What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Neil Zhenqiang Gong
Google Scholar
57
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
GRID: Protecting Training Graph from Link Stealing Attacks on GNN Models.
Jiadong Lou
Xu Yuan
Rui Zhang
Xingliang Yuan
Neil Zhenqiang Gong
Nian-Feng Tzeng
2025
conf/sp
DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks.
Yupei Liu
Yuqi Jia
Jinyuan Jia
Dawn Song
Neil Zhenqiang Gong
2025
conf/uss
Evaluating LLM-based Personal Information Extraction and Countermeasures.
Yupei Liu
Yuqi Jia
Jinyuan Jia
Neil Zhenqiang Gong
2024
journals/popets
Link Stealing Attacks Against Inductive Graph Neural Networks.
Yixin Wu
Xinlei He
Pascal Berrang
Mathias Humbert
Michael Backes
Neil Zhenqiang Gong
Yang Zhang
2024
conf/ccs
Optimization-based Prompt Injection Attack to LLM-as-a-Judge.
Jiawen Shi
Zenghui Yuan
Yinuo Liu
Yue Huang
Pan Zhou
Lichao Sun
Neil Zhenqiang Gong
2024
conf/ccs
A General Framework for Data-Use Auditing of ML Models.
Zonghao Huang
Neil Zhenqiang Gong
Michael K. Reiter
2024
conf/uss
ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.
Minxue Tang
Anna Dai
Louis DiValentin
Aolin Ding
Amin Hass
Neil Zhenqiang Gong
Yiran Chen
Hai (Helen) Li
2024
conf/uss
Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models.
Hongbin Liu
Michael K. Reiter
Neil Zhenqiang Gong
2024
conf/uss
Formalizing and Benchmarking Prompt Injection Attacks and Defenses.
Yupei Liu
Yuqi Jia
Runpeng Geng
Jinyuan Jia
Neil Zhenqiang Gong
2024
conf/sp
Pre-trained Encoders in Self-Supervised Learning Improve Secure and Privacy-preserving Supervised Learning.
Hongbin Liu
Wenjie Qu
Jinyuan Jia
Neil Zhenqiang Gong
2023
journals/compsec
Generation-based fuzzing? Don't build a new generator, reuse!
Chengbin Pang
Hongbin Liu
Yifan Wang
Neil Zhenqiang Gong
Bing Mao
Jun Xu
2023
conf/ccs
Evading Watermark based Detection of AI-Generated Content.
Zhengyuan Jiang
Jinghuai Zhang
Neil Zhenqiang Gong
2023
conf/uss
PORE: Provably Robust Recommender Systems against Data Poisoning Attacks.
Jinyuan Jia
Yupei Liu
Yuepeng Hu
Neil Zhenqiang Gong
2023
conf/uss
PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation.
Yuchen Yang
Bo Hui
Haolin Yuan
Neil Zhenqiang Gong
Yinzhi Cao
2023
conf/uss
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation.
Xiaoguang Li
Ninghui Li
Wenhai Sun
Neil Zhenqiang Gong
Hui Li
2023
conf/sp
FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information.
Xiaoyu Cao
Jinyuan Jia
Zaixi Zhang
Neil Zhenqiang Gong
2023
conf/ndss
REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service.
Wenjie Qu
Jinyuan Jia
Neil Zhenqiang Gong
2023
conf/dsn
Fortifying Federated Learning against Membership Inference Attacks via Client-level Input Perturbation.
Yuchen Yang
Haolin Yuan
Bo Hui
Neil Zhenqiang Gong
Neil Fendley
Philippe Burlina
Yinzhi Cao
2022
journals/tifs
FLCert: Provably Secure Federated Learning Against Poisoning Attacks.
Xiaoyu Cao
Zaixi Zhang
Jinyuan Jia
Neil Zhenqiang Gong
2022
conf/ccs
StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning.
Yupei Liu
Jinyuan Jia
Hongbin Liu
Neil Zhenqiang Gong
2022
conf/uss
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.
Yongji Wu
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
2022
conf/uss
PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning.
Hongbin Liu
Jinyuan Jia
Neil Zhenqiang Gong
2022
conf/sp
BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.
Jinyuan Jia
Yupei Liu
Neil Zhenqiang Gong
2022
conf/asiaccs
Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures.
Da Zhong
Haipei Sun
Jun Xu
Neil Zhenqiang Gong
Wendy Hui Wang
2022
conf/asiaccs
GraphTrack: A Graph-based Cross-Device Tracking Framework.
Binghui Wang
Tianchen Zhou
Song Li
Yinzhi Cao
Neil Zhenqiang Gong
2022
conf/acsac
AFLGuard: Byzantine-robust Asynchronous Federated Learning.
Minghong Fang
Jia Liu
Neil Zhenqiang Gong
Elizabeth S. Bentley
2021
conf/ccs
EncoderMI: Membership Inference against Pre-trained Encoders in Contrastive Learning.
Hongbin Liu
Jinyuan Jia
Wenjie Qu
Neil Zhenqiang Gong
2021
conf/uss
Stealing Links from Graph Neural Networks.
Xinlei He
Jinyuan Jia
Michael Backes
Neil Zhenqiang Gong
Yang Zhang
2021
conf/uss
Data Poisoning Attacks to Local Differential Privacy Protocols.
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
2021
conf/asiaccs
Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes.
Jinyuan Jia
Binghui Wang
Neil Zhenqiang Gong
2021
conf/asiaccs
IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary.
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
2021
conf/ndss
FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping.
Xiaoyu Cao
Minghong Fang
Jia Liu
Neil Zhenqiang Gong
2021
conf/ndss
Data Poisoning Attacks to Deep Learning Based Recommender Systems.
Hai Huang
Jiaming Mu
Neil Zhenqiang Gong
Qi Li
Bin Liu
Mingwei Xu
2021
conf/ndss
Practical Blind Membership Inference Attack via Differential Comparisons.
Bo Hui
Yuchen Yang
Haolin Yuan
Philippe Burlina
Neil Zhenqiang Gong
Yinzhi Cao
2021
conf/acsac
On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks.
Zijie Yang
Binghui Wang
Haoran Li
Dong Yuan
Zhuotao Liu
Neil Zhenqiang Gong
Chang Liu
Qi Li
Xiao Liang
Shaofeng Hu
2020
conf/uss
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.
Minghong Fang
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
2019
conf/ccs
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
Jinyuan Jia
Ahmed Salem
Michael Backes
Yang Zhang
Neil Zhenqiang Gong
2019
conf/ccs
Attacking Graph-based Classification via Manipulating the Graph Structure.
Binghui Wang
Neil Zhenqiang Gong
2019
conf/ccs
Detecting Fake Accounts in Online Social Networks at the Time of Registrations.
Dong Yuan
Yuanli Miao
Neil Zhenqiang Gong
Zheng Yang
Qi Li
Dawn Song
Qian Wang
Xiao Liang
2019
conf/ndss
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation.
Binghui Wang
Jinyuan Jia
Neil Zhenqiang Gong
2018
conf/ccs
EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis.
Chris Chao-Chun Cheng
Chen Shi
Neil Zhenqiang Gong
Yong Guan
2018
conf/uss
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.
Jinyuan Jia
Neil Zhenqiang Gong
2018
conf/sp
A Dynamic Taint Analysis Tool for Android App Forensics.
Zhen Xu
Chen Shi
Chris Chao-Chun Cheng
Neil Zhenqiang Gong
Yong Guan
2018
conf/sp
Stealing Hyperparameters in Machine Learning.
Binghui Wang
Neil Zhenqiang Gong
2018
conf/cns
SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection.
Peng Gao
Binghui Wang
Neil Zhenqiang Gong
Sanjeev R. Kulkarni
Kurt Thomas
Prateek Mittal
2018
conf/acsac
Poisoning Attacks to Graph-Based Recommender Systems.
Minghong Fang
Guolei Yang
Neil Zhenqiang Gong
Jia Liu
2017
conf/ndss
Fake Co-visitation Injection Attacks to Recommender Systems.
Guolei Yang
Neil Zhenqiang Gong
Ying Cai
2017
conf/dsn
Random Walk Based Fake Account Detection in Online Social Networks.
Jinyuan Jia
Binghui Wang
Neil Zhenqiang Gong
2017
conf/acsac
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification.
Xiaoyu Cao
Neil Zhenqiang Gong
2016
journals/tifs
Seed-Based De-Anonymizability Quantification of Social Networks.
Shouling Ji
Weiqing Li
Neil Zhenqiang Gong
Prateek Mittal
Raheem A. Beyah
2016
conf/ccs
Forgery-Resistant Touch-based Authentication on Mobile Devices.
Neil Zhenqiang Gong
Mathias Payer
Reza Moazzezi
Mario Frank
2016
conf/uss
You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors.
Neil Zhenqiang Gong
Bin Liu
2015
journals/tifs
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications.
Mathias Payer
Ling Huang
Neil Zhenqiang Gong
Kevin Borgolte
Mario Frank
2015
conf/ndss
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
Shouling Ji
Weiqing Li
Neil Zhenqiang Gong
Prateek Mittal
Raheem A. Beyah
2014
journals/tifs
On the Security of Trustee-Based Social Authentications.
Neil Zhenqiang Gong
Di Wang
2014
journals/tifs
SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection.
Neil Zhenqiang Gong
Mario Frank
Prateek Mittal
2012
conf/sp
On the Feasibility of Internet-Scale Author Identification.
Arvind Narayanan
Hristo S. Paskov
Neil Zhenqiang Gong
John Bethencourt
Emil Stefanov
Eui Chul Richard Shin
Dawn Song
Coauthors
Ahmed Salem
(1)
Amin Hass
(1)
Anna Dai
(1)
Aolin Ding
(1)
Arvind Narayanan
(1)
Bin Liu
(2)
Bing Mao
(1)
Binghui Wang
(8)
Bo Hui
(3)
Chang Liu
(1)
Chen Shi
(2)
Chengbin Pang
(1)
Chris Chao-Chun Cheng
(2)
Da Zhong
(1)
Dawn Song
(3)
Di Wang
(1)
Dong Yuan
(2)
Elizabeth S. Bentley
(1)
Emil Stefanov
(1)
Eui Chul Richard Shin
(1)
Guolei Yang
(2)
Hai (Helen) Li
(1)
Hai Huang
(1)
Haipei Sun
(1)
Haolin Yuan
(3)
Haoran Li
(1)
Hongbin Liu
(6)
Hristo S. Paskov
(1)
Hui Li
(1)
Jia Liu
(3)
Jiadong Lou
(1)
Jiaming Mu
(1)
Jiawen Shi
(1)
Jinghuai Zhang
(1)
Jinyuan Jia
(22)
John Bethencourt
(1)
Jun Xu
(2)
Kevin Borgolte
(1)
Kurt Thomas
(1)
Lichao Sun
(1)
Ling Huang
(1)
Louis DiValentin
(1)
Mario Frank
(3)
Mathias Humbert
(1)
Mathias Payer
(2)
Michael Backes
(3)
Michael K. Reiter
(2)
Minghong Fang
(4)
Mingwei Xu
(1)
Minxue Tang
(1)
Neil Fendley
(1)
Neil Zhenqiang Gong
(57)
Nian-Feng Tzeng
(1)
Ninghui Li
(1)
Pan Zhou
(1)
Pascal Berrang
(1)
Peng Gao
(1)
Philippe Burlina
(2)
Prateek Mittal
(4)
Qi Li
(3)
Qian Wang
(1)
Raheem A. Beyah
(2)
Reza Moazzezi
(1)
Rui Zhang
(1)
Runpeng Geng
(1)
Sanjeev R. Kulkarni
(1)
Shaofeng Hu
(1)
Shouling Ji
(2)
Song Li
(1)
Tianchen Zhou
(1)
Weiqing Li
(2)
Wendy Hui Wang
(1)
Wenhai Sun
(1)
Wenjie Qu
(3)
Xiao Liang
(2)
Xiaoguang Li
(1)
Xiaoyu Cao
(8)
Xingliang Yuan
(1)
Xinlei He
(2)
Xu Yuan
(1)
Yang Zhang
(3)
Yifan Wang
(1)
Ying Cai
(1)
Yinuo Liu
(1)
Yinzhi Cao
(4)
Yiran Chen
(1)
Yixin Wu
(1)
Yong Guan
(2)
Yongji Wu
(1)
Yuanli Miao
(1)
Yuchen Yang
(3)
Yue Huang
(1)
Yuepeng Hu
(1)
Yupei Liu
(6)
Yuqi Jia
(3)
Zaixi Zhang
(2)
Zenghui Yuan
(1)
Zhen Xu
(1)
Zheng Yang
(1)
Zhengyuan Jiang
(1)
Zhuotao Liu
(1)
Zijie Yang
(1)
Zonghao Huang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to