|
学术成果
论文:
Qiuhua Wang, Chuangchuang Li, Lifeng Yuan, Dong Wang, Yeru Wang, Yizhi Ren*, Weizhi Meng*: An XSS Attack Detection Model Based on Two-Stage AST Analysis. IEEE Trans. Dependable Secur. Comput. 23(2): 4071-4084 (2026)(CCF A类期刊) Gaoning Pan, Yiming Tao, Qinying Wang, Chunming Wu, Mingde Hu, Yizhi Ren*, and Shouling Ji, Breaking Isolation: A New Perspective on Hypervisor Exploitation via Cross-Domain Attacks, NDSS 2026.(CCF A类会议) Qiuhua Wang, Yi Hu, Xiyuan Jia, Guohua Wu, Yizhi Ren, Gaoning Pan, Yanyu Cheng: BadSTR: Backdoor Attack on Scene Text Recognition in IoT. IEEE Internet Things J. 12(18): 38526-38539 (2025) Qiuyun Lyu, Xiwen Liang, Shaopeng Cheng, Fu Li, Yizhi Ren*, Chengli Xu, Weizhi Meng, Duohe Ma: AATM: An Anonymous Authentication Protocol for Time Span of Membership With Self-Blindness and Accountability. IEEE Internet Things J. 12(14): 27671-27685 (2025) Ke Wang, Ye Yao, Yanzhao Shen, Fengjun Xiao, Yizhi Ren, Weizhi Meng: High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Dynamic Prediction and Virtual Connection. IEEE Trans. Dependable Secur. Comput. 22(3): 2996-3010 (2025)(CCF A类期刊) Weifeng Yin, Lifeng Yuan, Yizhi Ren*, Weizhi Meng, Dong Wang, Qiuhua Wang: Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage. IEEE Trans. Inf. Forensics Secur. 19: 6665-6678 (2024)(CCF A类期刊) Qiuyun Lyu, Yilong Zhou, Yizhi Ren*, Zhen Wang, Yunchuan Guo: Toward Personal Data Sharing Autonomy: A Task-Driven Data Capsule Sharing System.IEEE Trans. Inf. Forensics Secur. 19: 9760-9774 (2024)(CCF A类期刊) Qiuhua Wang, Chengyu Li, Tianyu Xia, Yizhi Ren, Dong Wang, Guoyan Zhang, Kim-Kwang Raymond Choo: Optimal Selfish Mining-Based Denial-of-Service Attack. IEEE Trans. Inf. Forensics Secur. 19: 835-850 (2024)(CCF A类期刊) Rongke Liu, Dong Wang, Yizhi Ren, Zhen Wang, Kaitian Guo, Qianqian Qin, Xiaolei Liu: Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion Model. IEEE Trans. Inf. Forensics Secur. 19: 3958-3973 (2024) (CCF A类期刊) Ye Yao, Chen Wang, Hui Wang, Ke Wang, Yizhi Ren, Weizhi Meng: Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer. IEEE Trans. Inf. Forensics Secur. 19: 4406-4419 (2024)(CCF A类期刊) Qiuhua Wang, Tianyu Xia, Dong Wang, Yizhi Ren*, Gongxun Miao, Kim-Kwang Raymond Choo: SDoS: Selfish Mining-Based Denial-of-Service Attack. IEEE Trans. Inf. Forensics Secur. 17: 3335-3349 (2022)(CCF A类期刊) Yizhi Ren, Mengjin Jiang, Ting Wu, Ye Yao, Kim-Kwang Raymond Choo, Zhen Wang: An eigenvalue-based immunization scheme for node attacks in networks with uncertainty. Sci. China Inf. Sci. 63(3) (2020)(CCF A类期刊) Qiuyun Lyu, Hao Li, Zhining Deng, Jingyu Wang, Yizhi Ren*, Ning Zheng, Junliang Liu, Huaping Liu, Kim-Kwang Raymond Choo: A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services. IEEE Trans. Cloud Comput. 11(3): 2546-2561 (2023)(中科院一区期刊) Ye Yao, Linchao Huang, Hui Wang, Qi Chang, Yizhi Ren, Fengjun Xiao: Robust Adaptive Steganography Based on Adaptive STC-ECC. IEEE Trans. Multim. 26: 5477-5489 (2024)(中科院TOP期刊) Qiuyun Lyu, Xiwen Liang, Shaopeng Cheng, Fu Li, Yizhi Ren*, Chengli Xu, Weizhi Meng, and Duohe Ma:AATM: An Anonymous Authentication Protocol for Time Span of Membership with Self-blindness and Accountability. IEEEInternet of Things Journal,DOI: 10.1109/JIOT.2025.3564396(2025)(中科院TOP期刊) 王秋华,吴国华,魏东晓,苗功勋,徐艳飞,任一支*.工业互联网安全产业发展态势及路径研究.中国工程科学,2021,23(02):46-55.(中国工程院国家高端智库学术期刊) 王冬,秦倩倩,郭开天,刘容轲,颜伟鹏;任一支*,罗清彩,申延召.联邦学习中的模型逆向攻防研究综述.通信学报,2023,44(11):94-109. 任一支,李泽龙,袁理锋,等.图深度学习攻击模型综述.信息安全学报,2022,7(01):66-83.
|