Qingchuan Zhao

Orcid: 0000-0003-0163-2846

According to our database1, Qingchuan Zhao authored at least 43 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
HeadSonic: Usable Bone Conduction Earphone Authentication via Head-Conducted Sounds.
IEEE Trans. Mob. Comput., September, 2025

ConfGuard: A Simple and Effective Backdoor Detection for Large Language Models.
CoRR, August, 2025

Towards Effective Detection of Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph.
ACM Trans. Softw. Eng. Methodol., May, 2025

FIGhost: Fluorescent Ink-based Stealthy and Flexible Backdoor Attacks on Physical Traffic Sign Recognition.
CoRR, May, 2025

MPMA: Preference Manipulation Attack Against Model Context Protocol.
CoRR, May, 2025

BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models.
CoRR, May, 2025

THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models.
CoRR, March, 2025

A Contemporary Survey of Large Language Model Assisted Program Analysis.
CoRR, February, 2025

A Survey on Backdoor Threats in Large Language Models (LLMs): Attacks, Defenses, and Evaluations.
CoRR, February, 2025

Deploying Intrusion Detection on In-Vehicle Networks: Challenges and Opportunities.
IEEE Netw., January, 2025

SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes.
IEEE Trans. Inf. Forensics Secur., 2025

Stealthiness Assessment of Adversarial Perturbation: From a Visual Perspective.
IEEE Trans. Inf. Forensics Secur., 2025

CSFuzzer: A grey-box fuzzer for network protocol using context-aware state feedback.
Comput. Secur., 2025

The proteomic and transcriptomic profiles of gastric mucosa from health volunteers.
Comput. Biol. Medicine, 2025

Non-intrusive and Unconstrained Keystroke Inference in VR Platforms via Infrared Side Channel.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
mmSpyVR: Exploiting mmWave Radar for Penetrating Obstacles to Uncover Privacy Vulnerability of Virtual Reality.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., November, 2024

ITPatch: An Invisible and Triggered Physical Adversarial Patch against Traffic Sign Recognition.
CoRR, 2024

EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR, 2024

L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks.
CoRR, 2024

PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks.
CoRR, 2024

AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

L-AutoDA: Large Language Models for Automatically Evolving Decision-based Adversarial Attacks.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024

2023
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023

Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting.
Proceedings of the 32nd USENIX Security Symposium, 2023

Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

XPorter: A Study of the Multi-Port Charger Security on Privacy Leakage and Voice Injection.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
No-Fuzz: Efficient Anti-fuzzing Techniques.
Proceedings of the Security and Privacy in Communication Networks, 2022

PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2020
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020

Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps.
Proceedings of the Security and Privacy in Communication Networks, 2020

A Study of the Privacy of COVID-19 Contact Tracing Apps.
Proceedings of the Security and Privacy in Communication Networks, 2020

Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2013
Products Competitive Relationships Mining.
Proceedings of the Advances in Conceptual Modeling, 2013


  Loading...