Follow
Zhan Qin
Zhan Qin
Researcher, Zhejiang University
No verified email - Homepage
Title
Cited by
Cited by
Year
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren
IEEE transactions on information forensics and security 11 (11), 2594-2608, 2016
7572016
Adversarial attacks and defenses in deep learning
K Ren, T Zheng, Z Qin, X Liu
Engineering 6 (3), 346-360, 2020
5252020
Heavy hitter estimation over set-valued data with local differential privacy
Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3602016
Generating synthetic decentralized social graphs with local differential privacy
Z Qin, T Yu, Y Yang, I Khalil, X Xiao, K Ren
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
2142017
Towards privacy-preserving content-based image retrieval in cloud computing
Z Xia, Y Zhu, X Sun, Z Qin, K Ren
IEEE Transactions on Cloud Computing 6 (1), 276-286, 2015
2112015
GANobfuscator: Mitigating information leakage under GAN via differential privacy
C Xu, J Ren, D Zhang, Y Zhang, Z Qin, K Ren
IEEE Transactions on Information Forensics and Security 14 (9), 2358-2371, 2019
2022019
Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy
Q Wang, Y Zhang, X Lu, Z Wang, Z Qin, K Ren
IEEE Transactions on Dependable and Secure Computing 15 (4), 591-606, 2016
1992016
The security of autonomous driving: Threats, defenses, and future directions
K Ren, Q Wang, C Wang, Z Qin, X Lin
Proceedings of the IEEE 108 (2), 357-372, 2019
1762019
Feature importance-aware transferable adversarial attacks
Z Wang, H Guo, Z Zhang, W Liu, Z Qin, K Ren
Proceedings of the IEEE/CVF international conference on computer vision …, 2021
1752021
Cloud-enabled privacy-preserving truth discovery in crowd sensing systems
C Miao, W Jiang, L Su, Y Li, S Guo, Z Qin, H Xiao, J Gao, K Ren
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems …, 2015
1652015
Towards efficient privacy-preserving image feature extraction in cloud computing
Z Qin, J Yan, K Ren, CW Chen, C Wang
Proceedings of the 22nd ACM international conference on Multimedia, 497-506, 2014
1552014
Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise
Z Zhang, Z Qin, L Zhu, J Weng, K Ren
IEEE Transactions on Smart Grid 8 (2), 619-626, 2016
1472016
Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data
S Hu, Q Wang, J Wang, Z Qin, K Ren
IEEE Transactions on Image Processing 25 (7), 3411-3425, 2016
1372016
Backdoor defense via decoupling the training process
K Huang, Y Li, B Wu, Z Qin, K Ren
arXiv preprint arXiv:2202.03423, 2022
1322022
ASAP: An anonymous smart-parking and payment scheme in vehicular networks
L Zhu, M Li, Z Zhang, Z Qin
IEEE Transactions on Dependable and Secure Computing 17 (4), 703-715, 2018
1272018
DPPro: Differentially private high-dimensional data release via random projection
C Xu, J Ren, Y Zhang, Z Qin, K Ren
IEEE Transactions on Information Forensics and Security 12 (12), 3081-3093, 2017
1142017
Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification
X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin, R Hao
IEEE Transactions on Dependable and Secure computing 18 (1), 490-504, 2019
1002019
EveDroid: Event-aware Android malware detection against model degrading for IoT devices
T Lei, Z Qin, Z Wang, Q Li, D Ye
IEEE Internet of Things Journal 6 (4), 6668-6680, 2019
972019
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Z Ba, T Zheng, X Zhang, Z Qin, B Li, X Liu, K Ren
NDSS 2020, 1-18, 2020
902020
Analyzing subgraph statistics from extended local views with decentralized differential privacy
H Sun, X Xiao, I Khalil, Y Yang, Z Qin, H Wang, T Yu
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
812019
The system can't perform the operation now. Try again later.
Articles 1–20