Neil Zhenqiang Gong
Neil Zhenqiang Gong
Assistant Professor, Duke University
Verified email at duke.edu - Homepage
TitleCited byYear
On the feasibility of internet-scale author identification
A Narayanan, H Paskov, NZ Gong, J Bethencourt, E Stefanov, ECR Shin, ...
2012 IEEE Symposium on Security and Privacy, 300-314, 2012
2382012
Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
ACM Internet Measurement Conference (IMC), 2012
2002012
Joint link prediction and attribute inference using a social-attribute network
NZ Gong, A Talwalkar, L Mackey, L Huang, ECR Shin, E Stefanov, ER Shi, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 5 (2), 27, 2014
188*2014
SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
NZ Gong, M Frank, P Mittal
IEEE Transactions on Information Forensics and Security 9 (6), 2014
862014
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference
B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong
Proceedings of the Eighth ACM International Conference on Web Search and …, 2015
692015
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge
S Ji, W Li, NZ Gong, P Mittal, R Beyah
NDSS, 2015
622015
Stealing Hyperparameters in Machine Learning
B Wang, NZ Gong
IEEE Symposium on Security and Privacy, 2018
542018
Protecting privacy in location-based services using k-anonymity without cloaked region
Z Gong, GZ Sun, X Xie
2010 Eleventh International Conference on Mobile Data Management, 366-371, 2010
402010
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification
X Cao, NZ Gong
Annual Computer Security Applications Conference (ACSAC), 2017
392017
SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection
P Gao, B Wang, NZ Gong, SR Kulkarni, K Thomas, P Mittal
IEEE Conference on Communications and Network Security (CNS), 2018
29*2018
You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors
NZ Gong, B Liu
USENIX Security Symposium, 979-995, 2016
282016
Reciprocal versus parasocial relationships in online social networks
NZ Gong, W Xu
Social Network Analysis and Mining 4 (1), 1-14, 2014
21*2014
Evolution of patterns on Conus shells
Z Gong, NJ Matzke, B Ermentrout, D Song, JE Vendetti, M Slatkin, G Oster
Proceedings of the National Academy of Sciences 109 (5), E234-E241, 2012
212012
SybilSCAR: Sybil Detection in Online Social Networks via Local Rule based Propagation
B Wang, L Zhang, NZ Gong
INFOCOM, 2017
202017
Seed-based de-anonymizability quantification of social networks
S Ji, W Li, NZ Gong, P Mittal, R Beyah
IEEE Transactions on Information Forensics and Security 11 (7), 1398-1411, 2016
192016
On the Security of Trustee-based Social Authentications
NZ Gong, D Wang
IEEE Transactions on Information Forensics and Security 9 (8), 2014
182014
GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs
B Wang, NZ Gong, H Fu
2017 IEEE International Conference on Data Mining (ICDM), 465-474, 2017
162017
Random walk based fake account detection in online social networks
J Jia, B Wang, NZ Gong
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
162017
AttriInfer: Inferring User Attributes in Online Social Networks Using Markov Random Fields
J Jia, B Wang, L Zhang, NZ Gong
Proceedings of the 26th International Conference on World Wide Web (WWW …, 2017
16*2017
Forgery-Resistant Touch-based Authentication on Mobile Devices
NZ Gong, M Payer, R Moazzezi, M Frank
ASIACCS, 2016
162016
The system can't perform the operation now. Try again later.
Articles 1–20