BibTeX records: Quanxin Zhang

download as .bib file

@article{DBLP:journals/cybersec/LyuWTZZZ24,
  author       = {Haoran Lyu and
                  Yajie Wang and
                  Yu{-}An Tan and
                  Huipeng Zhou and
                  Yuhang Zhao and
                  Quanxin Zhang},
  title        = {Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks},
  journal      = {Cybersecur.},
  volume       = {7},
  number       = {1},
  pages        = {6},
  year         = {2024},
  url          = {https://doi.org/10.1186/s42400-023-00196-3},
  doi          = {10.1186/S42400-023-00196-3},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersec/LyuWTZZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tai/ZhouWTWZZL24,
  author       = {Huipeng Zhou and
                  Yajie Wang and
                  Yu{-}an Tan and
                  Shangbo Wu and
                  Yuhang Zhao and
                  Quanxin Zhang and
                  Yuanzhang Li},
  title        = {Crafting Transferable Adversarial Examples Against Face Recognition
                  via Gradient Eroding},
  journal      = {{IEEE} Trans. Artif. Intell.},
  volume       = {5},
  number       = {1},
  pages        = {412--419},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAI.2023.3253083},
  doi          = {10.1109/TAI.2023.3253083},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tai/ZhouWTWZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/YangZBTTZ23,
  author       = {Jie Yang and
                  Jun Zheng and
                  Thar Baker and
                  Shuai Tang and
                  Yu{-}an Tan and
                  Quanxin Zhang},
  title        = {Clean-label poisoning attacks on federated learning for IoT},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {40},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1111/exsy.13161},
  doi          = {10.1111/EXSY.13161},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/es/YangZBTTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HaoZYSZZJL23,
  author       = {Shengang Hao and
                  Jun Zheng and
                  Jie Yang and
                  Haipeng Sun and
                  Quanxin Zhang and
                  Li Zhang and
                  Nan Jiang and
                  Yuanzhang Li},
  title        = {Deep reinforce learning for joint optimization of condition-based
                  maintenance and spare ordering},
  journal      = {Inf. Sci.},
  volume       = {634},
  pages        = {85--100},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.03.064},
  doi          = {10.1016/J.INS.2023.03.064},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HaoZYSZZJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangTSZZL23,
  author       = {Yaoyuan Zhang and
                  Yu{-}an Tan and
                  Haipeng Sun and
                  Yuhang Zhao and
                  Quanxin Zhang and
                  Yuanzhang Li},
  title        = {Improving the invisibility of adversarial examples with perceptually
                  adaptive perturbation},
  journal      = {Inf. Sci.},
  volume       = {635},
  pages        = {126--137},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.03.139},
  doi          = {10.1016/J.INS.2023.03.139},
  timestamp    = {Wed, 19 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangTSZZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangTLLWZL23,
  author       = {Yaoyuan Zhang and
                  Yu{-}an Tan and
                  Mingfeng Lu and
                  Lu Liu and
                  Dianxin Wang and
                  Quanxin Zhang and
                  Yuanzhang Li},
  title        = {Towards interpreting vulnerability of object detection models via
                  adversarial distillation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103410},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103410},
  doi          = {10.1016/J.JISA.2022.103410},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangTLLWZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/WangTBKZ23,
  author       = {Yajie Wang and
                  Yu{-}an Tan and
                  Thar Baker and
                  Neeraj Kumar and
                  Quanxin Zhang},
  title        = {Deep Fusion: Crafting Transferable Adversarial Examples and Improving
                  Robustness of Industrial Artificial Intelligence of Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {6},
  pages        = {7480--7488},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2022.3168874},
  doi          = {10.1109/TII.2022.3168874},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/WangTBKZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisp/TangMZFZY23,
  author       = {Shuai Tang and
                  Tianshi Mu and
                  Jun Zheng and
                  Yurong Fu and
                  Quanxin Zhang and
                  Jie Yang},
  editor       = {Jaideep Vaidya and
                  Moncef Gabbouj and
                  Jin Li},
  title        = {A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied
                  to Data LakeHouse},
  booktitle    = {Artificial Intelligence Security and Privacy - First International
                  Conference on Artificial Intelligence Security and Privacy, AIS{\&}P
                  2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14509},
  pages        = {316--327},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9785-5\_22},
  doi          = {10.1007/978-981-99-9785-5\_22},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisp/TangMZFZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisp/HuangCZZY23,
  author       = {Rong Huang and
                  Li Chen and
                  Jun Zheng and
                  Quanxin Zhang and
                  Xiao Yu},
  editor       = {Jaideep Vaidya and
                  Moncef Gabbouj and
                  Jin Li},
  title        = {Adversarial Attacks Against Object Detection in Remote Sensing Images},
  booktitle    = {Artificial Intelligence Security and Privacy - First International
                  Conference on Artificial Intelligence Security and Privacy, AIS{\&}P
                  2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14509},
  pages        = {358--367},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9785-5\_25},
  doi          = {10.1007/978-981-99-9785-5\_25},
  timestamp    = {Sun, 03 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisp/HuangCZZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/LiLXZLZ22,
  author       = {Yuanzhang Li and
                  Junli Liu and
                  Xinting Xu and
                  Xiaosong Zhang and
                  Zhang Li and
                  Quanxin Zhang},
  title        = {A robust packet-dropping covert channel for mobile intelligent terminals},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {10},
  pages        = {6928--6950},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22868},
  doi          = {10.1002/INT.22868},
  timestamp    = {Wed, 21 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/LiLXZLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/ZhangLRYMZ22,
  author       = {Li Zhang and
                  Zhao Li and
                  Huali Ren and
                  Xiao Yu and
                  Yuxi Ma and
                  Quanxin Zhang},
  title        = {Knowledge graph and behavior portrait of intelligent attack against
                  path planning},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {10},
  pages        = {7110--7123},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22874},
  doi          = {10.1002/INT.22874},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/ZhangLRYMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/ZhangTLCLZ22,
  author       = {Yaoyuan Zhang and
                  Yu{-}an Tan and
                  Mingfeng Lu and
                  Tian Chen and
                  Yuanzhang Li and
                  Quanxin Zhang},
  title        = {Boosting cross-task adversarial attack with random blur},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {10},
  pages        = {8139--8154},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22932},
  doi          = {10.1002/INT.22932},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/ZhangTLCLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/ZhangZZCQZL22,
  author       = {Jingci Zhang and
                  Jun Zheng and
                  Zheng Zhang and
                  Tian Chen and
                  Kefan Qiu and
                  Quanxin Zhang and
                  Yuanzhang Li},
  title        = {Hybrid isolation model for device application sandboxing deployment
                  in Zero Trust architecture},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {12},
  pages        = {11167--11187},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.23037},
  doi          = {10.1002/INT.23037},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/ZhangZZCQZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangTLLZLW22,
  author       = {Yaoyuan Zhang and
                  Yu{-}an Tan and
                  Mingfeng Lu and
                  Lu Liu and
                  Quanxin Zhang and
                  Yuanzhang Li and
                  Dianxin Wang},
  editor       = {Jianying Zhou and
                  Sridhar Adepu and
                  Cristina Alcaraz and
                  Lejla Batina and
                  Emiliano Casalicchio and
                  Sudipta Chattopadhyay and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Stjepan Picek and
                  Jun Shao and
                  Chunhua Su and
                  Cong Wang and
                  Yury Zhauniarovich and
                  Saman A. Zonouz},
  title        = {Towards Interpreting Vulnerability of Object Detection Models via
                  Adversarial Distillation},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13285},
  pages        = {53--65},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16815-4\_4},
  doi          = {10.1007/978-3-031-16815-4\_4},
  timestamp    = {Tue, 27 Sep 2022 16:52:52 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangTLLZLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HaoZYNZZ22,
  author       = {Shengang Hao and
                  Jun Zheng and
                  Jie Yang and
                  Ziwei Ni and
                  Quanxin Zhang and
                  Li Zhang},
  editor       = {Jianying Zhou and
                  Sridhar Adepu and
                  Cristina Alcaraz and
                  Lejla Batina and
                  Emiliano Casalicchio and
                  Sudipta Chattopadhyay and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Stjepan Picek and
                  Jun Shao and
                  Chunhua Su and
                  Cong Wang and
                  Yury Zhauniarovich and
                  Saman A. Zonouz},
  title        = {A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness
                  Network for Automobile Maintenance Service},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13285},
  pages        = {84--103},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16815-4\_6},
  doi          = {10.1007/978-3-031-16815-4\_6},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HaoZYNZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangZZCQZL22,
  author       = {Jingci Zhang and
                  Jun Zheng and
                  Zheng Zhang and
                  Tian Chen and
                  Kefan Qiu and
                  Quanxin Zhang and
                  Yuanzhang Li},
  editor       = {Jianying Zhou and
                  Sridhar Adepu and
                  Cristina Alcaraz and
                  Lejla Batina and
                  Emiliano Casalicchio and
                  Sudipta Chattopadhyay and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Stjepan Picek and
                  Jun Shao and
                  Chunhua Su and
                  Cong Wang and
                  Yury Zhauniarovich and
                  Saman A. Zonouz},
  title        = {Hybrid Isolation Model for Device Application Sandboxing Deployment
                  in Zero Trust Architecture},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13285},
  pages        = {104--123},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16815-4\_7},
  doi          = {10.1007/978-3-031-16815-4\_7},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangZZCQZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/Zhang0CLZL22,
  author       = {Yaoyuan Zhang and
                  Yu{-}an Tan and
                  Tian Chen and
                  Xinrui Liu and
                  Quanxin Zhang and
                  Yuanzhang Li},
  editor       = {Luc De Raedt},
  title        = {Enhancing the Transferability of Adversarial Examples with Random
                  Patch},
  booktitle    = {Proceedings of the Thirty-First International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2022, Vienna, Austria, 23-29 July
                  2022},
  pages        = {1672--1678},
  publisher    = {ijcai.org},
  year         = {2022},
  url          = {https://doi.org/10.24963/ijcai.2022/233},
  doi          = {10.24963/IJCAI.2022/233},
  timestamp    = {Wed, 27 Jul 2022 16:43:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/Zhang0CLZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-12204,
  author       = {Haoran Lyu and
                  Yajie Wang and
                  Yu{-}an Tan and
                  Huipeng Zhou and
                  Yuhang Zhao and
                  Quanxin Zhang},
  title        = {Boosting Adversarial Transferability of MLP-Mixer},
  journal      = {CoRR},
  volume       = {abs/2204.12204},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.12204},
  doi          = {10.48550/ARXIV.2204.12204},
  eprinttype    = {arXiv},
  eprint       = {2204.12204},
  timestamp    = {Wed, 19 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-12204.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-04881,
  author       = {Nan Luo and
                  Yuanzhang Li and
                  Yajie Wang and
                  Shangbo Wu and
                  Yu{-}An Tan and
                  Quanxin Zhang},
  title        = {Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers},
  journal      = {CoRR},
  volume       = {abs/2206.04881},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.04881},
  doi          = {10.48550/ARXIV.2206.04881},
  eprinttype    = {arXiv},
  eprint       = {2206.04881},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-04881.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/MaSZLTZW21,
  author       = {Yuxi Ma and
                  Meng Shen and
                  Yuhang Zhao and
                  Zhao Li and
                  Xiaoyao Tong and
                  Quanxin Zhang and
                  Zhi Wang},
  title        = {Opponent portrait for multiagent reinforcement learning in competitive
                  environment},
  journal      = {Int. J. Intell. Syst.},
  volume       = {36},
  number       = {12},
  pages        = {7461--7474},
  year         = {2021},
  url          = {https://doi.org/10.1002/int.22594},
  doi          = {10.1002/INT.22594},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/MaSZLTZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/KuangGWZKZ21,
  author       = {Xiaohui Kuang and
                  Xianfeng Gao and
                  Lianfang Wang and
                  Gang Zhao and
                  Lishan Ke and
                  Quanxin Zhang},
  title        = {A discrete cosine transform-based query efficient attack on black-box
                  object detectors},
  journal      = {Inf. Sci.},
  volume       = {546},
  pages        = {596--607},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2020.05.089},
  doi          = {10.1016/J.INS.2020.05.089},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/KuangGWZKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangLKZTZH21,
  author       = {Yajie Wang and
                  Haoran Lv and
                  Xiaohui Kuang and
                  Gang Zhao and
                  Yu{-}an Tan and
                  Quanxin Zhang and
                  Jingjing Hu},
  title        = {Towards a physical-world adversarial patch for blinding object detection
                  models},
  journal      = {Inf. Sci.},
  volume       = {556},
  pages        = {459--471},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2020.08.087},
  doi          = {10.1016/J.INS.2020.08.087},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangLKZTZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ZhangZLWYL21,
  author       = {Quanxin Zhang and
                  Mengyan Zhu and
                  Chen Liang and
                  Kunqing Wang and
                  Kai Yang and
                  Yuanzhang Li},
  title        = {A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis},
  journal      = {Mob. Networks Appl.},
  volume       = {26},
  number       = {4},
  pages        = {1493--1502},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11036-019-01485-3},
  doi          = {10.1007/S11036-019-01485-3},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/ZhangZLWYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ZhouTZKHH21,
  author       = {Yutian Zhou and
                  Yu{-}an Tan and
                  Quanxin Zhang and
                  Xiaohui Kuang and
                  Yahong Han and
                  Jingjing Hu},
  title        = {An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers},
  journal      = {Mob. Networks Appl.},
  volume       = {26},
  number       = {4},
  pages        = {1616--1629},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11036-019-01499-x},
  doi          = {10.1007/S11036-019-01499-X},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/ZhouTZKHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmbd/XueWCZLT21,
  author       = {Yuan Xue and
                  Shouxin Wang and
                  Tian Chen and
                  Quanxin Zhang and
                  Lu Liu and
                  Yu{-}an Tan},
  editor       = {Ying Tan and
                  Yuhui Shi and
                  Albert Y. Zomaya and
                  Hongyang Yan and
                  Jun Cai},
  title        = {On-line Firmware Updating and Fingerprint Generating for Solid State
                  Disks},
  booktitle    = {Data Mining and Big Data - 6th International Conference, {DMBD} 2021,
                  Guangzhou, China, October 20-22, 2021, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {1454},
  pages        = {28--36},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-7502-7\_3},
  doi          = {10.1007/978-981-16-7502-7\_3},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmbd/XueWCZLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmbd/LiuYZZLT21,
  author       = {Xinrui Liu and
                  Xiao Yu and
                  Zhibin Zhang and
                  Quanxin Zhang and
                  Yuanzhang Li and
                  Yu{-}an Tan},
  editor       = {Ying Tan and
                  Yuhui Shi and
                  Albert Y. Zomaya and
                  Hongyang Yan and
                  Jun Cai},
  title        = {A Random Multi-target Backdooring Attack on Deep Neural Networks},
  booktitle    = {Data Mining and Big Data - 6th International Conference, {DMBD} 2021,
                  Guangzhou, China, October 20-22, 2021, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {1454},
  pages        = {45--52},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-7502-7\_5},
  doi          = {10.1007/978-981-16-7502-7\_5},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmbd/LiuYZZLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmbd/LiMZYZL21,
  author       = {Zhao Li and
                  Yuxi Ma and
                  Zhibin Zhang and
                  Xiao Yu and
                  Quanxin Zhang and
                  Yuanzhang Li},
  editor       = {Ying Tan and
                  Yuhui Shi and
                  Albert Y. Zomaya and
                  Hongyang Yan and
                  Jun Cai},
  title        = {Intelligent Attack Behavior Portrait for Path Planning of Unmanned
                  Vehicles},
  booktitle    = {Data Mining and Big Data - 6th International Conference, {DMBD} 2021,
                  Guangzhou, China, October 20-22, 2021, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {1454},
  pages        = {53--60},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-7502-7\_6},
  doi          = {10.1007/978-981-16-7502-7\_6},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dmbd/LiMZYZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmbd/TongMXZLT21,
  author       = {Xiaoyao Tong and
                  Yuxi Ma and
                  Yuan Xue and
                  Quanxin Zhang and
                  Yuanzhang Li and
                  Yu{-}an Tan},
  editor       = {Ying Tan and
                  Yuhui Shi and
                  Albert Y. Zomaya and
                  Hongyang Yan and
                  Jun Cai},
  title        = {Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement
                  Learning},
  booktitle    = {Data Mining and Big Data - 6th International Conference, {DMBD} 2021,
                  Guangzhou, China, October 20-22, 2021, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {1454},
  pages        = {61--68},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-7502-7\_7},
  doi          = {10.1007/978-981-16-7502-7\_7},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmbd/TongMXZLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ShiCXLZTH21,
  author       = {Zhiwei Shi and
                  Tian Chen and
                  Yuan Xue and
                  Yuanzhang Li and
                  Quanxin Zhang and
                  Yu{-}an Tan and
                  Jingjing Hu},
  title        = {Code Decoupling Execution Isolating Based on {TF} Card Firmware Extension},
  booktitle    = {Sixth {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2021, Shenzhen, China, October 9-11, 2021},
  pages        = {403--408},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC53577.2021.00063},
  doi          = {10.1109/DSC53577.2021.00063},
  timestamp    = {Fri, 22 Apr 2022 19:18:38 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/ShiCXLZTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/WangWJHTZ21,
  author       = {Yajie Wang and
                  Shangbo Wu and
                  Wenyi Jiang and
                  Shengang Hao and
                  Yu{-}an Tan and
                  Quanxin Zhang},
  editor       = {Zhi{-}Hua Zhou},
  title        = {Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations
                  with Perceptual Similarity},
  booktitle    = {Proceedings of the Thirtieth International Joint Conference on Artificial
                  Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27
                  August 2021},
  pages        = {3125--3133},
  publisher    = {ijcai.org},
  year         = {2021},
  url          = {https://doi.org/10.24963/ijcai.2021/430},
  doi          = {10.24963/IJCAI.2021/430},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/WangWJHTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-01396,
  author       = {Yajie Wang and
                  Shangbo Wu and
                  Wenyi Jiang and
                  Shengang Hao and
                  Yu{-}an Tan and
                  Quanxin Zhang},
  title        = {Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations
                  with Perceptual Similarity},
  journal      = {CoRR},
  volume       = {abs/2107.01396},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.01396},
  eprinttype    = {arXiv},
  eprint       = {2107.01396},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-01396.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhangZWBZH20,
  author       = {Quanxin Zhang and
                  Yuhang Zhao and
                  Yajie Wang and
                  Thar Baker and
                  Jian Zhang and
                  Jingjing Hu},
  title        = {Towards cross-task universal perturbation against black-box object
                  detectors in autonomous driving},
  journal      = {Comput. Networks},
  volume       = {180},
  pages        = {107388},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107388},
  doi          = {10.1016/J.COMNET.2020.107388},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZhangZWBZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhangZXH20,
  author       = {Quanxin Zhang and
                  Xiaosong Zhang and
                  Yuan Xue and
                  Jingjing Hu},
  title        = {A stealthy covert storage channel for asymmetric surveillance VoLTE
                  endpoints},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {102},
  pages        = {472--480},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.08.016},
  doi          = {10.1016/J.FUTURE.2019.08.016},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhangZXH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/ShiHZK20,
  author       = {Yucheng Shi and
                  Yahong Han and
                  Quanxin Zhang and
                  Xiaohui Kuang},
  title        = {Adaptive iterative attack towards explainable adversarial robustness},
  journal      = {Pattern Recognit.},
  volume       = {105},
  pages        = {107309},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.patcog.2020.107309},
  doi          = {10.1016/J.PATCOG.2020.107309},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pr/ShiHZK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hucc/LiuWBHZZ20,
  author       = {Yujie Liu and
                  Wenjia Wu and
                  Wen Bo and
                  Chen Han and
                  Quanxin Zhang and
                  Changyou Zhang},
  editor       = {Qiaohong Zu and
                  Yong Tang and
                  Vladimir Mladenovic},
  title        = {Permission Dispatching Mechanism Inside and Outside of the Warranty
                  Period for Equipment Maintenance Service System},
  booktitle    = {Human Centered Computing - 6th International Conference, {HCC} 2020,
                  Virtual Event, December 14-15, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12634},
  pages        = {84--90},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70626-5\_9},
  doi          = {10.1007/978-3-030-70626-5\_9},
  timestamp    = {Wed, 05 May 2021 09:29:35 +0200},
  biburl       = {https://dblp.org/rec/conf/hucc/LiuWBHZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/ZhangJZHKT20,
  author       = {Haitao Zhang and
                  Fan Jia and
                  Quanxin Zhang and
                  Yahong Han and
                  Xiaohui Kuang and
                  Yu{-}an Tan},
  title        = {Two-Way Feature-Aligned And Attention-Rectified Adversarial Training},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2020,
                  London, UK, July 6-10, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICME46284.2020.9102777},
  doi          = {10.1109/ICME46284.2020.9102777},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/ZhangJZHKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiYYTZ19,
  author       = {Yuanzhang Li and
                  Shangjun Yao and
                  Kai Yang and
                  Yu{-}an Tan and
                  Quan{-}Xin Zhang},
  title        = {A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme
                  for {JPEG} Images},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {73573--73582},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2920178},
  doi          = {10.1109/ACCESS.2019.2920178},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LiYYTZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangGXZ19,
  author       = {Xiaosong Zhang and
                  Linhong Guo and
                  Yuan Xue and
                  Quanxin Zhang},
  title        = {A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network
                  Environment},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {122214--122223},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2937969},
  doi          = {10.1109/ACCESS.2019.2937969},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangGXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangWZH19,
  author       = {Quanxin Zhang and
                  Kunqing Wang and
                  Wenjiao Zhang and
                  Jingjing Hu},
  title        = {Attacking Black-Box Image Classifiers With Particle Swarm Optimization},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {158051--158063},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2948146},
  doi          = {10.1109/ACCESS.2019.2948146},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangWZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KuangLWZZZ19,
  author       = {Xiaohui Kuang and
                  Hongyi Liu and
                  Ye Wang and
                  Qikun Zhang and
                  Quanxin Zhang and
                  Jun Zheng},
  title        = {A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {172938--172947},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2956553},
  doi          = {10.1109/ACCESS.2019.2956553},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KuangLWZZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/ZhangHZ19,
  author       = {Li Zhang and
                  Shengang Hao and
                  Quanxin Zhang},
  title        = {Recovering SQLite data from fragmented flash pages},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {74},
  number       = {7-8},
  pages        = {451--460},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12243-019-00707-9},
  doi          = {10.1007/S12243-019-00707-9},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/ZhangHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WeiHCXZ19,
  author       = {Hua Wei and
                  Changzhen Hu and
                  Shiyou Chen and
                  Yuan Xue and
                  Quanxin Zhang},
  title        = {Establishing a software defect prediction model via effective dimension
                  reduction},
  journal      = {Inf. Sci.},
  volume       = {477},
  pages        = {399--409},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.10.056},
  doi          = {10.1016/J.INS.2018.10.056},
  timestamp    = {Fri, 11 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WeiHCXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/YuTSLLZ19,
  author       = {Xiao Yu and
                  Yu{-}an Tan and
                  Zhizhuo Sun and
                  Jingyu Liu and
                  Chen Liang and
                  Quanxin Zhang},
  title        = {A fault-tolerant and energy-efficient continuous data protection system},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {10},
  number       = {8},
  pages        = {2945--2954},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12652-018-0726-2},
  doi          = {10.1007/S12652-018-0726-2},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/YuTSLLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhangGZLT19,
  author       = {Quan{-}Xin Zhang and
                  Hanxiao Gong and
                  Xiaosong Zhang and
                  Chen Liang and
                  Yu{-}an Tan},
  title        = {A sensitive network jitter measurement for covert timing channels
                  over interactive traffic},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {3},
  pages        = {3493--3509},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6281-1},
  doi          = {10.1007/S11042-018-6281-1},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhangGZLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/WangLZK19,
  author       = {Xinxin Wang and
                  Yuanzhang Li and
                  Quanxin Zhang and
                  Xiaohui Kuang},
  editor       = {Jaideep Vaidya and
                  Xiao Zhang and
                  Jin Li},
  title        = {Boosting Training for {PDF} Malware Classifier via Active Learning},
  booktitle    = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
                  2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11983},
  pages        = {101--110},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37352-8\_9},
  doi          = {10.1007/978-3-030-37352-8\_9},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/WangLZK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ZhuCLLZ19,
  author       = {Haojia Zhu and
                  Can Cui and
                  Fengyin Li and
                  Zhongxing Liu and
                  Quanxin Zhang},
  editor       = {Jaideep Vaidya and
                  Xiao Zhang and
                  Jin Li},
  title        = {Design of Anonymous Communication Protocol Based on Group Signature},
  booktitle    = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
                  2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11983},
  pages        = {175--181},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37352-8\_15},
  doi          = {10.1007/978-3-030-37352-8\_15},
  timestamp    = {Wed, 08 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/ZhuCLLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/WangLLZX19,
  author       = {Dongfeng Wang and
                  Qinghua Li and
                  Fengyin Li and
                  Quanxin Zhang and
                  Banghai Xu},
  editor       = {Jaideep Vaidya and
                  Xiao Zhang and
                  Jin Li},
  title        = {Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain},
  booktitle    = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
                  2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11982},
  pages        = {274--278},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37337-5\_22},
  doi          = {10.1007/978-3-030-37337-5\_22},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/css/WangLLZX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/AiWYZ19,
  author       = {Haojun Ai and
                  Yifeng Wang and
                  Yuhong Yang and
                  Quanxin Zhang},
  editor       = {Jaideep Vaidya and
                  Xiao Zhang and
                  Jin Li},
  title        = {An Improvement of the Degradation of Speaker Recognition in Continuous
                  Cold Speech for Home Assistant},
  booktitle    = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
                  2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11982},
  pages        = {363--373},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37337-5\_29},
  doi          = {10.1007/978-3-030-37337-5\_29},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/css/AiWYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/WangLZHK19,
  author       = {Yaxiao Wang and
                  Yuanzhang Li and
                  Quanxin Zhang and
                  Jingjing Hu and
                  Xiaohui Kuang},
  editor       = {Jaideep Vaidya and
                  Xiao Zhang and
                  Jin Li},
  title        = {Evading {PDF} Malware Classifiers with Generative Adversarial Network},
  booktitle    = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
                  2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11982},
  pages        = {374--387},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37337-5\_30},
  doi          = {10.1007/978-3-030-37337-5\_30},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/WangLZHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/AiXZ19,
  author       = {Haojun Ai and
                  Wuyang Xia and
                  Quanxin Zhang},
  editor       = {Jaideep Vaidya and
                  Xiao Zhang and
                  Jin Li},
  title        = {Speaker Recognition Based on Lightweight Neural Network for Smart
                  Home Solutions},
  booktitle    = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
                  2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11983},
  pages        = {421--431},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37352-8\_37},
  doi          = {10.1007/978-3-030-37352-8\_37},
  timestamp    = {Wed, 08 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/AiXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/WuHZK19,
  author       = {Aming Wu and
                  Yahong Han and
                  Quanxin Zhang and
                  Xiaohui Kuang},
  title        = {Untargeted Adversarial Attack via Expanding the Semantic Gap},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2019,
                  Shanghai, China, July 8-12, 2019},
  pages        = {514--519},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICME.2019.00095},
  doi          = {10.1109/ICME.2019.00095},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/WuHZK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcom/YuWZL19,
  author       = {Xiao Yu and
                  Kunqing Wang and
                  Quanxin Zhang and
                  Yuanzhang Li},
  editor       = {Meikang Qiu},
  title        = {A Quantified Accuracy Measurement Based Localization Algorithm for
                  Autonomous Underwater Vehicles},
  booktitle    = {Smart Computing and Communication - 4th International Conference,
                  SmartCom 2019, Birmingham, UK, October 11-13, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11910},
  pages        = {34--41},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34139-8\_4},
  doi          = {10.1007/978-3-030-34139-8\_4},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcom/YuWZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcom/ZhaoWXZZ19,
  author       = {Yuhang Zhao and
                  Kunqing Wang and
                  Yuan Xue and
                  Quanxin Zhang and
                  Xiaosong Zhang},
  editor       = {Meikang Qiu},
  title        = {An Universal Perturbation Generator for Black-Box Attacks Against
                  Object Detectors},
  booktitle    = {Smart Computing and Communication - 4th International Conference,
                  SmartCom 2019, Birmingham, UK, October 11-13, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11910},
  pages        = {63--72},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34139-8\_7},
  doi          = {10.1007/978-3-030-34139-8\_7},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcom/ZhaoWXZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/ZhangGXJLZ19,
  author       = {Xiaosong Zhang and
                  Linhong Guo and
                  Yuan Xue and
                  Hongwei Jiang and
                  Lu Liu and
                  Quanxin Zhang},
  editor       = {Weizhi Meng and
                  Steven Furnell},
  title        = {A Hybrid Covert Channel with Feedback over Mobile Networks},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 5th International
                  Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1095},
  pages        = {87--94},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0758-8\_7},
  doi          = {10.1007/978-981-15-0758-8\_7},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socialsec/ZhangGXJLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangGZWT18,
  author       = {Qikun Zhang and
                  Yong Gan and
                  Quan{-}Xin Zhang and
                  Ruifang Wang and
                  Yu{-}an Tan},
  title        = {A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement
                  in Telemedicine Application},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {24064--24074},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2799007},
  doi          = {10.1109/ACCESS.2018.2799007},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangGZWT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhengTZZZZ18,
  author       = {Jiamin Zheng and
                  Yu{-}an Tan and
                  Qikun Zhang and
                  Xiaosong Zhang and
                  Liehuang Zhu and
                  Quan{-}Xin Zhang},
  title        = {Cross-cluster asymmetric group key agreement for wireless sensor networks},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {4},
  pages        = {048103:1--048103:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9212-2},
  doi          = {10.1007/S11432-017-9212-2},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhengTZZZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/TanXLZZL18,
  author       = {Yu{-}an Tan and
                  Xinting Xu and
                  Chen Liang and
                  Xiaosong Zhang and
                  Quan{-}Xin Zhang and
                  Yuanzhang Li},
  title        = {An end-to-end covert channel via packet dropout for mobile networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {14},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1177/1550147718779568},
  doi          = {10.1177/1550147718779568},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/TanXLZZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/XueTLLZZ18,
  author       = {Yuan Xue and
                  Yu{-}an Tan and
                  Chen Liang and
                  Yuanzhang Li and
                  Jun Zheng and
                  Quan{-}Xin Zhang},
  title        = {RootAgency: {A} digital signature-based root privilege management
                  agency for cloud terminal devices},
  journal      = {Inf. Sci.},
  volume       = {444},
  pages        = {36--50},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.02.069},
  doi          = {10.1016/J.INS.2018.02.069},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/XueTLLZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangLZLZT18,
  author       = {Xiaosong Zhang and
                  Chen Liang and
                  Quan{-}Xin Zhang and
                  Yuanzhang Li and
                  Jun Zheng and
                  Yu{-}an Tan},
  title        = {Building covert timing channels by packet rearrangement over mobile
                  networks},
  journal      = {Inf. Sci.},
  volume       = {445-446},
  pages        = {66--78},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.03.007},
  doi          = {10.1016/J.INS.2018.03.007},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangLZLZT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TanXLZZZL18,
  author       = {Yu{-}an Tan and
                  Yuan Xue and
                  Chen Liang and
                  Jun Zheng and
                  Quan{-}Xin Zhang and
                  Jiamin Zheng and
                  Yuanzhang Li},
  title        = {A root privilege management scheme with revocable authorization for
                  Android devices},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {107},
  pages        = {69--82},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.01.011},
  doi          = {10.1016/J.JNCA.2018.01.011},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/TanXLZZZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiangTZWZZ18,
  author       = {Chen Liang and
                  Yu{-}an Tan and
                  Xiaosong Zhang and
                  Xianmin Wang and
                  Jun Zheng and
                  Quan{-}Xin Zhang},
  title        = {Building packet length covert channel over mobile VoIP traffics},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {118},
  pages        = {144--153},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.06.012},
  doi          = {10.1016/J.JNCA.2018.06.012},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiangTZWZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhuTZWZL18,
  author       = {Hongfei Zhu and
                  Yu{-}an Tan and
                  Liehuang Zhu and
                  Xianmin Wang and
                  Quan{-}Xin Zhang and
                  Yuanzhang Li},
  title        = {An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication
                  in Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {18},
  number       = {5},
  pages        = {1663},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18051663},
  doi          = {10.3390/S18051663},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhuTZWZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/SunZLT18,
  author       = {Zhizhuo Sun and
                  Quan{-}Xin Zhang and
                  Yuanzhang Li and
                  Yu{-}an Tan},
  title        = {{DPPDL:} {A} Dynamic Partial-Parallel Data Layout for Green Video
                  Surveillance Storage},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {28},
  number       = {1},
  pages        = {193--205},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCSVT.2016.2605045},
  doi          = {10.1109/TCSVT.2016.2605045},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/SunZLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/TanZSLZL18,
  author       = {Yu{-}an Tan and
                  Xiaosong Zhang and
                  Kashif Sharif and
                  Chen Liang and
                  Quan{-}Xin Zhang and
                  Yuanzhang Li},
  title        = {Covert Timing Channels for IoT over Mobile Networks},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {25},
  number       = {6},
  pages        = {38--44},
  year         = {2018},
  url          = {https://doi.org/10.1109/MWC.2017.1800062},
  doi          = {10.1109/MWC.2017.1800062},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/TanZSLZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ZhuTZZL18,
  author       = {Hongfei Zhu and
                  Yu{-}an Tan and
                  Liehuang Zhu and
                  Quan{-}Xin Zhang and
                  Yuanzhang Li},
  title        = {An Efficient Identity-Based Proxy Blind Signature for Semioffline
                  Services},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {5401890:1--5401890:9},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/5401890},
  doi          = {10.1155/2018/5401890},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/ZhuTZZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/HanZGHY18,
  author       = {Wencong Han and
                  Quanxin Zhang and
                  Chongzhi Gao and
                  Jingjing Hu and
                  Fang Yan},
  editor       = {Jaideep Vaidya and
                  Jin Li},
  title        = {Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller
                  Firmware},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 18th International
                  Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
                  Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11337},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05063-4\_20},
  doi          = {10.1007/978-3-030-05063-4\_20},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/HanZGHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ZhangTXZLZZ17,
  author       = {Xiaosong Zhang and
                  Yu{-}an Tan and
                  Yuan Xue and
                  Quan{-}Xin Zhang and
                  Yuanzhang Li and
                  Can Zhang and
                  Jun Zheng},
  title        = {Cryptographic key protection against {FROST} for mobile devices},
  journal      = {Clust. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2393--2402},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10586-016-0721-3},
  doi          = {10.1007/S10586-016-0721-3},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/ZhangTXZLZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZhuZMZT17,
  author       = {Ruijin Zhu and
                  Baofeng Zhang and
                  Junjie Mao and
                  Quan{-}Xin Zhang and
                  Yu{-}an Tan},
  title        = {A methodology for determining the image base of ARM-based industrial
                  control system firmware},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {16},
  pages        = {26--35},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2016.12.002},
  doi          = {10.1016/J.IJCIP.2016.12.002},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZhuZMZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/KhaledZ17,
  author       = {Aourra Khaled and
                  Quan{-}Xin Zhang},
  title        = {An Energy Aware Mass Memory Unit for Small Satellites Using Hybrid
                  Architecture},
  booktitle    = {2017 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24,
                  2017, Volume 1},
  pages        = {210--213},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSE-EUC.2017.44},
  doi          = {10.1109/CSE-EUC.2017.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/KhaledZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/PangAXLZ17,
  author       = {Pengfei Pang and
                  Aourra Khaled and
                  Yuan Xue and
                  Yuanzhang Li and
                  Quan{-}Xin Zhang},
  title        = {A Transparent Encryption Scheme of Video Data for Android Devices},
  booktitle    = {2017 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24,
                  2017, Volume 1},
  pages        = {817--822},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSE-EUC.2017.163},
  doi          = {10.1109/CSE-EUC.2017.163},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/PangAXLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gski/LiuWZL17,
  author       = {Shaoru Liu and
                  Yao Wang and
                  Quan{-}Xin Zhang and
                  Yuanzhang Li},
  editor       = {Hanning Yuan and
                  Jing Geng and
                  Chuanlu Liu and
                  Fuling Bian and
                  Tisinee Surapunt},
  title        = {A VoLTE Encryption Experiment for Android Smartphones},
  booktitle    = {Geo-Spatial Knowledge and Intelligence - 5th International Conference,
                  {GSKI} 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected
                  Papers, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {848},
  pages        = {115--125},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-13-0893-2\_13},
  doi          = {10.1007/978-981-13-0893-2\_13},
  timestamp    = {Sun, 24 Jun 2018 18:48:11 +0200},
  biburl       = {https://dblp.org/rec/conf/gski/LiuWZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhuTZLZ16,
  author       = {Ruijin Zhu and
                  Yu{-}an Tan and
                  Quan{-}Xin Zhang and
                  Yuanzhang Li and
                  Jun Zheng},
  title        = {Determining image base of firmware for {ARM} devices by matching literal
                  pools},
  journal      = {Digit. Investig.},
  volume       = {16},
  pages        = {19--28},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.002},
  doi          = {10.1016/J.DIIN.2016.01.002},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZhuTZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhuTZWZX16,
  author       = {Ruijin Zhu and
                  Yu{-}an Tan and
                  Quan{-}Xin Zhang and
                  Fei Wu and
                  Jun Zheng and
                  Yuan Xue},
  title        = {Determining Image Base of Firmware Files for {ARM} Devices},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {2},
  pages        = {351--359},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015EDP7217},
  doi          = {10.1587/TRANSINF.2015EDP7217},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhuTZWZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhangHZTZL15,
  author       = {Li Zhang and
                  Shen{-}Gang Hao and
                  Jun Zheng and
                  Yu{-}an Tan and
                  Quan{-}xin Zhang and
                  Yuan{-}zhang Li},
  title        = {Descrambling data on solid-state disks by reverse-engineering the
                  firmware},
  journal      = {Digit. Investig.},
  volume       = {12},
  pages        = {77--87},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2014.12.003},
  doi          = {10.1016/J.DIIN.2014.12.003},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ZhangHZTZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/YuJZLT15,
  author       = {Xiao Yu and
                  Tong{-}Sheng Ju and
                  Quan{-}Xin Zhang and
                  Yuanzhang Li and
                  Yu{-}an Tan},
  title        = {Tuner and demodulator design of antenna control system},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {8},
  number       = {2},
  pages        = {141--146},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJWMC.2015.068622},
  doi          = {10.1504/IJWMC.2015.068622},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/YuJZLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcam/GaoZL14,
  author       = {Li Gao and
                  Quanxin Zhang and
                  Shouhua Liu},
  title        = {Oscillatory behavior of third-order nonlinear delay dynamic equations
                  on time scales},
  journal      = {J. Comput. Appl. Math.},
  volume       = {256},
  pages        = {104--113},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cam.2013.07.024},
  doi          = {10.1016/J.CAM.2013.07.024},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcam/GaoZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/GaoZCHWZL13,
  author       = {Yue Gao and
                  Quanxin Zhang and
                  Yulei Chu and
                  Xiang He and
                  Jun Wan and
                  Zhiqiang Zhou and
                  Jing Lin},
  title        = {The research and implementation of customised launcher in Android},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {6},
  number       = {5},
  pages        = {441--447},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJWMC.2013.057393},
  doi          = {10.1504/IJWMC.2013.057393},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/GaoZCHWZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/appml/ZhangGY12,
  author       = {Quanxin Zhang and
                  Li Gao and
                  Yuanhong Yu},
  title        = {Oscillation criteria for third-order neutral differential equations
                  with continuously distributed delay},
  journal      = {Appl. Math. Lett.},
  volume       = {25},
  number       = {10},
  pages        = {1514--1519},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.aml.2012.01.007},
  doi          = {10.1016/J.AML.2012.01.007},
  timestamp    = {Fri, 03 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/appml/ZhangGY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/appml/ZhangLG11,
  author       = {Quanxin Zhang and
                  Shouhua Liu and
                  Li Gao},
  title        = {Oscillation criteria for even-order half-linear functional differential
                  equations with damping},
  journal      = {Appl. Math. Lett.},
  volume       = {24},
  number       = {10},
  pages        = {1709--1715},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.aml.2011.04.025},
  doi          = {10.1016/J.AML.2011.04.025},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/appml/ZhangLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/LiuZY11,
  author       = {Shouhua Liu and
                  Quanxin Zhang and
                  Yuanhong Yu},
  title        = {Oscillation of even-order half-linear functional differential equations
                  with damping},
  journal      = {Comput. Math. Appl.},
  volume       = {61},
  number       = {8},
  pages        = {2191--2196},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.camwa.2010.09.011},
  doi          = {10.1016/J.CAMWA.2010.09.011},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/LiuZY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/ZhangGW11,
  author       = {Quanxin Zhang and
                  Li Gao and
                  Lei Wang},
  title        = {Oscillation of second-order nonlinear delay dynamic equations on time
                  scales},
  journal      = {Comput. Math. Appl.},
  volume       = {61},
  number       = {8},
  pages        = {2342--2348},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.camwa.2010.10.005},
  doi          = {10.1016/J.CAMWA.2010.10.005},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/ZhangGW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/ZhangQ11a,
  author       = {Quanxin Zhang and
                  Fang Qiu},
  title        = {Oscillation theorems for second-order half-linear delay dynamic equations
                  with damping on time scales},
  journal      = {Comput. Math. Appl.},
  volume       = {62},
  number       = {11},
  pages        = {4185--4193},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.camwa.2011.10.002},
  doi          = {10.1016/J.CAMWA.2011.10.002},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/ZhangQ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcam/Zhang11,
  author       = {Quanxin Zhang},
  title        = {Oscillation of second-order half-linear delay dynamic equations with
                  damping on time scales},
  journal      = {J. Comput. Appl. Math.},
  volume       = {235},
  number       = {5},
  pages        = {1180--1188},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cam.2010.07.027},
  doi          = {10.1016/J.CAM.2010.07.027},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcam/Zhang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/ZhangYG10,
  author       = {Quanxin Zhang and
                  Jurang Yan and
                  Li Gao},
  title        = {Oscillation behavior of even-order nonlinear neutral differential
                  equations with variable coefficients},
  journal      = {Comput. Math. Appl.},
  volume       = {59},
  number       = {1},
  pages        = {426--430},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.camwa.2009.06.027},
  doi          = {10.1016/J.CAMWA.2009.06.027},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/ZhangYG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icadl/JinNZLQ08,
  author       = {Fusheng Jin and
                  Zhendong Niu and
                  Quanxin Zhang and
                  Haiyang Lang and
                  Kai Qin},
  editor       = {George Buchanan and
                  Masood Masoodian and
                  Sally Jo Cunningham},
  title        = {A User Reputation Model for {DLDE} Learning 2.0 Community},
  booktitle    = {Digital Libraries: Universal and Ubiquitous Access to Information,
                  11th International Conference on Asian Digital Libraries, {ICADL}
                  2008, Bali, Indonesia, December 2-5, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5362},
  pages        = {61--70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89533-6\_7},
  doi          = {10.1007/978-3-540-89533-6\_7},
  timestamp    = {Mon, 05 Sep 2022 11:39:31 +0200},
  biburl       = {https://dblp.org/rec/conf/icadl/JinNZLQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/appml/ZhangY06,
  author       = {Quanxin Zhang and
                  Jurang Yan},
  title        = {Oscillation behavior of even order neutral differential equations
                  with variable coefficients},
  journal      = {Appl. Math. Lett.},
  volume       = {19},
  number       = {11},
  pages        = {1202--1206},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.aml.2006.01.003},
  doi          = {10.1016/J.AML.2006.01.003},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/appml/ZhangY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics