What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jiqiang Liu
Google Scholar
20
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
FedEditor: Efficient and Effective Federated Unlearning in Cooperative Intelligent Transportation Systems.
Xiaohan Yuan
Jiqiang Liu
Bin Wang
Guorong Chen
Xiangrui Xu
Junyong Wang
Tao Li
Wei Wang
2025
conf/ndss
Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks.
Jing Shang
Jian Wang
Kailun Wang
Jiqiang Liu
Nan Jiang
Md. Armanuzzaman
Ziming Zhao
2025
conf/dsn
An Analysis of Malicious Packages in Open-Source Software in the Wild.
Xiaoyan Zhou
Ying Zhang
Wenjia Niu
Jiqiang Liu
Haining Wang
Qiang Li
2025
conf/uss
From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning.
Xiangrui Xu
Zhize Li
Yufei Han
Bin Wang
Jiqiang Liu
Wei Wang
2024
journals/tifs
Eyes on Federated Recommendation: Targeted Poisoning With Competition and Its Mitigation.
Yurong Hao
Xihui Chen
Wei Wang
Jiqiang Liu
Tao Li
Junyong Wang
Witold Pedrycz
2024
journals/tifs
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
Xiaohan Yuan
Jiqiang Liu
Bin Wang
Wei Wang
Bin Wang
Tao Li
Xiaobo Ma
Witold Pedrycz
2024
conf/ccs
Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation.
Yurong Hao
Xihui Chen
Xiaoting Lyu
Jiqiang Liu
Yongsheng Zhu
Zhiguo Wan
Sjouke Mauw
Wei Wang
2024
conf/uss
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.
Xiaoting Lyu
Yufei Han
Wei Wang
Jingkai Liu
Yongsheng Zhu
Guangquan Xu
Jiqiang Liu
Xiangliang Zhang
2023
conf/ccs
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Chao Li
Balaji Palanisamy
Runhua Xu
Li Duan
Jiqiang Liu
Wei Wang
2022
journals/istr
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples.
Yixiang Wang
Jiqiang Liu
Xiaolin Chang
Jianhua Wang
Ricardo J. Rodríguez
2022
conf/cns
Alexa Skills: Security Vulnerabilities and Countermeasures.
Dan Su
Jiqiang Liu
Sencun Zhu
Xiaoyang Wang
Wei Wang
2021
conf/icics
Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning.
Yalun Wu
Minglu Song
Yike Li
Yunzhe Tian
Endong Tong
Wenjia Niu
Bowei Jia
Haixiang Huang
Qiong Li
Jiqiang Liu
2021
conf/dsn
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities.
Qiang Li
Jinke Song
Dawei Tan
Haining Wang
Jiqiang Liu
2018
conf/esorics
Efficient and Secure Outsourcing of Differentially Private Data Publication.
Jin Li
Heng Ye
Wei Wang
Wenjing Lou
Y. Thomas Hou
Jiqiang Liu
Rongxing Lu
2017
conf/icics
A Method to Effectively Detect Vulnerabilities on Path Planning of VIN.
Jingjing Liu
Wenjia Niu
Jiqiang Liu
Jia Zhao
Tong Chen
Yinqi Yang
Yingxiao Xiang
Lei Han
2017
conf/icics
A Cross-Modal CCA-Based Astroturfing Detection Approach.
XiaoXuan Bai
Yingxiao Xiang
Wenjia Niu
Jiqiang Liu
Tong Chen
Jingjing Liu
Tong Wu
2016
conf/ccs
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Shuo Qiu
Boyang Wang
Ming Li
Jesse Victors
Jiqiang Liu
Yanfeng Shi
Wei Wang
2015
journals/compsec
Selecting a trusted cloud service provider for your SaaS program.
Changlong Tang
Jiqiang Liu
2015
conf/ccs
POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy.
Xing Liu
Wei Wang
Jiqiang Liu
2014
journals/tifs
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection.
Wei Wang
Xing Wang
Dawei Feng
Jiqiang Liu
Zhen Han
Xiangliang Zhang
Coauthors
Balaji Palanisamy
(1)
Bin Wang
(2)
Bin Wang
(1)
Bin Wang
(1)
Bowei Jia
(1)
Boyang Wang
(1)
Changlong Tang
(1)
Chao Li
(1)
Dan Su
(1)
Dawei Feng
(1)
Dawei Tan
(1)
Endong Tong
(1)
Guangquan Xu
(1)
Guorong Chen
(1)
Haining Wang
(2)
Haixiang Huang
(1)
Heng Ye
(1)
Jesse Victors
(1)
Jia Zhao
(1)
Jian Wang
(1)
Jianhua Wang
(1)
Jin Li
(1)
Jing Shang
(1)
Jingjing Liu
(2)
Jingkai Liu
(1)
Jinke Song
(1)
Jiqiang Liu
(20)
Junyong Wang
(2)
Kailun Wang
(1)
Lei Han
(1)
Li Duan
(1)
Md. Armanuzzaman
(1)
Ming Li
(1)
Minglu Song
(1)
Nan Jiang
(1)
Qiang Li
(2)
Qiong Li
(1)
Ricardo J. Rodríguez
(1)
Rongxing Lu
(1)
Runhua Xu
(1)
Sencun Zhu
(1)
Shuo Qiu
(1)
Sjouke Mauw
(1)
Tao Li
(3)
Tong Chen
(2)
Tong Wu
(1)
Wei Wang
(12)
Wenjia Niu
(4)
Wenjing Lou
(1)
Witold Pedrycz
(2)
Xiangliang Zhang
(2)
Xiangrui Xu
(2)
Xiaobo Ma
(1)
Xiaohan Yuan
(2)
Xiaolin Chang
(1)
Xiaoting Lyu
(2)
XiaoXuan Bai
(1)
Xiaoyan Zhou
(1)
Xiaoyang Wang
(1)
Xihui Chen
(2)
Xing Liu
(1)
Xing Wang
(1)
Y. Thomas Hou
(1)
Yalun Wu
(1)
Yanfeng Shi
(1)
Yike Li
(1)
Ying Zhang
(1)
Yingxiao Xiang
(2)
Yinqi Yang
(1)
Yixiang Wang
(1)
Yongsheng Zhu
(2)
Yufei Han
(2)
Yunzhe Tian
(1)
Yurong Hao
(2)
Zhen Han
(1)
Zhiguo Wan
(1)
Zhize Li
(1)
Ziming Zhao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to