings of the International Joint Conference on Neural Networks, 2024

2023
Group Ensemble Block: Subspace Diversity Improves Coarse-to-Fine Image Retrieval.
IEEE Trans. Artif. Intell., February, 2023

LoMar: A Local Defense Against Poisoning Attack on Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2023

How Can the Adversary Effectively Identify Cellular IoT Devices Using LSTM Networks?
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, 2023

CCC: Chinese Commercial Contracts Dataset for Documents Layout Understanding.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

E-App: Adaptive mmWave Access Point Planning with Environmental Awareness in Wireless LANs.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Poster: Noninvasive Respirator Fit Factor Inference by Semi-Supervised Learning.
Proceedings of the IEEE/ACM Conference on Connected Health: Applications, 2023

MMP: A Dynamic Routing Protocol Design to Proactively Defend against Wireless Network Inference Attacks.
Proceedings of the 10th ACM Workshop on Moving Target Defense, 2023

2022
Wireless Training-Free Keystroke Inference Attack and Defense.
IEEE/ACM Trans. Netw., 2022

When Attackers Meet AI: Learning-Empowered Attacks in Cooperative Spectrum Sensing.
IEEE Trans. Mob. Comput., 2022

HoneyBreath: An Ambush Tactic Against Wireless Breath Inference.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2022

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
How to Test the Randomness From the Wireless Channel for Security?
IEEE Trans. Inf. Forensics Secur., 2021

Measurement Integrity Attacks Against Network Tomography: Feasibility and Defense.
IEEE Trans. Dependable Secur. Comput., 2021

Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021

Smartphone Location Spoofing Attack in Wireless Networks.
Proceedings of the Security and Privacy in Communication Networks, 2021

2020
Performance Analysis of IQI Impaired Cooperative NOMA for 5G-Enabled Internet of Things.
Wirel. Commun. Mob. Comput., 2020

How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks?
IEEE Trans. Wirel. Commun., 2020

Cyber Deception for Computer and Network Security: Survey and Challenges.
CoRR, 2020

Adversarial machine learning based partial-model attack in IoT.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020

Comb Decoding towards Collision-Free WiFi.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

2019
Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Entrapment for Wireless Eavesdroppers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

2018
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Stateful Inter-Packet Signal Processing for Wireless Networking.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2014
Performance Analysis of Cognitive Cooperative Communication System Based on Optimal Relay Selection Scheme.
J. Commun., 2014

Supplementary Proof of Upper and Lower Bounds of Two-Way Opportunistic Amplify-and-Forward Relaying Channels.
IEEE Commun. Lett., 2014


  Loading...