What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hai Jin
Google Scholar
ORCID:
0000-0002-3934-7605
61
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
MalPacDetector: An LLM-Based Malicious NPM Package Detector.
Jian Wang
Zhen Li
Jixiang Qu
Deqing Zou
Shouhuai Xu
Ziteng Xu
Zhenwei Wang
Hai Jin
2025
journals/tifs
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System.
Weiqi Dai
Yang Zhou
Xiaohai Dai
Kim-Kwang Raymond Choo
Xia Xie
Deqing Zou
Hai Jin
2025
journals/tifs
PlainDAG: A Low-Latency Asynchronous DAG BFT Protocol With Best-Effort Broadcast.
Yifan Zhou
Jiang Xiao
Xiaohai Dai
Hai Jin
2025
conf/uss
SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments.
Yiwei Hu
Zhen Li
Kedie Shu
Shenghua Guan
Deqing Zou
Shouhuai Xu
Bin Yuan
Hai Jin
2025
conf/uss
Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction.
Yiheng Zhang
Ming Wen
Shunjie Liu
Dongjie He
Hai Jin
2024
journals/tifs
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor.
Weiqi Dai
Jinkai Liu
Yang Zhou
Kim-Kwang Raymond Choo
Xia Xie
Deqing Zou
Hai Jin
2024
journals/tifs
Wahoo: A DAG-Based BFT Consensus With Low Latency and Low Communication Overhead.
Xiaohai Dai
Zhaonan Zhang
Zhengxuan Guo
Chaozheng Ding
Jiang Xiao
Xia Xie
Rui Hao
Hai Jin
2024
journals/tifs
Themis: Robust and Light-Client Dynamic Searchable Symmetric Encryption.
Yubo Zheng
Peng Xu
Miao Wang
Wanying Xu
Wei Wang
Tianyang Chen
Hai Jin
2024
journals/tifs
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness.
Haochen Dou
Zhenwu Dan
Peng Xu
Wei Wang
Shuning Xu
Tianyang Chen
Hai Jin
2024
journals/tifs
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning.
Jianrong Lu
Shengshan Hu
Wei Wan
Minghui Li
Leo Yu Zhang
Lulu Xue
Hai Jin
2024
conf/ccs
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches.
Chuqi Zhang
Jun Zeng
Yiming Zhang
Adil Ahmad
Fengwei Zhang
Hai Jin
Zhenkai Liang
2024
conf/uss
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
Siyue Feng
Yueming Wu
Wenjie Xue
Sikui Pan
Deqing Zou
Yang Liu
Hai Jin
2024
conf/sp
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations.
Bin Yuan
Zhanxiang Song
Yan Jia
Zhenyu Lu
Deqing Zou
Hai Jin
Luyi Xing
2024
conf/sp
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability.
Yechao Zhang
Shengshan Hu
Leo Yu Zhang
Junyu Shi
Minghui Li
Xiaogeng Liu
Wei Wan
Hai Jin
2024
conf/sp
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples.
Ziqi Zhou
Minghui Li
Wei Liu
Shengshan Hu
Yechao Zhang
Wei Wan
Lulu Xue
Leo Yu Zhang
Dezhong Yao
Hai Jin
2024
conf/esorics
ECLIPSE: Expunging Clean-Label Indiscriminate Poisons via Sparse Diffusion Purification.
Xianlong Wang
Shengshan Hu
Yechao Zhang
Ziqi Zhou
Leo Yu Zhang
Peng Xu
Wei Wan
Hai Jin
2024
conf/esorics
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks.
Weijie Chen
Yu Zhao
Yinqian Zhang
Weizhong Qiang
Deqing Zou
Hai Jin
2024
conf/ndss
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses.
Chaoxiang He
Xiaojing Ma
Bin B. Zhu
Yimiao Zeng
Hanqing Hu
Xiaofan Bai
Hai Jin
Dongmei Zhang
2024
conf/dsn
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications.
Yu Zhao
Wenjie Xue
Weijie Chen
Weizhong Qiang
Deqing Zou
Hai Jin
2023
journals/tifs
A Dynamic-Efficient Structure for Secure and Verifiable Location-Based Skyline Queries.
Zuan Wang
Liang Zhang
Xiaofeng Ding
Kim-Kwang Raymond Choo
Hai Jin
2023
journals/tifs
Differentially Private Deep Learning With Dynamic Privacy Budget Allocation and Adaptive Optimization.
Lin Chen
Danyang Yue
Xiaofeng Ding
Zuan Wang
Kim-Kwang Raymond Choo
Hai Jin
2023
conf/ccs
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path.
Xiaohai Dai
Bolin Zhang
Hai Jin
Ling Ren
2023
conf/ccs
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation.
Zhi Li
Weijie Liu
XiaoFeng Wang
Bin Yuan
Hongliang Tian
Hai Jin
Shoumeng Yan
2023
conf/esorics
Secure Outsourced Matrix Multiplication with Fully Homomorphic Encryption.
Lin Zhu
Qiang-Sheng Hua
Yi Chen
Hai Jin
2023
conf/esorics
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults.
Tingting Rao
Yixin Su
Peng Xu
Yubo Zheng
Wei Wang
Hai Jin
2023
conf/ndss
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
Jiayun Fu
Xiaojing Ma
Bin B. Zhu
Pingyi Hu
Ruixin Zhao
Yaru Jia
Peng Xu
Hai Jin
Dongmei Zhang
2023
conf/ndss
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Tianyang Chen
Peng Xu
Stjepan Picek
Bo Luo
Willy Susilo
Hai Jin
Kaitai Liang
2023
conf/dsn
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation.
Kunlun Ren
Weizhong Qiang
Yueming Wu
Yi Zhou
Deqing Zou
Hai Jin
2022
journals/compsec
Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks.
Weizhong Qiang
Lin Yang
Hai Jin
2022
journals/tifs
LaF: Lattice-Based and Communication-Efficient Federated Learning.
Peng Xu
Manqing Hu
Tianyang Chen
Wei Wang
Hai Jin
2022
journals/tifs
ROSE: Robust Searchable Encryption With Forward and Backward Security.
Peng Xu
Willy Susilo
Wei Wang
Tianyang Chen
Qianhong Wu
Kaitai Liang
Hai Jin
2022
conf/sp
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
Zhi Li
Weijie Liu
Hongbo Chen
XiaoFeng Wang
Xiaojing Liao
Luyi Xing
Mingming Zha
Hai Jin
Deqing Zou
2022
conf/esorics
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay.
Yubo Zheng
Peng Xu
Wei Wang
Tianyang Chen
Willy Susilo
Kaitai Liang
Hai Jin
2022
conf/acsac
StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance.
Zhechang Zhang
Bin Yuan
Kehan Yang
Deqing Zou
Hai Jin
2022
conf/acsac
Trebiz: Byzantine Fault Tolerance with Byzantine Merchants.
Xiaohai Dai
Liping Huang
Jiang Xiao
Zhaonan Zhang
Xia Xie
Hai Jin
2021
journals/tifs
CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships.
Weiqi Dai
Yan Lv
Kim-Kwang Raymond Choo
Zhongze Liu
Deqing Zou
Hai Jin
2021
journals/tifs
Cooperative Assurance of Cache Data Integrity for Mobile Edge Computing.
Bo Li
Qiang He
Feifei Chen
Haipeng Dai
Hai Jin
Yang Xiang
Yun Yang
2021
journals/tifs
Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data.
Xiaofeng Ding
Zuan Wang
Pan Zhou
Kim-Kwang Raymond Choo
Hai Jin
2021
conf/ccs
Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense.
Chaoxiang He
Bin Benjamin Zhu
Xiaojing Ma
Hai Jin
Shengshan Hu
2021
conf/ccs
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
Yan Jia
Bin Yuan
Luyi Xing
Dongfang Zhao
Yifan Zhang
XiaoFeng Wang
Yijing Liu
Kaimin Zheng
Peyton Crnjak
Yuqing Zhang
Deqing Zou
Hai Jin
2021
conf/esorics
Bestie: Very Practical Searchable Encryption with Forward and Backward Security.
Tianyang Chen
Peng Xu
Wei Wang
Yubo Zheng
Willy Susilo
Hai Jin
2020
journals/compsec
Static detection of real-world buffer overflow induced by loop.
Peng Luo
Deqing Zou
Yajuan Du
Hai Jin
Changming Liu
Jinan Shen
2020
journals/tifs
SDTE: A Secure Blockchain-Based Data Trading Ecosystem.
Weiqi Dai
Chunkai Dai
Kim-Kwang Raymond Choo
Changze Cui
Deqing Zou
Hai Jin
2020
conf/uss
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Bin Yuan
Yan Jia
Luyi Xing
Dongfang Zhao
XiaoFeng Wang
Deqing Zou
Hai Jin
Yuqing Zhang
2018
conf/acisp
Automatically Identifying Security Bug Reports via Multitype Features Analysis.
Deqing Zou
Zhijun Deng
Zhen Li
Hai Jin
2018
conf/ndss
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.
Zhen Li
Deqing Zou
Shouhuai Xu
Xinyu Ou
Hai Jin
Sujuan Wang
Zhijun Deng
Yuyi Zhong
2018
conf/acsac
A Heuristic Framework to Detect Concurrency Vulnerabilities.
Changming Liu
Deqing Zou
Peng Luo
Bin B. Zhu
Hai Jin
2017
conf/acisp
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
Peng Xu
Shuai Liang
Wei Wang
Willy Susilo
Qianhong Wu
Hai Jin
2017
conf/acisp
JSFfox: Run-Timely Confining JavaScript for Firefox.
Weizhong Qiang
JiaZhen Guo
Hai Jin
Weifeng Li
2017
conf/acisp
Fully Context-Sensitive CFI for COTS Binaries.
Weizhong Qiang
Yingda Huang
Deqing Zou
Hai Jin
Shizhen Wang
Guozhong Sun
2016
conf/ccs
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Peng Xu
Jun Xu
Wei Wang
Hai Jin
Willy Susilo
Deqing Zou
2016
conf/ccs
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security.
Peng Xu
Jingnan Li
Wei Wang
Hai Jin
2016
conf/acsac
VulPecker: an automated vulnerability detection system based on code similarity analysis.
Zhen Li
Deqing Zou
Shouhuai Xu
Hai Jin
Hanchao Qi
Jie Hu
2015
journals/tifs
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
Peng Xu
Qianhong Wu
Wei Wang
Willy Susilo
Josep Domingo-Ferrer
Hai Jin
2015
conf/wisec
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Daibin Wang
Haixia Yao
Yingjiu Li
Hai Jin
Deqing Zou
Robert H. Deng
2010
conf/ccs
TEE: a virtual DRTM based execution environment for secure cloud-end computing.
Weiqi Dai
Hai Jin
Deqing Zou
Shouhuai Xu
Weide Zheng
Lei Shi
2006
conf/iwsec
A New Approach to Hide Policy for Automated Trust Negotiation.
Hai Jin
Zhensong Liao
Deqing Zou
Weizhong Qiang
2005
conf/acisp
VO-Sec: An Access Control Framework for Dynamic Virtual Organization.
Hai Jin
Weizhong Qiang
Xuanhua Shi
Deqing Zou
2003
conf/icics
A Compound Intrusion Detection Model.
Jianhua Sun
Hai Jin
Hao Chen
Qian Zhang
Zongfen Han
2002
conf/icisc
A Risk-Sensitive Intrusion Detection Model.
Hai Jin
Jianhua Sun
Hao Chen
Zongfen Han
2002
conf/icics
A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System.
Hai Jin
Feng Xian
Zongfen Han
Shengli Li
Coauthors
Adil Ahmad
(1)
Bin B. Zhu
(3)
Bin Benjamin Zhu
(1)
Bin Yuan
(6)
Bo Li
(1)
Bo Luo
(1)
Bolin Zhang
(1)
Changming Liu
(2)
Changze Cui
(1)
Chaoxiang He
(2)
Chaozheng Ding
(1)
Chunkai Dai
(1)
Chuqi Zhang
(1)
Daibin Wang
(1)
Danyang Yue
(1)
Deqing Zou
(26)
Dezhong Yao
(1)
Dongfang Zhao
(2)
Dongjie He
(1)
Dongmei Zhang
(2)
Feifei Chen
(1)
Feng Xian
(1)
Fengwei Zhang
(1)
Guozhong Sun
(1)
Hai Jin
(61)
Haipeng Dai
(1)
Haixia Yao
(1)
Hanchao Qi
(1)
Hanqing Hu
(1)
Hao Chen
(2)
Haochen Dou
(1)
Hongbo Chen
(1)
Hongliang Tian
(1)
Jian Wang
(1)
Jiang Xiao
(3)
Jianhua Sun
(2)
Jianrong Lu
(1)
Jiayun Fu
(1)
JiaZhen Guo
(1)
Jie Hu
(1)
Jinan Shen
(1)
Jingnan Li
(1)
Jinkai Liu
(1)
Jixiang Qu
(1)
Josep Domingo-Ferrer
(1)
Jun Xu
(1)
Jun Zeng
(1)
Junyu Shi
(1)
Kaimin Zheng
(1)
Kaitai Liang
(3)
Kedie Shu
(1)
Kehan Yang
(1)
Kim-Kwang Raymond Choo
(7)
Kunlun Ren
(1)
Lei Shi
(1)
Leo Yu Zhang
(4)
Liang Zhang
(1)
Lin Chen
(1)
Lin Yang
(1)
Lin Zhu
(1)
Ling Ren
(1)
Liping Huang
(1)
Lulu Xue
(2)
Luyi Xing
(4)
Manqing Hu
(1)
Miao Wang
(1)
Ming Wen
(1)
Minghui Li
(3)
Mingming Zha
(1)
Pan Zhou
(1)
Peng Luo
(2)
Peng Xu
(14)
Peyton Crnjak
(1)
Pingyi Hu
(1)
Qian Zhang
(1)
Qiang He
(1)
Qiang-Sheng Hua
(1)
Qianhong Wu
(3)
Robert H. Deng
(1)
Rui Hao
(1)
Ruixin Zhao
(1)
Shenghua Guan
(1)
Shengli Li
(1)
Shengshan Hu
(5)
Shizhen Wang
(1)
Shouhuai Xu
(5)
Shoumeng Yan
(1)
Shuai Liang
(1)
Shuning Xu
(1)
Shunjie Liu
(1)
Sikui Pan
(1)
Siyue Feng
(1)
Stjepan Picek
(1)
Sujuan Wang
(1)
Tianyang Chen
(7)
Tingting Rao
(1)
Wanying Xu
(1)
Wei Liu
(1)
Wei Wan
(4)
Wei Wang
(11)
Weide Zheng
(1)
Weifeng Li
(1)
Weijie Chen
(2)
Weijie Liu
(2)
Weiqi Dai
(5)
Weizhong Qiang
(8)
Wenjie Xue
(2)
Willy Susilo
(7)
Xia Xie
(4)
Xianlong Wang
(1)
Xiaofan Bai
(1)
Xiaofeng Ding
(3)
XiaoFeng Wang
(4)
Xiaogeng Liu
(1)
Xiaohai Dai
(5)
Xiaojing Liao
(1)
Xiaojing Ma
(3)
Xinyu Ou
(1)
Xuanhua Shi
(1)
Yajuan Du
(1)
Yan Jia
(3)
Yan Lv
(1)
Yang Liu
(1)
Yang Xiang
(1)
Yang Zhou
(2)
Yaru Jia
(1)
Yechao Zhang
(3)
Yi Chen
(1)
Yi Zhou
(1)
Yifan Zhang
(1)
Yifan Zhou
(1)
Yiheng Zhang
(1)
Yijing Liu
(1)
Yimiao Zeng
(1)
Yiming Zhang
(1)
Yingda Huang
(1)
Yingjiu Li
(1)
Yinqian Zhang
(1)
Yiwei Hu
(1)
Yixin Su
(1)
Yu Zhao
(2)
Yubo Zheng
(4)
Yueming Wu
(2)
Yun Yang
(1)
Yuqing Zhang
(2)
Yuyi Zhong
(1)
Zhanxiang Song
(1)
Zhaonan Zhang
(2)
Zhechang Zhang
(1)
Zhen Li
(5)
Zhengxuan Guo
(1)
Zhenkai Liang
(1)
Zhensong Liao
(1)
Zhenwei Wang
(1)
Zhenwu Dan
(1)
Zhenyu Lu
(1)
Zhi Li
(2)
Zhijun Deng
(2)
Zhongze Liu
(1)
Ziqi Zhou
(2)
Ziteng Xu
(1)
Zongfen Han
(3)
Zuan Wang
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to