Yuqing Zhang
Orcid: 0000-0001-8306-7195Affiliations:
- University of Chinese Academy of Sciences, National Computer Network Intrusion Protection Center, Beijing, China
- Hainan University, School of Computer Science and Cyberspace Security, Haikou, China
- Xi'an University of Posts and Telecommunications, School of Cyberspace Security, Xi'an, China
- Xidian University, School of Cyber Engineering, Xi'an, China
According to our database1,
Yuqing Zhang
authored at least 191 papers
between 1999 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities.
ACM Comput. Surv., February, 2025
2024
Uncovering Access Token Security Flaws in Multiuser Scenario of Smart Home Platforms.
IEEE Internet Things J., November, 2024
Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles.
Sensors, April, 2024
J. Parallel Distributed Comput., 2024
CoRR, 2024
StateGuard: Detecting State Derailment Defects in Decentralized Exchange Smart Contract.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the IEEE International Conference on Software Analysis, 2024
Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
LibGuard: Protecting Sensitive Data In Android Third-Party Libraries From XLDH Attacks.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the IEEE Congress on Evolutionary Computation, 2024
2023
Finite Fields Their Appl., December, 2023
Inconsistent measurement and incorrect detection of software names in security vulnerability reports.
Comput. Secur., December, 2023
IEEE Trans. Dependable Secur. Comput., 2023
A novel secure and distributed architecture for privacy-preserving healthcare system.
J. Netw. Comput. Appl., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
J. King Saud Univ. Comput. Inf. Sci., November, 2022
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics.
IEEE Trans. Dependable Secur. Comput., 2022
Understanding and Conquering the Difficulties in Identifying Third-Party Libraries From Millions of Android Apps.
IEEE Trans. Big Data, 2022
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users.
IEEE Trans. Big Data, 2022
IEEE Internet Things J., 2022
Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study.
CoRR, 2022
CoRR, 2022
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences.
CoRR, 2022
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network.
Comput. Secur., 2022
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices.
Comput. Secur., 2022
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection.
Proceedings of the IEEE INFOCOM 2022, 2022
Unfettered Access Tokens: Discovering Security Flaws of the Access Token in Smart Home Platforms.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
2021
IEEE Trans. Cloud Comput., 2021
IEEE Internet Things J., 2021
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version).
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
A system for detecting third-party tracking through the combination of dynamic analysis and static analysis.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Whether the sensitive information statement of the IoT privacy policy is consistent with the actual behavior.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network.
EAI Endorsed Trans. Security Safety, 2020
EAI Endorsed Trans. Security Safety, 2020
J. Netw. Comput. Appl., 2020
IEEE Internet Things J., 2020
Secure IoT Data Outsourcing With Aggregate Statistics and Fine-Grained Access Control.
IEEE Access, 2020
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Proceedings of the 29th USENIX Security Symposium, 2020
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
An Improved Shapley Value Benefit Distribution Mechanism in Cooperative Game of Cyber Threat Intelligence Sharing.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model".
IEEE Trans. Inf. Forensics Secur., 2019
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks.
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
CoRR, 2019
Sci. China Inf. Sci., 2019
IEEE Access, 2019
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
A Blackboard Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
J. Netw. Comput. Appl., 2018
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.
CoRR, 2018
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
CoRR, 2018
Sci. China Inf. Sci., 2018
Privacy-Preserving and Dynamic Multi-Attribute Conjunctive Keyword Search Over Encrypted Cloud Data.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Communications, Signal Processing, and Systems, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Serv. Comput., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Driving Android apps to trigger target API invocations based on activity and GUI filtering.
Sci. China Inf. Sci., 2017
Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing.
Sci. China Inf. Sci., 2017
Sci. China Inf. Sci., 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence.
Proceedings of the Network and System Security - 11th International Conference, 2017
Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis.
Proceedings of the Network and System Security - 11th International Conference, 2017
One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017
2016
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks.
Secur. Commun. Networks, 2016
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage.
Quantum Inf. Process., 2016
KSII Trans. Internet Inf. Syst., 2016
KSII Trans. Internet Inf. Syst., 2016
Enhancing multi-label classification based on local label constraints and classifier chains.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
EasiND: Effective Neighbor Discovery Algorithms for Asynchronous and Asymmetric-Duty-Cycle Multi-channel Mobile WSNs.
Wirel. Pers. Commun., 2015
A privacy preserving authentication scheme for roaming services in global mobility networks.
Secur. Commun. Networks, 2015
Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks.
Secur. Commun. Networks, 2015
Lightweight handover authentication with location privacy-preserving in mobile wireless networks.
Int. J. Embed. Syst., 2015
Comput. Networks, 2015
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication.
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks.
Wirel. Pers. Commun., 2014
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014
Using fuzzy comprehensive evaluation method to establish a credible spectrum sensing and allocation model.
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks.
KSII Trans. Internet Inf. Syst., 2014
Some classes of monomial complete permutation polynomials over finite fields of characteristic two.
Finite Fields Their Appl., 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
A Soft Decision Scheme against Intermittent SSDF Attack in Cooperative Spectrum Sensing.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks.
Wirel. Pers. Commun., 2013
IEEE Trans. Parallel Distributed Syst., 2013
Secur. Commun. Networks, 2013
Secur. Commun. Networks, 2013
Secur. Commun. Networks, 2013
A new certificateless authenticated key agreement protocol for SIP with different KGCs.
Secur. Commun. Networks, 2013
Secur. Commun. Networks, 2013
RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing.
KSII Trans. Internet Inf. Syst., 2013
KSII Trans. Internet Inf. Syst., 2013
A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
KSII Trans. Internet Inf. Syst., 2013
Int. J. Distributed Sens. Networks, 2013
Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks.
IEEE Trans. Dependable Secur. Comput., 2012
J. Syst. Softw., 2012
Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks.
IEEE Commun. Lett., 2012
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network.
Comput. Secur., 2012
Ad Hoc Networks, 2012
BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks.
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 7th International Conference on Communications and Networking in China, 2012
2011
IEEE Trans. Wirel. Commun., 2011
Security Issues and Solutions of the Key Management Protocols in IEEE 802.16j Multi-Hop Relay Network.
IEICE Trans. Commun., 2011
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Proceedings of the Global Communications Conference, 2011
2010
IEICE Trans. Inf. Syst., 2010
IEEE Commun. Lett., 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Global Communications Conference, 2010
2008
2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
1999
ACM SIGOPS Oper. Syst. Rev., 1999