


Остановите войну!
for scientists:


default search action
Qian Wang 0002
Person information

- affiliation: Wuhan University, School of Cyber Science and Engineering, Hubei, China
- affiliation: Wuhan University, State Key Laboratory of Software Engineering, School of Computer Science, China
- affiliation (former): Illinois Institute of Technology, Department of Electrical and Computer Engineering, Chicago, IL, USA
Other persons with the same name
- Qian Wang — disambiguation page
- Qian Wang 0001
— Shanghai Jiao Tong University, Med-X Research Institute, School of Biomedical Engineering, China (and 1 more)
- Qian Wang 0003
— Texas A&M University, Department of Electrical and Computer Engineering, College Station, TX, USA
- Qian Wang 0004
— University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China
- Qian Wang 0005
— Xi'an Jiaotong University, School of Mathematics and Statistics, China
- Qian Wang 0006
— University of South Carolina, Department of Chemistry and Biochemistry, Columbia, SC, USA
- Qian Wang 0007
— The Hong Kong University of Science and Technology, Department of Civil and Environmental Engineering, Hong Kong (and 1 more)
- Qian Wang 0008
— University of Alberta, Edmonton, AB, Canada
- Qian Wang 0009
— Yanshan University, College of Information Science and Engineering, Qianhuangdao, China (and 2 more)
- Qian Wang 0010
— Clemson University, International Center for Automotive Research, Applied Dynamics and Control Group, Greenville, SC, USA
- Qian Wang 0011 — Southeast University, School of Computer Science and Engineering, MOE, Key Laboratory of Computer Network and Information Integration, Nanjing, China
- Qian Wang 0012
— Hangzhou Dianzi University, Institute of Information and Control, China (and 1 more)
- Qian Wang 0013
— Information Science and Technology Institute, Zhengzhou, China
- Qian Wang 0014
— Zhongnan University of Economics and Law, School of Information and Safety Engineering, Wuhan, China (and 2 more)
- Qian Wang 0015
— Beijing University of Posts and Telecommunications, Network Management Center, China
- Qian Wang 0016
— Aalborg University, Department of Energy Technology, Denmark (and 1 more)
- Qian Wang 0017
— Durham University, UK (and 1 more)
- Qian Wang 0018 — University of Bath, Department of Mechanical Engineering, UK (and 1 more)
- Qian Wang 0019
— Xi'an University of Posts and Telecommunications, School of Telecommunication and Information Engineering, China (and 3 more)
- Qian Wang 0020 — Harbin Institute of Technology, School of Mechatronics Engineering, China
- Qian Wang 0021
— EPFL, Computational Mathematics and Simulation Science, Lausanne, Switzerland (and 1 more)
- Qian Wang 0022
— University of Maryland, College Park, USA (and 1 more)
- Qian Wang 0023 — Zhengzhou University of Light Industry, Zhengzhou, China
- Qian Wang 0024 — University of Texas at Dallas, Department of Computer Science, Richardson, TX, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j126]Yanling Wang
, Qian Wang
, Lingchen Zhao, Cong Wang:
Differential privacy in deep learning: Privacy and beyond. Future Gener. Comput. Syst. 148: 408-424 (2023) - [j125]Buyun Liang, Zhongyuan Wang, Baojin Huang, Qin Zou, Qian Wang, Jingjing Liang:
Depth map guided triplet network for deepfake face detection. Neural Networks 159: 34-42 (2023) - [j124]Dongheng Zhang
, Jia Meng, Jian Zhang, Xinzhe Deng, Shouhong Ding, Man Zhou, Qian Wang
, Qi Li
, Yan Chen
:
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices. IEEE Trans. Circuits Syst. Video Technol. 33(8): 4401-4414 (2023) - [j123]Huayi Duan
, Yuefeng Du
, Leqian Zheng
, Cong Wang
, Man Ho Au
, Qian Wang
:
Towards Practical Auditing of Dynamic Data in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 20(1): 708-723 (2023) - [j122]Man Zhou
, Qian Wang
, Xiu Lin, Yi Zhao
, Peipei Jiang
, Qi Li
, Chao Shen
, Cong Wang
:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. IEEE Trans. Dependable Secur. Comput. 20(2): 1228-1242 (2023) - [j121]Dan Liu, Qian Wang
, Man Zhou
, Peipei Jiang
, Qi Li
, Chao Shen
, Cong Wang
:
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals. IEEE Trans. Dependable Secur. Comput. 20(2): 1687-1701 (2023) - [j120]Peipei Jiang
, Qian Wang
, Xiu Lin, Man Zhou
, Wenbing Ding, Cong Wang
, Chao Shen
, Qi Li
:
Securing Liveness Detection for Voice Authentication via Pop Noises. IEEE Trans. Dependable Secur. Comput. 20(2): 1702-1718 (2023) - [j119]Chenhao Lin
, Jingyi He
, Chao Shen
, Qi Li
, Qian Wang
:
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics. IEEE Trans. Dependable Secur. Comput. 20(3): 2314-2327 (2023) - [j118]Yuefeng Du
, Huayi Duan
, Lei Xu
, Helei Cui
, Cong Wang
, Qian Wang
:
${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services. IEEE Trans. Dependable Secur. Comput. 20(5): 4343-4358 (2023) - [j117]Zhuangzhuang Zhang
, Libing Wu, Chuanguo Ma, Jianxin Li
, Jing Wang, Qian Wang
, Shui Yu
:
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing. IEEE Trans. Inf. Forensics Secur. 18: 365-379 (2023) - [j116]Zheng Zheng
, Qian Wang
, Cong Wang
, Man Zhou, Yi Zhao
, Qi Li
, Chao Shen
:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. IEEE Trans. Inf. Forensics Secur. 18: 1295-1308 (2023) - [j115]Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Qian Wang
, Cong Wang
:
MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs. IEEE Trans. Inf. Forensics Secur. 18: 2929-2944 (2023) - [j114]Yunjie Ge
, Lingchen Zhao
, Qian Wang
, Yiheng Duan, Minxin Du
:
AdvDDoS: Zero-Query Adversarial Attacks Against Commercial Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 18: 3647-3661 (2023) - [j113]Xueluan Gong
, Ziyao Wang, Shuaike Li
, Yanjiao Chen
, Qian Wang
:
A GAN-Based Defense Framework Against Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 18: 4475-4487 (2023) - [j112]Zhibo Wang
, Jingxin Li, Jiahui Hu
, Ju Ren
, Qian Wang
, Zhetao Li
, Yanjun Li
:
Towards Privacy-Driven Truthful Incentives for Mobile Crowdsensing Under Untrusted Platform. IEEE Trans. Mob. Comput. 22(2): 1198-1212 (2023) - [j111]Xueluan Gong
, Yanjiao Chen, Qian Wang, Weihan Kong:
Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions. IEEE Wirel. Commun. 30(2): 114-121 (2023) - [c83]Baojin Huang, Zhongyuan Wang, Jifan Yang, Jiaxin Ai, Qin Zou, Qian Wang, Dengpan Ye:
Implicit Identity Driven Deepfake Face Swapping Detection. CVPR 2023: 4490-4499 - [c82]Peipei Jiang, Qian Wang, Jianhao Cheng, Cong Wang, Lei Xu, Xinyu Wang, Yihao Wu, Xiaoyuan Li, Kui Ren:
Boomerang: Metadata-Private Messaging under Hardware Trust. NSDI 2023: 877-899 - [c81]Yanling Wang
, Yuchen Liu
, Qian Wang
, Cong Wang
, Chenliang Li
:
Poisoning Self-supervised Learning Based Sequential Recommendations. SIGIR 2023: 300-310 - [c80]Yu Tian
, Bofang Li
, Si Chen
, Xubin Li
, Hongbo Deng
, Jian Xu
, Bo Zheng
, Qian Wang
, Chenliang Li
:
Multi-Scenario Ranking with Adaptive Feature Learning. SIGIR 2023: 517-526 - [c79]Xueluan Gong, Yanjiao Chen, Wang Yang, Qian Wang, Yuzhe Gu, Huayang Huang, Chao Shen:
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation. SP 2023: 755-772 - [c78]Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao:
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. USENIX Security Symposium 2023 - [c77]Xueluan Gong
, Ziyao Wang
, Yanjiao Chen
, Qian Wang
, Cong Wang
, Chao Shen
:
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples. WWW 2023: 2045-2053 - [i33]Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin:
Downstream-agnostic Adversarial Examples. CoRR abs/2307.12280 (2023) - 2022
- [j110]Xueluan Gong
, Yanjiao Chen, Qian Wang, Meng Wang, Shuyang Li:
Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions. IEEE Commun. Mag. 60(9): 46-52 (2022) - [j109]Jie Sun
, Lingchen Zhao, Zhuotao Liu, Qi Li, Xinhao Deng, Qian Wang
, Yong Jiang:
Practical differentially private online advertising. Comput. Secur. 112: 102504 (2022) - [j108]Xueluan Gong
, Yanjiao Chen, Huayang Huang, Yuqing Liao, Shuai Wang, Qian Wang:
Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers. IEEE Netw. 36(1): 84-90 (2022) - [j107]Minghui Li
, Sherman S. M. Chow
, Shengshan Hu
, Yuejing Yan, Chao Shen, Qian Wang
:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. IEEE Trans. Dependable Secur. Comput. 19(3): 1592-1604 (2022) - [j106]Yanjiao Chen
, Xin Tian, Qian Wang
, Jianlin Jiang
, Minghui Li
, Qian Zhang
:
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation. IEEE Trans. Dependable Secur. Comput. 19(3): 2038-2053 (2022) - [j105]Yuefeng Du
, Huayi Duan
, Anxin Zhou
, Cong Wang
, Man Ho Au
, Qian Wang
:
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain. IEEE Trans. Dependable Secur. Comput. 19(5): 3038-3054 (2022) - [j104]Xinyu Wang
, Yuefeng Du
, Cong Wang
, Qian Wang
, Liming Fang
:
WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave. IEEE Trans. Dependable Secur. Comput. 19(5): 3055-3070 (2022) - [j103]Lingchen Zhao
, Jianlin Jiang
, Bo Feng
, Qian Wang
, Chao Shen
, Qi Li
:
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning. IEEE Trans. Dependable Secur. Comput. 19(5): 3329-3342 (2022) - [j102]Qilei Yin
, Zhuotao Liu
, Qi Li
, Tao Wang, Qian Wang
, Chao Shen
, Yixiao Xu:
An Automated Multi-Tab Website Fingerprinting Attack. IEEE Trans. Dependable Secur. Comput. 19(6): 3656-3670 (2022) - [j101]Qi Li
, Xinhao Deng
, Zhuotao Liu
, Yuan Yang, Xiaoyue Zou
, Qian Wang
, Mingwei Xu
, Jianping Wu:
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling. IEEE Trans. Inf. Forensics Secur. 17: 486-499 (2022) - [j100]Xiaozhen Lu
, Liang Xiao
, Guohang Niu, Xiangyang Ji
, Qian Wang
:
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure. IEEE Trans. Inf. Forensics Secur. 17: 732-743 (2022) - [j99]Minxin Du
, Shuangke Wu, Qian Wang
, Dian Chen, Peipei Jiang
, Aziz Mohaisen
:
GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy. IEEE Trans. Knowl. Data Eng. 34(7): 3295-3308 (2022) - [j98]Zhibo Wang
, Tengda Zhao, Jinxin Ma, Hongkai Chen, Kaixin Liu, Huajie Shao
, Qian Wang
, Ju Ren
:
Hear Sign Language: A Real-Time End-to-End Sign Language Recognition System. IEEE Trans. Mob. Comput. 21(7): 2398-2410 (2022) - [j97]Zhuangzhuang Zhang
, Libing Wu, Debiao He, Qian Wang
, Dan Wu, Xiaochuan Shi
, Chao Ma
:
G-VCFL: Grouped Verifiable Chained Privacy-Preserving Federated Learning. IEEE Trans. Netw. Serv. Manag. 19(4): 4219-4231 (2022) - [j96]Xiaoyi Pang
, Zhibo Wang
, Defang Liu, John C. S. Lui
, Qian Wang
, Ju Ren
:
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams. IEEE/ACM Trans. Netw. 30(1): 327-340 (2022) - [c76]Chengjun Cai
, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. CCS 2022: 441-454 - [c75]Peiyang Li, Ye Wang
, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Qi Li:
Verifying the Quality of Outsourced Training on Clouds. ESORICS (2) 2022: 126-144 - [c74]Yike Zhan, Baolin Zheng, Qian Wang, Ningping Mou, Binqing Guo, Qi Li, Chao Shen, Cong Wang:
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems. ICME 2022: 1-6 - [c73]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen
, Qian Wang:
Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. ICSE 2022: 921-933 - [c72]Ningping Mou, Baolin Zheng, Qian Wang, Yunjie Ge, Binqing Guo:
A Few Seconds Can Change Everything: Fast Decision-based Attacks against DNNs. IJCAI 2022: 3342-3350 - [c71]Xueluan Gong, Yanjiao Chen, Jianshuo Dong, Qian Wang:
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks. NDSS 2022 - [c70]Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li:
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. USENIX Security Symposium 2022: 2225-2242 - [i32]Chenhao Lin, Jingyi Deng, Pengbin Hu, Chao Shen, Qian Wang, Qi Li:
Towards Benchmarking and Evaluating Deepfake Detection. CoRR abs/2203.02115 (2022) - [i31]Yunjie Ge, Qian Wang, Jingfeng Zhang, Juntao Zhou, Yunzhu Zhang, Chao Shen:
WaveFuzz: A Clean-Label Poisoning Attack to Protect Your Voice. CoRR abs/2203.13497 (2022) - [i30]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang:
FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. CoRR abs/2204.02567 (2022) - [i29]Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. IACR Cryptol. ePrint Arch. 2022: 894 (2022) - [i28]Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. IACR Cryptol. ePrint Arch. 2022: 1115 (2022) - 2021
- [j95]Yanjiao Chen
, Baolin Zheng, Zihan Zhang, Qian Wang
, Chao Shen
, Qian Zhang:
Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions. ACM Comput. Surv. 53(4): 84:1-84:37 (2021) - [j94]Xueluan Gong
, Yanjiao Chen
, Qian Wang
, Huayang Huang, Lingshuo Meng, Chao Shen
, Qian Zhang:
Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment. IEEE J. Sel. Areas Commun. 39(8): 2617-2631 (2021) - [j93]Minghui Li
, Yuejing Yan, Qian Wang
, Minxin Du, Zhan Qin, Cong Wang:
Secure Prediction of Neural Network in the Cloud. IEEE Netw. 35(1): 251-257 (2021) - [j92]Peipei Jiang
, Qian Wang
, Muqi Huang, Cong Wang
, Qi Li
, Chao Shen
, Kui Ren
:
Building In-the-Cloud Network Functions: Security and Privacy Challenges. Proc. IEEE 109(12): 1888-1919 (2021) - [j91]Shengshan Hu
, Leo Yu Zhang
, Qian Wang
, Zhan Qin, Cong Wang:
Towards Private and Scalable Cross-Media Retrieval. IEEE Trans. Dependable Secur. Comput. 18(3): 1354-1368 (2021) - [j90]Zhibo Wang
, Mengkai Song
, Siyan Zheng
, Zhifei Zhang
, Yang Song
, Qian Wang
:
Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach. IEEE Trans. Dependable Secur. Comput. 18(3): 1474-1488 (2021) - [j89]Helei Cui
, Yajin Zhou
, Cong Wang
, Xinyu Wang
, Yuefeng Du
, Qian Wang
:
PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing. IEEE Trans. Dependable Secur. Comput. 18(4): 1762-1778 (2021) - [j88]Lingchen Zhao
, Shengshan Hu
, Qian Wang
, Jianlin Jiang
, Chao Shen, Xiangyang Luo
, Pengfei Hu
:
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2029-2041 (2021) - [j87]Shengshan Hu, Chengjun Cai
, Qian Wang
, Cong Wang
, Zhibo Wang
, Dengpan Ye
:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. IEEE Trans. Dependable Secur. Comput. 18(6): 2569-2581 (2021) - [j86]Qian Wang
, Baolin Zheng, Qi Li
, Chao Shen
, Zhongjie Ba
:
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 896-908 (2021) - [j85]Xiaofeng Chen
, Hui Li
, Jin Li
, Qian Wang
, Xinyi Huang
, Willy Susilo
, Yang Xiang
:
Publicly Verifiable Databases With All Efficient Updating Operations. IEEE Trans. Knowl. Data Eng. 33(12): 3729-3740 (2021) - [j84]Man Zhou
, Qian Wang
, Jingxiao Yang
, Qi Li
, Peipei Jiang
, Yanjiao Chen, Zhibo Wang
:
Stealing Your Android Patterns via Acoustic Signals. IEEE Trans. Mob. Comput. 20(4): 1656-1671 (2021) - [j83]Zhibo Wang
, Yuting Huang
, Xinkai Wang
, Ju Ren
, Qian Wang
, Libing Wu
:
SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment With Social Networks. IEEE Trans. Mob. Comput. 20(5): 2055-2066 (2021) - [j82]Zhibo Wang
, Jing Zhao
, Jiahui Hu
, Tianqing Zhu
, Qian Wang
, Ju Ren
, Chao Li:
Towards Personalized Task-Oriented Worker Recruitment in Mobile Crowdsensing. IEEE Trans. Mob. Comput. 20(5): 2080-2093 (2021) - [j81]Dian Chen, Haobo Yuan
, Shengshan Hu
, Qian Wang
, Cong Wang
:
BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication. IEEE Trans. Parallel Distributed Syst. 32(4): 786-798 (2021) - [j80]Yanjiao Chen
, Long Lin, Baochun Li
, Qian Wang
, Qian Zhang
:
Silhouette: Efficient Cloud Configuration Exploration for Large-Scale Analytics. IEEE Trans. Parallel Distributed Syst. 32(8): 2049-2061 (2021) - [j79]Lingchen Zhao
, Qian Wang
, Cong Wang
, Qi Li
, Chao Shen
, Bo Feng:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. IEEE Trans. Parallel Distributed Syst. 32(10): 2524-2540 (2021) - [c69]Baolin Zheng, Peipei Jiang
, Qian Wang
, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CCS 2021: 86-107 - [c68]Wei Song, Mengfei Tang, Qiben Yan, Yuan Shen, Yang Cao, Qian Wang
, Zhiyong Peng:
Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server. DASFAA (1) 2021: 474-490 - [c67]Sicong Han
, Chenhao Lin, Chao Shen, Qian Wang
:
Rethinking Adversarial Examples Exploiting Frequency-Based Analysis. ICICS (2) 2021: 73-89 - [c66]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. ICML 2021: 1640-1650 - [c65]Xueluan Gong
, Yanjiao Chen, Wenbin Yang, Guanghao Mei, Qian Wang:
InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion. IJCAI 2021: 2439-2447 - [c64]Tao Bai, Jinqi Luo, Jun Zhao, Bihan Wen
, Qian Wang:
Recent Advances in Adversarial Training for Adversarial Robustness. IJCAI 2021: 4312-4321 - [c63]Yunjie Ge, Qian Wang
, Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, Cong Wang:
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. ACM Multimedia 2021: 826-834 - [c62]Yu Tian
, Yuhao Yang
, Xudong Ren, Pengfei Wang, Fangzhao Wu
, Qian Wang
, Chenliang Li:
Joint Knowledge Pruning and Recurrent Graph Convolution for News Recommendation. SIGIR 2021: 51-60 - [i27]Tao Bai, Jinqi Luo, Jun Zhao, Bihan Wen, Qian Wang:
Recent Advances in Adversarial Training for Adversarial Robustness. CoRR abs/2102.01356 (2021) - [i26]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. CoRR abs/2106.06667 (2021) - [i25]Man Zhou, Qian Wang, Qi Li, Peipei Jiang, Jingxiao Yang, Chao Shen, Cong Wang, Shouhong Ding:
Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns. CoRR abs/2106.08013 (2021) - [i24]Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CoRR abs/2110.09714 (2021) - 2020
- [j78]Xingliang Yuan
, Chengjun Cai
, Cong Wang, Qian Wang:
A scalable ledger-assisted architecture for secure query processing over distributed IoT data. CCF Trans. Netw. 3(2): 97-111 (2020) - [j77]Xueluan Gong
, Qian Wang
, Yanjiao Chen, Wang Yang, Xinchang Jiang:
Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models. IEEE Commun. Mag. 58(12): 83-89 (2020) - [j76]Mengkai Song
, Zhibo Wang
, Zhifei Zhang, Yang Song, Qian Wang
, Ju Ren
, Hairong Qi:
Analyzing User-Level Privacy Attack Against Federated Learning. IEEE J. Sel. Areas Commun. 38(10): 2430-2444 (2020) - [j75]Yanjiao Chen, Xueluan Gong
, Qian Wang
, Xing Di, Huayang Huang:
Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments. IEEE Netw. 34(5): 141-147 (2020) - [j74]Kui Ren
, Qian Wang
, Cong Wang
, Zhan Qin, Xiaodong Lin
:
The Security of Autonomous Driving: Threats, Defenses, and Future Directions. Proc. IEEE 108(2): 357-372 (2020) - [j73]Dong Yuan, Qi Li
, Guoliang Li
, Qian Wang
, Kui Ren:
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing. IEEE Trans. Inf. Forensics Secur. 15: 299-314 (2020) - [j72]Lingchen Zhao, Qian Wang
, Qin Zou
, Yan Zhang, Yanjiao Chen
:
Privacy-Preserving Collaborative Deep Learning With Unreliable Participants. IEEE Trans. Inf. Forensics Secur. 15: 1486-1500 (2020) - [j71]Libing Wu
, Jingxiao Yang, Man Zhou
, Yanjiao Chen
, Qian Wang
:
LVID: A Multimodal Biometrics Authentication System on Smartphones. IEEE Trans. Inf. Forensics Secur. 15: 1572-1585 (2020) - [j70]Qian Wang
, Zixi Li, Qin Zou
, Lingchen Zhao, Song Wang
:
Deep Domain Adaptation With Differential Privacy. IEEE Trans. Inf. Forensics Secur. 15: 3093-3106 (2020) - [j69]Qin Zou
, Yanling Wang
, Qian Wang
, Yi Zhao, Qingquan Li
:
Deep Learning-Based Gait Recognition Using Smartphones in the Wild. IEEE Trans. Inf. Forensics Secur. 15: 3197-3212 (2020) - [j68]Qin Zou
, Hanwen Jiang, Qiyu Dai
, Yuanhao Yue, Long Chen
, Qian Wang
:
Robust Lane Detection From Continuous Driving Scenes Using Deep Neural Networks. IEEE Trans. Veh. Technol. 69(1): 41-54 (2020) - [j67]Jiahui Hu
, Zhibo Wang
, Jian Wei, Ruizhao Lv, Jing Zhao, Qian Wang
, Honglong Chen, Dejun Yang
:
Towards Demand-Driven Dynamic Incentive for Mobile Crowdsensing Systems. IEEE Trans. Wirel. Commun. 19(7): 4907-4918 (2020) - [c61]Zhibo Wang, Jinxin Ma, Yongquan Zhang, Qian Wang, Ju Ren, Peng Sun:
Attention-over-Attention Field-Aware Factorization Machine. AAAI 2020: 6323-6330 - [c60]Yuefeng Du
, Huayi Duan
, Anxin Zhou
, Cong Wang, Man Ho Au, Qian Wang
:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. ICDCS 2020: 201-211 - [c59]Chengjun Cai
, Lei Xu
, Anxin Zhou
, Ruochen Wang, Cong Wang, Qian Wang
:
EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves. INFOCOM 2020: 1887-1896 - [c58]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Mengkai Song, Siyan Zheng, Qian Wang
, Ben Niu:
Towards compression-resistant privacy-preserving photo sharing on social networks. MobiHoc 2020: 81-90 - [p1]Lingjuan Lyu, Xinyi Xu, Qian Wang
, Han Yu
:
Collaborative Fairness in Federated Learning. Federated Learning 2020: 189-204 - [i23]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. CoRR abs/2005.05531 (2020)
2010 – 2019
- 2019
- [j66]Zhibo Wang, Jiahui Hu, Qian Wang
, Ruizhao Lv, Jian Wei, Honglong Chen, Xiaoguang Niu:
Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing. IEEE Commun. Mag. 57(2): 54-59 (2019) - [j65]Zhibo Wang, Jiahui Hu, Qian Wang
, Ruizhao Lv, Jian Wei, Honglong Chen, Xiaoguang Niu:
Task Bundling Based Incentive for Location-Dependent Mobile Crowdsourcing. IEEE Commun. Mag. 57(3): 132-137 (2019) - [j64]Zhibo Wang, Xiaoyi Pang, Jiahui Hu, Wenxin Liu, Qian Wang
, Yanjun Li, Honglong Chen:
When Mobile Crowdsensing Meets Privacy. IEEE Commun. Mag. 57(9): 72-78 (2019) - [j63]Shengshan Hu, Xingcan Shang, Zhan Qin, Minghui Li
, Qian Wang
, Cong Wang:
Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures. IEEE Commun. Mag. 57(10): 120-126 (2019) - [j62]Yongdong Wu
, Dengpan Ye, Zhuo Wei
, Qian Wang
, William Tan, Robert H. Deng
:
Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks. IEEE Internet Things J. 6(2): 1617-1627 (2019) - [j61]Zhibo Wang
, Yijie Li, Bonan Jin, Qian Wang
, Yunhe Feng, Yanjun Li
, Huajie Shao:
AirMouse: Turning a Pair of Glasses Into a Mouse in the Air. IEEE Internet Things J. 6(5): 7473-7483 (2019) - [j60]Cheng Tan, Qian Wang
, Lina Wang, Lei Zhao:
Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions. IEEE Netw. 33(2): 174-180 (2019) - [j59]Qian Wang
, Jing Huang, Yanjiao Chen
, Cong Wang
, Fu Xiao
, Xiangyang Luo:
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation. IEEE Trans. Inf. Forensics Secur. 14(2): 374-386 (2019) - [j58]Shuangke Wu, Yanjiao Chen
, Qian Wang
, Minghui Li
, Cong Wang
, Xiangyang Luo
:
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction. IEEE Trans. Inf. Forensics Secur. 14(7): 1687-1701 (2019) - [j57]Qin Zou
, Zheng Zhang, Qingquan Li
, Xianbiao Qi, Qian Wang
, Song Wang
:
DeepCrack: Learning Hierarchical Convolutional Features for Crack Detection. IEEE Trans. Image Process. 28(3): 1498-1512 (2019) - [j56]