What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Haixin Duan
Google Scholar
76
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Invade the Walled Garden: Evaluating GTP Security in Cellular Networks.
Yiming Zhang
Tao Wan
Yaru Yang
Haixin Duan
Yichen Wang
Jianjun Chen
Zixiang Wei
Xiang Li
2025
conf/sp
Hey, Your Secrets Leaked! Detecting and Characterizing Secret Leakage in the Wild.
Jiawei Zhou
Zidong Zhang
Lingyun Ying
Huajun Chai
Jiuxin Cao
Haixin Duan
2025
conf/ndss
Automatic Insecurity: Exploring Email Auto-configuration in the Wild.
Shushang Wen
Yiming Zhang
Yuxiang Shen
Bingyu Li
Haixin Duan
Jingqiang Lin
2025
conf/ndss
HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists.
Ruixuan Li
Chaoyi Lu
Baojun Liu
Yunyi Zhang
Geng Hong
Haixin Duan
Yanzhong Lin
Qingfeng Pan
Min Yang
Jun Shao
2025
conf/ndss
Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration.
Mengying Wu
Geng Hong
Jinsong Chen
Qi Liu
Shujun Tang
Youhao Li
Baojun Liu
Haixin Duan
Min Yang
2025
conf/ndss
Cross-Origin Web Attacks via HTTP/2 Server Push and Signed HTTP Exchange.
Pinji Chen
Jianjun Chen
Mingming Zhang
Qi Wang
Yiming Zhang
Mingwei Xu
Haixin Duan
2025
conf/dsn
Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting Providers.
Qihang Peng
Mingming Zhang
Deliang Chang
Jia Zhang
Baojun Liu
Haixin Duan
2025
conf/eurosp
The Danger of Packet Length Leakage: Off-path TCP/IP Hijacking Attacks Against Wireless and Mobile Networks.
Guancheng Li
Minghao Zhang
Jianjun Chen
Ge Dai
Pinji Chen
Huiming Liu
Yang Yu
Haixin Duan
Zhiyun Qian
2025
conf/esorics
Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings.
Bingyang Guo
Mingxuan Liu
Yihui Ma
Ruixuan Li
Fan Shi
Min Zhang
Baojun Liu
Chengxi Xu
Haixin Duan
Geng Hong
Min Yang
Qingfeng Pan
2025
conf/uss
Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification.
Jinsong Chen
Mengying Wu
Geng Hong
Baichao An
Mingxuan Liu
Lei Zhang
Baojun Liu
Haixin Duan
Min Yang
2025
conf/uss
NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines.
Mingxuan Liu
Yunyi Zhang
Lijie Wu
Baojun Liu
Geng Hong
Yiming Zhang
Hui Jiang
Jia Zhang
Haixin Duan
Min Zhang
Wei Guan
Fan Shi
Min Yang
2025
conf/uss
My ZIP isn't your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers.
Yufan You
Jianjun Chen
Qi Wang
Haixin Duan
2025
conf/uss
Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability.
Chuhan Wang
Chenkai Wang
Songyi Yang
Sophia Liu
Jianjun Chen
Haixin Duan
Gang Wang
2025
conf/uss
Misty Registry: An Empirical Study of Flawed Domain Registry Operation.
Mingming Zhang
Yunyi Zhang
Baojun Liu
Haixin Duan
Min Zhang
Fan Shi
Chengxi Xu
2025
conf/uss
The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing.
Keran Mu
Jianjun Chen
Jianwei Zhuge
Qi Li
Haixin Duan
Nick Feamster
2024
conf/ccs
Internet's Invisible Enemy: Detecting and Measuring Web Cache Poisoning in the Wild.
Yuejia Liang
Jianjun Chen
Run Guo
Kaiwen Shen
Hui Jiang
Man Hou
Yue Yu
Haixin Duan
2024
conf/ccs
Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors.
Jiahe Zhang
Jianjun Chen
Qi Wang
Hangyu Zhang
Chuhan Wang
Jianwei Zhuge
Haixin Duan
2024
conf/ccs
Toward Understanding the Security of Plugins in Continuous Integration Services.
Xiaofan Li
Yacong Gu
Chu Qiao
Zhenkai Zhang
Daiping Liu
Lingyun Ying
Haixin Duan
Xing Gao
2024
conf/ccs
PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts.
Ruijie Li
Chenyang Zhang
Huajun Chai
Lingyun Ying
Haixin Duan
Jun Tao
2024
conf/ccs
MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs.
Zidong Zhang
Qinsheng Hou
Lingyun Ying
Wenrui Diao
Yacong Gu
Rui Li
Shanqing Guo
Haixin Duan
2024
conf/uss
Rethinking the Security Threats of Stale DNS Glue Records.
Yunyi Zhang
Baojun Liu
Haixin Duan
Min Zhang
Xiang Li
Fan Shi
Chengxi Xu
Eihal Alowaisheq
2024
conf/uss
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing.
Qifan Zhang
Xuesong Bai
Xiang Li
Haixin Duan
Qi Li
Zhou Li
2024
conf/uss
Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure.
Yunyi Zhang
Mingming Zhang
Baojun Liu
Zhan Liu
Jia Zhang
Haixin Duan
Min Zhang
Fan Shi
Chengxi Xu
2024
conf/uss
Tickets or Privacy? Understand the Ecosystem of Chinese Ticket Grabbing Apps.
Yijing Liu
Yiming Zhang
Baojun Liu
Haixin Duan
Qiang Li
Mingxuan Liu
Ruixuan Li
Jia Yao
2024
conf/uss
Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO.
Yunyi Zhang
Mingxuan Liu
Baojun Liu
Yiming Zhang
Haixin Duan
Min Zhang
Hui Jiang
Yanzhe Li
Fan Shi
2024
conf/sp
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications.
Enze Wang
Jianjun Chen
Wei Xie
Chuhan Wang
Yifei Gao
Zhenhua Wang
Haixin Duan
Yang Liu
Baosheng Wang
2024
conf/sp
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services.
Yacong Gu
Lingyun Ying
Huajun Chai
Yingyuan Pu
Haixin Duan
Xing Gao
2024
conf/sp
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
Xiang Li
Wei Xu
Baojun Liu
Mingming Zhang
Zhou Li
Jia Zhang
Deliang Chang
Xiaofeng Zheng
Chuhan Wang
Jianjun Chen
Haixin Duan
Qi Li
2024
conf/sp
DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses.
Xiang Li
Dashuai Wu
Haixin Duan
Qi Li
2024
conf/sp
Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.
Qi Wang
Jianjun Chen
Zheyu Jiang
Run Guo
Ximeng Liu
Chao Zhang
Haixin Duan
2024
conf/ndss
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet.
Chuhan Wang
Yasuhiro Kuranaga
Yihang Wang
Mingming Zhang
Linkai Zheng
Xiang Li
Jianjun Chen
Haixin Duan
Yanzhong Lin
Qingfeng Pan
2024
conf/ndss
Understanding the Implementation and Security Implications of Protective DNS Services.
Mingxuan Liu
Yiming Zhang
Xiang Li
Chaoyi Lu
Baojun Liu
Haixin Duan
Xiaofeng Zheng
2024
conf/ndss
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing.
Linkai Zheng
Xiang Li
Chuhan Wang
Run Guo
Haixin Duan
Jianjun Chen
Chao Zhang
Kaiwen Shen
2024
conf/dsn
ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name Abuse.
Mingxuan Liu
Zhenglong Jin
Jiahai Yang
Baoiun Liu
Haixin Duan
Ying Liu
Ximeng Liu
Shujun Tang
2024
conf/acsac
Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks.
Yu Bi
Mingshuo Yang
Yong Fang
Xianghang Mi
Shanqing Guo
Shujun Tang
Haixin Duan
2024
conf/wisec
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services.
Yaru Yang
Yiming Zhang
Tao Wan
Chuhan Wang
Haixin Duan
Jianjun Chen
Yishen Li
2023
conf/ccs
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.
Wei Xu
Xiang Li
Chaoyi Lu
Baojun Liu
Haixin Duan
Jia Zhang
Jianjun Chen
Tao Wan
2023
conf/ccs
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers.
Fenglu Zhang
Baojun Liu
Eihal Alowaisheq
Jianjun Chen
Chaoyi Lu
Linjian Song
Yong Ma
Ying Liu
Haixin Duan
Min Yang
2023
conf/ccs
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
Zhenrui Zhang
Geng Hong
Xiang Li
Zhuoqun Fu
Jia Zhang
Mingxuan Liu
Chuhan Wang
Jianjun Chen
Baojun Liu
Haixin Duan
Chao Zhang
Min Yang
2023
conf/ccs
Stolen Risks of Models with Security Properties.
Yue Qin
Zhuoqun Fu
Chuyun Deng
Xiaojing Liao
Jia Zhang
Haixin Duan
2023
conf/uss
The Maginot Line: Attacking the Boundary of DNS Caching Protection.
Xiang Li
Chaoyi Lu
Baojun Liu
Qifan Zhang
Zhou Li
Haixin Duan
Qi Li
2023
conf/uss
Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack.
Run Guo
Jianjun Chen
Yihang Wang
Keran Mu
Baojun Liu
Xiang Li
Chao Zhang
Haixin Duan
Jianping Wu
2023
conf/uss
MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries.
Xingman Chen
Yinghao Shi
Zheyu Jiang
Yuan Li
Ruoyu Wang
Haixin Duan
Haoyu Wang
Chao Zhang
2023
conf/sp
Continuous Intrusion: Characterizing the Security of Continuous Integration Services.
Yacong Gu
Lingyun Ying
Huajun Chai
Chu Qiao
Haixin Duan
Xing Gao
2023
conf/sp
Investigating Package Related Security Threats in Software Registries.
Yacong Gu
Lingyun Ying
Yingyuan Pu
Xiao Hu
Huajun Chai
Ruimin Wang
Xing Gao
Haixin Duan
2023
conf/ndss
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.
Zihao Jin
Shuo Chen
Yang Chen
Haixin Duan
Jianjun Chen
Jianping Wu
2023
conf/ndss
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation.
Xiang Li
Baojun Liu
Xuesong Bai
Mingming Zhang
Qifan Zhang
Zhou Li
Haixin Duan
Qi Li
2022
conf/ccs
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.
Libo Chen
Quanpu Cai
Zhenbang Ma
Yanhao Wang
Hong Hu
Minghang Shen
Yue Liu
Shanqing Guo
Haixin Duan
Kaida Jiang
Zhi Xue
2022
conf/ccs
An Extensive Study of Residential Proxies in China.
Mingshuo Yang
Yunnan Yu
Xianghang Mi
Shujun Tang
Shanqing Guo
Yilin Li
Xiaofeng Zheng
Haixin Duan
2022
conf/uss
Building an Open, Robust, and Stable Voting-Based Domain Top List.
Qinge Xie
Shujun Tang
Xiaofeng Zheng
Qingran Lin
Baojun Liu
Haixin Duan
Frank Li
2022
conf/uss
A Large-scale and Longitudinal Measurement Study of DKIM Deployment.
Chuhan Wang
Kaiwen Shen
Minglei Guo
Yuxuan Zhao
Mingming Zhang
Jianjun Chen
Baojun Liu
Xiaofeng Zheng
Haixin Duan
Yanzhong Lin
Qingfeng Pan
2022
conf/sp
Analyzing Ground-Truth Data of Mobile Gambling Scams.
Geng Hong
Zhemin Yang
Sen Yang
Xiaojing Liao
Xiaolin Du
Min Yang
Haixin Duan
2022
conf/sp
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.
Zihao Jin
Ziqiao Kong
Shuo Chen
Haixin Duan
2022
conf/sp
Exploit the Last Straw That Breaks Android Systems.
Lei Zhang
Keke Lian
Haoyu Xiao
Zhibo Zhang
Peng Liu
Yuan Zhang
Min Yang
Haixin Duan
2022
conf/eurosp
Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers.
Huikai Xu
Miao Yu
Yanhao Wang
Yue Liu
Qinsheng Hou
Zhenbang Ma
Haixin Duan
Jianwei Zhuge
Baojun Liu
2022
conf/eurosp
Ethics in Security Research: Visions, Reality, and Paths Forward.
Yiming Zhang
Mingxuan Liu
Mingming Zhang
Chaoyi Lu
Haixin Duan
2022
conf/esorics
Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names.
Mingxuan Liu
Yiming Zhang
Baojun Liu
Haixin Duan
2022
conf/ndss
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Xuewei Feng
Qi Li
Kun Sun
Ke Xu
Baojun Liu
Xiaofeng Zheng
Qiushi Yang
Haixin Duan
Zhiyun Qian
2022
conf/dsn
HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations.
Kaiwen Shen
Jianyu Lu
Yaru Yang
Jianjun Chen
Mingming Zhang
Haixin Duan
Jia Zhang
Xiaofeng Zheng
2022
conf/dsn
Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts.
Huajun Chai
Lingyun Ying
Haixin Duan
Daren Zha
2022
conf/wisec
Measuring the Deployment of 5G Security Enhancement.
Shiyue Nie
Yiming Zhang
Tao Wan
Haixin Duan
Song Li
2021
conf/ccs
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem.
Yiming Zhang
Baojun Liu
Chaoyi Lu
Zhou Li
Haixin Duan
Jiachen Li
Zaifeng Zhang
2021
conf/uss
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems.
Libo Chen
Yanhao Wang
Quanpu Cai
Yunfan Zhan
Hong Hu
Jiaqi Linghu
Qinsheng Hou
Chao Zhang
Haixin Duan
Zhi Xue
2021
conf/uss
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Kaiwen Shen
Chuhan Wang
Minglei Guo
Xiaofeng Zheng
Chaoyi Lu
Baojun Liu
Yuxuan Zhao
Shuang Hao
Haixin Duan
Qingfeng Pan
Min Yang
2021
conf/esorics
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO.
Hao Yang
Kun Du
Yubao Zhang
Shuai Hao
Haining Wang
Jia Zhang
Haixin Duan
2021
conf/ndss
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Chaoyi Lu
Baojun Liu
Yiming Zhang
Zhou Li
Fenglu Zhang
Haixin Duan
Ying Liu
Joann Qiongna Chen
Jinjin Liang
Zaifeng Zhang
Shuang Hao
Min Yang
2021
conf/dsn
Fast IPv6 Network Periphery Discovery and Security Implications.
Xiang Li
Baojun Liu
Xiaofeng Zheng
Haixin Duan
Qi Li
Youjun Huang
2021
conf/acsac
Detecting and Characterizing SMS Spearphishing Attacks.
Mingxuan Liu
Yiming Zhang
Baojun Liu
Zhou Li
Haixin Duan
Donghong Sun
2020
conf/ccs
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels.
Keyu Man
Zhiyun Qian
Zhongjie Wang
Xiaofeng Zheng
Youjun Huang
Haixin Duan
2020
conf/ccs
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Mingming Zhang
Xiaofeng Zheng
Kaiwen Shen
Ziqiao Kong
Chaoyi Lu
Yu Wang
Haixin Duan
Shuang Hao
Baojun Liu
Min Yang
2020
conf/ccs
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China.
Yiming Zhang
Baojun Liu
Chaoyi Lu
Zhou Li
Haixin Duan
Shuang Hao
Mingxuan Liu
Ying Liu
Dong Wang
Qiang Li
2020
conf/uss
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Xiaofeng Zheng
Chaoyi Lu
Jian Peng
Qiushi Yang
Dongjie Zhou
Baojun Liu
Keyu Man
Shuang Hao
Haixin Duan
Zhiyun Qian
2020
conf/sp
TextExerciser: Feedback-driven Text Input Exercising for Android Applications.
Yuyu He
Lei Zhang
Zhemin Yang
Yinzhi Cao
Keke Lian
Shuai Li
Wei Yang
Zhibo Zhang
Min Yang
Yuan Zhang
Haixin Duan
2020
conf/ndss
CDN Judo: Breaking the CDN DoS Protection with Itself.
Run Guo
Weizhong Li
Baojun Liu
Shuang Hao
Jia Zhang
Haixin Duan
Kaiwen Sheng
Jianjun Chen
Ying Liu
2020
conf/dsn
CDN Backfired: Amplification Attacks Based on HTTP Range Requests.
Weizhong Li
Kaiwen Shen
Run Guo
Baojun Liu
Jia Zhang
Haixin Duan
Shuang Hao
Xiarun Chen
Yao Wang
2020
conf/acsac
Understanding Promotion-as-a-Service on GitHub.
Kun Du
Hao Yang
Yubao Zhang
Haixin Duan
Haining Wang
Shuang Hao
Zhou Li
Min Yang
Coauthors
Baichao An
(1)
Baoiun Liu
(1)
Baojun Liu
(34)
Baosheng Wang
(1)
Bingyang Guo
(1)
Bingyu Li
(1)
Chao Zhang
(6)
Chaoyi Lu
(12)
Chengxi Xu
(4)
Chenkai Wang
(1)
Chenyang Zhang
(1)
Chu Qiao
(2)
Chuhan Wang
(10)
Chuyun Deng
(1)
Daiping Liu
(1)
Daren Zha
(1)
Dashuai Wu
(1)
Deliang Chang
(2)
Dong Wang
(1)
Donghong Sun
(1)
Dongjie Zhou
(1)
Eihal Alowaisheq
(2)
Enze Wang
(1)
Fan Shi
(3)
Fan Shi
(3)
Fenglu Zhang
(2)
Frank Li
(1)
Gang Wang
(1)
Ge Dai
(1)
Geng Hong
(7)
Guancheng Li
(1)
Haining Wang
(2)
Haixin Duan
(76)
Hangyu Zhang
(1)
Hao Yang
(2)
Haoyu Wang
(1)
Haoyu Xiao
(1)
Hong Hu
(2)
Huajun Chai
(6)
Hui Jiang
(3)
Huikai Xu
(1)
Huiming Liu
(1)
Jia Yao
(1)
Jia Zhang
(11)
Jiachen Li
(1)
Jiahai Yang
(1)
Jiahe Zhang
(1)
Jian Peng
(1)
Jianjun Chen
(22)
Jianping Wu
(2)
Jianwei Zhuge
(3)
Jianyu Lu
(1)
Jiaqi Linghu
(1)
Jiawei Zhou
(1)
Jingqiang Lin
(1)
Jinjin Liang
(1)
Jinsong Chen
(2)
Jiuxin Cao
(1)
Joann Qiongna Chen
(1)
Jun Shao
(1)
Jun Tao
(1)
Kaida Jiang
(1)
Kaiwen Shen
(7)
Kaiwen Sheng
(1)
Ke Xu
(1)
Keke Lian
(2)
Keran Mu
(2)
Keyu Man
(2)
Kun Du
(2)
Kun Sun
(1)
Lei Zhang
(3)
Libo Chen
(2)
Lijie Wu
(1)
Lingyun Ying
(8)
Linjian Song
(1)
Linkai Zheng
(2)
Man Hou
(1)
Mengying Wu
(2)
Miao Yu
(1)
Min Yang
(14)
Min Zhang
(3)
Min Zhang
(3)
Minghang Shen
(1)
Minghao Zhang
(1)
Minglei Guo
(2)
Mingming Zhang
(11)
Mingshuo Yang
(2)
Mingwei Xu
(1)
Mingxuan Liu
(12)
Nick Feamster
(1)
Peng Liu
(1)
Pinji Chen
(2)
Qi Li
(8)
Qi Liu
(1)
Qi Wang
(3)
Qi Wang
(1)
Qiang Li
(2)
Qifan Zhang
(3)
Qihang Peng
(1)
Qinge Xie
(1)
Qingfeng Pan
(5)
Qingran Lin
(1)
Qinsheng Hou
(3)
Qiushi Yang
(2)
Quanpu Cai
(2)
Rui Li
(1)
Ruijie Li
(1)
Ruimin Wang
(1)
Ruixuan Li
(3)
Run Guo
(6)
Ruoyu Wang
(1)
Sen Yang
(1)
Shanqing Guo
(4)
Shiyue Nie
(1)
Shuai Hao
(1)
Shuai Li
(1)
Shuang Hao
(8)
Shujun Tang
(5)
Shuo Chen
(2)
Shushang Wen
(1)
Song Li
(1)
Songyi Yang
(1)
Sophia Liu
(1)
Tao Wan
(4)
Wei Guan
(1)
Wei Xie
(1)
Wei Xu
(2)
Wei Yang
(1)
Weizhong Li
(2)
Wenrui Diao
(1)
Xiang Li
(14)
Xianghang Mi
(2)
Xiao Hu
(1)
Xiaofan Li
(1)
Xiaofeng Zheng
(12)
Xiaojing Liao
(2)
Xiaolin Du
(1)
Xiarun Chen
(1)
Ximeng Liu
(2)
Xing Gao
(4)
Xingman Chen
(1)
Xuesong Bai
(2)
Xuewei Feng
(1)
Yacong Gu
(5)
Yang Chen
(1)
Yang Liu
(1)
Yang Yu
(1)
Yanhao Wang
(3)
Yanzhe Li
(1)
Yanzhong Lin
(3)
Yao Wang
(1)
Yaru Yang
(3)
Yasuhiro Kuranaga
(1)
Yichen Wang
(1)
Yifei Gao
(1)
Yihang Wang
(2)
Yihui Ma
(1)
Yijing Liu
(1)
Yilin Li
(1)
Yiming Zhang
(15)
Ying Liu
(5)
Yinghao Shi
(1)
Yingyuan Pu
(2)
Yinzhi Cao
(1)
Yishen Li
(1)
Yong Fang
(1)
Yong Ma
(1)
Youhao Li
(1)
Youjun Huang
(2)
Yu Bi
(1)
Yu Wang
(1)
Yuan Li
(1)
Yuan Zhang
(2)
Yubao Zhang
(2)
Yue Liu
(2)
Yue Qin
(1)
Yue Yu
(1)
Yuejia Liang
(1)
Yufan You
(1)
Yunfan Zhan
(1)
Yunnan Yu
(1)
Yunyi Zhang
(6)
Yuxiang Shen
(1)
Yuxuan Zhao
(2)
Yuyu He
(1)
Zaifeng Zhang
(2)
Zhan Liu
(1)
Zhemin Yang
(2)
Zhenbang Ma
(2)
Zhenglong Jin
(1)
Zhenhua Wang
(1)
Zhenkai Zhang
(1)
Zhenrui Zhang
(1)
Zheyu Jiang
(2)
Zhi Xue
(2)
Zhibo Zhang
(2)
Zhiyun Qian
(4)
Zhongjie Wang
(1)
Zhou Li
(9)
Zhuoqun Fu
(2)
Zidong Zhang
(2)
Zihao Jin
(2)
Ziqiao Kong
(2)
Zixiang Wei
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to