Zhiqiang Lin
Orcid: 0000-0001-6527-5994
According to our database1,
Zhiqiang Lin
authored at least 215 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Joint Luminance-Saliency Prior and Attention for Underwater Image Quality Assessment.
Remote. Sens., August, 2024
Data-Based Optimal Consensus Control for Multiagent Systems With Time Delays: Using Prioritized Experience Replay.
IEEE Trans. Syst. Man Cybern. Syst., May, 2024
SimLLM: Calculating Semantic Similarity in Code Summaries using a Large Language Model-Based Approach.
Proc. ACM Softw. Eng., 2024
Flashback: Enhancing Proposer-Builder Design with Future-Block Auctions in Proof-of-Stake Ethereum.
CoRR, 2024
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
CoRR, 2024
Comput. Aided Geom. Des., 2024
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023
Eng. Appl. Artif. Intell., 2023
CoRR, 2023
Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models.
CoRR, 2023
SoK: Decoding the Super App Enigma: The Security Mechanisms, Threats, and Trade-offs in OS-alike Apps.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
A 2.2um three-wafer stacked back side illuminated voltage domain global shutter CMOS image sensor.
Proceedings of the Imaging Sensors and Systems 2023, 2023
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Inf. Theory, 2022
IEEE Trans. Computers, 2022
Secur. Commun. Networks, 2022
Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing.
Proc. Priv. Enhancing Technol., 2022
Ultraverse: Efficient Retroactive Operation for Attack Recovery in Database Systems and Web Frameworks.
CoRR, 2022
CoRR, 2022
Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
A fine-grained telemetry stream for security services in 5G open radio access networks.
Proceedings of the 1st International Workshop on Emerging Topics in Wireless, 2022
Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things.
Secur. Commun. Networks, 2021
Biomed. Signal Process. Control., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Keynote: Uncovering Vulnerabilities in Bluetooth Devices with Automated Binary Analysis.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the 21st International Conference on Communication Technology, 2021
Proceedings of the ICCSE '21: 5th International Conference on Crowd Science and Engineering, Jinan, China, October 16, 2021
Proceedings of the ICCSE '21: 5th International Conference on Crowd Science and Engineering, Jinan, China, October 16, 2021
Proceedings of the ICCSE '21: 5th International Conference on Crowd Science and Engineering, Jinan, China, October 16, 2021
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Commun., 2020
IEEE Secur. Priv., 2020
Entropy, 2020
A novel authentication scheme based on edge computing for blockchain-based distributed energy trading system.
EURASIP J. Wirel. Commun. Netw., 2020
CoRR, 2020
IEEE Access, 2020
An Improved Model for Effectiveness Evaluation of Missile Electromagnetic Launch System.
IEEE Access, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Secur. Commun. Networks, 2019
Des. Codes Cryptogr., 2019
CoRR, 2019
IEEE Access, 2019
Vibration Control for Two Kinds of Flexible Mechanical Systems With Full State Output Constraints.
IEEE Access, 2019
Improved Migration Genetic Algorithm Optimization for Variable-Speed Falling Trajectory of Mobile Crossbeam in Composite Hydraulic Press With Pressure Shock.
IEEE Access, 2019
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019
Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Effects of Extremely Low Frequency Electromagnetic Fields Exposure in an Informationalized Perspective.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
An adaptive decision-making method with fuzzy Bayesian reinforcement learning for robot soccer.
Inf. Sci., 2018
Int. J. Inf. Commun. Technol., 2018
Des. Codes Cryptogr., 2018
Cryptogr. Commun., 2018
An Adaptive Strategy Selection Method With Reinforcement Learning for Robotic Soccer Games.
IEEE Access, 2018
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Proceedings of the Science of Cyber Security - First International Conference, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the IEEE Information Theory Workshop, 2018
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 6th International Workshop on Quantitative Approaches to Software Quality co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications.
Cryptogr. Commun., 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017
2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016
Load balancing scheduling algorithm for storage system based on state acquisition and dynamic feedback.
Proceedings of the IEEE International Conference on Information and Automation, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Construction of Transition Matrices for Ternary Ring Feedback With Carry Shift Registers.
IEEE Trans. Inf. Theory, 2015
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution.
IEEE Trans. Dependable Secur. Comput., 2015
J. Univers. Comput. Sci., 2015
Int. J. Inf. Commun. Technol., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
ACM Comput. Surv., 2015
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015
You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps.
Proceedings of the 24th USENIX Security Symposium, 2015
Automatically deriving pointer reference expressions from binary code for memory dump analysis.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Cloud Comput., 2014
Int. J. Grid Util. Comput., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification.
Proceedings of the Computer Security - ESORICS 2014, 2014
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.
ACM Trans. Inf. Syst. Secur., 2013
EXTERIOR: using a dual-VM based external shell for guest-OS introspection, configuration, and recovery.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013
CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Manipulating semantic values in kernel data structures: Attack assessments and implications.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Subverting system authentication with context-aware, reactive virtual machine introspection.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications.
IEEE Trans. Software Eng., 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the Advances in Neural Networks, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
2008
IEEE Trans. Circuits Syst. I Regul. Pap., 2008
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Convicting exploitable software vulnerabilities: An efficient input provenance based approach.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
2006
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.
Proceedings of the Information Security, 9th International Conference, 2006
Effects of charge-based computation non-idealities on CMOS image compression sensors.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
Proceedings of the The First International Conference on Availability, 2006
2005
ACM SIGOPS Oper. Syst. Rev., 2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005