Tianqing Zhu
Orcid: 0000-0003-3411-7947
According to our database1,
Tianqing Zhu
authored at least 244 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., June, 2024
IEEE Internet Things J., May, 2024
IEEE Internet Things J., May, 2024
IEEE Internet Things J., April, 2024
Blockchain-Empowered Multiagent Systems: Advancing IoT Security and Transaction Efficiency.
IEEE Internet Things J., April, 2024
J. Inf. Secur. Appl., February, 2024
A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential Privacy.
IEEE Internet Things J., February, 2024
ACM Comput. Surv., February, 2024
Comput. Secur., February, 2024
Artif. Intell. Rev., February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Knowl. Based Syst., 2024
Knowl. Based Syst., 2024
Knowl. Based Syst., 2024
Knowl. Based Syst., 2024
Knowl. Based Syst., 2024
Defending against gradient inversion attacks in federated learning via statistical machine unlearning.
Knowl. Based Syst., 2024
Inf. Sci., 2024
Neurocomputing, 2024
MeST-Former: Motion-enhanced Spatiotemporal Transformer for generalizable Deepfake detection.
Neurocomputing, 2024
Hybrid resampling and weighted majority voting for multi-class anomaly detection on imbalanced malware and network traffic data.
Eng. Appl. Artif. Intell., 2024
Comput. Vis. Image Underst., 2024
Comput. Stand. Interfaces, 2024
Comput. Stand. Interfaces, 2024
When deep learning meets watermarking: A survey of application, attacks and defenses.
Comput. Stand. Interfaces, 2024
Zero-shot Class Unlearning via Layer-wise Relevance Analysis and Neuronal Path Perturbation.
CoRR, 2024
When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge?
CoRR, 2024
Evaluating of Machine Unlearning: Robustness Verification Without Prior Modifications.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Update Selective Parameters: Federated Machine Unlearning Based on Model Explanation.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Linkage on Security, Privacy and Fairness in Federated Learning: New Balances and New Perspectives.
CoRR, 2024
Knowledge Distillation in Federated Learning: a Survey on Long Lasting Challenges and New Solutions.
CoRR, 2024
CoRR, 2024
Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Comput. Secur., 2024
How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Information Security Practice and Experience, 2024
When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Detection of Diffusion Model-Generated Faces by Assessing Smoothness and Noise Tolerance.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024
2023
Knowl. Based Syst., December, 2023
BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs.
Frontiers Comput. Sci., December, 2023
IEEE Trans. Knowl. Data Eng., November, 2023
A lightweight privacy-preserving scheme using pixel block mixing for facial image classification in deep learning.
Eng. Appl. Artif. Intell., November, 2023
IEEE Trans. Neural Networks Learn. Syst., October, 2023
Knowl. Based Syst., October, 2023
Balancing Learning Model Privacy, Fairness, and Accuracy With Early Stopping Criteria.
IEEE Trans. Neural Networks Learn. Syst., September, 2023
Migrating federated learning to centralized learning with the leverage of unlabeled data.
Knowl. Inf. Syst., September, 2023
Comput. Secur., September, 2023
Time-Driven and Privacy-Preserving Navigation Model for Vehicle-to-Vehicle Communication Systems.
IEEE Trans. Veh. Technol., July, 2023
IEEE Trans. Knowl. Data Eng., June, 2023
Evolution of cooperation in malicious social networks with differential privacy mechanisms.
Neural Comput. Appl., June, 2023
IEEE Internet Things J., May, 2023
IEEE Trans. Syst. Man Cybern. Syst., April, 2023
A Robust Game-Theoretical Federated Learning Framework With Joint Differential Privacy.
IEEE Trans. Knowl. Data Eng., April, 2023
IEEE Trans. Knowl. Data Eng., April, 2023
IEEE Trans. Knowl. Data Eng., April, 2023
Defense against membership inference attack in graph neural networks through graph perturbation.
Int. J. Inf. Sec., April, 2023
A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things.
IEEE Trans. Computers, February, 2023
Concurr. Comput. Pract. Exp., February, 2023
Concurr. Comput. Pract. Exp., February, 2023
Differential privacy: Review of improving utility through cryptography-based technologies.
Concurr. Comput. Pract. Exp., February, 2023
A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Knowl. Data Eng., 2023
IEEE Trans. Inf. Forensics Secur., 2023
FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks.
IEEE Trans. Inf. Forensics Secur., 2023
A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems.
IEEE Trans. Inf. Forensics Secur., 2023
Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack.
IEEE Trans. Dependable Secur. Comput., 2023
CIFair: Constructing continuous domains of invariant features for image fair classifications.
Knowl. Based Syst., 2023
Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity.
ACM Comput. Surv., 2023
ACM Comput. Surv., 2023
CoRR, 2023
Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness.
CoRR, 2023
High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking.
CoRR, 2023
Comput. Secur., 2023
Artif. Intell. Rev., 2023
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
Towards Robust Gan-Generated Image Detection: A Multi-View Completion Representation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Protect Trajectory Privacy in Food Delivery with Differential Privacy and Multi-agent Reinforcement Learning.
Proceedings of the Advanced Information Networking and Applications, 2023
2022
World Wide Web, 2022
More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence.
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Knowl. Data Eng., 2022
One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cybern., 2022
A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain.
Secur. Commun. Networks, 2022
Neural Comput. Appl., 2022
Mach. Learn., 2022
LOPO: a location privacy preserving path optimization scheme for spatial crowdsourcing.
J. Ambient Intell. Humaniz. Comput., 2022
Novel hybrid multi-head self-attention and multifractal algorithm for non-stationary time series prediction.
Inf. Sci., 2022
Resource Allocation in IoT Edge Computing via Concurrent Federated Reinforcement Learning.
IEEE Internet Things J., 2022
Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms.
IEEE Internet Things J., 2022
Multi-agent reinforcement learning via knowledge transfer with differentially private noise.
Int. J. Intell. Syst., 2022
ACM Comput. Surv., 2022
CoRR, 2022
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It.
CoRR, 2022
CoRR, 2022
Concurr. Comput. Pract. Exp., 2022
PriTxt: A privacy risk assessment method for text data based on semantic correlation learning.
Concurr. Comput. Pract. Exp., 2022
Concurr. Comput. Pract. Exp., 2022
From distributed machine learning to federated learning: In the view of data privacy and security.
Concurr. Comput. Pract. Exp., 2022
Concurr. Comput. Pract. Exp., 2022
A privacy preservation method for multiple-source unstructured data in online social networks.
Comput. Secur., 2022
Comput. Secur., 2022
Comput. Secur., 2022
Artif. Intell. Rev., 2022
Privacy-Preserving in Double Deep-Q-Network with Differential Privacy in Continuous Spaces.
Proceedings of the AI 2021: Advances in Artificial Intelligence, 2022
2021
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Inf. Forensics Secur., 2021
A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021
A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks.
J. Netw. Comput. Appl., 2021
FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts.
Inf. Sci., 2021
Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things.
Future Gener. Comput. Syst., 2021
A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning.
CoRR, 2021
Concurr. Comput. Pract. Exp., 2021
Comput. Secur., 2021
CDVT: A Cluster-Based Distributed Video Transcoding Scheme for Mobile Stream Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular Networks.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021
2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Cybern., 2020
A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020
A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things.
IEEE Internet Things J., 2020
BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things.
IEEE Internet Things J., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Digit. Commun. Networks, 2020
CoRR, 2020
Secure and efficient sharing of authenticated energy usage data with privacy preservation.
Comput. Secur., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations.
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
A Fast Robustness Quantification Method for Evaluating Typical Deep Learning Models by Generally Image Processing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020
Proceedings of the Blockchains for Network Security: Principles, 2020
2019
Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks.
IEEE Trans. Dependable Secur. Comput., 2019
Symmetry, 2019
SaaS: A situational awareness and analysis system for massive android malware detection.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Decentralized Learning with Average Difference Aggregation for Proactive Online Social Care.
CoRR, 2019
Concurr. Comput. Pract. Exp., 2019
Concurr. Comput. Pract. Exp., 2019
Comput. Commun., 2019
Database J. Biol. Databases Curation, 2019
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management.
IEEE Access, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Database Systems for Advanced Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
2018
Future Internet, 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Comput. Syst. Sci. Eng., 2018
Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments.
IEEE Access, 2018
Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy.
IEEE Access, 2018
IEEE Access, 2018
Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
Advances in Information Security 69, Springer, ISBN: 978-3-319-62002-2, 2017
Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models.
IEEE Trans. Veh. Technol., 2017
IEEE Trans. Knowl. Data Eng., 2017
Inf. Comput. Secur., 2017
Evolutionary virus immune strategy for temporal networks based on community vitality.
Future Gener. Comput. Syst., 2017
Enterp. Inf. Syst., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks.
IEEE Trans. Veh. Technol., 2016
Secur. Commun. Networks, 2016
Knowl. Inf. Syst., 2016
Knowl. Inf. Syst., 2016
Discovering Learning Patterns of Male and Female Students by Contrast Targeted Rule Mining.
Proceedings of the 4th International Conference on Enterprise Systems, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
2014
Soc. Netw. Anal. Min., 2014
An effective privacy preserving algorithm for neighborhood-based collaborative filtering.
Future Gener. Comput. Syst., 2014
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
2013
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013
Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks.
Proceedings of the Behavior and Social Computing, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012
2006
An Outlier Detection Model Based on Cross Datasets Comparison for Financial Surveillance.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006
Suspicious Financial Transaction Detection Based on Empirical Mode Decomposition Method.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006