What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kai Chen
Google Scholar
79
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
TruVRF: Toward Triple-Granularity Verification on Machine Unlearning.
Chunyi Zhou
Yansong Gao
Anmin Fu
Kai Chen
Zhi Zhang
Minhui Xue
Zhiyang Dai
Shouling Ji
Yuqing Zhang
2025
conf/sp
TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries.
Yanzhong Wang
Ruigang Liang
Yilin Li
Peiwei Hu
Kai Chen
Bolun Zhang
2025
conf/sp
EvilHarmony: Stealthy Adversarial Attacks Against Black-Box Speech Recognition Systems.
Xuejing Yuan
Jiangshan Zhang
Feng Guo
Kai Chen
Xiaofeng Wang
Shengzhi Zhang
Yuxuan Chen
Dun Liu
Pan Li
Zihao Wang
Runnan Zhu
2025
conf/ndss
Uncovering the iceberg from the tip: Generating API Specifications for Bug Detection via Specification Propagation Analysis.
Miaoqian Lin
Kai Chen
Yi Yang
Jinghua Liu
2025
conf/ndss
What's Done Is Not What's Claimed: Detecting and Interpreting Inconsistencies in App Behaviors.
Chang Yue
Kai Chen
Zhixiu Guo
Jun Dai
Xiaoyan Sun
Yi Yang
2025
conf/ndss
Generating API Parameter Security Rules with LLM for API Misuse Detection.
Jinghua Liu
Yi Yang
Kai Chen
Miaoqian Lin
2025
conf/ndss
The Midas Touch: Triggering the Capability of LLMs for RM-API Misuse Detection.
Yi Yang
Jinghua Liu
Kai Chen
Miaoqian Lin
2025
journals/compsec
ProvGOutLiner: A lightweight anomaly detection method based on process behavior features within provenance graphs.
Weiping Wang
Chenyu Wang
Hong Song
Kai Chen
Shigeng Zhang
2025
conf/icics
Transferable Adversarial Attacks in Object Detection: Leveraging Ensemble Features and Gradient Variance Minimization.
Zhitong Lu
Zhen Xu
Qian Yang
Kai Chen
2025
conf/uss
PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty.
Jinwen He
Yiyang Lu
Zijin Lin
Kai Chen
Yue Zhao
2025
conf/uss
Dormant: Defending against Pose-driven Human Image Animation.
Jiachen Zhou
Mingsi Wang
Tianlin Li
Guozhu Meng
Kai Chen
2025
conf/uss
Tady: A Neural Disassembler without Structural Constraint Violations.
Siliang Qin
Fengrui Yang
Hao Wang
Bolun Zhang
Zeyu Gao
Chao Zhang
Kai Chen
2024
journals/tifs
UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples.
Zhankai Li
Weiping Wang
Jie Li
Kai Chen
Shigeng Zhang
2024
journals/tifs
NeuralSanitizer: Detecting Backdoors in Neural Networks.
Hong Zhu
Yue Zhao
Shengzhi Zhang
Kai Chen
2024
journals/tifs
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions.
Dandan Xu
Kai Chen
Miaoqian Lin
Chaoyang Lin
Xiaofeng Wang
2024
journals/tifs
Foolmix: Strengthen the Transferability of Adversarial Examples by Dual-Blending and Direction Update Strategy.
Zhankai Li
Weiping Wang
Jie Li
Kai Chen
Shigeng Zhang
2024
conf/ccs
Demystifying RCE Vulnerabilities in LLM-Integrated Apps.
Tong Liu
Zizhuang Deng
Guozhu Meng
Yuekang Li
Kai Chen
2024
conf/ccs
I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors.
Zijin Lin
Yue Zhao
Kai Chen
Jinwen He
2024
conf/uss
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction.
Tong Liu
Yingjie Zhang
Zhe Zhao
Yinpeng Dong
Guozhu Meng
Kai Chen
2024
conf/uss
DARKFLEECE: Probing the Dark Side of Android Subscription Apps.
Chang Yue
Chen Zhong
Kai Chen
Zhiyu Zhang
Yeonjoon Lee
2024
conf/uss
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples.
Dandan Xu
Di Tang
Yi Chen
XiaoFeng Wang
Kai Chen
Haixu Tang
Longxing Li
2024
conf/uss
AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction.
Shenchen Zhu
Yue Zhao
Kai Chen
Bo Wang
Hualong Ma
Cheng'an Wei
2024
conf/sp
MEA-Defender: A Robust Watermark against Model Extraction Attack.
Peizhuo Lv
Hualong Ma
Kai Chen
Jiachen Zhou
Shengzhi Zhang
Ruigang Liang
Shenchen Zhu
Pan Li
Yingjun Zhang
2024
conf/ih
AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors in Occlusion.
Zhitong Lu
Duohe Ma
Linna Fan
Zhen Xu
Kai Chen
2024
conf/ndss
DeGPT: Optimizing Decompiler Output with LLM.
Peiwei Hu
Ruigang Liang
Kai Chen
2024
conf/ndss
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning.
Peizhuo Lv
Pan Li
Shenchen Zhu
Shengzhi Zhang
Kai Chen
Ruigang Liang
Chang Yue
Fan Xiang
Yuling Cai
Hualong Ma
Yingjun Zhang
Guozhu Meng
2023
journals/compsec
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Guangquan Xu
Wenqing Lei
Lixiao Gong
Jian Liu
Hongpeng Bai
Kai Chen
Ran Wang
Wei Wang
Kaitai Liang
Weizhe Wang
Weizhi Meng
Shaoying Liu
2023
journals/tifs
LSD: Adversarial Examples Detection Based on Label Sequences Discrepancy.
Shigeng Zhang
Shuxin Chen
Chengyao Hua
Zhetao Li
Yanchun Li
Xuan Liu
Kai Chen
Zhankai Li
Weiping Wang
2023
conf/ccs
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing.
Jinwen He
Kai Chen
Guozhu Meng
Jiangshan Zhang
Congyi Li
2023
conf/uss
CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing.
Dawei Wang
Ying Li
Zhiyu Zhang
Kai Chen
2023
conf/uss
Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities.
Zizhuang Deng
Guozhu Meng
Kai Chen
Tong Liu
Lu Xiang
Chunyang Chen
2023
conf/uss
A Data-free Backdoor Injection Approach in Neural Networks.
Peizhuo Lv
Chang Yue
Ruigang Liang
Yunfei Yang
Shengzhi Zhang
Hualong Ma
Kai Chen
2023
conf/uss
Detecting API Post-Handling Bugs Using Code and Description in Patches.
Miaoqian Lin
Kai Chen
Yang Xiao
2023
conf/uss
Aliasing Backdoor Attacks on Pre-trained Models.
Cheng'an Wei
Yeonjoon Lee
Kai Chen
Guozhu Meng
Peizhuo Lv
2023
conf/uss
AURC: Detecting Errors in Program Code and Documentation.
Peiwei Hu
Ruigang Liang
Ying Cao
Kai Chen
Runze Zhang
2023
conf/sp
AI-Guardian: Defeating Adversarial Attacks using Backdoors.
Hong Zhu
Shengzhi Zhang
Kai Chen
2023
conf/ndss
PPA: Preference Profiling Attack Against Federated Learning.
Chunyi Zhou
Yansong Gao
Anmin Fu
Kai Chen
Zhiyang Dai
Zhi Zhang
Minhui Xue
Yuqing Zhang
2022
conf/ccs
Game Theory Approaches for Evaluating the Deception-based Moving Target Defense.
Duohe Ma
Zhimin Tang
Xiaoyan Sun
Lu Guo
Liming Wang
Kai Chen
2022
conf/ccs
Understanding Real-world Threats to Deep Learning Models in Android Apps.
Zizhuang Deng
Kai Chen
Guozhu Meng
Xiaodong Zhang
Ke Xu
Yao Cheng
2022
conf/ccs
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam.
Siyuan Tang
Xianghang Mi
Ying Li
XiaoFeng Wang
Kai Chen
2022
conf/acsac
Boosting Neural Networks to Decompile Optimized Binaries.
Ying Cao
Ruigang Liang
Kai Chen
Peiwei Hu
2021
journals/tifs
An Exploit Kits Detection Approach Based on HTTP Message Graph.
Yan Qin
Weiping Wang
Shigeng Zhang
Kai Chen
2021
journals/tifs
MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree.
Cong Dong
Zhigang Lu
Zelin Cui
Baoxu Liu
Kai Chen
2021
conf/ccs
AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks.
Yue Zhao
Hong Zhu
Kai Chen
Shengzhi Zhang
2021
conf/uss
DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks.
Yingzhe He
Guozhu Meng
Kai Chen
Xingbo Hu
Jinwen He
2021
conf/sp
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.
Yi Chen
Yepeng Yao
XiaoFeng Wang
Dandan Xu
Chang Yue
Xiaozhong Liu
Kai Chen
Haixu Tang
Baoxu Liu
2021
conf/icics
Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models.
Chuan Zhou
Huiyun Jing
Xin He
Liming Wang
Kai Chen
Duohe Ma
2021
conf/dsn
Practical and Efficient in-Enclave Verification of Privacy Compliance.
Weijie Liu
Wenhao Wang
Hongbo Chen
Xiaofeng Wang
Yaosong Lu
Kai Chen
Xinyu Wang
Qintao Shen
Yi Chen
Haixu Tang
2020
conf/ccs
RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection.
Tao Lv
Ruishi Li
Yi Yang
Kai Chen
Xiaojing Liao
XiaoFeng Wang
Peiwei Hu
Luyi Xing
2020
conf/uss
FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning.
Peiyuan Zong
Tao Lv
Dawei Wang
Zizhuang Deng
Ruigang Liang
Kai Chen
2020
conf/uss
SkillExplorer: Understanding the Behavior of Skills in Large Scale.
Zhixiu Guo
Zijin Lin
Pan Li
Kai Chen
2020
conf/uss
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices.
Yuxuan Chen
Xuejing Yuan
Jiangshan Zhang
Yue Zhao
Shengzhi Zhang
Kai Chen
XiaoFeng Wang
2020
conf/eurosp
A Pragmatic Approach to Membership Inferences on Machine Learning Models.
Yunhui Long
Lei Wang
Diyue Bu
Vincent Bindschaedler
XiaoFeng Wang
Haixu Tang
Carl A. Gunter
Kai Chen
2020
conf/esorics
Zipper Stack: Shadow Stacks Without Shadow.
Jinfeng Li
Liwei Chen
Qizhen Xu
Linan Tian
Gang Shi
Kai Chen
Dan Meng
2019
journals/compsec
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS.
Kai Chen
Chen Song
Liming Wang
Zhen Xu
2019
conf/ccs
Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors.
Yue Zhao
Hong Zhu
Ruigang Liang
Qintao Shen
Shengzhi Zhang
Kai Chen
2019
conf/uss
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
Yi Chen
Luyi Xing
Yue Qin
Xiaojing Liao
XiaoFeng Wang
Kai Chen
Wei Zou
2019
conf/sp
Demystifying Hidden Privacy Settings in Mobile Apps.
Yi Chen
Mingming Zha
Nan Zhang
Dandan Xu
Qianqian Zhao
Xuan Feng
Kan Yuan
Fnu Suya
Yuan Tian
Kai Chen
XiaoFeng Wang
Wei Zou
2019
conf/eurosp
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Baojun Liu
Zhou Li
Peiyuan Zong
Chaoyi Lu
Hai-Xin Duan
Ying Liu
Sumayah A. Alrwais
XiaoFeng Wang
Shuang Hao
Yaoqi Jia
Yiming Zhang
Kai Chen
Zaifeng Zhang
2018
journals/compsec
A cyber security data triage operation retrieval system.
Chen Zhong
Tao Lin
Peng Liu
John Yen
Kai Chen
2018
journals/tifs
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis.
Ming Fan
Jun Liu
Xiapu Luo
Kai Chen
Zhenzhou Tian
Qinghua Zheng
Ting Liu
2018
journals/tifs
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.
Jing Chen
Chiheng Wang
Ziming Zhao
Kai Chen
Ruiying Du
Gail-Joon Ahn
2018
conf/uss
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Xuejing Yuan
Yuxuan Chen
Yue Zhao
Yunhui Long
Xiaokang Liu
Kai Chen
Shengzhi Zhang
Heqing Huang
Xiaofeng Wang
Carl A. Gunter
2018
conf/icics
Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree.
Kai Chen
Ning Zhang
Liming Wang
Zhen Xu
2017
conf/ccs
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.
Wei You
Peiyuan Zong
Kai Chen
XiaoFeng Wang
Xiaojing Liao
Pan Bian
Bin Liang
2017
conf/ccs
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Tongxin Li
Xueqiang Wang
Mingming Zha
Kai Chen
XiaoFeng Wang
Luyi Xing
Xiaolong Bai
Nan Zhang
Xinhui Han
2017
conf/ccs
Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.
Yi Chen
Wei You
Yeonjoon Lee
Kai Chen
XiaoFeng Wang
Wei Zou
2017
conf/dsn
Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
Yeonjoon Lee
Tongxin Li
Nan Zhang
Soteris Demetriou
Mingming Zha
XiaoFeng Wang
Kai Chen
Xiao-yong Zhou
Xinhui Han
Michael Grace
2016
conf/sp
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS.
Kai Chen
Xueqiang Wang
Yi Chen
Peng Wang
Yeonjoon Lee
XiaoFeng Wang
Bin Ma
Aohui Wang
Yingjun Zhang
Wei Zou
2015
conf/ccs
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Heqing Huang
Sencun Zhu
Kai Chen
Peng Liu
2015
conf/ccs
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Yousra Aafer
Nan Zhang
Zhongwen Zhang
Xiao Zhang
Kai Chen
XiaoFeng Wang
Xiao-yong Zhou
Wenliang Du
Michael Grace
2015
conf/ccs
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Luyi Xing
Xiaolong Bai
Tongxin Li
XiaoFeng Wang
Kai Chen
Xiaojing Liao
Shi-Min Hu
Xinhui Han
2015
conf/ccs
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Yangyi Chen
Tongxin Li
XiaoFeng Wang
Kai Chen
Xinhui Han
2015
conf/ccs
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Heqing Huang
Kai Chen
Chuangang Ren
Peng Liu
Sencun Zhu
Dinghao Wu
2015
conf/uss
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Kai Chen
Peng Wang
Yeonjoon Lee
XiaoFeng Wang
Nan Zhang
Heqing Huang
Wei Zou
Peng Liu
2014
conf/ccs
An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program.
Mingyi Zhao
Jens Grossklags
Kai Chen
2011
conf/icisc
AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability.
Kai Chen
Yifeng Lian
Yingjun Zhang
2011
conf/wisa
A Map-Layer-Based Access Control Model.
Yingjun Zhang
Yang Zhang
Kai Chen
2010
conf/icics
Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis.
Kai Chen
Yifeng Lian
Yingjun Zhang
Coauthors
Anmin Fu
(2)
Aohui Wang
(1)
Baojun Liu
(1)
Baoxu Liu
(2)
Bin Liang
(1)
Bin Ma
(1)
Bo Wang
(1)
Bolun Zhang
(2)
Carl A. Gunter
(2)
Chang Yue
(5)
Chao Zhang
(1)
Chaoyang Lin
(1)
Chaoyi Lu
(1)
Chen Song
(1)
Chen Zhong
(2)
Cheng'an Wei
(2)
Chengyao Hua
(1)
Chenyu Wang
(1)
Chiheng Wang
(1)
Chuan Zhou
(1)
Chuangang Ren
(1)
Chunyang Chen
(1)
Chunyi Zhou
(2)
Cong Dong
(1)
Congyi Li
(1)
Dan Meng
(1)
Dandan Xu
(4)
Dawei Wang
(2)
Di Tang
(1)
Dinghao Wu
(1)
Diyue Bu
(1)
Dun Liu
(1)
Duohe Ma
(3)
Fan Xiang
(1)
Feng Guo
(1)
Fengrui Yang
(1)
Fnu Suya
(1)
Gail-Joon Ahn
(1)
Gang Shi
(1)
Guangquan Xu
(1)
Guozhu Meng
(9)
Hai-Xin Duan
(1)
Haixu Tang
(4)
Hao Wang
(1)
Heqing Huang
(4)
Hong Song
(1)
Hong Zhu
(4)
Hongbo Chen
(1)
Hongpeng Bai
(1)
Hualong Ma
(4)
Huiyun Jing
(1)
Jens Grossklags
(1)
Jiachen Zhou
(1)
Jiachen Zhou
(1)
Jian Liu
(1)
Jiangshan Zhang
(3)
Jie Li
(2)
Jinfeng Li
(1)
Jing Chen
(1)
Jinghua Liu
(3)
Jinwen He
(4)
John Yen
(1)
Jun Dai
(1)
Jun Liu
(1)
Kai Chen
(79)
Kaitai Liang
(1)
Kan Yuan
(1)
Ke Xu
(1)
Lei Wang
(1)
Liming Wang
(4)
Linan Tian
(1)
Linna Fan
(1)
Liwei Chen
(1)
Lixiao Gong
(1)
Longxing Li
(1)
Lu Guo
(1)
Lu Xiang
(1)
Luyi Xing
(4)
Miaoqian Lin
(5)
Michael Grace
(2)
Ming Fan
(1)
Mingming Zha
(3)
Mingsi Wang
(1)
Mingyi Zhao
(1)
Minhui Xue
(2)
Nan Zhang
(5)
Ning Zhang
(1)
Pan Bian
(1)
Pan Li
(4)
Peiwei Hu
(5)
Peiyuan Zong
(3)
Peizhuo Lv
(4)
Peng Liu
(4)
Peng Wang
(2)
Qian Yang
(1)
Qianqian Zhao
(1)
Qinghua Zheng
(1)
Qintao Shen
(2)
Qizhen Xu
(1)
Ran Wang
(1)
Ruigang Liang
(9)
Ruishi Li
(1)
Ruiying Du
(1)
Runnan Zhu
(1)
Runze Zhang
(1)
Sencun Zhu
(2)
Shaoying Liu
(1)
Shenchen Zhu
(3)
Shengzhi Zhang
(10)
Shi-Min Hu
(1)
Shigeng Zhang
(5)
Shouling Ji
(1)
Shuang Hao
(1)
Shuxin Chen
(1)
Siliang Qin
(1)
Siyuan Tang
(1)
Soteris Demetriou
(1)
Sumayah A. Alrwais
(1)
Tao Lin
(1)
Tao Lv
(2)
Tianlin Li
(1)
Ting Liu
(1)
Tong Liu
(3)
Tongxin Li
(4)
Vincent Bindschaedler
(1)
Wei Wang
(1)
Wei You
(2)
Wei Zou
(5)
Weijie Liu
(1)
Weiping Wang
(5)
Weizhe Wang
(1)
Weizhi Meng
(1)
Wenhao Wang
(1)
Wenliang Du
(1)
Wenqing Lei
(1)
Xianghang Mi
(1)
Xiao Zhang
(1)
Xiao-yong Zhou
(2)
Xiaodong Zhang
(1)
Xiaofeng Wang
(4)
XiaoFeng Wang
(18)
Xiaojing Liao
(4)
Xiaokang Liu
(1)
Xiaolong Bai
(2)
Xiaoyan Sun
(2)
Xiaozhong Liu
(1)
Xiapu Luo
(1)
Xin He
(1)
Xingbo Hu
(1)
Xinhui Han
(4)
Xinyu Wang
(1)
Xuan Feng
(1)
Xuan Liu
(1)
Xuejing Yuan
(3)
Xueqiang Wang
(2)
Yan Qin
(1)
Yanchun Li
(1)
Yang Xiao
(1)
Yang Zhang
(1)
Yangyi Chen
(1)
Yansong Gao
(2)
Yanzhong Wang
(1)
Yao Cheng
(1)
Yaoqi Jia
(1)
Yaosong Lu
(1)
Yeonjoon Lee
(6)
Yepeng Yao
(1)
Yi Chen
(7)
Yi Yang
(5)
Yifeng Lian
(2)
Yilin Li
(1)
Yiming Zhang
(1)
Ying Cao
(2)
Ying Li
(2)
Ying Liu
(1)
Yingjie Zhang
(1)
Yingjun Zhang
(6)
Yingzhe He
(1)
Yinpeng Dong
(1)
Yiyang Lu
(1)
Yousra Aafer
(1)
Yuan Tian
(1)
Yue Qin
(1)
Yue Zhao
(8)
Yuekang Li
(1)
Yuling Cai
(1)
Yunfei Yang
(1)
Yunhui Long
(2)
Yuqing Zhang
(2)
Yuxuan Chen
(3)
Zaifeng Zhang
(1)
Zelin Cui
(1)
Zeyu Gao
(1)
Zhankai Li
(3)
Zhe Zhao
(1)
Zhen Xu
(4)
Zhenzhou Tian
(1)
Zhetao Li
(1)
Zhi Zhang
(2)
Zhigang Lu
(1)
Zhimin Tang
(1)
Zhitong Lu
(2)
Zhixiu Guo
(2)
Zhiyang Dai
(2)
Zhiyu Zhang
(2)
Zhongwen Zhang
(1)
Zhou Li
(1)
Zihao Wang
(1)
Zijin Lin
(3)
Ziming Zhao
(1)
Zizhuang Deng
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to