Neil Zhenqiang Gong
Neil Zhenqiang Gong
Assistant Professor, Duke University
Verified email at - Homepage
TitleCited byYear
On the feasibility of internet-scale author identification
A Narayanan, H Paskov, NZ Gong, J Bethencourt, E Stefanov, ECR Shin, ...
2012 IEEE Symposium on Security and Privacy, 300-314, 2012
Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
ACM Internet Measurement Conference (IMC), 2012
Joint link prediction and attribute inference using a social-attribute network
NZ Gong, A Talwalkar, L Mackey, L Huang, ECR Shin, E Stefanov, ER Shi, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 5 (2), 27, 2014
SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
NZ Gong, M Frank, P Mittal
IEEE Transactions on Information Forensics and Security 9 (6), 2014
Stealing Hyperparameters in Machine Learning
B Wang, NZ Gong
IEEE Symposium on Security and Privacy, 2018
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge
S Ji, W Li, NZ Gong, P Mittal, R Beyah
NDSS, 2015
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference
B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong
Proceedings of the Eighth ACM International Conference on Web Search and …, 2015
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification
X Cao, NZ Gong
Annual Computer Security Applications Conference (ACSAC), 2017
Protecting privacy in location-based services using k-anonymity without cloaked region
Z Gong, GZ Sun, X Xie
2010 Eleventh International Conference on Mobile Data Management, 366-371, 2010
SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection
P Gao, B Wang, NZ Gong, SR Kulkarni, K Thomas, P Mittal
IEEE Conference on Communications and Network Security (CNS), 2018
You are who you know and how you behave: Attribute inference attacks via users' social friends and behaviors
NZ Gong, B Liu
25th {USENIX} Security Symposium ({USENIX} Security 16), 979-995, 2016
AttriInfer: Inferring User Attributes in Online Social Networks Using Markov Random Fields
J Jia, B Wang, L Zhang, NZ Gong
Proceedings of the 26th International Conference on World Wide Web (WWW …, 2017
Random walk based fake account detection in online social networks
J Jia, B Wang, NZ Gong
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs
B Wang, NZ Gong, H Fu
2017 IEEE International Conference on Data Mining (ICDM), 465-474, 2017
SybilSCAR: Sybil detection in online social networks via local rule based propagation
B Wang, L Zhang, NZ Gong
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
Reciprocal versus parasocial relationships in online social networks
NZ Gong, W Xu
Social Network Analysis and Mining 4 (1), 1-14, 2014
On the Security of Trustee-based Social Authentications
NZ Gong, D Wang
IEEE Transactions on Information Forensics and Security 9 (8), 2014
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
J Jia, NZ Gong
USENIX Security Symposium, 2018
Evolution of patterns on Conus shells
Z Gong, NJ Matzke, B Ermentrout, D Song, JE Vendetti, M Slatkin, G Oster
Proceedings of the National Academy of Sciences 109 (5), E234-E241, 2012
Forgery-Resistant Touch-based Authentication on Mobile Devices
NZ Gong, M Payer, R Moazzezi, M Frank
The system can't perform the operation now. Try again later.
Articles 1–20