default search action
Zhiqiang Lin
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j47]Yang Zhou, Cheng Xu, Zhiqiang Lin, Xinwei He, Hui Huang:
Point-StyleGAN: Multi-scale point cloud synthesis with style modulation. Comput. Aided Geom. Des. 111: 102309 (2024) - [j46]Ada Lamba, Max Taylor, Vincent Beardsley, Jacob Bambeck, Michael D. Bond, Zhiqiang Lin:
Cocoon: Static Information Flow Control in Rust. Proc. ACM Program. Lang. 8(OOPSLA1): 166-193 (2024) - [j45]Xin Jin, Zhiqiang Lin:
SimLLM: Calculating Semantic Similarity in Code Summaries using a Large Language Model-Based Approach. Proc. ACM Softw. Eng. 1(FSE): 1376-1399 (2024) - [j44]Lianghao Ji, Zhiqiang Lin, Cuijuan Zhang, Shasha Yang, Jun Li, Huaqing Li:
Data-Based Optimal Consensus Control for Multiagent Systems With Time Delays: Using Prioritized Experience Replay. IEEE Trans. Syst. Man Cybern. Syst. 54(5): 3244-3256 (2024) - [c157]Chao Wang, Yue Zhang, Zhiqiang Lin:
RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop. AsiaCCS 2024 - [c156]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. WOOT @ USENIX Security Symposium 2024: 149-169 - [i22]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. CoRR abs/2401.15289 (2024) - [i21]Yifan Mao, Mengya Zhang, Shaileshh Bojja Venkatakrishnan, Zhiqiang Lin:
Flashback: Enhancing Proposer-Builder Design with Future-Block Auctions in Proof-of-Stake Ethereum. CoRR abs/2405.09465 (2024) - 2023
- [j43]Zhiqiang Lin, Fan Yang, Xuyang Wu, Jinsong Su, Xiaoyue Wang:
A Feedback-Enhanced Two-Stage Framework for judicial machine reading comprehension. Eng. Appl. Artif. Intell. 123(Part A): 106178 (2023) - [j42]Haoran Lu, Qingchuan Zhao, Yongliang Chen, Xiaojing Liao, Zhiqiang Lin:
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding. Proc. ACM Meas. Anal. Comput. Syst. 7(1): 18:1-18:27 (2023) - [c155]Pallavi Sivakumaran, Chaoshun Zuo, Zhiqiang Lin, Jorge Blasco:
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide. AsiaCCS 2023: 1004-1015 - [c154]Ali Ahad, Gang Wang, Chung Hwan Kim, Suman Jana, Zhiqiang Lin, Yonghwi Kwon:
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation. ASPLOS (4) 2023: 169-188 - [c153]Yue Zhang, Yuqing Yang, Zhiqiang Lin:
Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs. CCS 2023: 2411-2425 - [c152]Chao Wang, Yue Zhang, Zhiqiang Lin:
Uncovering and Exploiting Hidden APIs in Mobile Super Apps. CCS 2023: 2471-2485 - [c151]Zhiqiang Lin, Xiaojing Liao:
SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps. CCS 2023: 3655-3656 - [c150]Wubing Wang, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV. DIMVA 2023: 46-66 - [c149]Shimpei Fukuoka, Masayuki Uchiyama, Geunsook Park, Alan Chih-Wei Hsiung, Mourad Daoudi, Zhiqiang Lin, Vincent C. Venezia, Lindsay A. Grant:
A 2.2um three-wafer stacked back side illuminated voltage domain global shutter CMOS image sensor. Imaging Sensors and Systems 2023: 1-5 - [c148]Zhuo Zhang, Brian Zhang, Wen Xu, Zhiqiang Lin:
Demystifying Exploitable Bugs in Smart Contracts. ICSE 2023: 615-627 - [c147]Chao Wang, Ronny Ko, Yue Zhang, Yuqing Yang, Zhiqiang Lin:
Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis. ICSE 2023: 932-944 - [c146]Mohit Kumar Jangid, Yue Zhang, Zhiqiang Lin:
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing. NDSS 2023 - [c145]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
Thwarting Smartphone SMS Attacks at the Radio Interface Layer. NDSS 2023 - [c144]Md Sakib Anwar, Chaoshun Zuo, Carter Yagemann, Zhiqiang Lin:
Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating. RAID 2023: 17-31 - [c143]Erick Bauman, Jun Duan, Kevin W. Hamlen, Zhiqiang Lin:
Renewable Just-In-Time Control-Flow Integrity. RAID 2023: 580-594 - [c142]Haoran Lu, Qingchuan Zhao, Yongliang Chen, Xiaojing Liao, Zhiqiang Lin:
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding. SIGMETRICS (Abstracts) 2023: 45-46 - [c141]Jianyi Zhang, Yuchen Wang, Yazhou Tu, Sara Rampazzi, Zhiqiang Lin, Insup Lee, Xiali Hei:
ADC-Bank: Detecting Acoustic Out-of-Band Signal Injection on Inertial Sensors. SmartSP 2023: 53-72 - [c140]Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang:
Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract. USENIX Security Symposium 2023: 1757-1774 - [c139]Chaoshun Zuo, Chao Wang, Zhiqiang Lin:
A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games. USENIX Security Symposium 2023: 3925-3942 - [c138]Haohuang Wen, Zhiqiang Lin:
Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries. USENIX Security Symposium 2023: 3997-4014 - [c137]Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, Zhiqiang Lin:
Reusable Enclaves for Confidential Serverless Computing. USENIX Security Symposium 2023: 4015-4032 - [c136]Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang:
Controlled Data Races in Enclaves: Attacks and Detection. USENIX Security Symposium 2023: 4069-4086 - [c135]Chao Wang, Yue Zhang, Zhiqiang Lin:
One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat. USENIX Security Symposium 2023: 6629-6646 - [e4]Zhiqiang Lin, Xiaojing Liao:
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, SaTS 2023, Copenhagen, Denmark, 26 November 2023. ACM 2023 [contents] - [e3]Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikas:
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 462, Springer 2023, ISBN 978-3-031-25537-3 [contents] - [i20]Yuqing Yang, Chao Wang, Yue Zhang, Zhiqiang Lin:
SoK: Decoding the Super App Enigma: The Security Mechanisms, Threats, and Trade-offs in OS-alike Apps. CoRR abs/2306.07495 (2023) - [i19]Chao Wang, Yue Zhang, Zhiqiang Lin:
Uncovering and Exploiting Hidden APIs in Mobile Super Apps. CoRR abs/2306.08134 (2023) - [i18]Yue Zhang, Yuqing Yang, Zhiqiang Lin:
Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs. CoRR abs/2306.08151 (2023) - [i17]Ada Barach, Maxwell Taylor, Vincent Beardsley, Jacob Bambeck, Michael D. Bond, Zhiqiang Lin:
Cocoon: Static Information Flow Control in Rust. CoRR abs/2311.00097 (2023) - [i16]Xin Jin, Jonathan Larson, Weiwei Yang, Zhiqiang Lin:
Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models. CoRR abs/2312.09601 (2023) - [i15]Mengya Zhang, Xiaokuan Zhang, Josh Barbee, Yinqian Zhang, Zhiqiang Lin:
SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. CoRR abs/2312.12573 (2023) - 2022
- [j41]Christopher Ellis, Haohuang Wen, Zhiqiang Lin, Anish Arora:
Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing. Proc. Priv. Enhancing Technol. 2022(4): 727-745 (2022) - [j40]Weizhou Li, Zhiqiang Lin, Qi Chen:
A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses. Secur. Commun. Networks 2022: 1417607:1-1417607:9 (2022) - [j39]Yutao Tang, Zhengrui Qin, Zhiqiang Lin, Yue Li, Shanhe Yi, Fengyuan Xu, Qun Li:
vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS. IEEE Trans. Computers 71(12): 3349-3360 (2022) - [j38]Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes. IEEE Trans. Inf. Theory 68(1): 601-631 (2022) - [c134]Qingchuan Zhao, Chaoshun Zuo, Jorge Blasco, Zhiqiang Lin:
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals. AsiaCCS 2022: 521-533 - [c133]Xin Jin, Sunil Manandhar, Kaushal Kafle, Zhiqiang Lin, Adwait Nadkarni:
Understanding IoT Security from a Market-Scale Perspective. CCS 2022: 1615-1629 - [c132]Xin Jin, Kexin Pei, Jun Yeon Won, Zhiqiang Lin:
SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings. CCS 2022: 1631-1645 - [c131]Yuqing Yang, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson, Angelos Stavrou, Zhiqiang Lin:
Detecting and Measuring Misconfigured Manifests in Android Apps. CCS 2022: 3063-3077 - [c130]Yuqing Yang, Yue Zhang, Zhiqiang Lin:
Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection. CCS 2022: 3079-3092 - [c129]Yue Zhang, Zhiqiang Lin:
When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure. CCS 2022: 3181-3194 - [c128]Sen Lin, Ming Shi, Anish Arora, Raef Bassily, Elisa Bertino, Constantine Caramanis, Kaushik R. Chowdhury, Eylem Ekici, Atilla Eryilmaz, Stratis Ioannidis, Nan Jiang, Gauri Joshi, Jim Kurose, Yingbin Liang, Zhiqiang Lin, Jia Liu, Mingyan Liu, Tommaso Melodia, Aryan Mokhtari, Rob Nowak, Sewoong Oh, Srini Parthasarathy, Chunyi Peng, Hulya Seferoglu, Ness B. Shroff, Sanjay Shakkottai, Kannan Srinivasan, Ameet Talwalkar, Aylin Yener, Lei Ying:
Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks. CIC 2022: 16-25 - [c127]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
A fine-grained telemetry stream for security services in 5G open radio access networks. EmergingWireless@CoNEXT 2022: 18-23 - [c126]Huibo Wang, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures. NDSS 2022 - [c125]Jun Yeon Won, Haohuang Wen, Zhiqiang Lin:
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling. RAID 2022: 200-213 - [c124]Shixuan Zhao, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
vSGX: Virtualizing SGX Enclaves on AMD SEV. SP 2022: 321-336 - [c123]Chaoshun Zuo, Zhiqiang Lin:
Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games. USENIX Security Symposium 2022: 3093-3110 - [i14]Xingyu Lyu, Mengya Zhang, Xiaokuan Zhang, Jianyu Niu, Yinqian Zhang, Zhiqiang Lin:
An Empirical Study on Ethereum Private Transactions and the Security Implications. CoRR abs/2208.02858 (2022) - [i13]Ronny Ko, Chuan Xiao, Makoto Onizuka, Yihe Huang, Zhiqiang Lin:
Ultraverse: Efficient Retroactive Operation for Attack Recovery in Database Systems and Web Frameworks. CoRR abs/2211.05327 (2022) - 2021
- [j37]Zhiqiang Lin, Taorong Qiu, Ping Liu, Lingyun Zhang, Siwei Zhang, Zhendong Mu:
Fatigue driving recognition based on deep learning and graph neural network. Biomed. Signal Process. Control. 68: 102598 (2021) - [j36]Yue Zhang, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, Zhiqiang Lin:
A Measurement Study of Wechat Mini-Apps. Proc. ACM Meas. Anal. Comput. Syst. 5(2): 14:1-14:25 (2021) - [j35]Kaiqing Huang, Xueli Wang, Zhiqiang Lin:
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things. Secur. Commun. Networks 2021: 8872699:1-8872699:22 (2021) - [c122]Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. CCS 2021: 2937-2950 - [c121]Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin:
Specularizer : Detecting Speculative Execution Attacks via Performance Tracing. DIMVA 2021: 151-172 - [c120]Yechuan Bi, Jianshan Peng, Zhiqiang Lin:
Data flow sensitive driver vulnerability mining method. EITCE 2021: 1263-1268 - [c119]Ronghua Xu, Hefeng Meng, Zhiqiang Lin, Yonghui Xu, Lizhen Cui, Jun Lin:
Credit Default Prediction via Explainable Ensemble Learning. ICCSE 2021: 81-87 - [c118]Jiancheng Zhang, Xiao Yang, Hefeng Meng, Zhiqiang Lin, Yonghui Xu, Lizhen Cui:
A Survey on Knowledge Enhanced EHR Data Mining. ICCSE 2021: 124-131 - [c117]Hefeng Meng, Zhiqiang Lin, Fan Yang, Yonghui Xu, Lizhen Cui:
Knowledge Distillation In Medical Data Mining: A Survey. ICCSE 2021: 175-182 - [c116]Xiaowei Li, Hui Shu, Yi Zhai, Zhiqiang Lin:
A Method for Resume Information Extraction Using BERT-BiLSTM-CRF. ICCT 2021: 1437-1442 - [c115]Zhiqiang Lin:
Keynote: Uncovering Vulnerabilities in Bluetooth Devices with Automated Binary Analysis. PerCom Workshops 2021: 545 - [c114]Paul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
iTOP: Automating Counterfeit Object-Oriented Programming Attacks. RAID 2021: 162-176 - [c113]Yue Zhang, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, Zhiqiang Lin:
A Measurement Study of Wechat Mini-Apps. SIGMETRICS (Abstracts) 2021: 19-20 - [c112]Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Towards Formal Verification of State Continuity for Enclave Programs. USENIX Security Symposium 2021: 573-590 - [c111]Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang:
SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting. USENIX Security Symposium 2021: 1665-1682 - [c110]Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, Jim Hao Chen:
Automatic Policy Generation for Inter-Service Access Control of Microservices. USENIX Security Symposium 2021: 3971-3988 - [e2]Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung:
ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. ACM 2021, ISBN 978-1-4503-8287-8 [contents] - [i12]Cheng Zhang, Yunze Pan, Yunqi Zhang, Adam C. Champion, Zhaohui Shen, Dong Xuan, Zhiqiang Lin, Ness B. Shroff:
WLAN-Log-Based Superspreader Detection in the COVID-19 Pandemic. CoRR abs/2102.11171 (2021) - 2020
- [j34]Yan Ren, Qiuxia Zhao, Haipeng Guan, Zhiqiang Lin:
On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures. IEEE Access 8: 17854-17862 (2020) - [j33]Qiaoyang Li, Guiming Chen, Lingliang Xu, Zhiqiang Lin, Liyao Zhou:
An Improved Model for Effectiveness Evaluation of Missile Electromagnetic Launch System. IEEE Access 8: 156615-156633 (2020) - [j32]Yan Ren, Qiuxia Zhao, Haipeng Guan, Zhiqiang Lin:
A novel authentication scheme based on edge computing for blockchain-based distributed energy trading system. EURASIP J. Wirel. Commun. Netw. 2020(1): 152 (2020) - [j31]Lingyun Zhang, Taorong Qiu, Zhiqiang Lin, Shuli Zou, Xiaoming Bai:
Construction and Application of Functional Brain Network Based on Entropy. Entropy 22(11): 1234 (2020) - [j30]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution. IEEE Secur. Priv. 18(3): 28-37 (2020) - [j29]Qi Chen, Chunming Tang, Zhiqiang Lin:
Compartmented Secret Sharing Schemes and Locally Repairable Codes. IEEE Trans. Commun. 68(10): 5976-5987 (2020) - [c109]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings. ACSAC 2020: 466-479 - [c108]Yan Ren, Qiuxia Zhao, Haipeng Guan, Zhiqiang Lin:
On Design of Blockchain-based Transport Scheme. BSCI 2020: 214-215 - [c107]Haohuang Wen, Zhiqiang Lin, Yinqian Zhang:
FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware. CCS 2020: 167-180 - [c106]Haohuang Wen, Qingchuan Zhao, Qi Alfred Chen, Zhiqiang Lin:
Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps. NDSS 2020 - [c105]Qingchuan Zhao, Haohuang Wen, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps. SecureComm (1) 2020: 49-60 - [c104]Jaehyun Han, Zhiqiang Lin, Donald E. Porter:
On the Effectiveness of Behavior-Based Ransomware Detection. SecureComm (2) 2020: 120-140 - [c103]Haohuang Wen, Qingchuan Zhao, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
A Study of the Privacy of COVID-19 Contact Tracing Apps. SecureComm (1) 2020: 297-317 - [c102]Qingchuan Zhao, Chaoshun Zuo, Brendan Dolan-Gavitt, Giancarlo Pellegrino, Zhiqiang Lin:
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps. SP 2020: 1106-1120 - [c101]Ashish Kundu, Zhiqiang Lin, Joshua Hammond:
Energy Attacks on Mobile Devices. TPS-ISA 2020: 107-117 - [c100]Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. USENIX Security Symposium 2020: 37-54 - [c99]Raul Quinonez, Jairo Giraldo, Luis E. Salazar, Erick Bauman, Alvaro A. Cárdenas, Zhiqiang Lin:
SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. USENIX Security Symposium 2020: 895-912 - [c98]Haohuang Wen, Qi Alfred Chen, Zhiqiang Lin:
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT. USENIX Security Symposium 2020: 949-965 - [c97]Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin:
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. USENIX Security Symposium 2020: 2379-2396 - [c96]Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin:
TXSPECTOR: Uncovering Attacks in Ethereum from Transactions. USENIX Security Symposium 2020: 2775-2792 - [i11]Yuxiang Luo, Cheng Zhang, Yunqi Zhang, Chaoshun Zuo, Dong Xuan, Zhiqiang Lin, Adam C. Champion, Ness B. Shroff:
ACOUSTIC-TURF: Acoustic-based Privacy-Preserving COVID-19 Contact Tracing. CoRR abs/2006.13362 (2020) - [i10]Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. CoRR abs/2008.00146 (2020)
2010 – 2019
- 2019
- [j28]Heng Du, Zhiqiang Lin, Yuan Zhang, Hui Chen, Zhimin Xu:
Improved Migration Genetic Algorithm Optimization for Variable-Speed Falling Trajectory of Mobile Crossbeam in Composite Hydraulic Press With Pressure Shock. IEEE Access 7: 39459-39473 (2019) - [j27]Zhiqiang Lin, Shimin Lin, Sen Wu, Ge Ma, Zhongwei Liang:
Vibration Control of a Flexible Spacecraft System With Input Backlash. IEEE Access 7: 87017-87026 (2019) - [j26]Zhiqiang Lin, Shimin Lin, Meihua Huang, Jianing Zhang, Zhongwei Liang:
Vibration Control for Two Kinds of Flexible Mechanical Systems With Full State Output Constraints. IEEE Access 7: 120734-120743 (2019) - [j25]Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient explicit constructions of compartmented secret sharing schemes. Des. Codes Cryptogr. 87(12): 2913-2940 (2019) - [j24]Jingang Liu, Yongge Wang, Zongxiang Yi, Zhiqiang Lin:
polarRLCE: A New Code-Based Cryptosystem Using Polar Codes. Secur. Commun. Networks 2019: 3086975:1-3086975:10 (2019) - [c95]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing control flow integrity with LLVM-CFI. ACSAC 2019: 584-597 - [c94]Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes. ASIACRYPT (2) 2019: 505-536 - [c93]Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, Yinqian Zhang:
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach. AsiaCCS 2019: 114-121 - [c92]Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, Yinqian Zhang:
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. CCS 2019: 1469-1483 - [c91]Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, Zhiqiang Lin:
Towards Memory Safe Enclave Programming with Rust-SGX. CCS 2019: 2333-2350 - [c90]Yuzhong Liu, Zhiqiang Lin, Li Li, Hualiang Li, Yali Shen:
Effects of Extremely Low Frequency Electromagnetic Fields Exposure in an Informationalized Perspective. DPTA 2019: 1191-1201 - [c89]Jiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, Kehuan Zhang:
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users. DSN 2019: 222-233 - [c88]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. EuroS&P 2019: 142-157 - [c87]Kenneth A. Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang, Xiangyu Zhang, Zhiqiang Lin:
Probabilistic disassembly. ICSE 2019: 1187-1198 - [c86]Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin:
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. NDSS 2019 - [c85]