Zhan Qin

Orcid: 0000-0001-7872-6969

According to our database1, Zhan Qin authored at least 111 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
PMANet: Malicious URL detection via post-trained language model guided multi-level feature attention network.
Inf. Fusion, 2025

2024
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores.
Proc. VLDB Endow., June, 2024

Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.
Proc. ACM Manag. Data, February, 2024

RemovalNet: DNN Fingerprint Removal Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack.
IEEE Trans. Dependable Secur. Comput., 2024

Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation.
IEEE Trans. Dependable Secur. Comput., 2024

Privacy Enhancement Via Dummy Points in the Shuffle Model.
IEEE Trans. Dependable Secur. Comput., 2024

Task-Free Fairness-Aware Bias Mitigation for Black-Box Deployed Models.
IEEE Trans. Dependable Secur. Comput., 2024

PointNCBW: Towards Dataset Ownership Verification for Point Clouds via Negative Clean-label Backdoor Watermark.
CoRR, 2024

Defending Jailbreak Attack in VLMs via Cross-modality Information Detector.
CoRR, 2024

TAPI: Towards Target-Specific and Adversarial Prompt Injection against Code LLMs.
CoRR, 2024

Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning.
CoRR, 2024

Prompt-Consistency Image Generation (PCIG): A Unified Framework Integrating LLMs, Knowledge Graphs, and Controllable Diffusion Models.
CoRR, 2024

A Survey on Medical Large Language Models: Technology, Application, Trustworthiness, and Future Directions.
CoRR, 2024

Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution.
CoRR, 2024

Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models.
CoRR, 2024

A Causal Explainable Guardrails for Large Language Models.
CoRR, 2024

Going Proactive and Explanatory Against Malware Concept Drift.
CoRR, 2024

Differentially Private Zeroth-Order Methods for Scalable Large Language Model Finetuning.
CoRR, 2024

LLM-Guided Multi-View Hypergraph Learning for Human-Centric Explainable Recommendation.
CoRR, 2024

TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features.
Comput. Networks, 2024

Property Existence Inference against Generative Models.
Proceedings of the 33rd USENIX Security Symposium, 2024

MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
Proceedings of the 33rd USENIX Security Symposium, 2024

PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Need for Speed: Taming Backdoor Attacks with Speed and Precision.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Towards Reliable and Efficient Backdoor Trigger Inversion via Decoupling Benign Features.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

PoisonPrompt: Backdoor Attack on Prompt-Based Large Language Models.
Proceedings of the IEEE International Conference on Acoustics, 2024

Cross-modality Information Check for Detecting Jailbreaking in Multimodal Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

2023
DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer.
IEEE Trans. Dependable Secur. Comput., 2023

MsDroid: Identifying Malicious Snippets for Android Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2023

Equitable Data Valuation Meets the Right to Be Forgotten in Model Markets.
Proc. VLDB Endow., 2023

Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems.
ACM Comput. Surv., 2023

Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger.
CoRR, 2023

PyraTrans: Attention-Enriched Pyramid Transformer for Malicious URL Detection.
CoRR, 2023

ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach.
CoRR, 2023

Malicious URL Detection via Pretrained Language Model Guided Multi-Level Feature Attention Network.
CoRR, 2023

Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey.
CoRR, 2023

SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution.
CoRR, 2023

FDINet: Protecting against DNN Model Extraction via Feature Distortion Index.
CoRR, 2023

Quantifying and Defending against Privacy Threats on Federated Knowledge Graph Embedding.
Proceedings of the ACM Web Conference 2023, 2023

Certified Minimax Unlearning with Generalization Rates and Deletion Capacity.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

ShapleyFL: Robust Federated Learning Based on Shapley Value.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

MUter: Machine Unlearning on Adversarially Trained Models.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

A Large-Scale Pretrained Deep Model for Phishing URL Detection.
Proceedings of the IEEE International Conference on Acoustics, 2023

FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning.
IEEE Trans. Inf. Forensics Secur., 2022

OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.
Proc. VLDB Endow., 2022

FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model.
CoRR, 2022

Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training.
CoRR, 2022

Backdoor Defense via Decoupling the Training Process.
Proceedings of the Tenth International Conference on Learning Representations, 2022

SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection.
Proceedings of the Computer Security - ESORICS 2022, 2022

L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
e-PoS: Making Proof-of-Stake Decentralized and Fair.
IEEE Trans. Parallel Distributed Syst., 2021

Towards Private and Scalable Cross-Media Retrieval.
IEEE Trans. Dependable Secur. Comput., 2021

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021

Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains.
IEEE Trans. Dependable Secur. Comput., 2021

Are You Confident That You Have Successfully Generated Adversarial Examples?
IEEE Trans. Circuits Syst. Video Technol., 2021

Secure Prediction of Neural Network in the Cloud.
IEEE Netw., 2021

From Local to Global Norm Emergence: Dissolving Self-reinforcing Substructures with Incremental Social Instruments.
Proceedings of the 38th International Conference on Machine Learning, 2021

Feature Importance-aware Transferable Adversarial Attacks.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

2020
Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable Driver Identification Scheme.
IEEE Trans. Veh. Technol., 2020

LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs.
IEEE Trans. Inf. Forensics Secur., 2020

How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs.
IEEE Trans. Inf. Forensics Secur., 2020

ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2020

The Security of Autonomous Driving: Threats, Defenses, and Future Directions.
Proc. IEEE, 2020

DUMP: A Dummy-Point-Based Framework for Histogram Estimation in Shuffle Model.
CoRR, 2020

Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Accelerometer-based smartphone eavesdropping.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

Towards Differentially Private Truth Discovery for Crowd Sensing Systems.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

2019
Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars.
IEEE Wirel. Commun., 2019

Toward Hardware-Rooted Smartphone Authentication.
IEEE Wirel. Commun., 2019

Privacy-Preserving Truth Discovery in Crowd Sensing Systems.
ACM Trans. Sens. Networks, 2019

GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2019

CIM: Camera in Motion for Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2019

EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics.
IEEE Internet Things J., 2019

EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.
IEEE Internet Things J., 2019

Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures.
IEEE Commun. Mag., 2019

SPEED: Accelerating Enclave Applications Via Secure Deduplication.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

CFP: Enabling Camera Fingerprint Concealment for Privacy-Preserving Image Sharing.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters.
IEEE Trans. Smart Grid, 2018

Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2018

Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing.
IEEE Trans. Cloud Comput., 2018

Privacy-Preserving Image Processing in the Cloud.
IEEE Cloud Comput., 2018

An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017

DPPro: Differentially Private High-Dimensional Data Release via Random Projection.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Netw., 2017

Privacy-Preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing.
ACM Trans. Multim. Comput. Commun. Appl., 2016

DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud.
IEEE Trans. Multim., 2016

Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.
IEEE Trans. Image Process., 2016

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016

Securing acoustics-based short-range communication systems: an overview.
J. Commun. Inf. Networks, 2016

SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2016

RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

2014
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IEEE Internet Things J., 2014

Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Private image computation: The case of cloud based privacy-preserving SIFT.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

AcousAuth: An acoustic-based mobile application for user authentication.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Privacy-preserving outsourcing of image global feature detection.
Proceedings of the IEEE Global Communications Conference, 2014

2013
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IACR Cryptol. ePrint Arch., 2013


  Loading...