Web
		Analytics

Ziqi Yang

Assistant Professor
School of Cyber Space and Technology
College of Computer Science and Technology
Zhejiang University

Email: yangziqi at zju dot edu dot cn

ZJU Homepage (in Chinese)

Biography

I am an Assistant Professor (ZJU100 Young Professor), with both the Institute of Cyber Security Research and the College of Computer Science and Technology at Zhejiang University, China. Prior to Zhejiang University, I was a Research Fellow at National University of Singapore. I received a Ph.D degree at the School of Computing, National University of Singapore, working with Prof. LIANG Zhenkai, and a B.E. degree in Information Security from Huazhong University of Science and Technology.

I'm interested in cybersecurity and machine learning with a recent focus on the intersections between security, privacy, and machine learning.

I'm looking for self-motivated Postdoc/Ph.D./master/undergraduate students who are interested in machine learning and/or security. Please email me your CV.

Selected Papers

  1. Property Existence Inference against Generative Models
    Lijin Wang, Jingjing Wang, Jie Wan, Lin Long, Ziqi Yang*, Zhan Qin
    In Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024) * Corresponding Author
  2. Towards Fair Graph Federated Learning via Incentive Mechanisms
    Chenglu Pan, Jiarong Xu, Yue Yu, Ziqi Yang, Qingbiao Wu, Chunping Wang, Lei Chen, Yang Yang
    In Proceedings of the 38th AAAI Conference on Artificial Intelligence (AAAI 2024)
  3. Securing Web Inputs using Parallel Session Attachments
    Ziqi Yang, Ruite Xu, Qixiao Lin, Shikun Wu, Jian Mao, Zhenkai Liang
    In Proceedings of the 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023)
  4. BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wild
    Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang*
    In Proceedings of 2024 IEEE Symposium on Security and Privacy (IEEE S&P 2024) * Corresponding Author
  5. Purifier: Defending Data Inference Attacks via Transforming Confidence Scores
    Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren
    In Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023)
  6. SAGE: Steering the Adversarial Generation of Examples with Accelerations
    Ziming Zhao, Zhaoxuan Li, Fan Zhang, Ziqi Yang, Shuang Luo, Tingting Li, Rui Zhang, Kui Ren
    IEEE Transactions on Information Forensics and Security (TIFS 2022)
  7. MsDroid: Identifying Malicious Snippets for Android Malware Detection
    Yiling He, Yiping Liu, Lei Wu, Ziqi Yang, Kui Ren, Zhan Qin
    IEEE Transactions on Dependable and Secure Computing (TDSC 2022)
  8. From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices
    Fan Zhang, Bin Shao, Guorui Xu, Bolin Yang, Ziqi Yang*, Zhan Qin, and Kui Ren.
    In Proceedings of the 57th Annual Design Automation Conference 2020 (DAC 2020) * Corresponding Author
  9. Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment
    Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, and Zhenkai Liang.
    In Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS 2019) [PDF] [Code]
  10. Fidelity: Towards Measuring the Trustworthiness of Neural Network Classification
    Ziqi Yang
    In Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing (IDSC 2019)
  11. Fidelity: A Property of Deep Neural Networks to Measure the Trustworthiness of Prediction Results
    Ziqi Yang
    In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (Asia CCS 2019) [PDF]
  12. Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking
    Ziqi Yang, Hung Dang, Ee-Chien Chang, and Zhenkai Liang.
    arXiv preprint arXiv:1906.06046, 2019 [PDF]
  13. Automated Identification of Sensitive Data via Flexible User Requirements
    Ziqi Yang, Zhenkai Liang.
    In the Proceedings of the 14th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2018).
  14. Automated Identification of Sensitive Data from Implicit User Specification
    Ziqi Yang, Zhenkai Liang.
    Cybersecurity, 1(1), 13. [PDF]

Teaching


Professional Service