lin-jingqiang.github.io

View My GitHub Profile

Full Publication (by area / year)

PKI and Certificate

  1. Aozhuo Sun, Jingqiang Lin, Wei Wang, Zeyan Liu, Bingyu Li, Shushang Wen, Qiongxiao Wang, Fengjun Li, “Certificate Transparency Revisited: The Public Inspections on Third-party Monitors”, 31st ISOC Network and Distributed System Security Symposium (NDSS), 2024.
  2. Yajun Teng, Wei Wang, Jun Shao, Huiqing Wan, Heqing Huang, Yong Liu, Jingqiang Lin, “Curveball+: Exploring Curveball-like Vulnerabilities of Implicit Certificate Validation”, 28th European Symposium on Research in Computer Security (ESORICS), 2023.
  3. Aozhuo Sun, Bingyu Li, Qiongxiao Wang, Huiqing Wan, Jingqiang Lin, Wei Wang, “Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers”, 28th IEEE Symposium Computers and Communications (ISCC), 2023.
  4. Huiqing Wan, Qiongxiao Wang, Cunqing Ma, Yajun Teng, Jingqiang Lin, Dingfeng Ye, “ESCORT: Efficient Status Check and Revocation Transparency for Linkage-Based Pseudonym Certificates in VANETs”, 28th IEEE Symposium Computers and Communications (ISCC), 2023.
  5. Huiqing Wan, Qiongxiao Wang, Yajun Teng, Cunqing Ma, Jingqiang Lin, Mingyu Wang, “ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT”, 32nd International Conference on Computer Communications and Networks (ICCCN), 2023.
  6. Guangqi Liu, Qiongxiao Wang, Cunqing Ma, Jingqiang Lin, Yanduo Fu, Bingyu Li, Dingfeng Ye, “The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures”, 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023.
  7. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, Congli Wang, “The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild”, IEEE/ACM Transactions on Networking (TON), Vol. 30, No. 2, pp. 749-765, 2022.
  8. Li Song, Qiongxiao Wang, Shijie Jia, Jingqiang Lin, Linli Lu, Yanduo Fu, “You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks”, 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2022.
  9. Bingyu Li, Jingqiang Lin, Qiongxiao Wang, Ze Wang, Jiwu Jing, “Locally-centralized Certificate Validation and Its Application in Desktop Virtualization Systems”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 16, pp. 1380-1395, 2021.
  10. Wanling Huang, Jingqiang Lin, Qiongxiao Wang, Yajun Teng, Huiqing Wan, Wei Wang, “Certificate Transparency for ECQV Implicit Certificates”, 55th IEEE International Conference on Communications (ICC), 2021.
  11. Yanduo Fu, Qiongxiao Wang, Jingqiang Lin, Aozhuo Sun, Linli Lu, “Exploring the Security Issues of Trusted CA Certificate Management”, 23rd International Conference on Information and Communications Security (ICICS), 2021.
  12. Wenyuan Li, Wei Wang, Jingqiang Lin, Qiongxiao Wang, Wenjie Wang, “Privacy Preserving OpenPGP Public Key Distribution with Spamming Resistance”, 17th International Conference on Information Security and Cryptology (Inscrypt), 2021.
  13. Yunkun Wu, Xiaokun Zhang, Yajun Teng, Zhenya Liu, Liang Huang, Jingqiang Lin, Xuhua Bao, “Recent Advances in the Web PKI and the Technical Challenges in SCMS”, 1st EAI International Conference on Applied Cryptography in Computer and Communications (AC3), 2021.
  14. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang, “Certificate Transparency in the Wild: Exploring the Reliability of Monitors”, 26th ACM Conference on Computer and Communications Security (CCS), pp. 2505-2520, 2019.
  15. Bingyu Li, Dawei Chu, Jingqiang Lin, Quanwei Cai, Congli Wang, Lingjia Meng, “The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party Monitors”, 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 216-223, 2019.
  16. Bingyu Li, Wei Wang, Lingjia Meng, Jingqiang Lin, Xuezhong Liu, Congli Wang, “Elaphurus: Ensemble Defense against Fraudulent Certificates in TLS”, 15th International Conference on Information Security and Cryptology (Inscrypt), pp. 246-259, 2019.
  17. Congli Wang, Jingqiang Lin, Bingyu Li, Qi Li, Qiongxiao Wang, Xiaokun Zhang, “Analyzing the Browser Security Warnings on HTTPS Errors”, 53rd IEEE International Conference on Communications (ICC), 2019.
  18. Wen-Tao Zhu, Jingqiang Lin, “Generating Correlated Digital Certificates: Framework and Applications”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11, No. 6, pp. 1117-1127, 2016.
  19. Jingqiang Lin, Wen-Tao Zhu, Qiongxiao Wang, Nan Zhang, Jiwu Jing, Neng Gao, “RIKE+: Using Revocable Identities to Support Key Escrow in Public Key Infrastructures with Flexibility”, IET Information Security (IET-IFS), Vol. 9, No. 2, pp. 136-147, 2015.
  20. Jingqiang Lin, Jiwu Jing, Qionglu Zhang, Zhan Wang, “Recent Advances in PKI Technologies”, Chinese Journal of Cryptologic Research, Vol. 2, No. 6, pp. 487-496, 2015.
  21. Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao, “RIKE: Using Revocable Identities to Support Key Escrow in PKIs”, 10th International Conference on Applied Cryptography and Network Security (ACNS), pp. 48-65, 2012.
  22. Jingqiang Lin, Jiwu Jing, Peng Liu, “Evaluating Intrusion Tolerant Certification Authority Systems”, Quality and Reliability Engineering International (QREI), Vol. 28, No. 8, pp. 825-841, 2012.
  23. Quanwei Cai, Jingqiang Lin, Jiwu Jing, Ming Shang, “An Interoperability Evaluation Tool of PKI Applications”, Journal of Graduate University of Chinese Academy of Sciences, Vol. 29, No. 6, pp. 799-804, 2012.
  24. Jiwu Jing, Chuankun Wu, Jingqiang Lin, “Advances in Key Management and PKI Technologies”, chapter in Report on Advances in Cryptology, China Science and Technology Press, ISBN 9787504650207, pp. 107-125, 2010.
  25. Fan Zhang, Qing Gu, Jiwu Jing, Jingqiang Lin, Dare Zha, “PKI Application Interoperability Evaluation”, Journal of Graduate School of Chinese Academy of Sciences, Vol. 27, No. 6, pp. 824-830, 2010.
  26. Jingjing Wu, Jiwu Jing, Yuewu Wang, Jingqiang Lin, Yicong Liu, “Trust Model for Public Key Infrastructure in the Real-world Environment”, Journal of Graduate School of Chinese Academy of Sciences, Vol. 26, No. 3, pp. 389-399, 2009.
  27. Jiwu Jing, Jingqiang Lin, Dengguo Feng, “PKI Technology”, Science Press of China, ISBN 9787030219060, 2008.
  28. Jingqiang Lin, Jiwu Jing, Peng Liu, “A Framework for Intrusion Tolerant Certification Authority System Evaluation”, 26th IEEE Symposium on Reliable Distributed Systems (SRDS), pp. 231-241, 2007.
  29. Jingqiang Lin, Dengguo Feng, “Temporary RSA Key and OCSP Server Implementation”, Journal of Graduate School of Chinese Academy of Sciences, Vol. 22, No. 1, pp. 59-63, 2005.
  30. Jiwu Jing, Peng Liu, Dengguo Feng, Ji Xiang, Neng Gao, Jingqiang Lin, “ARECA: A Highly Attack Resilient Certification Authority”, ACM Workshop on Survivable and Self-Regenerative Systems (SSRS), in conjunction with 10th ACM Conference on Computer and Communications Security (CCS), pp. 53-63, 2003.

Authentication, Anonymity and Privacy

  1. Ruixuan Li, Xiaofeng Jia, Zhenyong Zhang, Jun Shao, Rongxing Lu, Jingqiang Lin, Xiaoqi Jia, Guiyi Wei, “A Longitudinal and Comprehensive Measurement of DNS Strict Privacy”, IEEE/ACM Transactions on Networking (TON), Vol. 31, No. 6, pp. 2793-2808, 2023.
  2. Bowen Xu, Shijie Jia, Jingqiang Lin, Fangyu Zheng, Yuan Ma, Limin Liu, Xiaozhuo Gu, Li Song, “JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications”, 28th European Symposium on Research in Computer Security (ESORICS), 2023.
  3. Guangqi Liu, Jingqiang Lin, Dawei Chu, Xiaokun Zhang, Qiongxiao Wang, Cunqing Ma, Fengjun Li, Dingfeng Ye, “Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms”, 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023.
  4. Li Song, Qiongxiao Wang, Jingqiang Lin, Shijie Jia, Yingjiu Li, Yikai Chen, “Approach then Connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme”, IEEE Wireless Communications and Network Conference (WCNC), 2022.
  5. Yaxi He, Wei Wang, Yajun Teng, Qiongxiao Wang, Mingyue Wang, Jingqiang Lin, “ABLE: Zero-effort Two-factor Authentication Exploiting BLE Co-location”, IEEE Wireless Communications and Network Conference (WCNC), 2022.
  6. Rong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang, “Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and their Real-World Deployment”, 37th Annual Computer Security Applications Conference (ACSAC), 2021.
  7. Mingwu Zhang, Yu Chen, Jingqiang Lin, “A Privacy-Preserving Optimization of Neighborhood-based Recommendation for Medical-Aided Diagnosis and Treatment”, IEEE Internet of Things Journal (IoT-J), Vol. 8, No. 13, pp. 10830-10842, 2021.
  8. Chengqian Guo, Quanwei Cai, Qiongxiao Wang, Jingqiang Lin, “Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes”, 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020.
  9. Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang, “Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs”, 15th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 511-531, 2019.
  10. Xuhua Bao, Xiaokun Zhang, Jingqiang Lin, Dawei Chu, Qiongxiao Wang, Fengjun Li, “Towards the Trust-Enhancements of Single Sign-On Services”, 3rd IEEE Conference on Dependable and Secure Computing (IDSC), 2019.
  11. Quanwei Cai, Jonathan Lutes, Jingqiang Lin, Bo Luo, “A-Tor: Accountable Anonymity in Tor”, 13th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 838-851, 2017.
  12. Jiwu Jing, Jingqiang Lin, Zhan Wang, Neng Gao, “Report on Authentication Technologies”, chapter in Report on Advances in Cryptology, China Science and Technology Press, ISBN 9787504670663, pp. 119-134, 2016.
  13. Congwu Li, Wuqiong Pan, Jingqiang Lin, “An AD-based Private Cloud Storage Access Control Scheme”, Journal of University of Chinese Academy of Sciences, Vol. 32, No. 5, pp. 676-681, 2015.
  14. Jiwu Jing, Pingjian Wang, Neng Gao, Ji Xiang, Jingqiang Lin, Zongbin Liu, “Emerging E-Business - Security Architecture and Certification Technologies”, Tsinghua University Press of China, ISBN 9787302324348, 2013.
  15. Daren Zha, Jiwu Jing, Peng Liu, Jingqiang Lin, Xiaoqi Jia, “Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control”, 10th International Conference on Computational Science and Its Applications (ICCSA), pp. 468-481, 2010.

Fault Tolerance, Blockchain and Transparency

  1. Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Daren Zha, Jiwu Jing, “Blockchain-based Certificate Transparency and Revocation Transparency”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 19, No. 1, 681-697, 2022.
  2. Tianlin Song, Jingqiang Lin, Wei Wang, Quanwei Cai, “Traceable Revocable Anonymous Registration Scheme with Zero-knowledge Proof on Blockchain”, 54th IEEE International Conference on Communications (ICC), 2020.
  3. Tianlin Song, Wei Wang, Fan Lang, Wenyi Ouyang, Qiongxiao Wang, Jingqiang Lin, “P2A: Privacy Preserving Anonymous Authentication based on Blockchain and SGX”, 16th International Conference on Information Security and Cryptology (Inscrypt), 2020.
  4. Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Jiwu Jing, Daren Zha, “Blockchain-based Certificate Transparency and Revocation Transparency”, 5th Workshop on Bitcoin and Blockchain Research (BITCOIN), in conjunction with 21st International Conference on Financial Cryptography and Data Security (FC), 2018, pp. 144-162.
  5. Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Daren Zha, “EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems against Faulty Clients”, 10th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 305-322, 2014.
  6. Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang, “Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes”, Security and Communication Networks (SCN), Vol. 6, No. 5, pp. 612-630, 2013.
  7. Jingqiang Lin, Bo Luo, Jiwu Jing, Xiaokun Zhang, “GRADE: Graceful Degradation in Byzantine Quorum Systems”, 31st IEEE Symposium on Reliable Distributed Systems (SRDS), pp. 171-180, 2012.
  8. Wentao Wang, Jingqiang Lin, Jiwu Jing, Bo Luo, “Graceful Degradation in TSS-BQS Systems”, Chinese Journal of Computers, Vol. 35, No. 9, pp. 1793-1803, 2012.
  9. Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang, “Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes”, 6th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 307-325, 2010.
  10. Qiongxiao Wang, Jiwu Jing, Jingqiang Lin, “A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms”, 10th IEEE International Conference on Computer and Information Technology (CIT), pp. 596-603, 2010.
  11. Jiwu Jing, Jing Wang, Jingqiang Lin, Yongquan Xie, Qing Gu, “Server Protocols of Byzantine Quorum Systems Implemented Utilizing Threshold Signature Schemes”, Chinese Journal of Software, Vol. 21, No. 10, pp. 2631-2641, 2010.
  12. Haijiao Liu, Jiwu Jing, Jingqiang Lin, Jiao Du, “Building an Intrusion Tolerant Repository”, Journal of Graduate School of Chinese Academy of Sciences, Vol. 23, No. 1, pp. 46-51, 2006.

Cryptographic Key Protection and Side Channel

  1. Mingyu Wang, Lingjia Meng, Fangyu Zheng, Jingqiang Lin, Shijie Jia, Yuan Ma, Haoling Fan, “TLTracer: Dynamically Detecting Cache Side Channel Attacks with a Timing Loop Tracer”, 58th IEEE International Conference on Communications (ICC), 2024.
  2. Mingyu Wang, Shijie Jia, Fangyu Zheng, Yuan Ma, Jingqiang Lin, Lingjia Meng, Ziqiang Ma, “TF-Timer: Mitigating Cache Side-Channel Attacks in Cloud through a Targeted Fuzzy Timer”, IEEE Wireless Communications and Network Conference (WCNC), 2024.
  3. Yu Fu, Jingqiang Lin, Dengguo Feng, Wei Wang, Mingyu Wang, Wenjie Wang, “RegKey: A Register-based Implementation of ECC Signature Algorithms against One-shot Memory Disclosure”, ACM Transactions on Embedded Computing Systems (TECS), Vol. 22, No. 6, pp. 1-12, 2023.
  4. Lingjia Meng, Yu Fu, Fangyu Zheng, Ziqiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin, “Protecting Private Keys of Dilithium using Hardware Transactional Memory”, 26th Information Security Conference (ISC), 2023.
  5. Yunming Zhang, Quanwei Cai, Houqiang Li, Jingqiang Lin, Wei Wang, “mShield: Protecting In-process Sensitive Data against Vulnerable Third-Party Libraries”, 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2023.
  6. Haoling Fan, Fangyu Zheng, Jingqiang Lin, Lingjia Meng, Mingyu Wang, Qiang Wang, Shijie Jia, Yuan Ma, “A Hybrid Detection Approach for Cryptographic Algorithms of Closed Source Software”, 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023.
  7. Lingjia Meng, Jingqiang Lin, Fangyu Zheng, Fan Lang, Mingyu Wang, “Research on Transient Execution Attacks and Their Impact on Security-Enhanced Software Cryptographic Implementation Schemes”, Chinese Journal of Cyber Security, 2023.
  8. Fan Lang, Wei Wang, Lingjia Meng, Jingqiang Lin, Qiongxiao Wang, Linli Lu, “MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape”, 38th Annual Computer Security Applications Conference (ACSAC), 2022.
  9. Wenqing Li, Shijie Jia, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin, “CryptoGo: Automatic Detection of Go Cryptographic API Misuses”, 38th Annual Computer Security Applications Conference (ACSAC), 2022.
  10. Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Quanwei Cai, Shuqin Fan, Fan Zhang, Bo Luo, “Another Lattice Attack against ECDSA with the wNAF to Recover More Bits per Signature”, 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2022.
  11. Jingqiang Lin, Fangyu Zheng, Wei Wang, Zhe Liu, Qiongxiao Wang, “Cryptographic Software Implementation and Cryptographic Key Security”, China Machine Press, ISBN 9787111679578, 2021.
  12. Congwu Li, Le Guan (co-first author), Jingqiang Lin, Bo Luo, Quanwei Cai, Jiwu Jing, Jing Wang, “Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 18, No. 3, pp. 1196-1213, 2021.
  13. Yu Fu, Wei Wang, Lingjia Meng, Qiongxiao Wang, Yuan Zhao, Jingqiang Lin, “VIRSA: Vectorized In-Register RSA Computation with Memory Disclosure Resistance”, 23rd International Conference on Information and Communications Security (ICICS), 2021.
  14. Fan Lang, Wei Wang, Lingjia Meng, Qiongxiao Wang, Jingqiang Lin, Li Song, “Informer: Protecting Intel SGX from Cross-core Side Channel Threats”, 23rd International Conference on Information and Communications Security (ICICS), 2021.
  15. Wenyi Ouyang, Qiongxiao Wang, Wei Wang, Jingqiang Lin, Yaxi He, “SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGX”, 40th IEEE International Performance Computing and Communications Conference (IPCCC), 2021.
  16. Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Guang Fan, Jiankuo Dong, “SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment”, 39th IEEE International Performance Computing and Communications Conference (IPCCC), 2020.
  17. Fan Lang, Huorong Li, Wei Wang, Jingqiang Lin, Fengwei Zhang, Wuqiong Pan, Qiongxiao Wang, “E-SGX: Cache Side-Channel Protection for Intel SGX on Untrusted OS”, 16th International Conference on Information Security and Cryptology (Inscrypt), 2020.
  18. Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Bo Luo, Jiwu Jing, “Towards the Optimal Performance of Integrating Warm and Delay against Remote Cache Timing Side Channels on Block Ciphers”, Journal of Computer Security (JCS), Vol. 27, No. 5, pp. 547-580, 2019.
  19. Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Jiwu Jing, Dingfeng Ye, Lingjia Meng, “Evaluating the Cache Side Channel Attacks against ECDSA”, 15th International Conference on Information Security and Cryptology (Inscrypt), pp. 325-345, 2019.
  20. Congwu Li, Jingqiang Lin, Quanwei Cai, Bo Luo, “Applying Transactional Memory in System Security: Present and Future”, Chinese Journal of Cyber Security, Vol. 4, No. 6, pp. 45-55, 2019.
  21. Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng, “CacheGuard: A Security-Enhanced Directory Architecture against Continuous Attacks”, 16th ACM International Conference on Computing Frontiers (CF), pp. 32-41, 2019.
  22. Le Guan, Jingqiang Lin, Ziqiang Ma, Bo Luo, Luning Xia, Jiwu Jing, “Copker: A Cryptographic Engine against Cold-Boot Attacks”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 15, No. 5, pp. 742-754, 2018.
  23. Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong, “Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation”, 20th International Conference on Information and Communications Security (ICICS), pp. 142-157, 2018.
  24. Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng, “PoS: Constructing Practical and Efficient Public Key Cryptosystems based on Symmetric Cryptography with SGX”, 20th International Conference on Information and Communications Security (ICICS), pp. 767-777, 2018.
  25. Congwu Li, Jingqiang Lin, Quanwei Cai, Bo Luo, “Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines”, 16th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA), pp. 862-869, 2018.
  26. Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li, “SSUKey: A CPU-based Solution Protecting Private Keys on Untrusted OS”, 18th International Conference on Information and Communications Security (ICICS), pp. 51-62, 2017.
  27. Jingqiang Lin, Bo Luo, Le Guan, Jiwu Jing, “Secure Computing using Registers and Caches: The Problem, Challenges and Solutions”, IEEE Security & Privacy, Vol. 14, No. 6, pp. 63-70, 2016.
  28. Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma, “RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks”, 31st International Conference on Systems Security and Privacy Protection (IFIP SEC), pp. 293-307, 2016.
  29. Kaijie Zhu, Quanwei Cai, Jingqiang Lin, Jiwu Jing, “Cryptographic Key Security and the Advances with Virtualization”, Chinese Journal of Cryptologic Research, Vol. 3, No. 1, pp. 12-21, 2016.
  30. Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, Jing Wang, “Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory”, 36th IEEE Symposium on Security and Privacy (Oakland), pp. 3-19, 2015.
  31. Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, “Copker: Computing with Private Keys without RAM”, 21st ISOC Network and Distributed System Security Symposium (NDSS), 2014.

High-performance Cryptographic Implementation

  1. Zhenya Liu, Jingqiang Lin, Xuhua Bao, Jiankuo Dong, “An ECQV-Schnorr Signature Aggregation Scheme with Fast Error Detections in Verification for BSMs of IoV”, Chinese Journal of Cryptologic Research, accepted.
  2. Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin, “ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches”, 26th International Conference on Cryptographic Hardware and Embedded Systems (CHES), 2024.
  3. Guang Fan, Fangyu Zheng, Lipeng Wan, Lili Gao, Yuan Zhao, Jiankuo Dong, Yixuan Song, Yuewu Wang, Jingqiang Lin, “Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs”, 37th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2023.
  4. Jiankuo Dong, Pinchang Zhang, Kaisheng Sun, Fu Xiao, Fangyu Zheng, Jingqiang Lin, “EG-FourQ: An Embedded GPU based Efficient ECC Cryptography Accelerator for Edge Computing”, IEEE Transactions on Industrial Informatics (TII), Vol. 19, No. 6, pp. 7291-7300, 2023.
  5. Wenjie Wang, Wei Wang, Jingqiang Lin, Lina Shang, Fan Lang, Dingfeng Ye, “Fast and Parallel Modular Multiplication without Borrow for ECC on ARM-NEON”, 57th IEEE International Conference on Communications (ICC), 2023.
  6. Qingguan Gao, Kaisheng Sun, Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Yongjun Ren, Zhe Liu, “V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture”, 19th International Conference on Information Security and Cryptology (Inscrypt), 2023.
  7. Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Yuewu Wang, Jingqiang Lin, Jiankuo Dong, “A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator”, 27th European Symposium on Research in Computer Security (ESORICS), 2022.
  8. Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Zhe Liu, Fu Xiao, Guang Fan, “EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2”, ACM Transactions on Embedded Computing Systems (TECS), Vol. 21, No. 2, 16:1-16:25, 2022.
  9. Jiankuo Dong, Fangyu Zheng, Guang Fan, Tianyu Mao, Fu Xiao, Jingqiang Lin,”TEGRAS: An Efficient Tegra Embedded GPU based RSA Acceleration Server”, IEEE Internet of Things Journal (IoT-J), 2022.
  10. Lili Gao, Fangyu Zheng, Rong Wei, Jinakuo Dong, Niall Emmart, Yuan Ma, Jingqiang Lin, Charles Weems, “DPF-ECC: A Framework for Efficient ECC with Double Precision Floating-Point Computing Power”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 16, pp. 3988-4002, 2021.
  11. Lipeng Wan, Fangyu Zheng, Jingqiang Lin, “TESLAC: Accelerating Lattice-based Cryptography with AI Accelerator”, 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2021.
  12. Wenjie Wang, Wei Wang, Jingqiang Lin, Yu Fu, Lingjia Meng, Qiongxiao Wang, “SMCOS: Fast and Parallel Modular Multiplication on ARM NEON Architecture for ECC”, 17th International Conference on Information Security and Cryptology (Inscrypt), 2021.
  13. Zhaohui Chen, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing, “High-performance Area-efficient Polynomial Ring Processor for CRYSTALS-Kyber on FPGAs”, Integration, the VLSI Journal, Vol. 78, pp. 25-35, 2021.
  14. Guang Fan, Fangyu Zheng, Jiankuo Dong, Jingqiang Lin, Lili Gao, Rong Wei, Lipeng Wan, “SECCEG: A Secure and Efficient Cryptographic Co-processor based on Embedded GPU System”, 16th International Conference on Wireless Algorithms, Systems, and Application (WASA), 2021.
  15. Jiankuo Dong, Guang Fan, Fangyu Zheng, Jingqiang Lin, Fu Xiao, “TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2”, 16th International Conference on Wireless Algorithms, Systems, and Application (WASA), 2021.
  16. Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, “Implementing High-performance X25519/448 Key Agreement Scheme in General Purpose GPUs”, Chinese Journal of Cyber Security, Vol. 5, No. 6, pp. 60-74, 2020.
  17. Lili Gao, Fangyu Zheng, Niall Emmart, Jiankuo Dong, Jingqiang Lin, Charles Weems, “DPF-ECC: Accelerating Elliptic Curve Cryptography with Floating-point Computing Power of GPUs”, 34th IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 494-504, 2020.
  18. Zhaohui Chen, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing, “Towards Efficient Kyber on FPGAs: A Processor for Vector of Polynomials”, 25th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 247-252, 2020.
  19. Jiankuo Dong, Fangyu Zheng, Niall Emmart, Jingqiang Lin, Charles C. Weems, “sDPF-RSA: Utilizing Floating-point Computing Power of GPUs for Massive Digital Signature Computations”, 32nd IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 599-609, 2018.
  20. Jiankuo Dong, Fangyu Zheng, Juanjuan Cheng, Jingqiang Lin, Wuqiong Pan, Ziyang Wang, “Towards High-performance X25519/448 Key Agreement in General Purpose GPUs”, 6th IEEE Conference on Communications and Network Security (CNS), 2018.
  21. Jiankuo Dong, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao, “Utilizing the Double-precision Floating-point Computing Power of GPUs for RSA Acceleration”, Security and Communication Networks (SCN), Article 3508786, 2017.
  22. Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li, “High-Performance Symmetric Cryptography Server with GPU Acceleration”, 18th International Conference on Information and Communications Security (ICICS), pp. 529-540, 2017.
  23. Yuan Zhao, Wuqiong Pan, Jingqiang Lin, Peng Liu, Cong Xue, Fangyu Zheng, “PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA”, 23rd Conference on Selected Areas in Cryptography (SAC), pp. 482-500, 2016.
  24. Yuan Ma, Qinglong Zhang, Liu Zongbin, Chenyang Tu, Jingqiang Lin, “Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields”, 18th International Conference on Information and Communications Security (ICICS), pp. 292-306, 2016.
  25. Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao, “Exploiting the Floating-Point Computing Power of GPUs for RSA”, 17th Information Security Conference (ISC), Best Student Paper Award, pp. 198-215, 2014.
  26. Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao, “Exploiting the Potential of GPUs for Modular Multiplication in ECC”, 15th International Workshop on Information Security Applications (WISA), pp. 295-306, 2014.
  27. Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu, “Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA”, 14th International Conference on Information and Communications Security (ICICS), pp. 105-118, 2012.

Cloud Security

  1. Xin Xu, Wei Wang, Jingqiang Lin, Zhen Yang, Haoling Fan, Qiongxiao Wang, “LiTIV: A Lightweight Traceable Data Integrity Verification Scheme for Version Control Systems”, 31th International Conference on Computer Communications and Networks (ICCCN), 2022.
  2. Dongzheng Jia, Yang Zhang, Shijie Jia, Limin Liu, Jingqiang Lin, “DPVGeo: Delay-based Public Verification of Cloud Data Geolocation”, 25th IEEE Symposium on Computers and Communications (ISCC), 2020.
  3. Yang Zhang, Dongzheng Jia (co-first author), Shijie Jia, Limin Liu, Jingqiang Lin, “Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data Publicly”, 29th International Conference on Computer Communications and Networks (ICCCN), 2020.
  4. Li Zhu, Pingjian Wang, Xiaozhuo Gu, Yuewu Wang, Jingqiang Lin, “PIV4DB: Probabilistic Integrity Verification for Cloud Database”, 25th IEEE Symposium on Computers and Communications (ISCC), 2020.
  5. Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, Ziqiang Ma, “TF-BIV: Transparent and Fine-grained Binary Integrity Verification in the Cloud”, 35th Annual Computer Security Applications Conference (ACSAC), pp. 57-69, 2019.
  6. Dawei Chu, Kaijie Zhu (co-first author), Quanwei Cai, Jingqiang Lin, Fengjun Li, Le Guan, Lingchen Zhang, “Secure Cryptography Infrastructures in the Cloud”, IEEE Global Communications Conference (GLOBECOM), 2019.
  7. Dongzheng Jia, Limin Liu, Shijie Jia, Jingqiang Lin, “VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts”, 38th IEEE International Performance Computing and Communications Conference (IPCCC), 2019.
  8. Xin Xu, Quanwei Cai, Jingqiang Lin, Shiran Pan, Liangqin Ren, “Enforcing Access Control in Distributed Version Control Systems”, IEEE International Conference on Multimedia and Expo (ICME), pp. 772-777, 2019.
  9. Jinxia Fang, Limin Liu, Jingqiang Lin, “Practical Verification of Data Encryption for Cloud Storage Services”, 16th International Conference on Services Computing (SCC), pp. 16-31, 2019.
  10. Peng Xu, Jingqiang Lin, Hai Jin, Wei Wang, Qiongxiao Wang, “Cloud Data Security”, China Machine Press, ISBN 9787111605096, 2018.
  11. Fangjie Jiang, Quanwei Cai, Le Guan, Jingqiang Lin, “Enforcing Access Controls for the Cryptographic Cloud Service Invocation based on Virtual Machine Introspection”, 21st Information Security Conference (ISC), pp. 213-230, 2018.
  12. Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li, “Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs”, 14th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 512-528, 2018.
  13. Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, Kun Sun, “Cloud Security Key Management: Cloud User Controls”, chapter in Cloud Computing Security: Foundations and Challenges, CRC Press, ISBN 9781482260946, pp. 151-177, 2016.
  14. Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin, “Towards Efficient Re-encryption for Secure Client-side Deduplication in Public Clouds”, 18th International Conference on Information and Communications Security (ICICS), pp. 71-84, 2016.
  15. Lei Lei, Quanwei Cai, Jiwu Jing, Jingqiang Lin, Zhan Wang, Bo Chen, “Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding”, Chinese Journal of Software, Vol. 27, No. 6, pp. 1432-1450, 2016.
  16. Manogna Thimma, Fang Liu, Jingqiang Lin, Bo Luo, “HyXAC: Hybrid XML Access Control Integrating View-based and Query-rewriting Approaches”, IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 27, No. 8, pp. 2190-2202, 2015.
  17. Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang, “LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data”, 13th International Conference on Applied Cryptography and Network Security (ACNS), pp. 215-239, 2015.
  18. Xueyan Lin, Jingqiang Lin, Le Guan, Lei Wang, “China Standard Cryptographic Algorithm Implementation in Virtual Desktop System”, Journal of University of Chinese Academy of Sciences, Vol. 32, No. 5, pp. 701-707, 2015.
  19. Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, “SEDB: Building Secure Database Services for Sensitive Data”, 16th International Conference on Information and Communications Security (ICICS), pp. 16-30, 2014.

Randomness Theory and Applications

  1. Tianyu Chen, Yuan Ma, Jingqiang Lin, Yuan Cao, Na Lv, Jiwu Jing, “A Lightweight Full Entropy TRNG with On-chip Entropy Assurance”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Vol. 40, No. 12, pp. 2431-2444, 2021.
  2. Shuangyi Zhu, Yuan Ma, Xusheng Li, Jing Yang, Jingqiang Lin, Jiwu Jing, “On the Analysis and Improvement of Min-entropy Estimation on Time-varying Data”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 15, pp. 1696-1708, 2020.
  3. Na Lv, Tianyu Chen, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin, “High-efficiency Min-entropy Estimation based on Neural Network for Random Number Generators”, Security and Communication Networks (SCN), Article 4241713, 2020.
  4. Yuan Ma, Tianyu Chen, Jingqiang Lin, Jing Yang, Jiwu Jing, “Entropy Estimation for ADC Sampling based True Random Number Generators”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 14, No. 11, pp. 2887-2900, 2019.
  5. Xinying Wu, Jing Yang, Tianyu Chen, Yuan Ma, Jingqiang Lin, “On the Security of TRNGs based on Multiple Ring Oscillators”, 15th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 89-107, 2019.
  6. Jing Yang, Shuangyi Zhu, Tianyu Chen, Yuan Ma, Na Lv, Jingqiang Lin, “Neural Network based Min-entropy Estimation for Random Number Generators”, 14th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 231-250, 2018.
  7. Shuangyi Zhu, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing, “Analysis and Improvement of the Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources”, 25th International Conference on Fast Software Encryption (FSE), 2018.
  8. Yuan Ma, Jingqiang Lin, Jiwu Jing, “On the Entropy of Oscillator-based True Random Number Generators”, the Cryptographer’s Track at RSA Conference (CT-RSA), pp. 165-180, 2017.
  9. Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing, “More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22”, 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (AsiaCrypt), pp. 307-329, 2016.
  10. Jing Yang, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing, “Extracting More Entropy for TRNGs based on the Coherent Sampling”, 12th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 694-709, 2016.
  11. Jia Zhuang, Yuan Ma, Shuangyi Zhu, Jingqiang Lin, Jiwu Jing, “Q-Value Test: A New Method on Randomness Statistical Test”, Chinese Journal of Cryptologic Research, Vol. 3, No. 2, pp. 192-201, 2016.
  12. Tianyu Chen, Yuan Ma, Jingqiang Lin, Zhan Wang, Jiwu Jing, “An Efficiency Optimization Scheme for the On-the-fly Statistical Randomness Test”, 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 515-517, 2015.
  13. Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing, “Entropy Evaluation for Oscillator-based True Random Number Generators”, 16th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 544-561, 2014.

Threshold Cryptography and Group Communication

  1. Zhenya Liu, Jingqiang Lin, “The Framework of 2-party Threshold Schemes for SM2 Digital Signature”, Chinese Journal of Software, accepted.
  2. Juanjuan Guo, Mengjie Shuai, Qiongxiao Wang, Wenyuan Li, Jingqiang Lin, “Replicated Additive Secret Sharing with the Optimized Number of Shares”, 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2022.
  3. Maomao Fu, Xiaozhuo Gu, Wenhao Dai, Jingqiang Lin, Han Wang, “Secure Multi-receiver Communications: Models, Proofs, and Implementation”, 19th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), pp. 689-709, 2019.
  4. Ming Shang, Yuan Ma, Jingqiang Lin, Jiwu Jing, “A Threshold Scheme for the SM2 Algorithm”, Chinese Journal of Cryptologic Research, Vol. 1, No. 2, pp. 155-166, 2014.
  5. Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, “An Efficient Group-based Secret Sharing Scheme”, 7th Information Security Practice and Experience Conference (ISPEC), pp. 288-301, 2011.
  6. Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, Mingli Sun, “Efficient Secret Sharing Schemes”, 8th FTRA International Conference on Secure and Trust Computing, Data management, and Applications (STA), pp. 114-121, 2011.

Mobile/IoT Security

  1. Wenqiang Li, Jiameng Shi, Fengjun Li, Jingqiang Lin, Wei Wang, Le Guan, “𝜇AFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware”, 44th ACM/IEEE International Conference on Software Engineering (ICSE), 2022.
  2. Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, Fengjun Li, “From Library Portability to Para-rehosting: Natively Executing Open-source Microcontroller OSs on Commodity Hardware”, 28th ISOC Network and Distributed System Security Symposium (NDSS), 2021.
  3. Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, Bo Luo, “CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks”, 25th European Symposium on Research in Computer Security (ESORICS), pp. 153-173, 2020.
  4. Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo, “Protecting Mobile Devices from Physical Memory Attacks with Targeted Encryption”, 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), pp. 34-44, 2019.
  5. Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou, “CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices”, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID), pp. 380-400, 2018.
  6. Yafei Ji, Luning Xia, Jingqiang Lin, Qiongxiao Wang, Lingguang Lei, Li Song, “Chord: Thwarting Relay Attacks among Near Field Communications”, 14th International Conference on Information Security and Cryptology (Inscrypt), pp. 329-348, 2018.
  7. Chen Cao, Le Guan, Peng Liu, Neng Gao, Jingqiang Lin, Ji Xiang, “Hey, You, Keep away from My Device: Remotely Implanting a Virus Expeller to Defeat Mirai on IoT Devices”, 1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec), in conjunction with 3rd ACM/IEEE International Conference on Internet of Things Design & Implementation (IoTDI), 2018.
  8. Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia, “Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices”, 33rd Annual Computer Security Applications Conference (ACSAC), Outstanding Paper Award, pp. 339-349, 2017.
  9. Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, Bo Luo, “Cyber-Physical Systems Security - A Survey”, IEEE Internet of Things Journal (IoT-J), Vol. 4, No. 6, pp. 1802-1831, 2017.
  10. Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang, Luning Xia, “vBox: Proactively Establishing Secure Channels between Wireless Devices without Prior Knowledge”, 20th European Symposium on Research in Computer Security (ESORICS), pp. 332-351, 2015.
  11. Shijie Jia, Luning Xia, Zhan Wang, Jingqiang Lin, Guozhu Zhang, Yafei Ji, “Extracting Robust Keys from NAND Flash Physical Unclonable Functions”, 18th Information Security Conference (ISC), pp. 437-454, 2015.
  12. Yafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia, “Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication”, 17th International Conference on Information and Communications Security (ICICS), pp. 346-355, 2015.
  13. Cunqing Ma, Jingqiang Lin, Yuewu Wang, “Efficient Missing Tag Detection in a Large RFID System”, 11th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom), pp. 185-192, 2012.
  14. Cunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang, “Offline RFID Grouping Proofs with Trusted Timestamps”, 11th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom), pp. 674-681, 2012.

Game Theory for Security

  1. Ming Shang, Jingqiang Lin, Xiaokun Zhang, Changwei Xu, “A Game-Theory Analysis of the Rat-group Attack in Smart Grids”, 9th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014.
  2. Jingqiang Lin, Peng Liu, Jiwu Jing, “Using Signaling Games to Model the Multi-step Attack-defense Scenarios on Confidentiality”, 3rd Conference on Decision and Game Theory for Security (GameSec), pp. 118-137, 2012.

Multi-Party Computation and Machine Learning Security

  1. Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo, “Hide and Seek: On the Stealthiness of Attacks against Deep Learning Systems”, 27th European Symposium on Research in Computer Security (ESORICS), 2022.
  2. Juanjuan Guo, Qiongxiao Wang, Xin Xu, Tianyu Wang, Jingqiang Lin, “Secure Multiparty Computation and Application in Machine Learning”, Chinese Journal of Computer Research and Development, Vol. 58, No. 10, pp. 2163-2186, 2021.

Special Issue on the Security Application of Cryptography (in Chinese) 密码应用安全专题

Back to Home