default search action
Zhiqiang Lin 0001
Person information
- affiliation: Ohio State University, Department of Computer Science and Engineering, Columbus, OH, USA
- affiliation (former): University of Texas at Dallas, Department of Computer Science, Richardson, TX, USA
- affiliation (former): Purdue University, Department of Computer Science, West Lafayette, IN, USA
Other persons with the same name
- Zhiqiang Lin (aka: Zhi-Qiang Lin) — disambiguation page
- Zhiqiang Lin 0002
— Guangzhou University, Guangzhou, China
- Zhiqiang Lin 0003
— Xiamen University, China
- Zhiqiang Lin 0004 — Shenzhen University, China
- Zhiqiang Lin 0005 — Ningbo University, Ningbo, China
- Zhiqiang Lin 0006 — Chongqing University of Posts and Telecommunications, Chongqing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j17]Ronny Ko
, Chuan Xiao
, Makoto Onizuka
, Zhiqiang Lin
, Yihe Huang
:
Ultraverse: An Efficient What-if Analysis Framework for Software Applications Interacting with Database Systems. Proc. ACM Manag. Data 3(1): 84:1-84:27 (2025) - [c149]Yuqing Yang, Yue Zhang, Zhiqiang Lin:
Understanding Miniapp Malware: Identification, Dissection, and Characterization. NDSS 2025 - [c148]Christopher Ellis, Yue Zhang, Mohit Kumar Jangid, Shixuan Zhao, Zhiqiang Lin:
Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation. NDSS 2025 - [c147]Linxi Jiang, Xin Jin, Zhiqiang Lin:
Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs. NDSS 2025 - [c146]Xin Jin, Shiqing Ma, Zhiqiang Lin:
Repurposing Neural Networks for Efficient Cryptographic Computation. NDSS 2025 - [i23]Xingyu Lyu, Mengya Zhang, Xiaokuan Zhang, Jianyu Niu, Yinqian Zhang, Zhiqiang Lin:
Demystifying Private Transactions and Their Impact in PoW and PoS Ethereum. CoRR abs/2503.23510 (2025) - [i22]Melih Sirlanci, Carter Yagemann, Zhiqiang Lin:
C2RUST-BENCH: A Minimized, Representative Dataset for C-to-Rust Transpilation Evaluation. CoRR abs/2504.15144 (2025) - 2024
- [j16]Ada Lamba
, Max Taylor, Vincent Beardsley, Jacob Bambeck, Michael D. Bond
, Zhiqiang Lin:
Cocoon: Static Information Flow Control in Rust. Proc. ACM Program. Lang. 8(OOPSLA1): 166-193 (2024) - [j15]Xin Jin
, Zhiqiang Lin
:
SimLLM: Calculating Semantic Similarity in Code Summaries using a Large Language Model-Based Approach. Proc. ACM Softw. Eng. 1(FSE): 1376-1399 (2024) - [c145]Mengya Zhang, Xingyu Lyu, Jianyu Niu, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin:
Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions. ACSAC 2024: 439-455 - [c144]Chao Wang
, Yue Zhang
, Zhiqiang Lin
:
RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop. AsiaCCS 2024 - [c143]Wenqiang Li
, Haohuang Wen
, Zhiqiang Lin
:
BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android's Radio Interface Layer. CCS 2024: 2311-2325 - [c142]Yue Zhang
, Melih Sirlanci
, Ruoyu Wang
, Zhiqiang Lin
:
When Compiler Optimizations Meet Symbolic Execution: An Empirical Study. CCS 2024: 4212-4225 - [c141]Zhiqiang Lin
, Luyi Xing
:
SaTS '24: The 2nd ACM Workshop on Secure and Trustworthy Superapps. CCS 2024: 4886-4887 - [c140]Haohuang Wen
, Prakhar Sharma
, Vinod Yegneswaran
, Phillip A. Porras
, Ashish Gehani
, Zhiqiang Lin
:
6G-XSec: Explainable Edge Security for Emerging OpenRAN Architectures. HotNets 2024: 77-85 - [c139]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Ashish Gehani, Zhiqiang Lin:
5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service. NDSS 2024 - [c138]Mengya Zhang
, Xiaokuan Zhang
, Yinqian Zhang
, Zhiqiang Lin
:
Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. RAID 2024: 298-316 - [c137]Xingli Zhang, Yazhou Tu, Yan Long
, Liqun Shan, Mohamed A Elsaadani, Kevin Fu, Zhiqiang Lin, Xiali Hei:
From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover. SP 2024: 2366-2384 - [c136]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. WOOT @ USENIX Security Symposium 2024: 149-169 - [e6]Zhiqiang Lin, Luyi Xing:
Proceedings of the ACM Workshop on Secure and Trustworthy Superapps, SaTS 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1237-1 [contents] - [i21]Xi Tan, Zheyuan Ma
, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. CoRR abs/2401.15289 (2024) - [i20]Yifan Mao, Mengya Zhang, Shaileshh Bojja Venkatakrishnan, Zhiqiang Lin:
Flashback: Enhancing Proposer-Builder Design with Future-Block Auctions in Proof-of-Stake Ethereum. CoRR abs/2405.09465 (2024) - [i19]Wenqiang Li, Haohuang Wen, Zhiqiang Lin:
BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android's Radio Interface Layer. CoRR abs/2409.00475 (2024) - [i18]Shixuan Zhao, Mengyuan Li, Mengjia Yan, Zhiqiang Lin:
Ditto: Elastic Confidential VMs with Secure and Dynamic CPU Scaling. CoRR abs/2409.15542 (2024) - 2023
- [j14]Haoran Lu
, Qingchuan Zhao
, Yongliang Chen
, Xiaojing Liao
, Zhiqiang Lin
:
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding. Proc. ACM Meas. Anal. Comput. Syst. 7(1): 18:1-18:27 (2023) - [c135]Pallavi Sivakumaran
, Chaoshun Zuo
, Zhiqiang Lin
, Jorge Blasco
:
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide. AsiaCCS 2023: 1004-1015 - [c134]Ali Ahad
, Gang Wang
, Chung Hwan Kim
, Suman Jana
, Zhiqiang Lin
, Yonghwi Kwon
:
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation. ASPLOS (4) 2023: 169-188 - [c133]Yue Zhang
, Yuqing Yang
, Zhiqiang Lin
:
Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs. CCS 2023: 2411-2425 - [c132]Chao Wang
, Yue Zhang
, Zhiqiang Lin
:
Uncovering and Exploiting Hidden APIs in Mobile Super Apps. CCS 2023: 2471-2485 - [c131]Zhiqiang Lin
, Xiaojing Liao
:
SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps. CCS 2023: 3655-3656 - [c130]Wubing Wang, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV. DIMVA 2023: 46-66 - [c129]Zhuo Zhang
, Brian Zhang, Wen Xu, Zhiqiang Lin:
Demystifying Exploitable Bugs in Smart Contracts. ICSE 2023: 615-627 - [c128]Chao Wang, Ronny Ko, Yue Zhang, Yuqing Yang
, Zhiqiang Lin:
Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis. ICSE 2023: 932-944 - [c127]Mohit Kumar Jangid, Yue Zhang, Zhiqiang Lin:
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing. NDSS 2023 - [c126]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
Thwarting Smartphone SMS Attacks at the Radio Interface Layer. NDSS 2023 - [c125]Md Sakib Anwar
, Chaoshun Zuo
, Carter Yagemann
, Zhiqiang Lin
:
Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating. RAID 2023: 17-31 - [c124]Erick Bauman
, Jun Duan
, Kevin W. Hamlen
, Zhiqiang Lin
:
Renewable Just-In-Time Control-Flow Integrity. RAID 2023: 580-594 - [c123]Haoran Lu
, Qingchuan Zhao
, Yongliang Chen
, Xiaojing Liao
, Zhiqiang Lin
:
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding. SIGMETRICS (Abstracts) 2023: 45-46 - [c122]Jianyi Zhang, Yuchen Wang, Yazhou Tu, Sara Rampazzi, Zhiqiang Lin, Insup Lee, Xiali Hei:
ADC-Bank: Detecting Acoustic Out-of-Band Signal Injection on Inertial Sensors. SmartSP 2023: 53-72 - [c121]Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang:
Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract. USENIX Security Symposium 2023: 1757-1774 - [c120]Chaoshun Zuo, Chao Wang, Zhiqiang Lin:
A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games. USENIX Security Symposium 2023: 3925-3942 - [c119]Haohuang Wen, Zhiqiang Lin:
Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries. USENIX Security Symposium 2023: 3997-4014 - [c118]Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, Zhiqiang Lin:
Reusable Enclaves for Confidential Serverless Computing. USENIX Security Symposium 2023: 4015-4032 - [c117]Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang:
Controlled Data Races in Enclaves: Attacks and Detection. USENIX Security Symposium 2023: 4069-4086 - [c116]Chao Wang, Yue Zhang, Zhiqiang Lin:
One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat. USENIX Security Symposium 2023: 6629-6646 - [e5]Zhiqiang Lin, Xiaojing Liao:
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, SaTS 2023, Copenhagen, Denmark, 26 November 2023. ACM 2023 [contents] - [e4]Fengjun Li
, Kaitai Liang
, Zhiqiang Lin
, Sokratis K. Katsikas
:
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 462, Springer 2023, ISBN 978-3-031-25537-3 [contents] - [i17]Yuqing Yang, Chao Wang, Yue Zhang, Zhiqiang Lin:
SoK: Decoding the Super App Enigma: The Security Mechanisms, Threats, and Trade-offs in OS-alike Apps. CoRR abs/2306.07495 (2023) - [i16]Chao Wang, Yue Zhang, Zhiqiang Lin:
Uncovering and Exploiting Hidden APIs in Mobile Super Apps. CoRR abs/2306.08134 (2023) - [i15]Yue Zhang, Yuqing Yang, Zhiqiang Lin:
Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs. CoRR abs/2306.08151 (2023) - [i14]Ada Barach
, Maxwell Taylor, Vincent Beardsley, Jacob Bambeck, Michael D. Bond, Zhiqiang Lin:
Cocoon: Static Information Flow Control in Rust. CoRR abs/2311.00097 (2023) - [i13]Xin Jin, Jonathan Larson, Weiwei Yang, Zhiqiang Lin:
Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models. CoRR abs/2312.09601 (2023) - [i12]Mengya Zhang, Xiaokuan Zhang, Josh Barbee, Yinqian Zhang, Zhiqiang Lin:
SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. CoRR abs/2312.12573 (2023) - 2022
- [j13]Christopher Ellis, Haohuang Wen, Zhiqiang Lin, Anish Arora:
Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing. Proc. Priv. Enhancing Technol. 2022(4): 727-745 (2022) - [j12]Yutao Tang
, Zhengrui Qin
, Zhiqiang Lin, Yue Li
, Shanhe Yi
, Fengyuan Xu, Qun Li
:
vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS. IEEE Trans. Computers 71(12): 3349-3360 (2022) - [c115]Qingchuan Zhao
, Chaoshun Zuo, Jorge Blasco, Zhiqiang Lin:
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals. AsiaCCS 2022: 521-533 - [c114]Xin Jin
, Sunil Manandhar, Kaushal Kafle, Zhiqiang Lin, Adwait Nadkarni:
Understanding IoT Security from a Market-Scale Perspective. CCS 2022: 1615-1629 - [c113]Xin Jin
, Kexin Pei, Jun Yeon Won, Zhiqiang Lin:
SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings. CCS 2022: 1631-1645 - [c112]Yuqing Yang
, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson, Angelos Stavrou
, Zhiqiang Lin:
Detecting and Measuring Misconfigured Manifests in Android Apps. CCS 2022: 3063-3077 - [c111]Yuqing Yang
, Yue Zhang
, Zhiqiang Lin:
Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection. CCS 2022: 3079-3092 - [c110]Yue Zhang
, Zhiqiang Lin:
When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure. CCS 2022: 3181-3194 - [c109]Sen Lin, Ming Shi, Anish Arora, Raef Bassily, Elisa Bertino, Constantine Caramanis, Kaushik R. Chowdhury
, Eylem Ekici, Atilla Eryilmaz, Stratis Ioannidis
, Nan Jiang, Gauri Joshi, Jim Kurose, Yingbin Liang, Zhiqiang Lin, Jia Liu, Mingyan Liu, Tommaso Melodia
, Aryan Mokhtari, Rob Nowak, Sewoong Oh, Srini Parthasarathy, Chunyi Peng, Hulya Seferoglu, Ness B. Shroff, Sanjay Shakkottai, Kannan Srinivasan, Ameet Talwalkar, Aylin Yener, Lei Ying
:
Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks. CIC 2022: 16-25 - [c108]Haohuang Wen
, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
A fine-grained telemetry stream for security services in 5G open radio access networks. EmergingWireless@CoNEXT 2022: 18-23 - [c107]Huibo Wang, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures. NDSS 2022 - [c106]Jun Yeon Won, Haohuang Wen
, Zhiqiang Lin:
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling. RAID 2022: 200-213 - [c105]Shixuan Zhao
, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
vSGX: Virtualizing SGX Enclaves on AMD SEV. SP 2022: 321-336 - [c104]Chaoshun Zuo, Zhiqiang Lin:
Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games. USENIX Security Symposium 2022: 3093-3110 - [i11]Xingyu Lyu, Mengya Zhang, Xiaokuan Zhang, Jianyu Niu, Yinqian Zhang, Zhiqiang Lin:
An Empirical Study on Ethereum Private Transactions and the Security Implications. CoRR abs/2208.02858 (2022) - [i10]Ronny Ko, Chuan Xiao, Makoto Onizuka
, Yihe Huang, Zhiqiang Lin:
Ultraverse: Efficient Retroactive Operation for Attack Recovery in Database Systems and Web Frameworks. CoRR abs/2211.05327 (2022) - 2021
- [j11]Yue Zhang
, Bayan Turkistani, Allen Yuqing Yang
, Chaoshun Zuo, Zhiqiang Lin:
A Measurement Study of Wechat Mini-Apps. Proc. ACM Meas. Anal. Comput. Syst. 5(2): 14:1-14:25 (2021) - [c103]Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. CCS 2021: 2937-2950 - [c102]Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin:
Specularizer : Detecting Speculative Execution Attacks via Performance Tracing. DIMVA 2021: 151-172 - [c101]Zhiqiang Lin:
Keynote: Uncovering Vulnerabilities in Bluetooth Devices with Automated Binary Analysis. PerCom Workshops 2021: 545 - [c100]Paul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
iTOP: Automating Counterfeit Object-Oriented Programming Attacks. RAID 2021: 162-176 - [c99]Yue Zhang
, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, Zhiqiang Lin:
A Measurement Study of Wechat Mini-Apps. SIGMETRICS (Abstracts) 2021: 19-20 - [c98]Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Towards Formal Verification of State Continuity for Enclave Programs. USENIX Security Symposium 2021: 573-590 - [c97]Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang:
SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting. USENIX Security Symposium 2021: 1665-1682 - [c96]Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, Jim Hao Chen:
Automatic Policy Generation for Inter-Service Access Control of Microservices. USENIX Security Symposium 2021: 3971-3988 - [e3]Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung:
ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. ACM 2021, ISBN 978-1-4503-8287-8 [contents] - [i9]Cheng Zhang, Yunze Pan, Yunqi Zhang, Adam C. Champion, Zhaohui Shen, Dong Xuan, Zhiqiang Lin, Ness B. Shroff:
WLAN-Log-Based Superspreader Detection in the COVID-19 Pandemic. CoRR abs/2102.11171 (2021) - 2020
- [j10]Guoxing Chen
, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution. IEEE Secur. Priv. 18(3): 28-37 (2020) - [c95]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan
, Jens Grossklags, Claudia Eckert:
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings. ACSAC 2020: 466-479 - [c94]Haohuang Wen
, Zhiqiang Lin, Yinqian Zhang:
FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware. CCS 2020: 167-180 - [c93]Haohuang Wen, Qingchuan Zhao, Qi Alfred Chen, Zhiqiang Lin:
Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps. NDSS 2020 - [c92]Qingchuan Zhao
, Haohuang Wen
, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps. SecureComm (1) 2020: 49-60 - [c91]Jaehyun Han
, Zhiqiang Lin, Donald E. Porter:
On the Effectiveness of Behavior-Based Ransomware Detection. SecureComm (2) 2020: 120-140 - [c90]Haohuang Wen
, Qingchuan Zhao
, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
A Study of the Privacy of COVID-19 Contact Tracing Apps. SecureComm (1) 2020: 297-317 - [c89]Qingchuan Zhao
, Chaoshun Zuo, Brendan Dolan-Gavitt, Giancarlo Pellegrino, Zhiqiang Lin:
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps. SP 2020: 1106-1120 - [c88]Ashish Kundu, Zhiqiang Lin, Joshua Hammond:
Energy Attacks on Mobile Devices. TPS-ISA 2020: 107-117 - [c87]Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. USENIX Security Symposium 2020: 37-54 - [c86]Raul Quinonez, Jairo Giraldo, Luis E. Salazar, Erick Bauman, Alvaro A. Cárdenas, Zhiqiang Lin:
SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. USENIX Security Symposium 2020: 895-912 - [c85]Haohuang Wen, Qi Alfred Chen, Zhiqiang Lin:
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT. USENIX Security Symposium 2020: 949-965 - [c84]Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou
, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin
:
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. USENIX Security Symposium 2020: 2379-2396 - [c83]Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin:
TXSPECTOR: Uncovering Attacks in Ethereum from Transactions. USENIX Security Symposium 2020: 2775-2792 - [i8]Yuxiang Luo, Cheng Zhang, Yunqi Zhang
, Chaoshun Zuo, Dong Xuan, Zhiqiang Lin, Adam C. Champion, Ness B. Shroff:
ACOUSTIC-TURF: Acoustic-based Privacy-Preserving COVID-19 Contact Tracing. CoRR abs/2006.13362 (2020) - [i7]Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. CoRR abs/2008.00146 (2020)
2010 – 2019
- 2019
- [c82]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan
, Jens Grossklags, Claudia Eckert:
Analyzing control flow integrity with LLVM-CFI. ACSAC 2019: 584-597 - [c81]Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, Yinqian Zhang:
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach. AsiaCCS 2019: 114-121 - [c80]Chaoshun Zuo, Haohuang Wen
, Zhiqiang Lin, Yinqian Zhang:
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. CCS 2019: 1469-1483 - [c79]Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, Zhiqiang Lin:
Towards Memory Safe Enclave Programming with Rust-SGX. CCS 2019: 2333-2350 - [c78]Jiongyi Chen, Chaoshun Zuo, Wenrui Diao
, Shuaike Dong, Qingchuan Zhao
, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, Kehuan Zhang:
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users. DSN 2019: 222-233 - [c77]Guoxing Chen, Sanchuan Chen
, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. EuroS&P 2019: 142-157 - [c76]Kenneth A. Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang
, Xiangyu Zhang, Zhiqiang Lin
:
Probabilistic disassembly. ICSE 2019: 1187-1198 - [c75]Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin:
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. NDSS 2019 - [c74]Wubing Wang, Yinqian Zhang, Zhiqiang Lin:
Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries. RAID 2019: 443-457 - [c73]Xing Li, Yan Chen, Zhiqiang Lin:
Towards Automated Inter-Service Authorization for Microservice Applications. SIGCOMM Posters and Demos 2019: 3-5 - [c72]Chaoshun Zuo, Zhiqiang Lin, Yinqian Zhang:
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps. IEEE Symposium on Security and Privacy 2019: 1296-1310 - [c71]Omar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio:
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends. USENIX Security Symposium 2019: 551-566 - [c70]Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin:
Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization. USENIX Security Symposium 2019: 1257-1272 - [c69]Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin:
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software. USENIX Security Symposium 2019: 1805-1821 - [e2]Lorenzo Cavallaro, Johannes Kinder, Adam Doupé, Zhiqiang Lin:
Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation, CCS 2019, London, United Kingdom, November 11-15, 2019. ACM 2019, ISBN 978-1-4503-6834-6 [contents] - [e1]Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis:
Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16-18, 2019, Proceedings. Lecture Notes in Computer Science 11723, Springer 2019, ISBN 978-3-030-30214-6 [contents] - [i6]Yue Zhang
, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode. CoRR abs/1908.10497 (2019) - [i5]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing Control Flow Integrity with LLVM-CFI. CoRR abs/1910.01485 (2019) - 2018
- [c68]Bo Lu, Xiaokuan Zhang, Ziman Ling, Yinqian Zhang, Zhiqiang Lin:
A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites. ACSAC 2018: 89-100 - [c67]Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan
, Kevin W. Hamlen:
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering. AsiaCCS 2018: 393-398 - [c66]Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu:
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. CCS 2018: 412-425 - [c65]Erick Bauman, Huibo Wang, Mingwei Zhang, Zhiqiang Lin:
SGXElide: enabling enclave code secrecy via self-modification. CGO 2018: 75-86 - [c64]Xiaoyang Xu, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin:
Towards Interface-Driven COTS Binary Hardening. FEAST@CCS 2018: 20-26 - [c63]Erick Bauman, Zhiqiang Lin, Kevin W. Hamlen:
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. NDSS 2018 - [c62]Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, Kehuan Zhang:
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. NDSS 2018 - [c61]Paul Muntean
, Matthias Fischer, Gang Tan
, Zhiqiang Lin
, Jens Grossklags
, Claudia Eckert:
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. RAID 2018: 423-444 - [c60]Manish Bhatt, Irfan Ahmed
, Zhiqiang Lin:
Using Virtual Machine Introspection for Operating Systems Security Education. SIGCSE 2018: 396-401 - [c59]Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu:
Guarder: A Tunable Secure Allocator. USENIX Security Symposium 2018: 117-133 - [c58]Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei:
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors. USENIX Security Symposium 2018: 1545-1562 - [i4]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution. CoRR abs/1802.09085 (2018) - [i3]Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei:
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors. CoRR abs/1806.07558 (2018) - 2017
- [c57]Guofei Gu, Hongxin Hu, Eric Keller, Zhiqiang Lin, Donald E. Porter:
Building a Security OS With Software Defined Infrastructure. APSys 2017: 4:1-4:8 - [c56]Vishal Karande, Erick Bauman, Zhiqiang Lin, Latifur Khan
:
SGX-Log: Securing System Logs With SGX. AsiaCCS 2017: 19-30 - [c55]Chaoshun Zuo, Qingchuan Zhao
, Zhiqiang Lin:
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services. CCS 2017: 799-813 - [c54]Fahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, Latifur Khan
:
SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors. CCS 2017: 1211-1228 - [c53]Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu:
FreeGuard: A Faster Secure Heap Allocator. CCS 2017: 2389-2403 - [c52]Taesoo Kim, Zhiqiang Lin, Chia-Che Tsai
:
CCS'17 Tutorial Abstract / SGX Security and Privacy. CCS 2017: 2613-2614 - [c51]Yufei Gu, Qingchuan Zhao
, Yinqian Zhang, Zhiqiang Lin:
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace. CODASPY 2017: 173-184 - [c50]Swarup Chandra, Vishal Karande, Zhiqiang Lin, Latifur Khan
, Murat Kantarcioglu, Bhavani Thuraisingham:
Securing Data Analytics on SGX with Randomization. ESORICS (1) 2017: 352-369 - [c49]Yangchun Fu, Erick Bauman, Raul Quinonez, Zhiqiang Lin:
Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults. RAID 2017: 357-380 - [c48]Chaoshun Zuo, Zhiqiang Lin:
SMARTGEN: Exposing Server URLs of Mobile Apps With Selective Symbolic Execution. WWW 2017: 867-876 - [i2]Ashish Kundu, Zhiqiang Lin, Joshua Hammond:
Energy Attacks on Mobile Devices. CoRR abs/1704.04464 (2017) - [i1]Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu:
FreeGuard: A Faster Secure Heap Allocator. CoRR abs/1709.02746 (2017) - 2016
- [j9]Juan Caballero, Zhiqiang Lin:
Type Inference on Executables. ACM Comput. Surv. 48(4): 65:1-65:35 (2016) - [c47]Khaled Al-Naami, Swarup Chandra, Ahmad Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani Thuraisingham:
Adaptive encrypted traffic fingerprinting with bi-directional dependence. ACSAC 2016: 177-188 - [c46]Yufei Gu, Zhiqiang Lin:
Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics. CODASPY 2016: 62-72 - [c45]Erick Bauman, Zhiqiang Lin:
A Case for Protecting Computer Games With SGX. SysTEX@Middleware 2016: 4:1-4:6 - [c44]Chaoshun Zuo, Wubing Wang, Zhiqiang Lin, Rui Wang:
Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services. NDSS 2016 - [c43]Junyuan Zeng, Yangchun Fu, Zhiqiang Lin:
Automatic Uncovering of Tap Points from Kernel Executions. RAID 2016: 49-70 - [c42]Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang:
Detecting Stack Layout Corruptions with Robust Stack Unwinding. RAID 2016: 71-94 - 2015
- [j8]Erick Bauman, Gbadebo Ayoade, Zhiqiang Lin:
A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions. ACM Comput. Surv. 48(1): 10:1-10:33 (2015) - [j7]Aravind Prakash, Eknath Venkataramani
, Heng Yin
, Zhiqiang Lin:
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution. IEEE Trans. Dependable Secur. Comput. 12(5): 557-570 (2015) - [c41]Seung-Hun Kim, Lei Xu
, Ziyi Liu, Zhiqiang Lin, Won Woo Ro, Weidong Shi:
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization. DSN 2015: 251-262 - [c40]Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu:
A Practical Approach for Adaptive Data Structure Layout Randomization. ESORICS (1) 2015: 69-89 - [c39]Erick Bauman, Yafeng Lu, Zhiqiang Lin:
Half a Century of Practice: Who Is Still Storing Plaintext Passwords? ISPEC 2015: 253-267 - [c38]Junyuan Zeng, Zhiqiang Lin:
Towards Automatic Inference of Kernel Object Semantics from Binary Code. RAID 2015: 538-561 - [c37]Yangchun Fu, Zhiqiang Lin, David Brumley
:
Automatically deriving pointer reference expressions from binary code for memory dump analysis. ESEC/SIGSOFT FSE 2015: 614-624 - [c36]Jin Chen, Haibo Chen, Erick Bauman, Zhiqiang Lin, Binyu Zang, Haibing Guan:
You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps. USENIX Security Symposium 2015: 657-690 - [c35]Junyuan Zeng, Yangchun Fu, Zhiqiang Lin:
PEMU: A Pin Highly Compatible Out-of-VM Dynamic Binary Instrumentation Framework. VEE 2015: 147-160 - 2014
- [j6]Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, Heng Yin
:
Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting. IEEE Trans. Cloud Comput. 2(4): 380-394 (2014) - [j5]Junghwan Rhee, Ryan D. Riley
, Zhiqiang Lin
, Xuxian Jiang, Dongyan Xu:
Data-Centric OS Kernel Malware Characterization. IEEE Trans. Inf. Forensics Secur. 9(1): 72-87 (2014) - [c34]Qian Feng, Aravind Prakash, Heng Yin
, Zhiqiang Lin:
MACE: high-coverage and robust memory analysis for commodity operating systems. ACSAC 2014: 196-205 - [c33]Ziyi Liu, Weidong Shi, Shouhuai Xu, Zhiqiang Lin:
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy. DATE 2014: 1-6 - [c32]David I. Urbina, Yufei Gu, Juan Caballero, Zhiqiang Lin:
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification. ESORICS (2) 2014: 237-256 - [c31]Alireza Saberi, Yangchun Fu, Zhiqiang Lin:
Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization. NDSS 2014 - [c30]David Sounthiraraj, Justin Sahs, Garret Greenwood, Zhiqiang Lin, Latifur Khan:
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps. NDSS 2014 - [c29]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment. RAID 2014: 22-45 - [c28]Swarup Chandra, Zhiqiang Lin, Ashish Kundu, Latifur Khan
:
Towards a Systematic Study of the Covert Channel Attacks in Smartphones. SecureComm (1) 2014: 427-435 - [c27]Yangchun Fu, Junyuan Zeng, Zhiqiang Lin:
HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management. USENIX ATC 2014: 85-96 - [c26]Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy:
Preventing Cryptographic Key Leakage in Cloud Virtual Machines. USENIX Security Symposium 2014: 703-718 - [c25]Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su:
X-Force: Force-Executing Binary Programs for Security Applications. USENIX Security Symposium 2014: 829-844 - 2013
- [j4]Yangchun Fu, Zhiqiang Lin:
Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. ACM Trans. Inf. Syst. Secur. 16(2): 7 (2013) - [c24]Yangchun Fu, Zhiqiang Lin, Kevin W. Hamlen:
Subverting system authentication with context-aware, reactive virtual machine introspection. ACSAC 2013: 229-238 - [c23]Junyuan Zeng, Yangchun Fu, Kenneth A. Miller, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Obfuscation resilient binary code reuse through trace-oriented programming. CCS 2013: 487-498 - [c22]Aravind Prakash, Eknath Venkataramani
, Heng Yin
, Zhiqiang Lin:
Manipulating semantic values in kernel data structures: Attack assessments and implications. DSN 2013: 1-12 - [c21]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization. ICDCS 2013: 112-123 - [c20]Ziyi Liu, Jong-Hyuk Lee, Junyuan Zeng, Yuanfeng Wen, Zhiqiang Lin, Weidong Shi:
CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM. ISCA 2013: 392-403 - [c19]Yangchun Fu, Zhiqiang Lin:
EXTERIOR: using a dual-VM based external shell for guest-OS introspection, configuration, and recovery. VEE 2013: 97-110 - 2012
- [j3]Scott Hand, Zhiqiang Lin, Guofei Gu, Bhavani Thuraisingham:
Bin-Carver: Automatic recovery of binary executable files. Digit. Investig. 9(Supplement): S108-S117 (2012) - [c18]Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin:
Securing untrusted code via compiler-agnostic binary rewriting. ACSAC 2012: 299-308 - [c17]Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin:
Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. CCS 2012: 157-168 - [c16]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
Automatic generation of vaccines for malware immunization. CCS 2012: 1037-1039 - [c15]Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, Heng Yin
:
OS-Sommelier: memory-only operating system fingerprinting in the cloud. SoCC 2012: 5 - [c14]Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, Dongyan Xu:
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence. NDSS 2012 - [c13]Yangchun Fu, Zhiqiang Lin:
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. IEEE Symposium on Security and Privacy 2012: 586-600 - 2011
- [c12]Junghwan Rhee, Zhiqiang Lin, Dongyan Xu:
Characterizing kernel malware behavior with kernel data access patterns. AsiaCCS 2011: 207-216 - [c11]Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang:
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. NDSS 2011 - 2010
- [j2]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications. IEEE Trans. Software Eng. 36(5): 688-703 (2010) - [c10]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction. DSN 2010: 281-290 - [c9]Tao Bao, Yunhui Zheng, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Strict control dependence and its effect on dynamic information flow analyses. ISSTA 2010: 13-24 - [c8]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Automatic Reverse Engineering of Data Structures from Binary Execution. NDSS 2010
2000 – 2009
- 2009
- [c7]Zhiqiang Lin, Ryan D. Riley
, Dongyan Xu:
Polymorphing Software by Randomizing Data Structure Layout. DIMVA 2009: 107-126 - [c6]Tielei Wang, Tao Wei, Zhiqiang Lin, Wei Zou:
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. NDSS 2009 - 2008
- [c5]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Convicting exploitable software vulnerabilities: An efficient input provenance based approach. DSN 2008: 247-256 - [c4]Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang:
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. NDSS 2008 - [c3]Zhiqiang Lin, Xiangyu Zhang:
Deriving input syntactic structure from execution. SIGSOFT FSE 2008: 83-93 - 2006
- [c2]Zhiqiang Lin, Bing Mao, Li Xie:
A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. ARES 2006: 348-357 - [c1]Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie:
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. ISC 2006: 17-31 - 2005
- [j1]Zhiqiang Lin, Chao Wang, Bing Mao, Li Xie:
A policy flexible architecture for secure operating system. ACM SIGOPS Oper. Syst. Rev. 39(3): 24-33 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-06-12 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint