default search action
Quanxin Zhang 0001
Person information
- affiliation: Beijing Institute of Technology, School of Computer Science and Technology, Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, Beijing, China
Other persons with the same name
- Quanxin Zhang (aka: QuanXin Zhang, Quan-xin Zhang, Quan-Xin Zhang) — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Yu-an Tan, Quanxin Zhang, Yuanzhang Li:
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks. Comput. Networks 245: 110376 (2024) - [j45]Haoran Lyu, Yajie Wang, Yu-An Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang:
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks. Cybersecur. 7(1): 6 (2024) - [j44]Huipeng Zhou, Yajie Wang, Yu-an Tan, Shangbo Wu, Yuhang Zhao, Quanxin Zhang, Yuanzhang Li:
Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding. IEEE Trans. Artif. Intell. 5(1): 412-419 (2024) - [c28]Xundi Yang, Kefan Qiu, Quanxin Zhang:
EasyLog: An Efficient Kernel Logging Service for Machine Learning. ACNS Workshops (1) 2024: 16-28 - 2023
- [j43]Jie Yang, Jun Zheng, Thar Baker, Shuai Tang, Yu-an Tan, Quanxin Zhang:
Clean-label poisoning attacks on federated learning for IoT. Expert Syst. J. Knowl. Eng. 40(5) (2023) - [j42]Shengang Hao, Jun Zheng, Jie Yang, Haipeng Sun, Quanxin Zhang, Li Zhang, Nan Jiang, Yuanzhang Li:
Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering. Inf. Sci. 634: 85-100 (2023) - [j41]Yaoyuan Zhang, Yu-an Tan, Haipeng Sun, Yuhang Zhao, Quanxin Zhang, Yuanzhang Li:
Improving the invisibility of adversarial examples with perceptually adaptive perturbation. Inf. Sci. 635: 126-137 (2023) - [j40]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Dianxin Wang, Quanxin Zhang, Yuanzhang Li:
Towards interpreting vulnerability of object detection models via adversarial distillation. J. Inf. Secur. Appl. 72: 103410 (2023) - [j39]Yajie Wang, Yu-an Tan, Thar Baker, Neeraj Kumar, Quanxin Zhang:
Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things. IEEE Trans. Ind. Informatics 19(6): 7480-7488 (2023) - [c27]Shuai Tang, Tianshi Mu, Jun Zheng, Yurong Fu, Quanxin Zhang, Jie Yang:
A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse. AIS&P (1) 2023: 316-327 - [c26]Rong Huang, Li Chen, Jun Zheng, Quanxin Zhang, Xiao Yu:
Adversarial Attacks Against Object Detection in Remote Sensing Images. AIS&P (1) 2023: 358-367 - [c25]Yashi Liu, Kefan Qiu, Lu Liu, Quanxin Zhang:
Penetrating Machine Learning Servers via Exploiting BMC Vulnerability. ML4CS 2023: 163-172 - 2022
- [j38]Yuanzhang Li, Junli Liu, Xinting Xu, Xiaosong Zhang, Zhang Li, Quanxin Zhang:
A robust packet-dropping covert channel for mobile intelligent terminals. Int. J. Intell. Syst. 37(10): 6928-6950 (2022) - [j37]Li Zhang, Zhao Li, Huali Ren, Xiao Yu, Yuxi Ma, Quanxin Zhang:
Knowledge graph and behavior portrait of intelligent attack against path planning. Int. J. Intell. Syst. 37(10): 7110-7123 (2022) - [j36]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Tian Chen, Yuanzhang Li, Quanxin Zhang:
Boosting cross-task adversarial attack with random blur. Int. J. Intell. Syst. 37(10): 8139-8154 (2022) - [j35]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li:
Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture. Int. J. Intell. Syst. 37(12): 11167-11187 (2022) - [c24]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Quanxin Zhang, Yuanzhang Li, Dianxin Wang:
Towards Interpreting Vulnerability of Object Detection Models via Adversarial Distillation. ACNS Workshops 2022: 53-65 - [c23]Shengang Hao, Jun Zheng, Jie Yang, Ziwei Ni, Quanxin Zhang, Li Zhang:
A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness Network for Automobile Maintenance Service. ACNS Workshops 2022: 84-103 - [c22]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li:
Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture. ACNS Workshops 2022: 104-123 - [c21]Yaoyuan Zhang, Yu-an Tan, Tian Chen, Xinrui Liu, Quanxin Zhang, Yuanzhang Li:
Enhancing the Transferability of Adversarial Examples with Random Patch. IJCAI 2022: 1672-1678 - [i3]Haoran Lyu, Yajie Wang, Yu-an Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang:
Boosting Adversarial Transferability of MLP-Mixer. CoRR abs/2204.12204 (2022) - [i2]Nan Luo, Yuanzhang Li, Yajie Wang, Shangbo Wu, Yu-An Tan, Quanxin Zhang:
Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers. CoRR abs/2206.04881 (2022) - 2021
- [j34]Yuxi Ma, Meng Shen, Yuhang Zhao, Zhao Li, Xiaoyao Tong, Quanxin Zhang, Zhi Wang:
Opponent portrait for multiagent reinforcement learning in competitive environment. Int. J. Intell. Syst. 36(12): 7461-7474 (2021) - [j33]Xiaohui Kuang, Xianfeng Gao, Lianfang Wang, Gang Zhao, Lishan Ke, Quanxin Zhang:
A discrete cosine transform-based query efficient attack on black-box object detectors. Inf. Sci. 546: 596-607 (2021) - [j32]Yajie Wang, Haoran Lv, Xiaohui Kuang, Gang Zhao, Yu-an Tan, Quanxin Zhang, Jingjing Hu:
Towards a physical-world adversarial patch for blinding object detection models. Inf. Sci. 556: 459-471 (2021) - [j31]Quanxin Zhang, Mengyan Zhu, Chen Liang, Kunqing Wang, Kai Yang, Yuanzhang Li:
A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis. Mob. Networks Appl. 26(4): 1493-1502 (2021) - [j30]Yutian Zhou, Yu-an Tan, Quanxin Zhang, Xiaohui Kuang, Yahong Han, Jingjing Hu:
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers. Mob. Networks Appl. 26(4): 1616-1629 (2021) - [c20]Yuan Xue, Shouxin Wang, Tian Chen, Quanxin Zhang, Lu Liu, Yu-an Tan:
On-line Firmware Updating and Fingerprint Generating for Solid State Disks. DMBD (2) 2021: 28-36 - [c19]Xinrui Liu, Xiao Yu, Zhibin Zhang, Quanxin Zhang, Yuanzhang Li, Yu-an Tan:
A Random Multi-target Backdooring Attack on Deep Neural Networks. DMBD (2) 2021: 45-52 - [c18]Zhao Li, Yuxi Ma, Zhibin Zhang, Xiao Yu, Quanxin Zhang, Yuanzhang Li:
Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles. DMBD (2) 2021: 53-60 - [c17]Xiaoyao Tong, Yuxi Ma, Yuan Xue, Quanxin Zhang, Yuanzhang Li, Yu-an Tan:
Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement Learning. DMBD (2) 2021: 61-68 - [c16]Zhiwei Shi, Tian Chen, Yuan Xue, Yuanzhang Li, Quanxin Zhang, Yu-an Tan, Jingjing Hu:
Code Decoupling Execution Isolating Based on TF Card Firmware Extension. DSC 2021: 403-408 - [c15]Yajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, Quanxin Zhang:
Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity. IJCAI 2021: 3125-3133 - [i1]Yajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, Quanxin Zhang:
Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity. CoRR abs/2107.01396 (2021) - 2020
- [j29]Quanxin Zhang, Yuhang Zhao, Yajie Wang, Thar Baker, Jian Zhang, Jingjing Hu:
Towards cross-task universal perturbation against black-box object detectors in autonomous driving. Comput. Networks 180: 107388 (2020) - [j28]Quanxin Zhang, Xiaosong Zhang, Yuan Xue, Jingjing Hu:
A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints. Future Gener. Comput. Syst. 102: 472-480 (2020) - [j27]Yucheng Shi, Yahong Han, Quanxin Zhang, Xiaohui Kuang:
Adaptive iterative attack towards explainable adversarial robustness. Pattern Recognit. 105: 107309 (2020) - [c14]Yujie Liu, Wenjia Wu, Wen Bo, Chen Han, Quanxin Zhang, Changyou Zhang:
Permission Dispatching Mechanism Inside and Outside of the Warranty Period for Equipment Maintenance Service System. HCC 2020: 84-90 - [c13]Haitao Zhang, Fan Jia, Quanxin Zhang, Yahong Han, Xiaohui Kuang, Yu-an Tan:
Two-Way Feature-Aligned And Attention-Rectified Adversarial Training. ICME 2020: 1-6
2010 – 2019
- 2019
- [j26]Yuanzhang Li, Shangjun Yao, Kai Yang, Yu-an Tan, Quanxin Zhang:
A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images. IEEE Access 7: 73573-73582 (2019) - [j25]Xiaosong Zhang, Linhong Guo, Yuan Xue, Quanxin Zhang:
A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment. IEEE Access 7: 122214-122223 (2019) - [j24]Quanxin Zhang, Kunqing Wang, Wenjiao Zhang, Jingjing Hu:
Attacking Black-Box Image Classifiers With Particle Swarm Optimization. IEEE Access 7: 158051-158063 (2019) - [j23]Xiaohui Kuang, Hongyi Liu, Ye Wang, Qikun Zhang, Quanxin Zhang, Jun Zheng:
A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks. IEEE Access 7: 172938-172947 (2019) - [j22]Li Zhang, Shengang Hao, Quanxin Zhang:
Recovering SQLite data from fragmented flash pages. Ann. des Télécommunications 74(7-8): 451-460 (2019) - [j21]Hua Wei, Changzhen Hu, Shiyou Chen, Yuan Xue, Quanxin Zhang:
Establishing a software defect prediction model via effective dimension reduction. Inf. Sci. 477: 399-409 (2019) - [j20]Xiao Yu, Yu-an Tan, Zhizhuo Sun, Jingyu Liu, Chen Liang, Quanxin Zhang:
A fault-tolerant and energy-efficient continuous data protection system. J. Ambient Intell. Humaniz. Comput. 10(8): 2945-2954 (2019) - [j19]Quanxin Zhang, Hanxiao Gong, Xiaosong Zhang, Chen Liang, Yu-an Tan:
A sensitive network jitter measurement for covert timing channels over interactive traffic. Multim. Tools Appl. 78(3): 3493-3509 (2019) - [c12]Xinxin Wang, Yuanzhang Li, Quanxin Zhang, Xiaohui Kuang:
Boosting Training for PDF Malware Classifier via Active Learning. CSS (2) 2019: 101-110 - [c11]Haojia Zhu, Can Cui, Fengyin Li, Zhongxing Liu, Quanxin Zhang:
Design of Anonymous Communication Protocol Based on Group Signature. CSS (2) 2019: 175-181 - [c10]Dongfeng Wang, Qinghua Li, Fengyin Li, Quanxin Zhang, Banghai Xu:
Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain. CSS (1) 2019: 274-278 - [c9]Haojun Ai, Yifeng Wang, Yuhong Yang, Quanxin Zhang:
An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home Assistant. CSS (1) 2019: 363-373 - [c8]Yaxiao Wang, Yuanzhang Li, Quanxin Zhang, Jingjing Hu, Xiaohui Kuang:
Evading PDF Malware Classifiers with Generative Adversarial Network. CSS (1) 2019: 374-387 - [c7]Haojun Ai, Wuyang Xia, Quanxin Zhang:
Speaker Recognition Based on Lightweight Neural Network for Smart Home Solutions. CSS (2) 2019: 421-431 - [c6]Aming Wu, Yahong Han, Quanxin Zhang, Xiaohui Kuang:
Untargeted Adversarial Attack via Expanding the Semantic Gap. ICME 2019: 514-519 - [c5]Xiao Yu, Kunqing Wang, Quanxin Zhang, Yuanzhang Li:
A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles. SmartCom 2019: 34-41 - [c4]Yuhang Zhao, Kunqing Wang, Yuan Xue, Quanxin Zhang, Xiaosong Zhang:
An Universal Perturbation Generator for Black-Box Attacks Against Object Detectors. SmartCom 2019: 63-72 - [c3]Xiaosong Zhang, Linhong Guo, Yuan Xue, Hongwei Jiang, Lu Liu, Quanxin Zhang:
A Hybrid Covert Channel with Feedback over Mobile Networks. SocialSec 2019: 87-94 - 2018
- [j18]Qikun Zhang, Yong Gan, Quanxin Zhang, Ruifang Wang, Yu-an Tan:
A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application. IEEE Access 6: 24064-24074 (2018) - [j17]Jiamin Zheng, Yu-an Tan, Qikun Zhang, Xiaosong Zhang, Liehuang Zhu, Quanxin Zhang:
Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci. China Inf. Sci. 61(4): 048103:1-048103:3 (2018) - [j16]Yu-an Tan, Xinting Xu, Chen Liang, Xiaosong Zhang, Quanxin Zhang, Yuanzhang Li:
An end-to-end covert channel via packet dropout for mobile networks. Int. J. Distributed Sens. Networks 14(5) (2018) - [j15]Yuan Xue, Yu-an Tan, Chen Liang, Yuanzhang Li, Jun Zheng, Quanxin Zhang:
RootAgency: A digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444: 36-50 (2018) - [j14]Xiaosong Zhang, Chen Liang, Quanxin Zhang, Yuanzhang Li, Jun Zheng, Yu-an Tan:
Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445-446: 66-78 (2018) - [j13]Yu-an Tan, Yuan Xue, Chen Liang, Jun Zheng, Quanxin Zhang, Jiamin Zheng, Yuanzhang Li:
A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. Appl. 107: 69-82 (2018) - [j12]Chen Liang, Yu-an Tan, Xiaosong Zhang, Xianmin Wang, Jun Zheng, Quanxin Zhang:
Building packet length covert channel over mobile VoIP traffics. J. Netw. Comput. Appl. 118: 144-153 (2018) - [j11]Hongfei Zhu, Yu-an Tan, Liehuang Zhu, Xianmin Wang, Quanxin Zhang, Yuanzhang Li:
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks. Sensors 18(5): 1663 (2018) - [j10]Zhizhuo Sun, Quanxin Zhang, Yuanzhang Li, Yu-an Tan:
DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage. IEEE Trans. Circuits Syst. Video Technol. 28(1): 193-205 (2018) - [j9]Yu-an Tan, Xiaosong Zhang, Kashif Sharif, Chen Liang, Quanxin Zhang, Yuanzhang Li:
Covert Timing Channels for IoT over Mobile Networks. IEEE Wirel. Commun. 25(6): 38-44 (2018) - [j8]Hongfei Zhu, Yu-an Tan, Liehuang Zhu, Quanxin Zhang, Yuanzhang Li:
An Efficient Identity-Based Proxy Blind Signature for Semioffline Services. Wirel. Commun. Mob. Comput. 2018: 5401890:1-5401890:9 (2018) - [c2]Wencong Han, Quanxin Zhang, Chongzhi Gao, Jingjing Hu, Fang Yan:
Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware. ICA3PP (4) 2018: 249-259 - 2017
- [j7]Xiaosong Zhang, Yu-an Tan, Yuan Xue, Quanxin Zhang, Yuanzhang Li, Can Zhang, Jun Zheng:
Cryptographic key protection against FROST for mobile devices. Clust. Comput. 20(3): 2393-2402 (2017) - [j6]Ruijin Zhu, Baofeng Zhang, Junjie Mao, Quanxin Zhang, Yu-an Tan:
A methodology for determining the image base of ARM-based industrial control system firmware. Int. J. Crit. Infrastructure Prot. 16: 26-35 (2017) - 2016
- [j5]Ruijin Zhu, Yu-an Tan, Quanxin Zhang, Yuanzhang Li, Jun Zheng:
Determining image base of firmware for ARM devices by matching literal pools. Digit. Investig. 16: 19-28 (2016) - [j4]Ruijin Zhu, Yu-an Tan, Quanxin Zhang, Fei Wu, Jun Zheng, Yuan Xue:
Determining Image Base of Firmware Files for ARM Devices. IEICE Trans. Inf. Syst. 99-D(2): 351-359 (2016) - 2015
- [j3]Li Zhang, Shen-Gang Hao, Jun Zheng, Yu-an Tan, Quanxin Zhang, Yuan-zhang Li:
Descrambling data on solid-state disks by reverse-engineering the firmware. Digit. Investig. 12: 77-87 (2015) - [j2]Xiao Yu, Tong-Sheng Ju, Quanxin Zhang, Yuanzhang Li, Yu-an Tan:
Tuner and demodulator design of antenna control system. Int. J. Wirel. Mob. Comput. 8(2): 141-146 (2015) - 2013
- [j1]Yue Gao, Quanxin Zhang, Yulei Chu, Xiang He, Jun Wan, Zhiqiang Zhou, Jing Lin:
The research and implementation of customised launcher in Android. Int. J. Wirel. Mob. Comput. 6(5): 441-447 (2013)
2000 – 2009
- 2008
- [c1]Fusheng Jin, Zhendong Niu, Quanxin Zhang, Haiyang Lang, Kai Qin:
A User Reputation Model for DLDE Learning 2.0 Community. ICADL 2008: 61-70
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 22:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint