Leo Zhang

Senior Lecturer, Griffith University


Books & Book Chapters | Leo Zhang

Books & Book Chapters

  1. L. Y. Zhang and Kai Zeng, Multimedia Security. in S. Shen, X. Lin, K. Zhang (Eds.), Encyclopedia of Wireless Networks, Springer, 2020.
  2. Y. Zhang, Y. Xiang, L. Y. Zhang, Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT, Springer, 2019.

Conference Papers

  1. F. Wang, J. Ouyang, L. Y. Zhang, L. Pan, S. Hu, R. Doss, J. Zhou, “SEBioID: Secure and Efficient Biometric Identification with Two-Party Computation”, in ACNS, 2025. (ccf c)
  2. F. Wang, J. Ouyang, L. Pan, L. Y. Zhang, X. Liu, Y. Wang, R. Doss, “TrustMIS: Trust-Enhanced Inference Framework for Medical Imaging Segmentation”, in ECAI, 2024. (core a)
  3. Z. Zhang, X. Zhang, Y. Zhang, L. Y. Zhang, C. Chen, S. Hu, A. Gill, S. Pan, “Stealing Watermarks of Large Language Models via Mixed Integer Programming”, in ACSAC, 2024. (core a)
  4. Y. Zhou, Y. Zhang, L. Y. Zhang, Zhongyun Hua, “DERD: Data-free Adversarial Robustness Distillation through Self-adversarial Teacher Group”, in ACM MM, 2024. (core a*, ccf a)
  5. L. Hou, R. Feng, Z. Hua, W. Luo, L. Y. Zhang, Y. Li, “IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency,” in ICML, 2024. (core a*, ccf a)
  6. W. Wan, Y. Ning, S. Hu, L. Xue, M. Li, L. Y. Zhang, Y. Wang, “DarkFed: A Data-Free Backdoor Attack in Federated Learning,” in IJCAI, 2024. (core a*, ccf a)
  7. H. Zhang, S. Hu, Y. Wang, L. Y. Zhang, Z. Zhou, X. Wang, Y. Zhang, C. Chen, “Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness,” in IJCAI, 2024. (core a*, ccf a)
  8. W. Wan, Y. Ning, S. Hu, L. Xue, M. Li, L. Y. Zhang, H. Jin, “MISA: Unveiling the Vulnerabilities in Split Federated Learning,” in ICASSP, 2024. (ccf b)
  9. Z. Zhou, M. Li, W. Liu, S. Hu, Y. Zhang, W. Wan, L. Xue, L. Y. Zhang, D. Yao, H. Jin, “Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples,” in Oakland, 2024. (core a*, ccf a)
  10. X. Wang, S. Hu, P. Xu, W. Liu, L. Y. Zhang, M. Li, Y. Zhang, “Exploiting Class-Wise Rotation for Availability Poisoning Attacks in 3D Point Clouds,” in Esorics, 2024. (core a, ccf b)
  11. F. Wang, Z. Chen, L. Pan, L. Y. Zhang, J. Zhou, “CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments,” in AsiaCCS, 2024. (core a, ccf c)
  12. D. Mi, Y. Zhang, L. Y. Zhang, S. Hu, Q. Zhong, H. Yuan, S. Pan, “Towards Model Extraction Attacks in GAN-based Image Translation via Domain Shift Mitigation,” in AAAI, 2024. (core a*, ccf a)
  13. Q. Duan, Z. Hua, Q. Liao, Y. Zhang, L. Y. Zhang, “Conditional Backdoor Attack via JPEG Compression,” in AAAI, 2024. (core a*, ccf a)
  14. L. Xue, S. Hu, R. Zhao, L. Y. Zhang, S. Hu, L. Sun, D. Yao, “Revisiting Gradient Pruning: A Dual Realization for Defending Against Gradient Attacks,” in AAAI, 2024. (core a*, ccf a)
  15. X. Mo, Y. Zhang, L. Y. Zhang, W. Luo, N. Sun, S. Hu, S. Gao, Y. Xiang, “Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics,” in Oakland, 2024. (core a*, ccf a)
  16. Y. Zhang, S. Hu, L. Y. Zhang, J. Shi, M. Li, X. Liu, W. Wan, H. Jin, “Why Does Little Robustness Help? Understanding Adversarial Transferability From Surrogate Training,” in Oakland, 2024. (core a*, ccf a)
  17. J. Lu, L. Xue, W. Wan, M. Li, L. Y. Zhang, S. Hu, “Preserving Privacy of Input Features Across All Stages of Collaborative Learning,” in ISPA, 2023. (ccf c)
  18. K. T. Noor, A. Robles-Kelly, L. Y. Zhang, M. R. Bouadjenek, “A Bottom-Up Capsule Network for Hierarchical Image Classification,” in DICTA, 2023. (core -23 c)
  19. Y. Liu, K. Ding, Q. Lu, F. Li, L. Y. Zhang, S. Pan, “Towards Self-Interpretable Graph-Level Anomaly Detection,” in NeurIPS, 2023. (core-21 a*, ccf a)
  20. S. Hu, W. Liu, M. Li, Y. Zhang, X. Liu, X. Wang, L. Y. Zhang, J. Hou, “PointCRT: Detecting Backdoor in 3D Point Cloud via Corruption Robustness,” in ACM MM, 2023. (core-21 a*, ccf a)
  21. W. Wan, S. Hu, M. Li, J. Lu, L. Zhang, L. Y. Zhang, H. Jin, “A Four-Pronged Defense Against Byzantine Attacks in Federated Learning,” in ACM MM, 2023. (core-21 a*, ccf a)
  22. Z. Zhou, S. Hu, R. Zhao, Q. Wang, L. Y. Zhang, J. Hou, H. Jin, “Downstream-agnostic Adversarial Examples,” in ICCV, 2023. (core-21 a*, ccf a)
  23. X. Mo, L. Y. Zhang, N. Sun, W. Luo, S. Gao, “Backdoor Attack on Deep Neural Networks in Perception Domain,” in IJCNN, 2023. (core-21 b, ccf c)
  24. L. Li, C. Chen, L. Pan, L. Y. Zhang, J. Zhang, Y. Xiang, “SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display,” in RAID, 2023. (core-23 a, ccf b)
  25. H. Zhang, Z. Yao, L. Y. Zhang, S. Hu, C. Chen, A. W.-C. Liew, Z. Li, “Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning,” in IJCAI 2023. (core a*, ccf a)
  26. M. Ma, Y. Zhang, P. C. M. Arachchige, L. Y. Zhang, M. B. Chhetri, G. Bai, “LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks,” in AsiaCCS, 2023. (core a, ccf c)
  27. Y. Yang, J. Weng, Y. Yi, C. Dong, L. Y. Zhang, J. Y. Zhou, “Predicate Private Set Intersection with Linear Complexity,” in ACNS, pp. 143-166, 2023. (ccf c)
  28. X. Zhang, Z. Zhang, Q. Zhong, X. Zheng, Y. Zhang, S. Hu, L. Y. Zhang, “Masked Language Model Based Textual Adversarial Example Detection,” in AsiaCCS, 2023. (core-21 a, ccf c)
  29. T. Cai, Y. Li, T. Jia, L. Y. Zhang, Z. Yang, “Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint,” in CSCWD, 2023. (core-21 b, ccf c)
  30. S. Hu, J. Zhang, W. Liu, J. Hou, M. Li, L. Y. Zhang, H. Jin, and L. Sun, “PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples,” in AAAI, 2023. (core-21 a*, ccf a)
  31. M. Li, J. Shi, W. Wan, J. Lu, S. Hu and L. Y. Zhang, “Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraint,” in IEEE MSN, 2022. (ccf c)
  32. Z. Zheng, Z. Hua and L. Y. Zhang, “Detecting and Mitigating Backdoor Attacks with Dynamic and Invisible Triggers,” in ICONIP, 2022. (core-21 b, ccf c)
  33. B. H. Abbasi, Q. Zhong, L. Y. Zhang, S. Gao, A. Robles-Kelly and R. Doss, “A Generic Enhancer for Backdoor Attacks on Deep Neural Networks,” in ICONIP, 2022. (core-21 b, ccf c)
  34. G. Yang, M. Ge, S. Gao, X. Lu, L. Y. Zhang, R. Doss, “A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks,” in NSS, 2022. (core b)
  35. Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Jinyu Tian, Jiantao Zhou, “Self-Supervised Adversarial Example Detection by Disentangled Representation,” in TrustCom, 2022. (core-21 b, ccf c)
  36. Junyu Shi, Wei Wan, Jianrong Lu, Shengshan Hu, Leo Yu Zhang, “Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning,” in TrustCom, 2022. (core-21 b, ccf c)
  37. S. Hu, Z. Zhou, Y. Zhang, L. Y. Zhang, Y. Zheng, Y. He, H. Jin, “BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label,” in ACM MM, 2022. (core-21 a*, ccf a)
  38. W. Wan, S. Hu, J. Lu, L. Y. Zhang, H. Jin, Y. He, “Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection,” in IJCAI, 2022. (core-21 a*, ccf a)
  39. Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss, “Towards Privacy-Preserving Neural Architecture Search,” in IEEE ISCC, 2022. (core-21 b, ccf c)
  40. S. Hu, X. Liu, Y. Zhang, M. Li, L. Y. Zhang, H. Jin, L. Wu, “Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer,” in IEEE/CVF CVPR, 2022. (core-21 a*, ccf a)
  41. Q. Zhong, L. Y. Zhang, S. Hu, L. Gao, J. Zhang, Y. Xiang, “Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting,” in IEEE ICME, 2022. (core-21 a, ccf b)
  42. Shengshan Hu, Yechao Zhang, Xiaogeng Liu, Leo Yu Zhang, Minghui Li, Hai Jin, “AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch,” in ACM MM, 2021. DOI: 10.1145/3474085.3475396 (core-21 a*, ccf a)
  43. Wei Wan, Jianrong Lu, Shengshan Hu, Leo Yu Zhang, Xiaobing Pei, “Shielding Federated Learning: A New Attack Approach and Its Defense,” in IEEE WCNC, 2021. (ccf c)
  44. Nan Sun, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Jun Zhang, Yang Xiang, “My Security: An interactive search engine for cybersecurity,” in HICSS, 2020. (core-18 a)
  45. Meng Li, Qi Zhong, Leo Yu Zhang, Yajuan Du, Jun Zhang and Yong Xiang, “Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach,” in IEEE TrustCom, 2020. (core-20 a, ccf c)
  46. Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe and Yang Xiang, “Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence,” in NSS, 2020. (core-21 b)
  47. Qi Zhong, Leo Yu Zhang, Jun Zhang, Longxiang Gao, Yong Xiang, “Protecting IP of Deep Neural Networks with Watermarking: A New Label Helps,” in PAKDD, 2020. (core-20 a, ccf c)
  48. Digby Mooney, Lynn Batten and Leo Yu Zhang, “A New Rabin-type Cryptosystem with Modulus p^2q,” ATIS, 2020.
  49. Yong Wang, Pengyu Wang, Xuhui Zhao, Zhuo Liu and Leo Yu Zhang, “A New Interval Preference Model and Corresponding Fuzzy Similarity Measure for Collaborative Filtering,” Workshop On Big Data Service On Management, Security And Privacy Preservation, IEEE BDS, 2020.
  50. Leo Yu Zhang, Yushu Zhang, Yuansheng Liu, Guanrong Chen, “Security analysis of some diffusion mechanisms in chaotic cryptography”, Proceedings of The 2nd International Conference on Chaotic Secure Communication (ICCSC2016), Hunan, P.R. China, pp. 135-141, 2016. (recommended for publication in IJBC)
  51. Yushu Zhang, Xiaofeng Liao, Jiantao Zhou, Leo Yu Zhang, Jun-xin Chen, Di Xiao, “A Cascade Chaotic Map and Block Compressive Sensing Based Scalable Encryption Framework to Protect Significant Image Regions,” Proceedings of The 1st International Conference on Chaotic Secure Communication (ICCSC2015), Beijing, P.R. China, 2015.
  52. Yushu Zhang, Jiantao Zhou, Leo Yu Zhang, Fei Chen, Xinyu Lei, “Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-Clouds,” International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec2015), accepted, 2015.
  53. Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Qiuzhen Lin, “Joint Quantization and Diffusion for Compressed Sensing Measurements of Natural Images,” Proceedings of 2015 IEEE International Symposium on Circuits and Systems (ISCAS2015), pp. 2744-2747, 2015. (ccf c)

Journal Papers

  1. C. Luo, Y. Wang, Y. Zhang, L. Y. Zhang, “Distributed Differentially Private Matrix Factorization for Implicit Data via Secure Aggregation”, IEEE Transactions on Computers, 2024. DOI: 10.1109/TC.2024.3500383
  2. Y. Wang, L. Y. Zhang, X. Zhang, X. Wang, F. Wang, S. Hu, R. Doss, “Towards Threshold Anonymous Announcement With Batch Verification for Cooperative Intelligent Transport Systems,” IEEE Transactions on Vehicular Technology, 2024. DOI: 10.1109/TVT.2024.3435930
  3. M. Xue, Y. Wu, L. Y. Zhang, D. Gu, Y. Zhang, W. Liu, “SSAT: Active Authorization Control and User’s Fingerprint Tracking Framework for DNN IP Protection,” ACM Transactions on Multimedia Computing, Communications, and Applications, 2024. DOI: 10.1145/3679202
  4. L. Hou, Z. Hua, Y. Li, Y. Zheng, L. Y. Zhang, “M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models,” IEEE Transactions on Circuits and Systems for Video Technology, in press, 2024. DOI: 10.1109/TCSVT.2024.3417410
  5. M. Xue, X. Wang, Y. Wu, S. Ni, L. Y. Zhang, Y. Zhang, W. Liu, “An Explainable Intellectual Property Protection Method for Deep Neural Networks based on Intrinsic Features,” IEEE Transactions on Artificial Intelligence, in press, 2024. DOI: 10.1109/TAI.2024.3388389.
  6. X. Xiao, Y. Zhang, L. Y. Zhang, Z. Hua, Z. Liu, J. Huang, “FairCMS: Cloud Media Sharing With Fair Copyright Protection,” IEEE Transactions on Computational Social Systems, in press, 2024. DOI: 10.1109/TCSS.2024.3374452.
  7. Z. Hou, J. Ning, X. Huang, S. Xu, L. Y. Zhang, “Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud,” Computer Standards & Interfaces, in press, 2024. DOI: 10.1016/j.csi.2024.103854.
  8. H. Liu, Y. Wang, Z. Zhang, J. Deng, C. Chen, L. Y. Zhang, “Matrix factorization recommender based on adaptive Gaussian differential privacy for implicit feedback,” vol. 61, no. 4, Information Processing & Management, 2024. DOI: 10.1016/j.ipm.2024.103720.
  9. Z. Yao, H. Zhang, Y. Guo, X. Tian, W. Peng, Y. Zou, L. Y. Zhang, C. Chen, “Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Model,” IEEE Transactions on Dependable and Secure Computing, in press, 2024.
  10. J. Lu, S. Hu, W. Wan, M. Li, L. Y. Zhang, L. Xue, H. Wang, H. Jin, “Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning,” IEEE Transactions on Information Forensics and Security, in press, 2024. DOI: 10.1109/TIFS.2024.3360869.
  11. M. Xue, Y. Wu, S. Ni, L. Y. Zhang, Y. Zhang, W. Liu, “Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger,” IEEE Transactions on Industrial Informatics, pp. 1241-1250, 2023, DOI: 10.1109/TII.2023.3329641.
  12. Z. Gong, L. Shen, Y. Zhang, L. Y. Zhang, J. Wang, G. Bai, Y. Xiang, “AGRAMPLIFIER: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification,” IEEE Transactions on Information Forensics and Security, in press, 2023, DOI: 10.1109/TIFS.2023.3333555.
  13. L. Li, C. Chen, L. Pan, L. Y. Zhang, Z. Wang, J. Zhang, Y. Xiang, “A Survey of PPG’s Application in Authentication,” Computers & Security, 2023, DOI: 10.1016/j.cose.2023.103488.
  14. Y. Wang, X. Zhang, R. Chen, H.-N. Dai, X. Wang, L. Y. Zhang, M. Li, “Multi-Receiver Conditional Anonymous Singcryption for IoMT Crowdsourcing,” IEEE Internet of Things Journal, 2023, DOI: 10.1109/JIOT.2023.3319074.
  15. J. Deng, H. Li, J. Guo, L. Y. Zhang, Y. Wang, “Providing prediction reliability through deep neural networks for recommender systems,” vol. 185, no. 109627, Computers & Industrial Engineering, 2023. 10.1016/j.cie.2023.109627.
  16. J. Deng, X. Ran, Y. Wang, L. Y. Zhang, J. Guo, “Probabilistic Matrix Factorization Recommendation Approach for Integrating Multiple Information Sources,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2023, DOI: 10.1109/TSMC.2023.3281706.
  17. C. Luo, Y. Wang, B. Li, H. Liu, P. Wang, L. Y. Zhang, “An Efficient Approach to Manage Natural Noises in Recommender Systems,” Algorithms, vol. 16 no. 5: 228, 2023.
  18. Y. Yang, J. Weng, Y. Tong, J.-N. Liu, Z. Wu, L. Y. Zhang, A. Yang, “PriGenX: Privacy-preserving Query With Anonymous Access Control for Genomic Data,” IEEE Transactions on Dependable and Secure Computing, in press, 2023. DOI: 10.1109/TDSC.2023.3266292.
  19. Y. Wang, M. Gao, X. Ran, J. Ma, L. Y. Zhang, “An improved matrix factorization with local differential privacy based on piecewise mechanism for recommendation systems,” Expert Systems with Applications, in press, 2023. DOI: 10.1016/j.eswa.2022.119457.
  20. Y. Yang, Y. Tong, J. Weng, Y. Yi, Y. Zheng, L. Y. Zhang, R. Lu, “PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data,” IEEE Transactions on Cloud Computing, in press, 2022. DOI: 10.1109/TCC.2022.3205700
  21. H. Zhang, J. Chen, L. Y. Zhang, C, Fu, R. Gravina, G. Fortino, Z. Lv, “Low-cost and Confidential ECG Acquisition Framework using Compressed Sensing and Chaotic Systems for Wireless Body Area Network,” IEEE Journal of Biomedical and Health Informatics, 2022. DOI: 10.1109/JBHI.2022.3206232
  22. Z. Zheng, Z. Li, H. Jiang, L. Y. Zhang, D. Tu, “Semantic-Aware Privacy-Preserving Online Location Trajectory Data Sharing,” IEEE Transactions on Information Forensics and Security, in press, 2022. DOI: 10.1109/TIFS.2022.3181855
  23. Z. Zhang, L. Y. Zhang, X. Zheng, B. H. Abbasi, S. Hu, “Evaluating Membership Inference Through Adversarial Robustness,” The Computer Journal, in press, 2022.
  24. Z. Zhang, H. Zhu, P. Ban, Y. Wang, L. Y. Zhang, “Buffeting Chaotification Model for Enhancing Chaos and Its Hardware Implementation,” IEEE Transactions on Industrial Electronics, in press, 2022. DOI: 10.1109/TIE.2022.3174288
  25. N. Sun, C.-T. Li, H. Chan, B. D. Le, M. Z. Islam, L. Y. Zhang, M. R. Islam, W. Armstrong, “Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges,” IEEE Access, in press, 2022. DOI: 10.1109/ACCESS.2022.3168716
  26. F. Zhao, L. Zhou, Q. Zhong, R. Lan, L. Y. Zhang, “Natural Backdoor Attacks on Deep Neural Networks via Raindrops,” Security and Communication Networks, 2022. DOI: 10.1155/2022/4593002
  27. Z. Liu, J. Y. Liu, L. Y. Zhang, Y. Zhao, X. F. Gong, “Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption,” Complexity, in press, 2022.
  28. F. Wang, L. Y. Zhang*, “Equiprobable symbolization pattern entropy for time series complexity measurement,” Nonlinear Dynamics, pp. 1-14, 2022. DOI: 10.1007/s11071-022-07772-1
  29. Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang, “Cyber Information Retrieval Through Pragmatics Understanding and Visualization,” IEEE Transactions on Dependable and Secure Computing, in press, 2022. DOI: 10.1109/TDSC.2022.3151148
  30. Xun Ran, Yong Wang, Leo Yu Zhang, Jun Ma, “A Differentially Private Matrix Factorization Based on Vector Perturbation for Recommender System,” Neurocomputing, in press, 2022.
  31. Xun Ran, Yong Wang, Leo Yu Zhang, Jun Ma, “A Differentially Private Nonnegative Matrix Factorization for Recommender System,” Information Sciences, in press, 2022.
  32. Yong Wang, Zhuo Liu, L. Y. Zhang, Fabio Pareschi, Gianluca Setti, Guanrong Chen, “From Chaos to Pseudo-Randomness: A Case Study on the 2D Coupled Map Lattice,” IEEE Transactions on Cybernetics, in press, 2021. DOI: 10.1109/TCYB.2021.3129808
  33. G Lin, W Xiao, L. Y. Zhang, S Gao, Y Tai, J Zhang, “Deep neural-based vulnerability discovery demystified: data, model and performance,” Neural Computing and Applications, in press, 2021
  34. Y. Wang, X. Zhao, Z. Zhang, L. Y. Zhang, “A collaborative filtering algorithm based on item labels and Hellinger distance for sparse data,” Journal of Information Science, in press, 2021. DOI: 10.1177/0165551520979876
  35. P Wang, Y Wang, L. Y. Zhang, and H Zhu “An effective and efficient fuzzy approach for managing natural noise in recommender systems,” Information Sciences, vol. 570, pp. 623-637, 2021.
  36. Z. Liu, Y. Wang, L. Y. Zhang, and J. Ma, “A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model,” Security and Communication Networks, 2021.
  37. Junxin Chen, Leo Yu Zhang, Yicong Zhou, “Re-evaluation of the security of a family of image diffusion mechanisms,” IEEE Transactions on Circuits and Systems for Video Technology, 2021. DOI: 10.1109/TCSVT.2021.3054508
  38. Zhuo Liu, Yong Wang, Gongkun Jiang, Leo Yu Zhang, “Design and Analysis on a Parallel Chaos-Based Hash Function,” International Journal of Bifurcation and Chaos, 2020. DOI: 10.1142/S0218127420501886
  39. C.K. Ng, S. Rajasegarar, L. Pan, F. Jiang, L. Y. Zhang, “VoterChoice: A ransomware detection honeypot with multiple voting framework,” Concurrency and Computation: Practice and Experience, e5726, 2020.
  40. Y. Wang, Z. Zhang, L. Y. Zhang, J. Feng, J. Gao, P. Lei, “A genetic algorithm for constructing bijective substitution boxes with high nonlinearity,” Information Sciences, vol. 523, pp. 152-166, 2020.
  41. G. Hua, Y. Xiang, L. Y. Zhang, “Informed Histogram-Based Watermarking,” IEEE Signal Processing Letters, in press, 2020. DOI: 10.1109/LSP.2020.2965331
  42. Y. Zhang, X. Huang, X. Chen, L. Y. Zhang, J. Zhang, Y. Xiang, “A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle,” IEEE Internet of Things Journal, in press, 2019. DOI: 10.1109/JIOT.2019.2949407
  43. J. Chen, J. Xing, L. Y. Zhang, Q. Lin, “Compressed sensing for electrocardiogram acquisition in wireless body sensor network: A comparative analysis,” International Journal of Distributed Sensor Networks, in press, 2019. DOI: 10.1177/1550147719864884
  44. Y. Zhang, Y. Xiang, L. Y. Zhang, Y. Rong, S. Guo, “Secure Wireless Communications Based on Compressive Sensing: A Survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1093-1111, 2019.
  45. Y. Zhang, Y. Xiang, L. Y. Zhang, L. Yang, J. Zhou, “Efficiently and Securely Outsourcing Compressed Sensing Reconstruction to a Cloud,” Information Sciences, in press, 2019. DOI: 10.1016/j.ins.2019.05.024
  46. Yuansheng Liu, L. Y. Zhang, Jinyan Li, “Fast detection of maximal exact matches via fixed sampling of query k-mers and Bloom filtering of index k-mers,” Bioinformatics, in press, 2019. DOI: 10.1093/bioinformatics/btz273
  47. J. Chen, L. Chen, L. Y. Zhang, Z. Zhu, “Medical image cipher using hierarchical diffusion and non-sequential encryption,” Nonlinear Dynamics, in press, 2019.
  48. C.K. Ng, F. Jiang, L. Y. Zhang, W. Zhou, “Static malware clustering using enhanced deep embedding method,” Concurrency and Computation: Practice and Experience, e5234, 2019.
  49. N. Sun, J. Zhang, P. Rimba, S. Gao, L. Y. Zhang, Y. Xiang, “Data-driven cybersecurity incident prediction: A survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1744-1772, 2019.
  50. S. Hu, L. Y. Zhang, Q. Wang, Z. Qin, C. Wang, “Towards Private and Scalable Cross-Media Retrieval,” IEEE Transactions on Dependable and Secure Computing, in press, 2019. DOI: 10.1109/TDSC.2019.2926968
  51. J. Wang, L. Y. Zhang, J. Chen, G. Hua, Y. Zhang, Y. Xiang, “Compressed Sensing Based Selective Encryption With Data Hiding Capability,” IEEE Transactions on Industrial Informatics, in press, 2019. DOI: 10.1109/TII.2019.2924083
  52. J. Wang, J. Li, H. Wang, L. Y. Zhang, L. M. Cheng, Q. Lin, “Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 5892-5901, 2019.
  53. Leo Yu Zhang, Yifeng Zheng, Jian Weng, Cong Wang, Zihao Shan, Kui Ren, “You Can Access But You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center,” IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 6, pp. 1218-1231, 2018.
  54. Junxin Chen, Nan Bao, Leo Yu Zhang, Zhiliang Zhu, “Optical information authentication using optical encryption and sparsity constraint,” Optics and Lasers in Engineering, vol. 107, pp. 352-363, 2018.
  55. Yushu Zhang, Qi He, Yong Xiang, Leo Yu Zhang, Bo Liu, Junxin Chen, Yiyuan Xie, “Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things,” IEEE Internet of Things Journal, in press, 2018.
  56. Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, and Guanrong Chen, “Improved Known-plaintext Attack on Permutation-only Multimedia Ciphers,” Information Sciences, vols. 430-431, pp. 228-239, 2018.
  57. Junxin Chen, Nan Bao, Jinchang Li, Zhiliang Zhu, Leo Yu Zhang, “Cryptanalysis of Optical Ciphers Integrating Double Random Phase Encoding With Permutation,” IEEE Access, vol. 5, pp. 16124-16129, 2017.
  58. Yushu Zhang, Jiantao Zhou, Yong Xiang, Leo Yu Zhang, Fei Chen, Shaoning Pang, and Xiaofeng Liao, “Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds,” IEEE Transactions on Big Data, in press, 2017.
  59. Qiuzhen Lin, Bishan Hu, Ya Tang, Leo Yu Zhang, Jianyong Chen, Xiaomin Wang, Zhong Ming, “A Local Search Enhanced Differential Evolutionary Algorithm for Sparse Recovery,” Applied Soft Computing, vol. 57, pp. 144-163, 2017.
  60. Leo Yu Zhang, Yuansheng Liu, Fabio Pareschi, Yushu Zhang, Kwok-Wo Wong, Riccardo Rovatti, Gianluca Setti, “On the security of a class of diffusion mechanisms for image encryption,” IEEE Transactions on Cybernetics, vol. 48, no. 4, pp. 1163-1175, 2018. [Code]
  61. Leo Yu Zhang, Yushu Zhang, Yuansheng Liu, Anjia Yang, Guanrong Chen, “Security analysis of some diffusion mechanisms used in chaotic ciphers,” International Journal of Bifurcation and Chaos, vol. 27, no. 10, article no. 1750155, 2017.
  62. Yushu Zhang, Hui Huang, Yong Xiang, Leo Yu Zhang, Xing He, “Harnessing the hybrid cloud for secure big image data service,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1380-1388, 2017.
  63. Junxin Chen, Yushu Zhang, Leo Yu Zhang, “On the security of optical ciphers under the architecture of compressed sensing combining with double random phase encoding,” IEEE Photonics Journal, vol. 9, no. 4, 7802711, 2017.
  64. Guodong Ye, Xiaoling Huang, Leo Yu Zhang, Zhengxia Wang. “A self-cited pixel summation based image encryption algorithm,” Chinese Physics B, vol. 26, no. 1, 10501, 2017.
  65. Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Jiantao Zhou, “Bi-level Protected Compressive Sampling,” IEEE Transactions on Multimedia, vol. 18, no. 9, pp. 1720-1732, 2016.
  66. Yushu Zhang, Leo Yu Zhang, Jiantao Zhou, Licheng Liu, Fei Chen, Xing He, “A Review of Compressive Sensing in Information Security Field,” IEEE Access, vol. 4, pp. 2507-2519, 2016.
  67. Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Di Xiao, Bin Chen, Xiaofeng Liao, A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions,” International Journal of Bifurcation and Chaos, vol. 26, no. 11, 1650191, 2016.
  68. Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Kwok-Wo Wong, Xing He, Xiao Di, “Embedding Cryptographic Features in Compressive Sensing,” Neurocomputing, vol. 40, no. 12, pp. 472-480, 2016.
  69. Yuansheng Liu, Leo Yu Zhang, Jia Wang, Yushu Zhang, Kwok-Wo Wong, “Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure,” Nonlinear Dynamics, vol. 84, no. 4, pp. 2241-2250, 2016.
  70. Li Zeng, Renren Liu, Leo Yu Zhang, Yuansheng Liu, Kwok-Wo Wong, “Cryptanalyzing an image encryption algorithm based on scrambling and Veginere cipher,” Multimedia Tools and Applications, vol. 75, no. 10, pp. 5439-5453, 2016.
  71. Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang, Wenying Wen, Jiantao Zhou, Xing He, “Robust Coding of Encrypted Images via Structural Matrix,” Signal Processing: Image Communication, vol. 39, part A, pp. 202-211, 2015.
  72. Yushu Zhang, Leo Yu Zhang, “Exploiting random convolution and random subsampling for optical image encryption and compression,” Electronics Letters, vol. 51, no. 20, pp. 1572-1574, 2015.
  73. Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Kwok-Wo Wong, “Breaking an image compression and encryption scheme based on Chinese Remainder Theorem,” Signal Processing: Image Communication, vol. 29, no. 8, pp. 914-920, 2014.
  74. Leo Yu Zhang, Xiaobo Hu, Yuansheng Liu, Kwok-Wo Wong, “A chaotic image encryption scheme owning temp-value feedback,” Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 10, pp. 3653-3659, 2014.
  75. Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Michael Z. Q. Chen, “Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation,” International Journal of Bifurcation and Chaos, vol. 23, no. 4, 2013.
  76. Chengqing Li, Leo Yu Zhang, Rong Ou, Kwok-Wo Wong, “Breaking a novel colour image encryption algorithm based on chaos,” Nonlinear Dynamics, vol. 70, no. 4, pp. 2383-2388, 2012.
  77. Leo Yu Zhang, Chengqing Li, Kwok-Wo Wong, Shi Shu, Guanrong Chen, “Cryptanalyzing a chaos-based image encryption algorithm using alternate structure,” Journal of Systems and Software, vol. 85, no. 9, pp. 2077-2085, 2012.
  78. Leo Yu Zhang, Chengqing Li, Qin Li, Dan Zhang, Shi Shu, “Breaking a chaotic image encryption algorithm based on perceptron model,” Nonlinear Dynamics, vol. 69, no. 3, pp. 1091-1096, 2012.