default search action
Qingchuan Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j4]Longxiang Wang, Qingchuan Zhao, Wei-Bin Lee, Cong Wang:
Deploying Intrusion Detection on In-Vehicle Networks: Challenges and Opportunities. IEEE Netw. 39(1): 306-312 (2025) - [j3]Hangcheng Liu, Yuan Zhou, Ying Yang, Qingchuan Zhao, Tianwei Zhang, Tao Xiang:
Stealthiness Assessment of Adversarial Perturbation: From a Visual Perspective. IEEE Trans. Inf. Forensics Secur. 20: 898-913 (2025) - 2024
- [j2]Luoyu Mei, Ruofeng Liu, Zhimeng Yin, Qingchuan Zhao, Wenchao Jiang, Shuai Wang, Kangjie Lu, Tian He:
mmSpyVR: Exploiting mmWave Radar for Penetrating Obstacles to Uncover Privacy Vulnerability of Virtual Reality. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(4): 172:1-172:29 (2024) - [c23]Ping Guo, Fei Liu, Xi Lin, Qingchuan Zhao, Qingfu Zhang:
L-AutoDA: Large Language Models for Automatically Evolving Decision-based Adversarial Attacks. GECCO Companion 2024: 1846-1854 - [c22]Pengcheng Ren, Chaoshun Zuo, Xiaofeng Liu, Wenrui Diao, Qingchuan Zhao, Shanqing Guo:
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps. ICSE 2024: 41:1-41:13 - [c21]Yongliang Chen, Ruoqin Tang, Chaoshun Zuo, Xiaokuan Zhang, Lei Xue, Xiapu Luo, Qingchuan Zhao:
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps. ICSE 2024: 63:1-63:13 - [c20]Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao:
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection. SP 2024: 74-90 - [i8]Ping Guo, Zhiyuan Yang, Xi Lin, Qingchuan Zhao, Qingfu Zhang:
PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks. CoRR abs/2401.10586 (2024) - [i7]Ping Guo, Fei Liu, Xi Lin, Qingchuan Zhao, Qingfu Zhang:
L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks. CoRR abs/2401.15335 (2024) - [i6]Xiping Sun, Jing Chen, Kun He, Zhixiang He, Ruiying Du, Yebo Feng, Qingchuan Zhao, Cong Wu:
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing. CoRR abs/2404.15000 (2024) - [i5]Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Weisong Sun, Ruiying Du, Qingchuan Zhao, Yang Liu:
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph. CoRR abs/2406.00921 (2024) - [i4]Shuai Yuan, Hongwei Li, Xingshuo Han, Guowen Xu, Wenbo Jiang, Tao Ni, Qingchuan Zhao, Yuguang Fang:
ITPatch: An Invisible and Triggered Physical Adversarial Patch against Traffic Sign Recognition. CoRR abs/2409.12394 (2024) - [i3]Luoyu Mei, Ruofeng Liu, Zhimeng Yin, Qingchuan Zhao, Wenchao Jiang, Shuai Wang, Kangjie Lu, Tian He:
mmSpyVR: Exploiting mmWave Radar for Penetrating Obstacles to Uncover Privacy Vulnerability of Virtual Reality. CoRR abs/2411.09914 (2024) - [i2]Tao Ni, Yuefeng Du, Qingchuan Zhao, Cong Wang:
Non-intrusive and Unconstrained Keystroke Inference in VR Platforms via Infrared Side Channel. CoRR abs/2412.14815 (2024) - 2023
- [j1]Haoran Lu, Qingchuan Zhao, Yongliang Chen, Xiaojing Liao, Zhiqiang Lin:
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding. Proc. ACM Meas. Anal. Comput. Syst. 7(1): 18:1-18:27 (2023) - [c19]Tao Ni, Xiaokuan Zhang, Qingchuan Zhao:
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel. CCS 2023: 253-267 - [c18]Tao Ni, Jianfeng Li, Xiaokuan Zhang, Chaoshun Zuo, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao:
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning. MobiCom 2023: 73:1-73:15 - [c17]Tao Ni, Yongliang Chen, Weitao Xu, Lei Xue, Qingchuan Zhao:
XPorter: A Study of the Multi-Port Charger Security on Privacy Leakage and Voice Injection. MobiCom 2023: 78:1-78:15 - [c16]Haoran Lu, Qingchuan Zhao, Yongliang Chen, Xiaojing Liao, Zhiqiang Lin:
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding. SIGMETRICS (Abstracts) 2023: 45-46 - [c15]Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao:
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels. SP 2023: 3399-3415 - [c14]Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu:
Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting. USENIX Security Symposium 2023: 3511-3528 - [i1]Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao:
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection. CoRR abs/2312.08675 (2023) - 2022
- [c13]Qingchuan Zhao, Chaoshun Zuo, Jorge Blasco, Zhiqiang Lin:
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals. AsiaCCS 2022: 521-533 - [c12]Zhengxiang Zhou, Cong Wang, Qingchuan Zhao:
No-Fuzz: Efficient Anti-fuzzing Techniques. SecureComm 2022: 731-751 - 2020
- [c11]Haohuang Wen, Qingchuan Zhao, Qi Alfred Chen, Zhiqiang Lin:
Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps. NDSS 2020 - [c10]Qingchuan Zhao, Haohuang Wen, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps. SecureComm (1) 2020: 49-60 - [c9]Haohuang Wen, Qingchuan Zhao, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
A Study of the Privacy of COVID-19 Contact Tracing Apps. SecureComm (1) 2020: 297-317 - [c8]Qingchuan Zhao, Chaoshun Zuo, Brendan Dolan-Gavitt, Giancarlo Pellegrino, Zhiqiang Lin:
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps. SP 2020: 1106-1120 - [c7]Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin:
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. USENIX Security Symposium 2020: 2379-2396
2010 – 2019
- 2019
- [c6]Jiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, Kehuan Zhang:
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users. DSN 2019: 222-233 - [c5]Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin:
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. NDSS 2019 - 2018
- [c4]Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, Kehuan Zhang:
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. NDSS 2018 - 2017
- [c3]Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin:
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services. CCS 2017: 799-813 - [c2]Yufei Gu, Qingchuan Zhao, Yinqian Zhang, Zhiqiang Lin:
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace. CODASPY 2017: 173-184 - 2013
- [c1]Jun Li, Tao Wang, Shuyue Hu, Qingchuan Zhao, Huaqing Min:
Products Competitive Relationships Mining. ER Workshops 2013: 205-215
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-26 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint