Qi Wang

Orcid: 0000-0002-7517-8888

Affiliations:
  • University of Illinois at Urbana-Champaign, IL, USA (PhD 2020)
  • Shanghai Jiao Tong University, School of Software, Shanghai, China (2007 - 2014)


According to our database1, Qi Wang authored at least 16 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data.
Proc. ACM Manag. Data, 2023

2021
Detecting AI Trojans Using Meta Neural Analysis.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Securing emerging IoT systems through systematic analysis and design
PhD thesis, 2020

Generating Correct-by-Construction Distributed Implementations from Formal Maude Designs.
Proceedings of the NASA Formal Methods - 12th International Symposium, 2020

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Read atomic transactions with prevention of lost updates: ROLA and its formal analysis.
Formal Aspects Comput., 2019

Automatic Analysis of Consistency Properties of Distributed Transaction Systems in Maude.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2019

Charting the Attack Surface of Trigger-Action IoT Platforms.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Formal Modeling and Analysis of the Walter Transactional Data Store.
Proceedings of the Rewriting Logic and Its Applications - 12th International Workshop, 2018

Fear and Logging in the Internet of Things.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

ROLA: A New Distributed Transaction Protocol and Its Formal Analysis.
Proceedings of the Fundamental Approaches to Software Engineering, 2018

Cross-App Poisoning in Software-Defined Networking.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2013
Extracting URLs from JavaScript via program analysis.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Towards systematic parallel programming of graph problems via tree decomposition and tree parallelism.
Proceedings of the 2nd ACM SIGPLAN workshop on Functional high-performance computing, 2013


  Loading...