publications

publications by categories in reversed chronological order. generated by jekyll-scholar.

2026

  1. USENIX Security26
    vCause.png
    vCause: Efficient and Verifiable Causality Analysis for Cloud-based Endpoint Auditing
    Qiyang Song, Qihang Zhou, Xiaoqi Jia, Zhengyu Song, Wenbo Jiang, and 3 more authors
    In the 35th USENIX Security 2026, 2026
  2. AAAI26
    focusing_on.png
    Focusing on Language: Revealing and Exploiting Language Attention Heads in Multilingual Large Language Models
    Xin Liu, Qiyang Song, Qihang Zhou, HaiChao Du, Shaowen Xu, and 3 more authors
    In the 40th Association for the Advancement of Artificial Intelligence Conference (AAAI) 2026, 2026

2025

  1. MMAsia25
    when_hallucinated.png
    When Hallucinated Concepts Cross Modals: Unveiling Backdoor Vulnerability in Multi-modal In-context Learning
    Guanyu Hou, Jiaming He, Yitong Qiao, Jiachen Li, Qiyang Song, and 3 more authors
    In the 7th ACM International Conference on Multimedia in Asia (MMAsia) 2025, 2025
  2. ECAI25
    LKS.png
    Latent Knowledge Scalpel: Precise and Massive Knowledge Editing for Large Language Models
    Xin Liu, Qiyang Song, Shaowen Xu, Kerou Zhou, Wenbo Jiang, and 4 more authors
    In European Conference on Artificial Intelligence (ECAI) 2025, 2025
  3. ICC25
    Physical_Traffic_Sign_Backdoor.png
    Stealthy Physical Backdoor Attacks against Traffic Sign Recognition Systems
    Wenbo Jiang, Hongwei Li, Yuxin Lu, Shuai Yuan, Rui Zhang, Zihan Wang, Qiyang Song, and Dongxiao Liu
    In IEEE International Conference on Communications (ICC) 2025, 2025
  4. ICME25
    weaponizing_tokens.png
    Weaponizing Tokens: Backdooring Text-to-Image Generation via Token Remapping
    Jiaming He, Wenbo Jiang, Guanyu Hou, Qiyang Song, Ji Guo, and 1 more author
    In IEEE International Conference on Multimedia & Expo (ICME) 2025, 2025
  5. NDSS25
    silence_false_alarms.png
    Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection
    Qiyang Song, Heqing Huang, Xiaoqi Jia, Yuanbo Xie, and Jiahao Cao
    In The Network and Distributed System Security (NDSS) Symposium 2025, 2025

2021

  1. ACSAC21
    try_before_you.png
    Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace
    Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, and Ke Xu
    In Annual Computer Security Applications Conference (ACSAC) 2021, 2021
  2. TKDE21
    GPSC.png
    GPSC: A grid-based privacy-reserving framework for online spatial crowdsourcing
    Haoda Li, Qiyang Song, Guoliang Li, Qi Li, and Rengui Wang
    IEEE Transactions on Knowledge and Data Engineering, 2021

2020

  1. TIFS20
    SAP-SSE.png
    SAP-SSE: Protecting search patterns and access patterns in searchable symmetric encryption
    Qiyang Song, Zhuotao Liu, Jiahao Cao, Kun Sun, Qi Li, and 1 more author
    IEEE Transactions on Information Forensics and Security, 2020
  2. SecureComm20
    SGX-Cube.png
    Sgx-cube: An sgx-enhanced single sign-on system against server-side credential leakage
    Songsong Liu, Qiyang Song, Kun Sun, and Qi Li
    In Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, 2020

2019

  1. DSC19
    federated_cloud_based.png
    Federated-cloud based deep neural networks with privacy preserving image filtering techniques
    Isabelle Choi, Qiyang Song, and Kun Sun
    In 2019 IEEE Conference on Dependable and Secure Computing (DSC), 2019
  2. GlobeCom19
    cSFC.png
    cSFC: Building credible service function chain on the cloud
    Shengsheng Yao, Mingwei Xu, Qi Li, Jiahao Cao, and Qiyang Song
    In 2019 IEEE Global Communications Conference (GLOBECOM), 2019