Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Quanxin Zhang
@article{DBLP:journals/cybersec/LyuWTZZZ24, author = {Haoran Lyu and Yajie Wang and Yu{-}An Tan and Huipeng Zhou and Yuhang Zhao and Quanxin Zhang}, title = {Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks}, journal = {Cybersecur.}, volume = {7}, number = {1}, pages = {6}, year = {2024}, url = {https://doi.org/10.1186/s42400-023-00196-3}, doi = {10.1186/S42400-023-00196-3}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersec/LyuWTZZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tai/ZhouWTWZZL24, author = {Huipeng Zhou and Yajie Wang and Yu{-}an Tan and Shangbo Wu and Yuhang Zhao and Quanxin Zhang and Yuanzhang Li}, title = {Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding}, journal = {{IEEE} Trans. Artif. Intell.}, volume = {5}, number = {1}, pages = {412--419}, year = {2024}, url = {https://doi.org/10.1109/TAI.2023.3253083}, doi = {10.1109/TAI.2023.3253083}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tai/ZhouWTWZZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/YangZBTTZ23, author = {Jie Yang and Jun Zheng and Thar Baker and Shuai Tang and Yu{-}an Tan and Quanxin Zhang}, title = {Clean-label poisoning attacks on federated learning for IoT}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {40}, number = {5}, year = {2023}, url = {https://doi.org/10.1111/exsy.13161}, doi = {10.1111/EXSY.13161}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/YangZBTTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HaoZYSZZJL23, author = {Shengang Hao and Jun Zheng and Jie Yang and Haipeng Sun and Quanxin Zhang and Li Zhang and Nan Jiang and Yuanzhang Li}, title = {Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering}, journal = {Inf. Sci.}, volume = {634}, pages = {85--100}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.03.064}, doi = {10.1016/J.INS.2023.03.064}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HaoZYSZZJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangTSZZL23, author = {Yaoyuan Zhang and Yu{-}an Tan and Haipeng Sun and Yuhang Zhao and Quanxin Zhang and Yuanzhang Li}, title = {Improving the invisibility of adversarial examples with perceptually adaptive perturbation}, journal = {Inf. Sci.}, volume = {635}, pages = {126--137}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.03.139}, doi = {10.1016/J.INS.2023.03.139}, timestamp = {Wed, 19 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangTSZZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangTLLWZL23, author = {Yaoyuan Zhang and Yu{-}an Tan and Mingfeng Lu and Lu Liu and Dianxin Wang and Quanxin Zhang and Yuanzhang Li}, title = {Towards interpreting vulnerability of object detection models via adversarial distillation}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103410}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103410}, doi = {10.1016/J.JISA.2022.103410}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhangTLLWZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/WangTBKZ23, author = {Yajie Wang and Yu{-}an Tan and Thar Baker and Neeraj Kumar and Quanxin Zhang}, title = {Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {6}, pages = {7480--7488}, year = {2023}, url = {https://doi.org/10.1109/TII.2022.3168874}, doi = {10.1109/TII.2022.3168874}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/WangTBKZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisp/TangMZFZY23, author = {Shuai Tang and Tianshi Mu and Jun Zheng and Yurong Fu and Quanxin Zhang and Jie Yang}, editor = {Jaideep Vaidya and Moncef Gabbouj and Jin Li}, title = {A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse}, booktitle = {Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS{\&}P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14509}, pages = {316--327}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9785-5\_22}, doi = {10.1007/978-981-99-9785-5\_22}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisp/TangMZFZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisp/HuangCZZY23, author = {Rong Huang and Li Chen and Jun Zheng and Quanxin Zhang and Xiao Yu}, editor = {Jaideep Vaidya and Moncef Gabbouj and Jin Li}, title = {Adversarial Attacks Against Object Detection in Remote Sensing Images}, booktitle = {Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS{\&}P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14509}, pages = {358--367}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9785-5\_25}, doi = {10.1007/978-981-99-9785-5\_25}, timestamp = {Sun, 03 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisp/HuangCZZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/LiLXZLZ22, author = {Yuanzhang Li and Junli Liu and Xinting Xu and Xiaosong Zhang and Zhang Li and Quanxin Zhang}, title = {A robust packet-dropping covert channel for mobile intelligent terminals}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {6928--6950}, year = {2022}, url = {https://doi.org/10.1002/int.22868}, doi = {10.1002/INT.22868}, timestamp = {Wed, 21 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/LiLXZLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ZhangLRYMZ22, author = {Li Zhang and Zhao Li and Huali Ren and Xiao Yu and Yuxi Ma and Quanxin Zhang}, title = {Knowledge graph and behavior portrait of intelligent attack against path planning}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {7110--7123}, year = {2022}, url = {https://doi.org/10.1002/int.22874}, doi = {10.1002/INT.22874}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/ZhangLRYMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ZhangTLCLZ22, author = {Yaoyuan Zhang and Yu{-}an Tan and Mingfeng Lu and Tian Chen and Yuanzhang Li and Quanxin Zhang}, title = {Boosting cross-task adversarial attack with random blur}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {8139--8154}, year = {2022}, url = {https://doi.org/10.1002/int.22932}, doi = {10.1002/INT.22932}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/ZhangTLCLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ZhangZZCQZL22, author = {Jingci Zhang and Jun Zheng and Zheng Zhang and Tian Chen and Kefan Qiu and Quanxin Zhang and Yuanzhang Li}, title = {Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {12}, pages = {11167--11187}, year = {2022}, url = {https://doi.org/10.1002/int.23037}, doi = {10.1002/INT.23037}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/ZhangZZCQZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhangTLLZLW22, author = {Yaoyuan Zhang and Yu{-}an Tan and Mingfeng Lu and Lu Liu and Quanxin Zhang and Yuanzhang Li and Dianxin Wang}, editor = {Jianying Zhou and Sridhar Adepu and Cristina Alcaraz and Lejla Batina and Emiliano Casalicchio and Sudipta Chattopadhyay and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Weizhi Meng and Stjepan Picek and Jun Shao and Chunhua Su and Cong Wang and Yury Zhauniarovich and Saman A. Zonouz}, title = {Towards Interpreting Vulnerability of Object Detection Models via Adversarial Distillation}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13285}, pages = {53--65}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16815-4\_4}, doi = {10.1007/978-3-031-16815-4\_4}, timestamp = {Tue, 27 Sep 2022 16:52:52 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhangTLLZLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HaoZYNZZ22, author = {Shengang Hao and Jun Zheng and Jie Yang and Ziwei Ni and Quanxin Zhang and Li Zhang}, editor = {Jianying Zhou and Sridhar Adepu and Cristina Alcaraz and Lejla Batina and Emiliano Casalicchio and Sudipta Chattopadhyay and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Weizhi Meng and Stjepan Picek and Jun Shao and Chunhua Su and Cong Wang and Yury Zhauniarovich and Saman A. Zonouz}, title = {A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness Network for Automobile Maintenance Service}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13285}, pages = {84--103}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16815-4\_6}, doi = {10.1007/978-3-031-16815-4\_6}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HaoZYNZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhangZZCQZL22, author = {Jingci Zhang and Jun Zheng and Zheng Zhang and Tian Chen and Kefan Qiu and Quanxin Zhang and Yuanzhang Li}, editor = {Jianying Zhou and Sridhar Adepu and Cristina Alcaraz and Lejla Batina and Emiliano Casalicchio and Sudipta Chattopadhyay and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Weizhi Meng and Stjepan Picek and Jun Shao and Chunhua Su and Cong Wang and Yury Zhauniarovich and Saman A. Zonouz}, title = {Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13285}, pages = {104--123}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16815-4\_7}, doi = {10.1007/978-3-031-16815-4\_7}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhangZZCQZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/Zhang0CLZL22, author = {Yaoyuan Zhang and Yu{-}an Tan and Tian Chen and Xinrui Liu and Quanxin Zhang and Yuanzhang Li}, editor = {Luc De Raedt}, title = {Enhancing the Transferability of Adversarial Examples with Random Patch}, booktitle = {Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, {IJCAI} 2022, Vienna, Austria, 23-29 July 2022}, pages = {1672--1678}, publisher = {ijcai.org}, year = {2022}, url = {https://doi.org/10.24963/ijcai.2022/233}, doi = {10.24963/IJCAI.2022/233}, timestamp = {Wed, 27 Jul 2022 16:43:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/Zhang0CLZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-12204, author = {Haoran Lyu and Yajie Wang and Yu{-}an Tan and Huipeng Zhou and Yuhang Zhao and Quanxin Zhang}, title = {Boosting Adversarial Transferability of MLP-Mixer}, journal = {CoRR}, volume = {abs/2204.12204}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.12204}, doi = {10.48550/ARXIV.2204.12204}, eprinttype = {arXiv}, eprint = {2204.12204}, timestamp = {Wed, 19 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-12204.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-04881, author = {Nan Luo and Yuanzhang Li and Yajie Wang and Shangbo Wu and Yu{-}An Tan and Quanxin Zhang}, title = {Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers}, journal = {CoRR}, volume = {abs/2206.04881}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.04881}, doi = {10.48550/ARXIV.2206.04881}, eprinttype = {arXiv}, eprint = {2206.04881}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-04881.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/MaSZLTZW21, author = {Yuxi Ma and Meng Shen and Yuhang Zhao and Zhao Li and Xiaoyao Tong and Quanxin Zhang and Zhi Wang}, title = {Opponent portrait for multiagent reinforcement learning in competitive environment}, journal = {Int. J. Intell. Syst.}, volume = {36}, number = {12}, pages = {7461--7474}, year = {2021}, url = {https://doi.org/10.1002/int.22594}, doi = {10.1002/INT.22594}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/MaSZLTZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/KuangGWZKZ21, author = {Xiaohui Kuang and Xianfeng Gao and Lianfang Wang and Gang Zhao and Lishan Ke and Quanxin Zhang}, title = {A discrete cosine transform-based query efficient attack on black-box object detectors}, journal = {Inf. Sci.}, volume = {546}, pages = {596--607}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2020.05.089}, doi = {10.1016/J.INS.2020.05.089}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/KuangGWZKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangLKZTZH21, author = {Yajie Wang and Haoran Lv and Xiaohui Kuang and Gang Zhao and Yu{-}an Tan and Quanxin Zhang and Jingjing Hu}, title = {Towards a physical-world adversarial patch for blinding object detection models}, journal = {Inf. Sci.}, volume = {556}, pages = {459--471}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2020.08.087}, doi = {10.1016/J.INS.2020.08.087}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangLKZTZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/ZhangZLWYL21, author = {Quanxin Zhang and Mengyan Zhu and Chen Liang and Kunqing Wang and Kai Yang and Yuanzhang Li}, title = {A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis}, journal = {Mob. Networks Appl.}, volume = {26}, number = {4}, pages = {1493--1502}, year = {2021}, url = {https://doi.org/10.1007/s11036-019-01485-3}, doi = {10.1007/S11036-019-01485-3}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/ZhangZLWYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/ZhouTZKHH21, author = {Yutian Zhou and Yu{-}an Tan and Quanxin Zhang and Xiaohui Kuang and Yahong Han and Jingjing Hu}, title = {An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers}, journal = {Mob. Networks Appl.}, volume = {26}, number = {4}, pages = {1616--1629}, year = {2021}, url = {https://doi.org/10.1007/s11036-019-01499-x}, doi = {10.1007/S11036-019-01499-X}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/ZhouTZKHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmbd/XueWCZLT21, author = {Yuan Xue and Shouxin Wang and Tian Chen and Quanxin Zhang and Lu Liu and Yu{-}an Tan}, editor = {Ying Tan and Yuhui Shi and Albert Y. Zomaya and Hongyang Yan and Jun Cai}, title = {On-line Firmware Updating and Fingerprint Generating for Solid State Disks}, booktitle = {Data Mining and Big Data - 6th International Conference, {DMBD} 2021, Guangzhou, China, October 20-22, 2021, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {1454}, pages = {28--36}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-7502-7\_3}, doi = {10.1007/978-981-16-7502-7\_3}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmbd/XueWCZLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmbd/LiuYZZLT21, author = {Xinrui Liu and Xiao Yu and Zhibin Zhang and Quanxin Zhang and Yuanzhang Li and Yu{-}an Tan}, editor = {Ying Tan and Yuhui Shi and Albert Y. Zomaya and Hongyang Yan and Jun Cai}, title = {A Random Multi-target Backdooring Attack on Deep Neural Networks}, booktitle = {Data Mining and Big Data - 6th International Conference, {DMBD} 2021, Guangzhou, China, October 20-22, 2021, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {1454}, pages = {45--52}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-7502-7\_5}, doi = {10.1007/978-981-16-7502-7\_5}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmbd/LiuYZZLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmbd/LiMZYZL21, author = {Zhao Li and Yuxi Ma and Zhibin Zhang and Xiao Yu and Quanxin Zhang and Yuanzhang Li}, editor = {Ying Tan and Yuhui Shi and Albert Y. Zomaya and Hongyang Yan and Jun Cai}, title = {Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles}, booktitle = {Data Mining and Big Data - 6th International Conference, {DMBD} 2021, Guangzhou, China, October 20-22, 2021, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {1454}, pages = {53--60}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-7502-7\_6}, doi = {10.1007/978-981-16-7502-7\_6}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dmbd/LiMZYZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmbd/TongMXZLT21, author = {Xiaoyao Tong and Yuxi Ma and Yuan Xue and Quanxin Zhang and Yuanzhang Li and Yu{-}an Tan}, editor = {Ying Tan and Yuhui Shi and Albert Y. Zomaya and Hongyang Yan and Jun Cai}, title = {Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement Learning}, booktitle = {Data Mining and Big Data - 6th International Conference, {DMBD} 2021, Guangzhou, China, October 20-22, 2021, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {1454}, pages = {61--68}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-7502-7\_7}, doi = {10.1007/978-981-16-7502-7\_7}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmbd/TongMXZLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ShiCXLZTH21, author = {Zhiwei Shi and Tian Chen and Yuan Xue and Yuanzhang Li and Quanxin Zhang and Yu{-}an Tan and Jingjing Hu}, title = {Code Decoupling Execution Isolating Based on {TF} Card Firmware Extension}, booktitle = {Sixth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2021, Shenzhen, China, October 9-11, 2021}, pages = {403--408}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC53577.2021.00063}, doi = {10.1109/DSC53577.2021.00063}, timestamp = {Fri, 22 Apr 2022 19:18:38 +0200}, biburl = {https://dblp.org/rec/conf/dsc/ShiCXLZTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/WangWJHTZ21, author = {Yajie Wang and Shangbo Wu and Wenyi Jiang and Shengang Hao and Yu{-}an Tan and Quanxin Zhang}, editor = {Zhi{-}Hua Zhou}, title = {Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity}, booktitle = {Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27 August 2021}, pages = {3125--3133}, publisher = {ijcai.org}, year = {2021}, url = {https://doi.org/10.24963/ijcai.2021/430}, doi = {10.24963/IJCAI.2021/430}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/WangWJHTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-01396, author = {Yajie Wang and Shangbo Wu and Wenyi Jiang and Shengang Hao and Yu{-}an Tan and Quanxin Zhang}, title = {Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity}, journal = {CoRR}, volume = {abs/2107.01396}, year = {2021}, url = {https://arxiv.org/abs/2107.01396}, eprinttype = {arXiv}, eprint = {2107.01396}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-01396.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhangZWBZH20, author = {Quanxin Zhang and Yuhang Zhao and Yajie Wang and Thar Baker and Jian Zhang and Jingjing Hu}, title = {Towards cross-task universal perturbation against black-box object detectors in autonomous driving}, journal = {Comput. Networks}, volume = {180}, pages = {107388}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107388}, doi = {10.1016/J.COMNET.2020.107388}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZhangZWBZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhangZXH20, author = {Quanxin Zhang and Xiaosong Zhang and Yuan Xue and Jingjing Hu}, title = {A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints}, journal = {Future Gener. Comput. Syst.}, volume = {102}, pages = {472--480}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.08.016}, doi = {10.1016/J.FUTURE.2019.08.016}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ZhangZXH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/ShiHZK20, author = {Yucheng Shi and Yahong Han and Quanxin Zhang and Xiaohui Kuang}, title = {Adaptive iterative attack towards explainable adversarial robustness}, journal = {Pattern Recognit.}, volume = {105}, pages = {107309}, year = {2020}, url = {https://doi.org/10.1016/j.patcog.2020.107309}, doi = {10.1016/J.PATCOG.2020.107309}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pr/ShiHZK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hucc/LiuWBHZZ20, author = {Yujie Liu and Wenjia Wu and Wen Bo and Chen Han and Quanxin Zhang and Changyou Zhang}, editor = {Qiaohong Zu and Yong Tang and Vladimir Mladenovic}, title = {Permission Dispatching Mechanism Inside and Outside of the Warranty Period for Equipment Maintenance Service System}, booktitle = {Human Centered Computing - 6th International Conference, {HCC} 2020, Virtual Event, December 14-15, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12634}, pages = {84--90}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70626-5\_9}, doi = {10.1007/978-3-030-70626-5\_9}, timestamp = {Wed, 05 May 2021 09:29:35 +0200}, biburl = {https://dblp.org/rec/conf/hucc/LiuWBHZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/ZhangJZHKT20, author = {Haitao Zhang and Fan Jia and Quanxin Zhang and Yahong Han and Xiaohui Kuang and Yu{-}an Tan}, title = {Two-Way Feature-Aligned And Attention-Rectified Adversarial Training}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2020, London, UK, July 6-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICME46284.2020.9102777}, doi = {10.1109/ICME46284.2020.9102777}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/ZhangJZHKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiYYTZ19, author = {Yuanzhang Li and Shangjun Yao and Kai Yang and Yu{-}an Tan and Quan{-}Xin Zhang}, title = {A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for {JPEG} Images}, journal = {{IEEE} Access}, volume = {7}, pages = {73573--73582}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2920178}, doi = {10.1109/ACCESS.2019.2920178}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LiYYTZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangGXZ19, author = {Xiaosong Zhang and Linhong Guo and Yuan Xue and Quanxin Zhang}, title = {A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment}, journal = {{IEEE} Access}, volume = {7}, pages = {122214--122223}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2937969}, doi = {10.1109/ACCESS.2019.2937969}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangGXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangWZH19, author = {Quanxin Zhang and Kunqing Wang and Wenjiao Zhang and Jingjing Hu}, title = {Attacking Black-Box Image Classifiers With Particle Swarm Optimization}, journal = {{IEEE} Access}, volume = {7}, pages = {158051--158063}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2948146}, doi = {10.1109/ACCESS.2019.2948146}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangWZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KuangLWZZZ19, author = {Xiaohui Kuang and Hongyi Liu and Ye Wang and Qikun Zhang and Quanxin Zhang and Jun Zheng}, title = {A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {172938--172947}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2956553}, doi = {10.1109/ACCESS.2019.2956553}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KuangLWZZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/ZhangHZ19, author = {Li Zhang and Shengang Hao and Quanxin Zhang}, title = {Recovering SQLite data from fragmented flash pages}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {74}, number = {7-8}, pages = {451--460}, year = {2019}, url = {https://doi.org/10.1007/s12243-019-00707-9}, doi = {10.1007/S12243-019-00707-9}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/ZhangHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WeiHCXZ19, author = {Hua Wei and Changzhen Hu and Shiyou Chen and Yuan Xue and Quanxin Zhang}, title = {Establishing a software defect prediction model via effective dimension reduction}, journal = {Inf. Sci.}, volume = {477}, pages = {399--409}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.10.056}, doi = {10.1016/J.INS.2018.10.056}, timestamp = {Fri, 11 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WeiHCXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/YuTSLLZ19, author = {Xiao Yu and Yu{-}an Tan and Zhizhuo Sun and Jingyu Liu and Chen Liang and Quanxin Zhang}, title = {A fault-tolerant and energy-efficient continuous data protection system}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {10}, number = {8}, pages = {2945--2954}, year = {2019}, url = {https://doi.org/10.1007/s12652-018-0726-2}, doi = {10.1007/S12652-018-0726-2}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/YuTSLLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhangGZLT19, author = {Quan{-}Xin Zhang and Hanxiao Gong and Xiaosong Zhang and Chen Liang and Yu{-}an Tan}, title = {A sensitive network jitter measurement for covert timing channels over interactive traffic}, journal = {Multim. Tools Appl.}, volume = {78}, number = {3}, pages = {3493--3509}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6281-1}, doi = {10.1007/S11042-018-6281-1}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhangGZLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/WangLZK19, author = {Xinxin Wang and Yuanzhang Li and Quanxin Zhang and Xiaohui Kuang}, editor = {Jaideep Vaidya and Xiao Zhang and Jin Li}, title = {Boosting Training for {PDF} Malware Classifier via Active Learning}, booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS} 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11983}, pages = {101--110}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37352-8\_9}, doi = {10.1007/978-3-030-37352-8\_9}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/WangLZK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/ZhuCLLZ19, author = {Haojia Zhu and Can Cui and Fengyin Li and Zhongxing Liu and Quanxin Zhang}, editor = {Jaideep Vaidya and Xiao Zhang and Jin Li}, title = {Design of Anonymous Communication Protocol Based on Group Signature}, booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS} 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11983}, pages = {175--181}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37352-8\_15}, doi = {10.1007/978-3-030-37352-8\_15}, timestamp = {Wed, 08 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/ZhuCLLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/WangLLZX19, author = {Dongfeng Wang and Qinghua Li and Fengyin Li and Quanxin Zhang and Banghai Xu}, editor = {Jaideep Vaidya and Xiao Zhang and Jin Li}, title = {Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain}, booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS} 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11982}, pages = {274--278}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37337-5\_22}, doi = {10.1007/978-3-030-37337-5\_22}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/css/WangLLZX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/AiWYZ19, author = {Haojun Ai and Yifeng Wang and Yuhong Yang and Quanxin Zhang}, editor = {Jaideep Vaidya and Xiao Zhang and Jin Li}, title = {An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home Assistant}, booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS} 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11982}, pages = {363--373}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37337-5\_29}, doi = {10.1007/978-3-030-37337-5\_29}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/css/AiWYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/WangLZHK19, author = {Yaxiao Wang and Yuanzhang Li and Quanxin Zhang and Jingjing Hu and Xiaohui Kuang}, editor = {Jaideep Vaidya and Xiao Zhang and Jin Li}, title = {Evading {PDF} Malware Classifiers with Generative Adversarial Network}, booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS} 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11982}, pages = {374--387}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37337-5\_30}, doi = {10.1007/978-3-030-37337-5\_30}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/WangLZHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/AiXZ19, author = {Haojun Ai and Wuyang Xia and Quanxin Zhang}, editor = {Jaideep Vaidya and Xiao Zhang and Jin Li}, title = {Speaker Recognition Based on Lightweight Neural Network for Smart Home Solutions}, booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS} 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11983}, pages = {421--431}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37352-8\_37}, doi = {10.1007/978-3-030-37352-8\_37}, timestamp = {Wed, 08 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/AiXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/WuHZK19, author = {Aming Wu and Yahong Han and Quanxin Zhang and Xiaohui Kuang}, title = {Untargeted Adversarial Attack via Expanding the Semantic Gap}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2019, Shanghai, China, July 8-12, 2019}, pages = {514--519}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICME.2019.00095}, doi = {10.1109/ICME.2019.00095}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/WuHZK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcom/YuWZL19, author = {Xiao Yu and Kunqing Wang and Quanxin Zhang and Yuanzhang Li}, editor = {Meikang Qiu}, title = {A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles}, booktitle = {Smart Computing and Communication - 4th International Conference, SmartCom 2019, Birmingham, UK, October 11-13, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11910}, pages = {34--41}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34139-8\_4}, doi = {10.1007/978-3-030-34139-8\_4}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartcom/YuWZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcom/ZhaoWXZZ19, author = {Yuhang Zhao and Kunqing Wang and Yuan Xue and Quanxin Zhang and Xiaosong Zhang}, editor = {Meikang Qiu}, title = {An Universal Perturbation Generator for Black-Box Attacks Against Object Detectors}, booktitle = {Smart Computing and Communication - 4th International Conference, SmartCom 2019, Birmingham, UK, October 11-13, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11910}, pages = {63--72}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34139-8\_7}, doi = {10.1007/978-3-030-34139-8\_7}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartcom/ZhaoWXZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/ZhangGXJLZ19, author = {Xiaosong Zhang and Linhong Guo and Yuan Xue and Hongwei Jiang and Lu Liu and Quanxin Zhang}, editor = {Weizhi Meng and Steven Furnell}, title = {A Hybrid Covert Channel with Feedback over Mobile Networks}, booktitle = {Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1095}, pages = {87--94}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-0758-8\_7}, doi = {10.1007/978-981-15-0758-8\_7}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socialsec/ZhangGXJLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangGZWT18, author = {Qikun Zhang and Yong Gan and Quan{-}Xin Zhang and Ruifang Wang and Yu{-}an Tan}, title = {A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application}, journal = {{IEEE} Access}, volume = {6}, pages = {24064--24074}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2799007}, doi = {10.1109/ACCESS.2018.2799007}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangGZWT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhengTZZZZ18, author = {Jiamin Zheng and Yu{-}an Tan and Qikun Zhang and Xiaosong Zhang and Liehuang Zhu and Quan{-}Xin Zhang}, title = {Cross-cluster asymmetric group key agreement for wireless sensor networks}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {4}, pages = {048103:1--048103:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9212-2}, doi = {10.1007/S11432-017-9212-2}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhengTZZZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/TanXLZZL18, author = {Yu{-}an Tan and Xinting Xu and Chen Liang and Xiaosong Zhang and Quan{-}Xin Zhang and Yuanzhang Li}, title = {An end-to-end covert channel via packet dropout for mobile networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {14}, number = {5}, year = {2018}, url = {https://doi.org/10.1177/1550147718779568}, doi = {10.1177/1550147718779568}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/TanXLZZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/XueTLLZZ18, author = {Yuan Xue and Yu{-}an Tan and Chen Liang and Yuanzhang Li and Jun Zheng and Quan{-}Xin Zhang}, title = {RootAgency: {A} digital signature-based root privilege management agency for cloud terminal devices}, journal = {Inf. Sci.}, volume = {444}, pages = {36--50}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.02.069}, doi = {10.1016/J.INS.2018.02.069}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/XueTLLZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangLZLZT18, author = {Xiaosong Zhang and Chen Liang and Quan{-}Xin Zhang and Yuanzhang Li and Jun Zheng and Yu{-}an Tan}, title = {Building covert timing channels by packet rearrangement over mobile networks}, journal = {Inf. Sci.}, volume = {445-446}, pages = {66--78}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.03.007}, doi = {10.1016/J.INS.2018.03.007}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangLZLZT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TanXLZZZL18, author = {Yu{-}an Tan and Yuan Xue and Chen Liang and Jun Zheng and Quan{-}Xin Zhang and Jiamin Zheng and Yuanzhang Li}, title = {A root privilege management scheme with revocable authorization for Android devices}, journal = {J. Netw. Comput. Appl.}, volume = {107}, pages = {69--82}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.01.011}, doi = {10.1016/J.JNCA.2018.01.011}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TanXLZZZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiangTZWZZ18, author = {Chen Liang and Yu{-}an Tan and Xiaosong Zhang and Xianmin Wang and Jun Zheng and Quan{-}Xin Zhang}, title = {Building packet length covert channel over mobile VoIP traffics}, journal = {J. Netw. Comput. Appl.}, volume = {118}, pages = {144--153}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.06.012}, doi = {10.1016/J.JNCA.2018.06.012}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiangTZWZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhuTZWZL18, author = {Hongfei Zhu and Yu{-}an Tan and Liehuang Zhu and Xianmin Wang and Quan{-}Xin Zhang and Yuanzhang Li}, title = {An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks}, journal = {Sensors}, volume = {18}, number = {5}, pages = {1663}, year = {2018}, url = {https://doi.org/10.3390/s18051663}, doi = {10.3390/S18051663}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ZhuTZWZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/SunZLT18, author = {Zhizhuo Sun and Quan{-}Xin Zhang and Yuanzhang Li and Yu{-}an Tan}, title = {{DPPDL:} {A} Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {28}, number = {1}, pages = {193--205}, year = {2018}, url = {https://doi.org/10.1109/TCSVT.2016.2605045}, doi = {10.1109/TCSVT.2016.2605045}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/SunZLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/TanZSLZL18, author = {Yu{-}an Tan and Xiaosong Zhang and Kashif Sharif and Chen Liang and Quan{-}Xin Zhang and Yuanzhang Li}, title = {Covert Timing Channels for IoT over Mobile Networks}, journal = {{IEEE} Wirel. Commun.}, volume = {25}, number = {6}, pages = {38--44}, year = {2018}, url = {https://doi.org/10.1109/MWC.2017.1800062}, doi = {10.1109/MWC.2017.1800062}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/TanZSLZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ZhuTZZL18, author = {Hongfei Zhu and Yu{-}an Tan and Liehuang Zhu and Quan{-}Xin Zhang and Yuanzhang Li}, title = {An Efficient Identity-Based Proxy Blind Signature for Semioffline Services}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {5401890:1--5401890:9}, year = {2018}, url = {https://doi.org/10.1155/2018/5401890}, doi = {10.1155/2018/5401890}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/ZhuTZZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/HanZGHY18, author = {Wencong Han and Quanxin Zhang and Chongzhi Gao and Jingjing Hu and Fang Yan}, editor = {Jaideep Vaidya and Jin Li}, title = {Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware}, booktitle = {Algorithms and Architectures for Parallel Processing - 18th International Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11337}, pages = {249--259}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05063-4\_20}, doi = {10.1007/978-3-030-05063-4\_20}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/HanZGHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ZhangTXZLZZ17, author = {Xiaosong Zhang and Yu{-}an Tan and Yuan Xue and Quan{-}Xin Zhang and Yuanzhang Li and Can Zhang and Jun Zheng}, title = {Cryptographic key protection against {FROST} for mobile devices}, journal = {Clust. Comput.}, volume = {20}, number = {3}, pages = {2393--2402}, year = {2017}, url = {https://doi.org/10.1007/s10586-016-0721-3}, doi = {10.1007/S10586-016-0721-3}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ZhangTXZLZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZhuZMZT17, author = {Ruijin Zhu and Baofeng Zhang and Junjie Mao and Quan{-}Xin Zhang and Yu{-}an Tan}, title = {A methodology for determining the image base of ARM-based industrial control system firmware}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {16}, pages = {26--35}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2016.12.002}, doi = {10.1016/J.IJCIP.2016.12.002}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ZhuZMZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/KhaledZ17, author = {Aourra Khaled and Quan{-}Xin Zhang}, title = {An Energy Aware Mass Memory Unit for Small Satellites Using Hybrid Architecture}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 1}, pages = {210--213}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.44}, doi = {10.1109/CSE-EUC.2017.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/KhaledZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/PangAXLZ17, author = {Pengfei Pang and Aourra Khaled and Yuan Xue and Yuanzhang Li and Quan{-}Xin Zhang}, title = {A Transparent Encryption Scheme of Video Data for Android Devices}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 1}, pages = {817--822}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.163}, doi = {10.1109/CSE-EUC.2017.163}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/PangAXLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gski/LiuWZL17, author = {Shaoru Liu and Yao Wang and Quan{-}Xin Zhang and Yuanzhang Li}, editor = {Hanning Yuan and Jing Geng and Chuanlu Liu and Fuling Bian and Tisinee Surapunt}, title = {A VoLTE Encryption Experiment for Android Smartphones}, booktitle = {Geo-Spatial Knowledge and Intelligence - 5th International Conference, {GSKI} 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part {I}}, series = {Communications in Computer and Information Science}, volume = {848}, pages = {115--125}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-13-0893-2\_13}, doi = {10.1007/978-981-13-0893-2\_13}, timestamp = {Sun, 24 Jun 2018 18:48:11 +0200}, biburl = {https://dblp.org/rec/conf/gski/LiuWZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZhuTZLZ16, author = {Ruijin Zhu and Yu{-}an Tan and Quan{-}Xin Zhang and Yuanzhang Li and Jun Zheng}, title = {Determining image base of firmware for {ARM} devices by matching literal pools}, journal = {Digit. Investig.}, volume = {16}, pages = {19--28}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.002}, doi = {10.1016/J.DIIN.2016.01.002}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZhuTZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhuTZWZX16, author = {Ruijin Zhu and Yu{-}an Tan and Quan{-}Xin Zhang and Fei Wu and Jun Zheng and Yuan Xue}, title = {Determining Image Base of Firmware Files for {ARM} Devices}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {2}, pages = {351--359}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015EDP7217}, doi = {10.1587/TRANSINF.2015EDP7217}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/ZhuTZWZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZhangHZTZL15, author = {Li Zhang and Shen{-}Gang Hao and Jun Zheng and Yu{-}an Tan and Quan{-}xin Zhang and Yuan{-}zhang Li}, title = {Descrambling data on solid-state disks by reverse-engineering the firmware}, journal = {Digit. Investig.}, volume = {12}, pages = {77--87}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2014.12.003}, doi = {10.1016/J.DIIN.2014.12.003}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ZhangHZTZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/YuJZLT15, author = {Xiao Yu and Tong{-}Sheng Ju and Quan{-}Xin Zhang and Yuanzhang Li and Yu{-}an Tan}, title = {Tuner and demodulator design of antenna control system}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {8}, number = {2}, pages = {141--146}, year = {2015}, url = {https://doi.org/10.1504/IJWMC.2015.068622}, doi = {10.1504/IJWMC.2015.068622}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/YuJZLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcam/GaoZL14, author = {Li Gao and Quanxin Zhang and Shouhua Liu}, title = {Oscillatory behavior of third-order nonlinear delay dynamic equations on time scales}, journal = {J. Comput. Appl. Math.}, volume = {256}, pages = {104--113}, year = {2014}, url = {https://doi.org/10.1016/j.cam.2013.07.024}, doi = {10.1016/J.CAM.2013.07.024}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcam/GaoZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/GaoZCHWZL13, author = {Yue Gao and Quanxin Zhang and Yulei Chu and Xiang He and Jun Wan and Zhiqiang Zhou and Jing Lin}, title = {The research and implementation of customised launcher in Android}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {6}, number = {5}, pages = {441--447}, year = {2013}, url = {https://doi.org/10.1504/IJWMC.2013.057393}, doi = {10.1504/IJWMC.2013.057393}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/GaoZCHWZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/appml/ZhangGY12, author = {Quanxin Zhang and Li Gao and Yuanhong Yu}, title = {Oscillation criteria for third-order neutral differential equations with continuously distributed delay}, journal = {Appl. Math. Lett.}, volume = {25}, number = {10}, pages = {1514--1519}, year = {2012}, url = {https://doi.org/10.1016/j.aml.2012.01.007}, doi = {10.1016/J.AML.2012.01.007}, timestamp = {Fri, 03 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/appml/ZhangGY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/appml/ZhangLG11, author = {Quanxin Zhang and Shouhua Liu and Li Gao}, title = {Oscillation criteria for even-order half-linear functional differential equations with damping}, journal = {Appl. Math. Lett.}, volume = {24}, number = {10}, pages = {1709--1715}, year = {2011}, url = {https://doi.org/10.1016/j.aml.2011.04.025}, doi = {10.1016/J.AML.2011.04.025}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/appml/ZhangLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/LiuZY11, author = {Shouhua Liu and Quanxin Zhang and Yuanhong Yu}, title = {Oscillation of even-order half-linear functional differential equations with damping}, journal = {Comput. Math. Appl.}, volume = {61}, number = {8}, pages = {2191--2196}, year = {2011}, url = {https://doi.org/10.1016/j.camwa.2010.09.011}, doi = {10.1016/J.CAMWA.2010.09.011}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/LiuZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/ZhangGW11, author = {Quanxin Zhang and Li Gao and Lei Wang}, title = {Oscillation of second-order nonlinear delay dynamic equations on time scales}, journal = {Comput. Math. Appl.}, volume = {61}, number = {8}, pages = {2342--2348}, year = {2011}, url = {https://doi.org/10.1016/j.camwa.2010.10.005}, doi = {10.1016/J.CAMWA.2010.10.005}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/ZhangGW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/ZhangQ11a, author = {Quanxin Zhang and Fang Qiu}, title = {Oscillation theorems for second-order half-linear delay dynamic equations with damping on time scales}, journal = {Comput. Math. Appl.}, volume = {62}, number = {11}, pages = {4185--4193}, year = {2011}, url = {https://doi.org/10.1016/j.camwa.2011.10.002}, doi = {10.1016/J.CAMWA.2011.10.002}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/ZhangQ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcam/Zhang11, author = {Quanxin Zhang}, title = {Oscillation of second-order half-linear delay dynamic equations with damping on time scales}, journal = {J. Comput. Appl. Math.}, volume = {235}, number = {5}, pages = {1180--1188}, year = {2011}, url = {https://doi.org/10.1016/j.cam.2010.07.027}, doi = {10.1016/J.CAM.2010.07.027}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcam/Zhang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/ZhangYG10, author = {Quanxin Zhang and Jurang Yan and Li Gao}, title = {Oscillation behavior of even-order nonlinear neutral differential equations with variable coefficients}, journal = {Comput. Math. Appl.}, volume = {59}, number = {1}, pages = {426--430}, year = {2010}, url = {https://doi.org/10.1016/j.camwa.2009.06.027}, doi = {10.1016/J.CAMWA.2009.06.027}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/ZhangYG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icadl/JinNZLQ08, author = {Fusheng Jin and Zhendong Niu and Quanxin Zhang and Haiyang Lang and Kai Qin}, editor = {George Buchanan and Masood Masoodian and Sally Jo Cunningham}, title = {A User Reputation Model for {DLDE} Learning 2.0 Community}, booktitle = {Digital Libraries: Universal and Ubiquitous Access to Information, 11th International Conference on Asian Digital Libraries, {ICADL} 2008, Bali, Indonesia, December 2-5, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5362}, pages = {61--70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89533-6\_7}, doi = {10.1007/978-3-540-89533-6\_7}, timestamp = {Mon, 05 Sep 2022 11:39:31 +0200}, biburl = {https://dblp.org/rec/conf/icadl/JinNZLQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/appml/ZhangY06, author = {Quanxin Zhang and Jurang Yan}, title = {Oscillation behavior of even order neutral differential equations with variable coefficients}, journal = {Appl. Math. Lett.}, volume = {19}, number = {11}, pages = {1202--1206}, year = {2006}, url = {https://doi.org/10.1016/j.aml.2006.01.003}, doi = {10.1016/J.AML.2006.01.003}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/appml/ZhangY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.