I'm interested in cybersecurity and machine learning with a recent focus on the intersections between security, privacy, and machine learning.
➙ I'm looking for self-motivated Postdoc/Ph.D./master/undergraduate students who are interested in machine learning and/or security. Please email me your CV.
Selected Papers
Property Existence Inference against Generative Models
Lijin Wang, Jingjing Wang, Jie Wan, Lin Long, Ziqi Yang*, Zhan Qin In Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024)* Corresponding Author
Towards Fair Graph Federated Learning via Incentive Mechanisms
Chenglu Pan, Jiarong Xu, Yue Yu, Ziqi Yang, Qingbiao Wu, Chunping Wang, Lei Chen, Yang Yang In Proceedings of the 38th AAAI Conference on Artificial Intelligence (AAAI 2024)
Securing Web Inputs using Parallel Session Attachments Ziqi Yang, Ruite Xu, Qixiao Lin, Shikun Wu, Jian Mao, Zhenkai Liang In Proceedings of the 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023)
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wild
Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang* In Proceedings of 2024 IEEE Symposium on Security and Privacy (IEEE S&P 2024)* Corresponding Author
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren In Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023)
SAGE: Steering the Adversarial Generation of Examples with Accelerations
Ziming Zhao, Zhaoxuan Li, Fan Zhang, Ziqi Yang, Shuang Luo, Tingting Li, Rui Zhang, Kui Ren IEEE Transactions on Information Forensics and Security (TIFS 2022)
MsDroid: Identifying Malicious Snippets for Android Malware Detection
Yiling He, Yiping Liu, Lei Wu, Ziqi Yang, Kui Ren, Zhan Qin IEEE Transactions on Dependable and Secure Computing (TDSC 2022)
From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices
Fan Zhang, Bin Shao, Guorui Xu, Bolin Yang, Ziqi Yang*, Zhan Qin, and Kui Ren. In Proceedings of the 57th Annual Design Automation Conference 2020 (DAC 2020)* Corresponding Author
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, and Zhenkai Liang. In Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS 2019)[PDF][Code]
Fidelity: Towards Measuring the Trustworthiness of Neural Network Classification Ziqi Yang In Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing (IDSC 2019)
Fidelity: A Property of Deep Neural Networks to Measure the Trustworthiness of Prediction Results Ziqi Yang In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (Asia CCS 2019)[PDF]
Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking Ziqi Yang, Hung Dang, Ee-Chien Chang, and Zhenkai Liang. arXiv preprint arXiv:1906.06046, 2019[PDF]
Automated Identification of Sensitive Data via Flexible User Requirements Ziqi Yang, Zhenkai Liang.
In the Proceedings of the 14th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2018).
Automated Identification of Sensitive Data from Implicit User Specification Ziqi Yang, Zhenkai Liang. Cybersecurity, 1(1), 13.[PDF]
Teaching
Spring 2024 Fundamentals of Data Structures
Spring 2024 Artificial Intelligence Security
Spring 2024 AI Ethics and Security
Spring 2024 Cutting-edge Technology and Research Methodology of Information Security
Spring 2024 Guidance on Research Writing for Postgraduate Students
Fall 2023 Fundamentals of Data Structures
Spring 2023 Artificial Intelligence Security
Spring 2023 AI Ethics and Security
Spring 2023 Cutting-edge Technology and Research Methodology of Information Security
Spring 2023 Guidance on Research Writing for Postgraduate Students
Fall 2022 Fundamentals of Data Structures
Spring 2022 Artificial Intelligence Security
Spring 2022 AI Ethics and Security
Spring 2022 Cutting-edge Technology and Research Methodology of Information Security
Spring 2022 Guidance on Research Writing for Postgraduate Students
Spring 2021 Cutting-edge Technology and Research Methodology of Information Security
Spring 2021 Guidance on Research Writing for Postgraduate Students