Quanxin Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.
Cybersecur., December, 2024

Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding.
IEEE Trans. Artif. Intell., January, 2024

2023
Improving the invisibility of adversarial examples with perceptually adaptive perturbation.
Inf. Sci., July, 2023

Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering.
Inf. Sci., July, 2023

Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things.
IEEE Trans. Ind. Informatics, June, 2023

Clean-label poisoning attacks on federated learning for IoT.
Expert Syst. J. Knowl. Eng., June, 2023

Towards interpreting vulnerability of object detection models via adversarial distillation.
J. Inf. Secur. Appl., 2023

A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

Adversarial Attacks Against Object Detection in Remote Sensing Images.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture.
Int. J. Intell. Syst., December, 2022

Boosting cross-task adversarial attack with random blur.
Int. J. Intell. Syst., 2022

Knowledge graph and behavior portrait of intelligent attack against path planning.
Int. J. Intell. Syst., 2022

A robust packet-dropping covert channel for mobile intelligent terminals.
Int. J. Intell. Syst., 2022

Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers.
CoRR, 2022

Boosting Adversarial Transferability of MLP-Mixer.
CoRR, 2022

Enhancing the Transferability of Adversarial Examples with Random Patch.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness Network for Automobile Maintenance Service.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers.
Mob. Networks Appl., 2021

A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis.
Mob. Networks Appl., 2021

Towards a physical-world adversarial patch for blinding object detection models.
Inf. Sci., 2021

A discrete cosine transform-based query efficient attack on black-box object detectors.
Inf. Sci., 2021

Opponent portrait for multiagent reinforcement learning in competitive environment.
Int. J. Intell. Syst., 2021

Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Code Decoupling Execution Isolating Based on TF Card Firmware Extension.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

On-line Firmware Updating and Fingerprint Generating for Solid State Disks.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement Learning.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

A Random Multi-target Backdooring Attack on Deep Neural Networks.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

2020
Adaptive iterative attack towards explainable adversarial robustness.
Pattern Recognit., 2020

A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints.
Future Gener. Comput. Syst., 2020

Towards cross-task universal perturbation against black-box object detectors in autonomous driving.
Comput. Networks, 2020

Two-Way Feature-Aligned And Attention-Rectified Adversarial Training.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

Permission Dispatching Mechanism Inside and Outside of the Warranty Period for Equipment Maintenance Service System.
Proceedings of the Human Centered Computing - 6th International Conference, 2020

2019
A sensitive network jitter measurement for covert timing channels over interactive traffic.
Multim. Tools Appl., 2019

A fault-tolerant and energy-efficient continuous data protection system.
J. Ambient Intell. Humaniz. Comput., 2019

Establishing a software defect prediction model via effective dimension reduction.
Inf. Sci., 2019

Recovering SQLite data from fragmented flash pages.
Ann. des Télécommunications, 2019

Attacking Black-Box Image Classifiers With Particle Swarm Optimization.
IEEE Access, 2019

A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment.
IEEE Access, 2019

A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images.
IEEE Access, 2019

A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks.
IEEE Access, 2019

A Hybrid Covert Channel with Feedback over Mobile Networks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

An Universal Perturbation Generator for Black-Box Attacks Against Object Detectors.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

Untargeted Adversarial Attack via Expanding the Semantic Gap.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Design of Anonymous Communication Protocol Based on Group Signature.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Boosting Training for PDF Malware Classifier via Active Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Evading PDF Malware Classifiers with Generative Adversarial Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Speaker Recognition Based on Lightweight Neural Network for Smart Home Solutions.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home Assistant.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
An Efficient Identity-Based Proxy Blind Signature for Semioffline Services.
Wirel. Commun. Mob. Comput., 2018

Covert Timing Channels for IoT over Mobile Networks.
IEEE Wirel. Commun., 2018

DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage.
IEEE Trans. Circuits Syst. Video Technol., 2018

An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Sensors, 2018

A root privilege management scheme with revocable authorization for Android devices.
J. Netw. Comput. Appl., 2018

Building packet length covert channel over mobile VoIP traffics.
J. Netw. Comput. Appl., 2018

Building covert timing channels by packet rearrangement over mobile networks.
Inf. Sci., 2018

RootAgency: A digital signature-based root privilege management agency for cloud terminal devices.
Inf. Sci., 2018

An end-to-end covert channel via packet dropout for mobile networks.
Int. J. Distributed Sens. Networks, 2018

Cross-cluster asymmetric group key agreement for wireless sensor networks.
Sci. China Inf. Sci., 2018

A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application.
IEEE Access, 2018

Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
A methodology for determining the image base of ARM-based industrial control system firmware.
Int. J. Crit. Infrastructure Prot., 2017

Cryptographic key protection against FROST for mobile devices.
Clust. Comput., 2017

A VoLTE Encryption Experiment for Android Smartphones.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

A Transparent Encryption Scheme of Video Data for Android Devices.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

An Energy Aware Mass Memory Unit for Small Satellites Using Hybrid Architecture.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Determining Image Base of Firmware Files for ARM Devices.
IEICE Trans. Inf. Syst., 2016

Determining image base of firmware for ARM devices by matching literal pools.
Digit. Investig., 2016

2015
Tuner and demodulator design of antenna control system.
Int. J. Wirel. Mob. Comput., 2015

Descrambling data on solid-state disks by reverse-engineering the firmware.
Digit. Investig., 2015

2014
Oscillatory behavior of third-order nonlinear delay dynamic equations on time scales.
J. Comput. Appl. Math., 2014

2013
The research and implementation of customised launcher in Android.
Int. J. Wirel. Mob. Comput., 2013

2012
Oscillation criteria for third-order neutral differential equations with continuously distributed delay.
Appl. Math. Lett., 2012

2011
Oscillation of second-order half-linear delay dynamic equations with damping on time scales.
J. Comput. Appl. Math., 2011

Oscillation theorems for second-order half-linear delay dynamic equations with damping on time scales.
Comput. Math. Appl., 2011

Oscillation of second-order nonlinear delay dynamic equations on time scales.
Comput. Math. Appl., 2011

Oscillation of even-order half-linear functional differential equations with damping.
Comput. Math. Appl., 2011

Oscillation criteria for even-order half-linear functional differential equations with damping.
Appl. Math. Lett., 2011

2010
Oscillation behavior of even-order nonlinear neutral differential equations with variable coefficients.
Comput. Math. Appl., 2010

2008
A User Reputation Model for DLDE Learning 2.0 Community.
Proceedings of the Digital Libraries: Universal and Ubiquitous Access to Information, 2008

2006
Oscillation behavior of even order neutral differential equations with variable coefficients.
Appl. Math. Lett., 2006


  Loading...