Research
Research interests include:
- Hardware Security: Hardware Trojan detection.
- Artificial Intelligence Security: (1) Robust/Secure/Private AI systems, including training set poisoning; backdoor in the training set; adversarial examples; model theft; recovery of sensitive training data; (2) Intellectual Properties Protection of Deep Learning Models.
I have been the PI of 18 research projects, and participated in 5 research projects.
I have published around 70 papers in security related journals and international conferences, including IEEE Transactions on Dependable and Secure Computing (CCF A), IEEE Transactions on Emerging Topics in Computing, IEEE Transactions on Industrial Informatics, IEEE Transactions on Artificial Intelligence, IEEE Transactions on Visualization and Computer Graphics(CCF A),IEEE Transactions on Neural Networks and Learning Systems, IEEE Transactions on Vehicular Technolgy,IEEE Transactions on Big Data,ACM Transactions on Multimedia Computing Communications and Applications, Information Sciences,Computers & Security (CCF B), IEEE Journal on Emerging and Selected Topics in Circuits and Systems, Chinese Journal of Computers (CCF Chinese A), Acta Electronica Sinica (CCF Chinese A), and so on. In addition, over 10 papers are under review/arXiv.
Best Paper Award of ICCCS 2015.
IET High-Impact Paper.
IET CDT Editor's Choice Award.
I have also published 2 Book, 16 Patents, and
4 Software Copyrights.
Participated in two standards on artificial intelligence security.
Recent Publications:
2020-2024:
1. One-to-N & N-to-One: Two Advanced Backdoor Attacks against Deep Learning Models. IEEE Transactions on Dependable and Secure Computing. 2020, SCI, CCF A, IF 7.329
2. AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption . IEEE Transactions on Emerging Topics in Computing,2022,SCI,IF 7.691
3. Untargeted Backdoor Attack against Deep Neural Networks with Imperceptible Trigger. IEEE Transactions on Industrial Informatics, 2023, SCI,中科院1区,IF 12.3
4. An Explainable Intellectual Property Protection Method for Deep Neural Networks based on Intrinsic Features. IEEE Transactions on Artificial Intelligence, 2024
5. Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations. IEEE Transactions on Artificial Intelligence, 2021.
6. Use the Spear as a Shield: An Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks. IEEE Transactions on Emerging Topics in Computing,2022,SCI, IF 7.691
7. SSAT: Active Authorization Control and User's Fingerprint Tracking Framework for DNN IP Protection. ACM Transactions on Multimedia Computing, Communications and Applications , 2024, SCI.
8. Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion. IEEE Transactions on Visualization and Computer Graphics . 2023, SCI,CCF A 类
9. Localization of Conventional Inpainting With Feature Enhancement Network. IEEE Transactions on Big Data, 2022, SCI
10. PS-Net: A Learning Strategy for Accurately Exposing the Professional Photoshop Inpainting. IEEE Transactions on Neural Networks and Learning Systems. 2023, SCI, 中科院 1 区
11. PRNU-based Image Forgery Localization With Deep Multi-Scale Fusion. ACM Transactions on Multimedia Computing Communications and Applications, 2022, SCI
12. Detection of Recolored Image by Texture Features in Chrominance Components. ACM Transactions on Multimedia Computing, Communications, and Applications. 2022, https://doi.org/10.1145/3571076,SCI
13. Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations. Information Sciences . 中科院1区, SCI, 2023
14. LOPA: A Linear Offset Based Poisoning Attack Method Against Adaptive Fingerprint Authentication System. Computers & Security. 99, 2020, 102046, pp.1-13. SCI, CCF B, IF 4.438
15. PTB: Robust Physical Backdoor Attacks against Deep Neural Networks in Real World. Computers & Security, 2022. SCI, CCF B, IF 4.438
16. A Reinforcement Learning-based ELF Adversarial Malicious Sample Generation Method. IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 2024, SCI, 中科院2区
17. Dataset Authorization Control: Protect the Intellectual Property of Dataset via Reversible Feature Space Adversarial Examples. Applied Intelligence. 2022. SCI, 中科院 2 区,IF 5.3.
18. Active Intellectual Property Protection for Deep Neural Networks through Stealthy Backdoor and Users' Identities Authentication. Applied Intelligence, 2022. SCI, 中科院 2 区, IF 5.3
19. Compression-Resistant Backdoor Attack against Deep Neural Networks. Applied Intelligence, 2023. SCI, 中科院2区, IF 5.3.
20. Imperceptible and Multi-Channel Backdoor Attack. Applied Intelligence, 2023. SCI, 中科院 2 区, IF 5.3.
21. NaturalAE: Natural and robust physical adversarial examples for object detectors. Journal of Information Security and Applications. 57 (2021) 102694, 1-12. SCI, CCF C, IF 3.872
22. Backdoors Hidden in Facial Features: A Novel Invisible Backdoor Attack against Face Recognition Systems. Peer-to-Peer Networking and Applications. 2021, 14:1458–1474. SCI, CCF C, IF 3.307
23. SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images. Journal of Information Security and Applications. 2021. SCI, CCF C, IF 3.872
24. ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. IET Computers & Digital Techniques, 2023, SCI
25. Ten years of hardware Trojans: a survey from the attacker's perspective. IET Computers & Digital Techniques. 2020, Vol. 14, Iss. 6, pp. 231-246. SCI
26. DPAEG: A Dependency Parse Based Adversarial Examples Generation Method for Intelligent Q&A Robots. Security and Communication Networks. 2020, Volume 2020, Article ID 5890820:1-15. SCI, CCF C
27. Machine Learning Security: Threats, Countermeasures, and Evaluations. IEEE Access, 2020, Vol 8, pp. 74720-74742. SCI
28. Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique. The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), 2020. EI, CCF C
29. DNN Intellectual Property Protection: Taxonomy, Attacks and Evaluations (Invited Paper). In Proceedings of the Great Lakes Symposium on VLSI 2021 (GLSVLSI '21). EI, CCF C, Session邀请报告和Invited Paper
30. Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. The 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2021). EI, CCF C
31. Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks. 24th Information Security Conference (ISC) 2021. EI, CCF C, 录用率 24%.
32. Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks. IEEE AICAS,2022. EI,Session 邀请报告和邀请论文.
33. Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems. ACM TURC'20: Proceedings of the ACM Turing Celebration Conference - China. May 2020, Pages 231–235. EI, 被推荐扩展到期刊.
34. An Imperceptible and Owner-unique Watermarking Method for Graph Neural Networks. ACM Turing Award Celebration Conference 2024 (ACM TURC '24). EI
35. Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection. ACM Turing Award Celebration Conference 2024 (ACM TURC '24). EI
36. Qing Tan, Shuren Qi, Yushu Zhang, Mingfu Xue. PRNU-based Image Forgery Localization With Convolutional Neural Network. IEEE 24th International Workshop on Multimedia Signal Processing. 2022, EI
37. ActiveGuard: Active Intellectual Property Protection for Deep Neural Networks via Adversarial Examples based User Fingerprinting. AAAI 2022 workshop, International Workshop on Practical Deep Learning in the Wild. EI
38. 基于稠密连接的深度修复定位网络 . 信息网络安全, 2022 年第 7 期, 84-93. CCF T3
39. 基于通道间相关性的图像重着色检测. 网络与信息安全学报,2022,第8 卷第5 期,167-178. CCF中文C类
40. 面向多畸变稳健性的图像归因算法. 信息网络安全. 2023, 23(04), 30-38. CCF T3
41. 基于隐形后门水印的开源数据集版权保护. 计算机工程与科学. 2024, 46(06), 1013-1021. CCF中文 C类
2019 and earlier:
Please refer to
Google Scholar, and so on.
Biography
- 2024/4 - now, School of Communication and Electronic Engineering,
East China Normal University, Professor
- 2014/5 - 2024/3, College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Assistant Professor, Associate Professor
- 2011/7 - 2012/7, School of electrical and electronic engineering, Nanyang Technological University, Singapore, Research intern, Supvisor: Prof. Chang Chip-Hong, IEEE Fellow
- 2010/9 - 2014/4, Information and Communication Engineering (Information security), Southeast University, Ph.D, Supvisor: Prof. Hu Aiqun
- 2008/9 - 2010/7, Information and Communication Engineering (Information security), Southeast University, Master, Supvisor: Prof. Hu Aiqun
- 2004/9 - 2008/7, Electronic and Information Engineering, Southwest Jiaotong University, Bachelor
(Special Grade Scholarship for 4 times)
Principal Investigator of Projects/Fundings:
- National Natural Science Foundation of China(面上);
- National Natural Science Foundation of China(青基);
- XXXXXXXXXXXXXXXX(XX863);
- XXXXXXXXXXXXXXXX;
- CCF - NSFOCUS Kunpeng research plan funding (2024, Only 17 people won that award);
- CCF - NSFOCUS Kunpeng research plan funding (2021, Only 14 people won that award);
- CCF - VENUSTECH Hongyan research plan funding (2016, Only 16 people won that award);
- CCF - NSFOCUS Kunpeng research plan funding (2017, Only 11 people won that award);
- Natural Science Foundation of Jiangsu Province;
- Aeronautical science foundation;
- Chinese Postdoctoral Science Foundation;
- Jiangsu Province Postdoctoral Science Foundation;
- Project of Institute of Chinese Aerospace 503;
- Project of CETC 30;
- Project of
Sangfor Technologies Inc.;
- Open Project Foundation of Information Technology Research Base of Civil Aviation Administration of China;
- The Fundamental Research Funds for the Central Universities;
- XXXXXXXXXXXXXXX;
- Three Teaching Projects;
Participated Projects/Fundings:
- XXXXXXXXXXXXXXXX;
- XXXXXXXXXXXXXXXX;
- XXXXXXXXXXXXXXXX;
- National Natural Science Foundation of China Projects;
- National Natural Science Foundation of China Projects;
- One Teaching Project;
Professional services
- Committee member of the Chinese Artificial Intelligence and Security Professional Committee;
- Executive Committee Member of ACM Nanjing branch;
- Committee Member of the Digital Media Forensics and Security Committee of the China Society of Image and Graphics;
- China Artificial Intelligence Society Youth Working Committee Member;
- Committee member of Computer network and distributed computing Specialized Committee of Jiangsu Province;
- Publishing Chair of ChinaMFS 2022;
- Program Chair of the 3rd Chinese Symposium on Hardware Security;
- Committee member of Intelligence and Security Committee of Jiangsu Artificial Intelligence Society;
- Committee member of Data Security Special Committee of Jiangsu Cyberspace Security Society;
- Special Committee Member on Artificial Intelligence Security of Jiangsu Cyberspace Security Society;
- IEEE Senior Member, CCF Distinguished Member, CSIG Senior Member, ACM member, CAAI member;
Technical Program Committee (TPC)
- 2015: ICCCS2015;CBD2015;
- 2016: CBD2016;
- 2017: IEEE GLOBECOM2017;
- 2018: IEEE GLOBECOM2018;CBD2018;IEEE COMNETSAT2018;全国硬件安全论坛;
- 2019: IEEE GLOBECOM2019;IEEE COMNETSAT2019;IEEE GCC2019;IEEE MENACOMM'19;SSCC-2019;3ICT'19;CFTC2019;ICCCN2019-BDMLS workshop;CBD 2019;SSCC-CIS-2019;
- 2020: ICCCN-BDMLS workshop2020;CCF CTC2020;CBD2020;ACM TURC 2020;3ICT2020;Globecom2020; ATS 2020
- 2021: ACM TURC 2021;AITS 2021;SIoTEC 2021;ATS 2021;Globecom2021 CISS;CBD2021
- 2022: Globecom2022 CISS TPC;AITS2022;ATS2022;CBD2022;
- 2023: ICCSI 2023; Globecom 2023 CISS TPC; ATS2023; AsianHOST2023;TRIDENTCOM2023;CBD2023;
- 2024: AsianHOST 2024;Globecom 2024 CISS;CBD2024;
- 2025: AAAI 2025
Reviewer
Journal:
- IEEE Transactions on Information Forensics & Security;
- IEEE Transactions on Dependable and Secure Computing;
- IEEE Transactions on Pattern Analysis and Machine Intelligence;
- IEEE Transactions on Neural Networks and Learning Systems;
- IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;
- IEEE Transactions on Circuits and Systems I: Regular Papers.
- IEEE Transactions on Circuits and Systems II: Express Briefs.
- IEEE Transactions on Emerging Topics in Computing;
- IEEE Transactions on Multimedia;
- IEEE Transactions on Circuits and Systems for Video Technology;
- IEEE Transactions on Industrial Informatics;
- IEEE Transactions on Artificial Intelligence;
- IEEE Transactions on Software Engineering;
- IEEE Transactions on Image Processing;
- IEEE Transactions on VLSI Systems;
- IEEE Transactions on Sustainable Computing;
- IEEE Transactions on Reliability;
- IEEE Transactions on Big Data;
- IEEE Transactions on Services Computing;
- IEEE Transactions on Systems, Man and Cybernetics: Systems;
- IEEE Transactions on Consumer Electronics;
- ACM Transactions on Design Automation of Electronic Systems;
- ACM Transactions on Intelligent Systems and Technology;
- IEEE Journal on Selected Areas in Communications;
- IEEE Signal Processing Letters;
- IEEE Embedded Systems Letters;
- Pattern Recognition;
- Information Sciences;
- IEEE Internet of Things;
- Computer Networks;
- IEEE Open Journal of Signal Processing;
- Journal of Systems Architecture;
- Pattern Recognition Letters;
- ACM Journal on Emerging Technologies in Computing Systems;
IET Computers & Digital Techniques;
- IET Cyber-Physical Systems: Theory & Applications;
- Electronics Letters;
- Computers and Security;
- Journal of Information Security and Applications;
- Future Generation Computer Systems;
- Knowledge and Information Systems;
- Knowledge-Based Systems;
- Information Fusion;
- Frontiers of Computer Science;
- IEEE Journal on Emerging and Selected Topics in Circuits and Systems;
- Computers in Industry;
- Computer Vision and Image Understanding;
- Neural Networks;
- Neurocomputing;
- IEEE Internet Computing;
- Advanced Engineering Informatics;
- International Journal of Intelligent Systems;
- Journal of Circuits, Systems, and Computers;
- Integration, the VLSI Journal;
- Peer-to-Peer Networking and Applications;
- Image and Vision Computing;
- Engineering Applications of Artificial Intelligence;
- Signal, Image and Video Processing;
- Applied Soft Computing;
- China Communications;
- Security and Communication Networks;
- Applied Intelligence;
- Artificial Intelligence Review;
- Neural Computing and Applications;
- Connection Science;
- Computer;
- Expert Systems With Applications;
- Computer Modeling in Engineering and Sciences;
- Scientific Reports;
- Computers and Electrical Engineering;
- Wireless Communications and Mobile Computing;
- International Journal of Distributed Sensor Networks;
- Defence Technology;
- Journal of Intelligent & Fuzzy Systems;
- Journal of Internet Technology;
- Chinese Journal of Electronics;
- Digital Signal Processing;
- Computers, Materials & Continua;
- ICT Express;
- Microprocessors and Microsystems;
- EURASIP Journal on Wireless Communications and Networking;
- IEEE Open Journal of the Industrial Electronics Society;
- Journal of Circuits, Systems, and Computers;
- Journal of Semiconductors;
- Journal of King Saud University - Computer and Information Sciences;
- Journal of Sensors;
- IETE Journal of Research;
- Information Security Journal: A Global Perspective;
- International Journal of Automation and Computing;
- Software: Practice and Experience;
- IEEE Access;
- Journal of Current Science and Technology;
- 国家自然科学基金(面上、青年);
- 教育部学位中心学位论文评审;
- Review applications for the Estonian Research Council(评审爱沙尼亚研究委员会基金)
- 计算机学报(CCF中文A类);
- 计算机研究与发展(CCF中文A类);
- 计算机科学(CCF中文B类);
- 信息安全学报(CCF中文B类);
- 《北京航空航天大学学报》
Conferences:
- 2013: IEEE WCNC;
- 2015: ICCCS2015, CBD2015;
- 2016: CHES2016, CBD2016;
- 2017: IEEE ISCAS2017, IEEE MWSCAS2017, IEEE ASAP2017, ISPACS2017, CBD2017,IEEE GLOBECOM2017;
- 2018: IEEE GLOBECOM2018, IEEE MWSCAS2018, CBD2018;
- 2019: IEEE ISCAS2019; ISVLSI 2019; IEEE MWSCAS 2019; CFTC2019; IEEE MENACOMM'19; ICCCN2019-BDMLS workshop; MLICOM 2019; IEEE Globecom2019; IEEE COMNETSAT 2019; CBD 2019; 3ICT'19;SSCC-2019;
- 2020: ISCAS2020; ICCCN-BDMLS workshop2020; ACM TURC 2020; CCF CTC2020; Globecom2020; CBD2020; AJCAI2020; 3ICT2020;ATS 2020;
- 2021: AITS 2021; SIoTEC 2021; ATS 2021; Globecom2021 CISS;CBD2021;
- 2022: ISCAS 2022;Globecom2022 CISS; CVPR 2022; ECCV 2022; ATS 2022; CBD2022; 3rd CSIG ChinaMFS 2022;
- 2023: CVPR 2023;ICCV2023; Globecom 2023; ICCSI 2023; ATS2023;AsianHOST2023; CBD2023;
- 2024: CVPR 2024; ISCAS 2024; ECCV 2024; ACCV 2024; AsianHOST 2024; Globecom 2024; CBD2024 ;
- 2025: AAAI2025;
|