Zhan Qin
Orcid: 0000-0001-7872-6969
According to our database1,
Zhan Qin
authored at least 111 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
PMANet: Malicious URL detection via post-trained language model guided multi-level feature attention network.
Inf. Fusion, 2025
2024
Proc. VLDB Endow., June, 2024
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.
Proc. ACM Manag. Data, February, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
PointNCBW: Towards Dataset Ownership Verification for Point Clouds via Negative Clean-label Backdoor Watermark.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning.
CoRR, 2024
Prompt-Consistency Image Generation (PCIG): A Unified Framework Integrating LLMs, Knowledge Graphs, and Controllable Diffusion Models.
CoRR, 2024
A Survey on Medical Large Language Models: Technology, Application, Trustworthiness, and Future Directions.
CoRR, 2024
Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution.
CoRR, 2024
CoRR, 2024
Differentially Private Zeroth-Order Methods for Scalable Large Language Model Finetuning.
CoRR, 2024
LLM-Guided Multi-View Hypergraph Learning for Human-Centric Explainable Recommendation.
CoRR, 2024
TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features.
Comput. Networks, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Towards Reliable and Efficient Backdoor Trigger Inversion via Decoupling Benign Features.
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Cross-modality Information Check for Detecting Jailbreaking in Multimodal Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Proc. VLDB Endow., 2023
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems.
ACM Comput. Surv., 2023
CoRR, 2023
CoRR, 2023
CoRR, 2023
Malicious URL Detection via Pretrained Language Model Guided Multi-Level Feature Attention Network.
CoRR, 2023
SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution.
CoRR, 2023
CoRR, 2023
Quantifying and Defending against Privacy Threats on Federated Knowledge Graph Embedding.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.
Proc. VLDB Endow., 2022
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model.
CoRR, 2022
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training.
CoRR, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
From Local to Global Norm Emergence: Dissolving Self-reinforcing Substructures with Incremental Social Instruments.
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
2020
Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable Driver Identification Scheme.
IEEE Trans. Veh. Technol., 2020
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Proc. IEEE, 2020
CoRR, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
2019
IEEE Wirel. Commun., 2019
ACM Trans. Sens. Networks, 2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Inf. Forensics Secur., 2019
EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics.
IEEE Internet Things J., 2019
EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.
IEEE Internet Things J., 2019
IEEE Commun. Mag., 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters.
IEEE Trans. Smart Grid, 2018
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Cloud Comput., 2018
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017
IEEE Trans. Inf. Forensics Secur., 2017
Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Netw., 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
ACM Trans. Multim. Comput. Commun. Appl., 2016
IEEE Trans. Multim., 2016
Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.
IEEE Trans. Image Process., 2016
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016
J. Commun. Inf. Networks, 2016
SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2016
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015
2014
IEEE Internet Things J., 2014
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the IEEE Global Communications Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013