A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren IEEE transactions on information forensics and security 11 (11), 2594-2608, 2016 | 773 | 2016 |
Adversarial attacks and defenses in deep learning K Ren, T Zheng, Z Qin, X Liu Engineering 6 (3), 346-360, 2020 | 610 | 2020 |
Heavy hitter estimation over set-valued data with local differential privacy Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 381 | 2016 |
Generating synthetic decentralized social graphs with local differential privacy Z Qin, T Yu, Y Yang, I Khalil, X Xiao, K Ren Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 239 | 2017 |
Feature importance-aware transferable adversarial attacks Z Wang, H Guo, Z Zhang, W Liu, Z Qin, K Ren Proceedings of the IEEE/CVF international conference on computer vision …, 2021 | 234 | 2021 |
GANobfuscator: Mitigating information leakage under GAN via differential privacy C Xu, J Ren, D Zhang, Y Zhang, Z Qin, K Ren IEEE Transactions on Information Forensics and Security 14 (9), 2358-2371, 2019 | 234 | 2019 |
Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy Q Wang, Y Zhang, X Lu, Z Wang, Z Qin, K Ren IEEE Transactions on Dependable and Secure Computing 15 (4), 591-606, 2016 | 222 | 2016 |
Towards privacy-preserving content-based image retrieval in cloud computing Z Xia, Y Zhu, X Sun, Z Qin, K Ren IEEE Transactions on Cloud Computing 6 (1), 276-286, 2015 | 218 | 2015 |
The security of autonomous driving: Threats, defenses, and future directions K Ren, Q Wang, C Wang, Z Qin, X Lin Proceedings of the IEEE 108 (2), 357-372, 2019 | 206 | 2019 |
Cloud-enabled privacy-preserving truth discovery in crowd sensing systems C Miao, W Jiang, L Su, Y Li, S Guo, Z Qin, H Xiao, J Gao, K Ren Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems …, 2015 | 180 | 2015 |
Backdoor defense via decoupling the training process K Huang, Y Li, B Wu, Z Qin, K Ren arXiv preprint arXiv:2202.03423, 2022 | 171 | 2022 |
Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise Z Zhang, Z Qin, L Zhu, J Weng, K Ren IEEE Transactions on Smart Grid 8 (2), 619-626, 2016 | 159 | 2016 |
Towards efficient privacy-preserving image feature extraction in cloud computing Z Qin, J Yan, K Ren, CW Chen, C Wang Proceedings of the 22nd ACM international conference on Multimedia, 497-506, 2014 | 157 | 2014 |
Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data S Hu, Q Wang, J Wang, Z Qin, K Ren IEEE Transactions on Image Processing 25 (7), 3411-3425, 2016 | 139 | 2016 |
ASAP: An anonymous smart-parking and payment scheme in vehicular networks L Zhu, M Li, Z Zhang, Z Qin IEEE Transactions on Dependable and Secure Computing 17 (4), 703-715, 2018 | 134 | 2018 |
DPPro: Differentially private high-dimensional data release via random projection C Xu, J Ren, Y Zhang, Z Qin, K Ren IEEE Transactions on Information Forensics and Security 12 (12), 3081-3093, 2017 | 125 | 2017 |
Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin, R Hao IEEE Transactions on Dependable and Secure computing 18 (1), 490-504, 2019 | 114 | 2019 |
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. Z Ba, T Zheng, X Zhang, Z Qin, B Li, X Liu, K Ren NDSS 2020, 1-18, 2020 | 113 | 2020 |
EveDroid: Event-aware Android malware detection against model degrading for IoT devices T Lei, Z Qin, Z Wang, Q Li, D Ye IEEE Internet of Things Journal 6 (4), 6668-6680, 2019 | 110 | 2019 |
Analyzing subgraph statistics from extended local views with decentralized differential privacy H Sun, X Xiao, I Khalil, Y Yang, Z Qin, H Wang, T Yu Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 96 | 2019 |