What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xiangyu Zhang
Google Scholar
85
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Mutual Information Guided Backdoor Mitigation for Pre-Trained Encoders.
Tingxu Han
Weisong Sun
Ziqi Ding
Chunrong Fang
Hanwei Qian
Jiaxun Li
Zhenyu Chen
Xiangyu Zhang
2025
conf/sp
BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target.
Guangyu Shen
Siyuan Cheng
Zhuo Zhang
Guanhong Tao
Kaiyuan Zhang
Hanxi Guo
Lu Yan
Xiaolong Jin
Shengwei An
Shiqing Ma
Xiangyu Zhang
2025
conf/ndss
CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling.
Kaiyuan Zhang
Siyuan Cheng
Guangyu Shen
Bruno Ribeiro
Shengwei An
Pin-Yu Chen
Xiangyu Zhang
Ninghui Li
2025
conf/ndss
Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary.
Xiangzhe Xu
Zhuo Zhang
Zian Su
Ziyang Huang
Shiwei Feng
Yapeng Ye
Nan Jiang
Danning Xie
Siyuan Cheng
Lin Tan
Xiangyu Zhang
2025
conf/uss
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks.
Kaiyuan Zhang
Siyuan Cheng
Hanxi Guo
Yuetian Chen
Zian Su
Shengwei An
Yuntao Du
Charles Fleming
Ashish Kundu
Xiangyu Zhang
Ninghui Li
2024
conf/ccs
ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries.
Danning Xie
Zhuo Zhang
Nan Jiang
Xiangzhe Xu
Lin Tan
Xiangyu Zhang
2024
conf/uss
Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion.
Shengwei An
Lu Yan
Siyuan Cheng
Guangyu Shen
Kaiyuan Zhang
Qiuling Xu
Guanhong Tao
Xiangyu Zhang
2024
conf/uss
Cost-effective Attack Forensics by Recording and Correlating File System Changes.
Le Yu
Yapeng Ye
Zhuo Zhang
Xiangyu Zhang
2024
conf/sp
Distribution Preserving Backdoor Attack in Self-supervised Learning.
Guanhong Tao
Zhenting Wang
Shiwei Feng
Guangyu Shen
Shiqing Ma
Xiangyu Zhang
2024
conf/sp
Exploring the Orthogonality and Linearity of Backdoor Attacks.
Kaiyuan Zhang
Siyuan Cheng
Guangyu Shen
Guanhong Tao
Shengwei An
Anuran Makur
Shiqing Ma
Xiangyu Zhang
2024
conf/sp
Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts.
Wuqi Zhang
Zhuo Zhang
Qingkai Shi
Lu Liu
Lili Wei
Yepang Liu
Xiangyu Zhang
Shing-Chi Cheung
2024
conf/sp
OdScan: Backdoor Scanning for Object Detection Models.
Siyuan Cheng
Guangyu Shen
Guanhong Tao
Kaiyuan Zhang
Zhuo Zhang
Shengwei An
Xiangzhe Xu
Yingqi Li
Shiqing Ma
Xiangyu Zhang
2024
conf/sp
On Large Language Models' Resilience to Coercive Interrogation.
Zhuo Zhang
Guangyu Shen
Guanhong Tao
Siyuan Cheng
Xiangyu Zhang
2024
conf/acsac
Exploring Inherent Backdoors in Deep Learning Models.
Guanhong Tao
Siyuan Cheng
Zhenting Wang
Shiqing Ma
Shengwei An
Yingqi Liu
Guangyu Shen
Zhuo Zhang
Yunshu Mao
Xiangyu Zhang
2023
conf/ccs
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications.
Qingkai Shi
Junyang Shao
Yapeng Ye
Mingwei Zheng
Xiangyu Zhang
2023
conf/uss
Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract.
Zhuo Zhang
Zhiqiang Lin
Marcelo Morales
Xiangyu Zhang
Kaiyuan Zhang
2023
conf/uss
Extracting Protocol Format as State Machine via Controlled Static Loop Analysis.
Qingkai Shi
Xiangzhe Xu
Xiangyu Zhang
2023
conf/uss
Hard-label Black-box Universal Adversarial Patch Attack.
Guanhong Tao
Shengwei An
Siyuan Cheng
Guangyu Shen
Xiangyu Zhang
2023
conf/uss
PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.
Zhuo Zhang
Guanhong Tao
Guangyu Shen
Shengwei An
Qiuling Xu
Yingqi Liu
Yapeng Ye
Yaoxuan Wu
Xiangyu Zhang
2023
conf/sp
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.
Yapeng Ye
Zhuo Zhang
Qingkai Shi
Yousra Aafer
Xiangyu Zhang
2023
conf/sp
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes.
Shengwei An
Yuan Yao
Qiuling Xu
Shiqing Ma
Guanhong Tao
Siyuan Cheng
Kaiyuan Zhang
Yingqi Liu
Guangyu Shen
Ian Kelk
Xiangyu Zhang
2023
conf/ndss
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense.
Siyuan Cheng
Guanhong Tao
Yingqi Liu
Shengwei An
Xiangzhe Xu
Shiwei Feng
Guangyu Shen
Kaiyuan Zhang
Qiuling Xu
Shiqing Ma
Xiangyu Zhang
2022
conf/ccs
Discovering IoT Physical Channel Vulnerabilities.
Muslum Ozgur Ozmen
Xuansong Li
Andrew Chu
Z. Berkay Celik
Bardh Hoxha
Xiangyu Zhang
2022
conf/uss
ProFactory: Improving IoT Security via Formalized Protocol Customization.
Fei Wang
Jianliang Wu
Yuhong Nan
Yousra Aafer
Xiangyu Zhang
Dongyan Xu
Mathias Payer
2022
conf/sp
Piccolo: Exposing Complex Backdoors in NLP Transformer Models.
Yingqi Liu
Guangyu Shen
Guanhong Tao
Shengwei An
Shiqing Ma
Xiangyu Zhang
2022
conf/sp
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security.
Guanhong Tao
Yingqi Liu
Guangyu Shen
Qiuling Xu
Shengwei An
Zhuo Zhang
Xiangyu Zhang
2022
conf/ndss
MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity.
Guanhong Tao
Qiuling Xu
Yingqi Liu
Guangyu Shen
Shengwei An
Jingwei Xu
Xiangyu Zhang
Yuan Yao
2022
conf/ndss
RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning.
Hongjun Choi
Zhiyuan Cheng
Xiangyu Zhang
2021
journals/tifs
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection.
Hassaan Irshad
Gabriela F. Ciocarlie
Ashish Gehani
Vinod Yegneswaran
Kyu Hyung Lee
Jignesh M. Patel
Somesh Jha
Yonghwi Kwon
Dongyan Xu
Xiangyu Zhang
2021
conf/uss
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.
Yousra Aafer
Wei You
Yi Sun
Yu Shi
Xiangyu Zhang
Heng Yin
2021
conf/uss
ATLAS: A Sequence-based Learning Approach for Attack Investigation.
Abdulellah Alsaheel
Yuhong Nan
Shiqing Ma
Le Yu
Gregory Walkup
Z. Berkay Celik
Xiangyu Zhang
Dongyan Xu
2021
conf/sp
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Zhuo Zhang
Yapeng Ye
Wei You
Guanhong Tao
Wen-Chuan Lee
Yonghwi Kwon
Yousra Aafer
Xiangyu Zhang
2021
conf/sp
StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting.
Zhuo Zhang
Wei You
Guanhong Tao
Yousra Aafer
Xuwei Liu
Xiangyu Zhang
2021
conf/ndss
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Yapeng Ye
Zhuo Zhang
Fei Wang
Xiangyu Zhang
Dongyan Xu
2021
conf/ndss
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Le Yu
Shiqing Ma
Zhuo Zhang
Guanhong Tao
Xiangyu Zhang
Dongyan Xu
Vincent E. Urias
Han Wei Lin
Gabriela F. Ciocarlie
Vinod Yegneswaran
Ashish Gehani
2020
conf/ccs
Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features.
Junyu Lin
Lei Xu
Yingqi Liu
Xiangyu Zhang
2020
conf/ccs
Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles.
Hongjun Choi
Sayali Kate
Yousra Aafer
Xiangyu Zhang
Dongyan Xu
2020
conf/uss
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY.
Taegyu Kim
Chung Hwan Kim
Altay Ozen
Fan Fei
Zhan Tu
Xiangyu Zhang
Xinyan Deng
Dave (Jing) Tian
Dongyan Xu
2020
conf/sp
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning.
Wei You
Zhuo Zhang
Yonghwi Kwon
Yousra Aafer
Fei Peng
Yu Shi
Carson Harmon
Xiangyu Zhang
2020
conf/ndss
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
Runqing Yang
Shiqing Ma
Haitao Xu
Xiangyu Zhang
Yan Chen
2019
conf/ccs
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation.
Yingqi Liu
Wen-Chuan Lee
Guanhong Tao
Shiqing Ma
Yousra Aafer
Xiangyu Zhang
2019
conf/uss
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing.
Taegyu Kim
Chung Hwan Kim
Junghwan Rhee
Fan Fei
Zhan Tu
Gregory Walkup
Xiangyu Zhang
Xinyan Deng
Dongyan Xu
2019
conf/sp
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery.
Wei You
Xueqiang Wang
Shiqing Ma
Jianjun Huang
Xiangyu Zhang
XiaoFeng Wang
Bin Liang
2019
conf/ndss
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking.
Shiqing Ma
Yingqi Liu
Guanhong Tao
Wen-Chuan Lee
Xiangyu Zhang
2018
journals/compsec
Gemini: Guest-transparent honey files via hypervisor-level access redirection.
Zhongshu Gu
Brendan Saltaformaggio
Xiangyu Zhang
Dongyan Xu
2018
conf/ccs
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach.
Hongjun Choi
Wen-Chuan Lee
Yousra Aafer
Fan Fei
Zhan Tu
Xiangyu Zhang
Dongyan Xu
Xinyan Deng
2018
conf/ccs
Precise Android API Protection Mapping Derivation and Reasoning.
Yousra Aafer
Guanhong Tao
Jianjun Huang
Xiangyu Zhang
Ninghui Li
2018
conf/ndss
Securing Real-Time Microcontroller Systems through Customized Memory View Switching.
Chung Hwan Kim
Taegyu Kim
Hongjun Choi
Zhongshu Gu
Byoungyoung Lee
Xiangyu Zhang
Dongyan Xu
2018
conf/ndss
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Yonghwi Kwon
Fei Wang
Weihang Wang
Kyu Hyung Lee
Wen-Chuan Lee
Shiqing Ma
Xiangyu Zhang
Dongyan Xu
Somesh Jha
Gabriela F. Ciocarlie
Ashish Gehani
Vinod Yegneswaran
2018
conf/ndss
Trojaning Attack on Neural Networks.
Yingqi Liu
Shiqing Ma
Yousra Aafer
Wen-Chuan Lee
Juan Zhai
Weihang Wang
Xiangyu Zhang
2018
conf/ndss
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Rohit Bhatia
Brendan Saltaformaggio
Seung Jei Yang
Aisha I. Ali-Gombe
Xiangyu Zhang
Dongyan Xu
Golden G. Richard III
2018
conf/ndss
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection.
Yousra Aafer
Jianjun Huang
Yi Sun
Xiangyu Zhang
Ninghui Li
Chen Tian
2018
conf/acsac
Lprov: Practical Library-aware Provenance Tracing.
Fei Wang
Yonghwi Kwon
Shiqing Ma
Xiangyu Zhang
Dongyan Xu
2017
conf/uss
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
Shiqing Ma
Juan Zhai
Fei Wang
Kyu Hyung Lee
Xiangyu Zhang
Dongyan Xu
2017
conf/ndss
Self Destructing Exploit Executions via Input Perturbation.
Yonghwi Kwon
Brendan Saltaformaggio
I Luk Kim
Kyu Hyung Lee
Xiangyu Zhang
Dongyan Xu
2017
conf/acsac
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications.
Taegyu Kim
Chung Hwan Kim
Hongjun Choi
Yonghwi Kwon
Brendan Saltaformaggio
Xiangyu Zhang
Dongyan Xu
2017
conf/acsac
Analysis of SEAndroid Policies: Combining MAC and DAC in Android.
Haining Chen
Ninghui Li
William Enck
Yousra Aafer
Xiangyu Zhang
2016
conf/uss
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
Brendan Saltaformaggio
Rohit Bhatia
Xiangyu Zhang
Dongyan Xu
Golden G. Richard III
2016
conf/ndss
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting.
Shiqing Ma
Xiangyu Zhang
Dongyan Xu
2016
conf/acsac
HERCULE: attack story reconstruction via community discovery on correlated log graph.
Kexin Pei
Zhongshu Gu
Brendan Saltaformaggio
Shiqing Ma
Fei Wang
Zhiwei Zhang
Luo Si
Xiangyu Zhang
Dongyan Xu
2015
conf/ccs
iRiS: Vetting Private API Abuse in iOS Applications.
Zhui Deng
Brendan Saltaformaggio
Xiangyu Zhang
Dongyan Xu
2015
conf/ccs
Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability.
Hao Sun
Xiangyu Zhang
Chao Su
Qingkai Zeng
2015
conf/ccs
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images.
Brendan Saltaformaggio
Rohit Bhatia
Zhongshu Gu
Xiangyu Zhang
Dongyan Xu
2015
conf/ccs
Android Implicit Information Flow Demystified.
Wei You
Bin Liang
Jingzhe Li
Wenchang Shi
Xiangyu Zhang
2015
conf/ccs
GUITAR: Piecing Together Android App GUIs from Memory Images.
Brendan Saltaformaggio
Rohit Bhatia
Zhongshu Gu
Xiangyu Zhang
Dongyan Xu
2015
conf/uss
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.
Jianjun Huang
Zhichun Li
Xusheng Xiao
Zhenyu Wu
Kangjie Lu
Xiangyu Zhang
Guofei Jiang
2015
conf/ndss
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Yonghwi Kwon
Fei Peng
Dohyeong Kim
Kyungtae Kim
Xiangyu Zhang
Dongyan Xu
Vinod Yegneswaran
John Qian
2015
conf/dsn
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis.
Zhongshu Gu
Kexin Pei
Qifan Wang
Luo Si
Xiangyu Zhang
Dongyan Xu
2015
conf/acsac
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows.
Shiqing Ma
Kyu Hyung Lee
Chung Hwan Kim
Junghwan Rhee
Xiangyu Zhang
Dongyan Xu
2014
conf/uss
X-Force: Force-Executing Binary Programs for Security Applications.
Fei Peng
Zhui Deng
Xiangyu Zhang
Dongyan Xu
Zhiqiang Lin
Zhendong Su
2014
conf/uss
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
Brendan Saltaformaggio
Zhongshu Gu
Xiangyu Zhang
Dongyan Xu
2014
conf/dsn
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine.
Zhongshu Gu
Brendan Saltaformaggio
Xiangyu Zhang
Dongyan Xu
2013
conf/ccs
Obfuscation resilient binary code reuse through trace-oriented programming.
Junyuan Zeng
Yangchun Fu
Kenneth A. Miller
Zhiqiang Lin
Xiangyu Zhang
Dongyan Xu
2013
conf/ccs
LogGC: garbage collecting audit log.
Kyu Hyung Lee
Xiangyu Zhang
Dongyan Xu
2013
conf/esorics
BISTRO: Binary Component Extraction and Embedding for Software Security Applications.
Zhui Deng
Xiangyu Zhang
Dongyan Xu
2013
conf/ndss
High Accuracy Attack Provenance via Binary-based Execution Partition.
Kyu Hyung Lee
Xiangyu Zhang
Dongyan Xu
2013
conf/dsn
DRIP: A framework for purifying trojaned kernel drivers.
Zhongshu Gu
William N. Sumner
Zhui Deng
Xiangyu Zhang
Dongyan Xu
2013
conf/acsac
SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization.
Zhui Deng
Xiangyu Zhang
Dongyan Xu
2012
conf/ndss
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
Zhiqiang Lin
Junghwan Rhee
Chao Wu
Xiangyu Zhang
Dongyan Xu
2011
conf/ndss
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Zhiqiang Lin
Junghwan Rhee
Xiangyu Zhang
Dongyan Xu
Xuxian Jiang
2011
conf/dsn
Unified debugging of distributed systems with Recon.
Kyu Hyung Lee
Nick Sumner
Xiangyu Zhang
Patrick Eugster
2010
conf/ndss
Automatic Reverse Engineering of Data Structures from Binary Execution.
Zhiqiang Lin
Xiangyu Zhang
Dongyan Xu
2010
conf/dsn
Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction.
Zhiqiang Lin
Xiangyu Zhang
Dongyan Xu
2008
conf/ndss
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Zhiqiang Lin
Xuxian Jiang
Dongyan Xu
Xiangyu Zhang
2008
conf/dsn
Convicting exploitable software vulnerabilities: An efficient input provenance based approach.
Zhiqiang Lin
Xiangyu Zhang
Dongyan Xu
Coauthors
Abdulellah Alsaheel
(1)
Aisha I. Ali-Gombe
(1)
Altay Ozen
(1)
Andrew Chu
(1)
Anuran Makur
(1)
Ashish Gehani
(3)
Ashish Kundu
(1)
Bardh Hoxha
(1)
Bin Liang
(2)
Brendan Saltaformaggio
(11)
Bruno Ribeiro
(1)
Byoungyoung Lee
(1)
Carson Harmon
(1)
Chao Su
(1)
Chao Wu
(1)
Charles Fleming
(1)
Chen Tian
(1)
Chung Hwan Kim
(5)
Chunrong Fang
(1)
Danning Xie
(2)
Dave (Jing) Tian
(1)
Dohyeong Kim
(1)
Dongyan Xu
(41)
Fan Fei
(3)
Fei Peng
(3)
Fei Wang
(3)
Fei Wang
(3)
Gabriela F. Ciocarlie
(3)
Golden G. Richard III
(2)
Gregory Walkup
(2)
Guangyu Shen
(15)
Guanhong Tao
(20)
Guofei Jiang
(1)
Haining Chen
(1)
Haitao Xu
(1)
Han Wei Lin
(1)
Hanwei Qian
(1)
Hanxi Guo
(2)
Hao Sun
(1)
Hassaan Irshad
(1)
Heng Yin
(1)
Hongjun Choi
(5)
I Luk Kim
(1)
Ian Kelk
(1)
Jianjun Huang
(4)
Jianliang Wu
(1)
Jiaxun Li
(1)
Jignesh M. Patel
(1)
Jingwei Xu
(1)
Jingzhe Li
(1)
John Qian
(1)
Juan Zhai
(2)
Junghwan Rhee
(4)
Junyang Shao
(1)
Junyu Lin
(1)
Junyuan Zeng
(1)
Kaiyuan Zhang
(9)
Kangjie Lu
(1)
Kenneth A. Miller
(1)
Kexin Pei
(2)
Kyu Hyung Lee
(8)
Kyungtae Kim
(1)
Le Yu
(3)
Lei Xu
(1)
Lili Wei
(1)
Lin Tan
(2)
Lu Liu
(1)
Lu Yan
(2)
Luo Si
(2)
Marcelo Morales
(1)
Mathias Payer
(1)
Mingwei Zheng
(1)
Muslum Ozgur Ozmen
(1)
Nan Jiang
(2)
Nick Sumner
(1)
Ninghui Li
(5)
Patrick Eugster
(1)
Pin-Yu Chen
(1)
Qifan Wang
(1)
Qingkai Shi
(4)
Qingkai Zeng
(1)
Qiuling Xu
(6)
Rohit Bhatia
(4)
Runqing Yang
(1)
Sayali Kate
(1)
Seung Jei Yang
(1)
Shengwei An
(14)
Shing-Chi Cheung
(1)
Shiqing Ma
(21)
Shiwei Feng
(3)
Siyuan Cheng
(12)
Somesh Jha
(2)
Taegyu Kim
(4)
Tingxu Han
(1)
Vincent E. Urias
(1)
Vinod Yegneswaran
(4)
Wei You
(6)
Weihang Wang
(2)
Weisong Sun
(1)
Wen-Chuan Lee
(6)
Wenchang Shi
(1)
William Enck
(1)
William N. Sumner
(1)
Wuqi Zhang
(1)
Xiangyu Zhang
(85)
Xiangzhe Xu
(5)
XiaoFeng Wang
(1)
Xiaolong Jin
(1)
Xinyan Deng
(3)
Xuansong Li
(1)
Xueqiang Wang
(1)
Xusheng Xiao
(1)
Xuwei Liu
(1)
Xuxian Jiang
(2)
Yan Chen
(1)
Yangchun Fu
(1)
Yaoxuan Wu
(1)
Yapeng Ye
(7)
Yepang Liu
(1)
Yi Sun
(2)
Yingqi Li
(1)
Yingqi Liu
(11)
Yonghwi Kwon
(8)
Yousra Aafer
(13)
Yu Shi
(2)
Yuan Yao
(2)
Yuetian Chen
(1)
Yuhong Nan
(2)
Yunshu Mao
(1)
Yuntao Du
(1)
Z. Berkay Celik
(2)
Zhan Tu
(3)
Zhendong Su
(1)
Zhenting Wang
(2)
Zhenyu Chen
(1)
Zhenyu Wu
(1)
Zhichun Li
(1)
Zhiqiang Lin
(9)
Zhiwei Zhang
(1)
Zhiyuan Cheng
(1)
Zhongshu Gu
(9)
Zhui Deng
(5)
Zhuo Zhang
(17)
Zian Su
(2)
Ziqi Ding
(1)
Ziyang Huang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to