Prof. ZHAO Qingchuan (趙晴川)

Research Output

  1. 2024
  2. Published

    Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps

    Chen, Y., Tang, R., Zuo, C., Zhang, X., Xue, L., Luo, X. & Zhao, Q., Feb 2024, ICSE '24: Proceedings of the 46th IEEE/ACM International Conference on Software . Association for Computing Machinery, 13 p. 63

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Check@CityULib
  3. Published

    DeMistify: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps

    Ren, P., Zuo, C., Liu, X., Diao, W., Zhao, Q. & Guo, S., Feb 2024, ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. Association for Computing Machinery, 41. (Proceedings - International Conference on Software Engineering).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 2
    Check@CityULib
  4. Published

    AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection

    Meng, X., Wang, L., Guo, S., Ju, L. & Zhao, Q., 2024, Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Institute of Electrical and Electronics Engineers, Inc., p. 74-90 (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Check@CityULib
  5. Published

    L-AutoDA: Large Language Models for Automatically Evolving Decision-based Adversarial Attacks

    Guo, P., Liu, F., Lin, X., Zhao, Q. & Zhang, Q., 2024, GECCO '24 Companion: Proceedings of the 2024 Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery, p. 1846-1854

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Check@CityULib
  6. 2023
  7. Published

    Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning

    Ni, T., Li, J., Zhang, X., Zuo, C., Wang, W., Xu, W., Luo, X., & 1 othersZhao, Q., Oct 2023, ACM MobiCom '23: Proceedings of the 29th Annual International Conference on Mobile Computing and Networking. Association for Computing Machinery, p. 1105-1119 15 p. 73

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 8
    Check@CityULib
  8. Online published

    XPorter: A Study of the Multi-Port Charger Security on Privacy Leakage and Voice Injection

    Ni, T., Chen, Y., Xu, W., Xue, L. & Zhao, Q., Oct 2023, (Online published) ACM MobiCom '23: Proceedings of the 29th Annual International Conference on Mobile Computing and Networking. Association for Computing Machinery, 15 p.

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 4
    Check@CityULib
  9. Published

    Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting

    Ni, T., Lan, G., Wang, J., Zhao, Q. & Xu, W., Aug 2023, Proceedings of the 32nd USENIX Security Symposium. USENIX Association, p. 3511-3528 18 p. (USENIX Security Symposium, USENIX Security).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 14
    Check@CityULib
  10. Published

    Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding

    Lu, H., Zhao, Q., Chen, Y., Liao, X. & Lin, Z., Jun 2023, In: Performance Evaluation Review. 51, 1, p. 45-46

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Check@CityULib
  11. Published

    Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding

    LU, H., ZHAO, Q., CHEN, Y., LIAO, X. & LIN, Z., Mar 2023, In: Proceedings of the ACM on Measurement and Analysis of Computing Systems. 7, 1, 18.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 4
    Check@CityULib
  12. Published

    Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding

    Lu, H., Zhao, Q., Chen, Y., Liao, X. & Lin, Z., 2023, SIGMETRICS '23 Abstracts - Abstract Proceedings of the 2023 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. New York, NY: Association for Computing Machinery, Inc, p. 45-46 (SIGMETRICS - Abstract Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 1
    Check@CityULib
  13. Published

    No-Fuzz: Efficient Anti-fuzzing Techniques

    Zhou, Z., Wang, C. & Zhao, Q., 2023, Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. Li, F., Liang, K., Lin, Z. & Katsikas, S. K. (eds.). Cham: Springer , p. 731-751 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 462).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 4
    Check@CityULib
  14. Published

    Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel

    Ni, T., Zhang, X. & Zhao, Q., 2023, CCS '23 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. New York, NY: Association for Computing Machinery, p. 253-267 15 p.

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 6
    Check@CityULib
  15. Published

    Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels

    Ni, T., Zhang, X., Zuo, C., Li, J., Yan, Z., Wang, W., Xu, W., & 2 othersLuo, X. & Zhao, Q., 2023, Proceedings - 44th IEEE Symposium on Security and Privacy, SP 2023. Institute of Electrical and Electronics Engineers, Inc., p. 3399-3415 17 p. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 12
    Check@CityULib
  16. 2022
  17. Published

    PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals

    Zhao, Q., Zuo, C., Blasco, J. & Lin, Z., May 2022, ASIA CCS ’22: Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery, p. 521-533 (ASIA CCS - Proceedings of the ACM Asia Conference on Computer and Communications Security).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 3
    Check@CityULib
  18. 2020
  19. FIRMSCOPE: Automatic uncovering of privilege-escalation vulnerabilities in pre-installed apps in Android firmware

    Elsabagh, M., Johnson, R., Stavrou, A., Zuo, C., Zhao, Q. & Lin, Z., Aug 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association, p. 2379-2396 (Proceedings of the USENIX Security Symposium).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 37
    Check@CityULib
  20. Automated Cross-Platform Reverse Engineering of CAN Bus Commands from Mobile Apps

    Wen, H., Zhao, Q., Chen, Q. & Lin, Z., Feb 2020, Proceedings - 2020 Network and Distributed System Security Symposium. Reston, VA: Internet Society, 17 p.

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 26
    Check@CityULib
  21. A study of the privacy of COVID-19 contact tracing apps

    Wen, H., Zhao, Q., Lin, Z., Xuan, D. & Shroff, N., 2020, Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Proceedings. Springer, Cham, Vol. Part I. p. 297-317 (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 335).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 56
    Check@CityULib
  22. Automatic uncovering of hidden behaviors from input validation in mobile apps

    Zhao, Q., Zuo, C., Dolan-Gavitt, B., Pellegrino, G. & Lin, Z., 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers, Inc., p. 1106-1120 9152205. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 31
    Check@CityULib
  23. On the accuracy of measured proximity of bluetooth-based contact tracing apps

    Zhao, Q., Wen, H., Lin, Z., Xuan, D. & Shroff, N., 2020, Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Proceedings. Park, N., Sun, K. & Foresti, S. (eds.). Springer, Cham, Vol. Part I. p. 49-60 (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 335).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 38
    Check@CityULib
  24. 2019
  25. Your IoTs Are (Not) Mine: On the Remote Binding between IoT Devices and Users

    Chen, J., Zuo, C., Diao, W., Dong, S., Zhao, Q., Sun, M., Lin, Z., & 2 othersZhang, Y. & Zhang, K., 1 Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019. Institute of Electrical and Electronics Engineers, Inc., p. 222-233 8809544. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 36
    Check@CityULib
Previous 1 2 Next