[By year][By topic]
Publications
Authors with a star * are students advised, co-advised, or mentored by me at Iowa State University.
2019
- Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study
Zenghua Xia, Chang Liu, Neil Zhenqiang Gong, Qi Li, Yong Cui, and Dawn Song
ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Applied Data Science Track, 2019
Acceptance rate: ~145/700= 20.7%
- Calibrate: Frequency Estimation and Heavy Hitter Identification with Local Differential Privacy via Incorporating Prior Knowledge
Jinyuan Jia*, Neil Zhenqiang Gong
IEEE International Conference on Computer Communications (INFOCOM), 2019
Acceptance rate: 288/1464= 19.7%
- Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation
Binghui Wang*, Jinyuan Jia*, and Neil Zhenqiang Gong
ISOC Network and Distributed System Security Symposium (NDSS), 2019
Acceptance rate: 89/521= 17.1%
Distinguished Paper Award Honorable Mention
2018
- Poisoning Attacks to Graph-Based Recommender Systems
Minghong Fang*, Guolei Yang, Neil Zhenqiang Gong, and Jia Liu
Annual Computer Security Applications Conference (ACSAC), 2018
Acceptance rate: 60/299= 20.1%
- EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis
Chris Chao-Chun*, Chen Shi*, Neil Zhenqiang Gong, Yong Guan
ACM Conference on Computer and Communications Security (CCS), 2018
Acceptance rate: 134/809= 16.6%
- AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
Jinyuan Jia*, Neil Zhenqiang Gong
USENIX Security Symposium, 2018
Acceptance rate: 100/524= 19.1%
Code and dataset is available [here]
- Stealing Hyperparameters in Machine Learning
Binghui Wang*, Neil Zhenqiang Gong
IEEE Symposium on Security and Privacy (IEEE S&P), 2018
Acceptance rate: 63/549= 11.5%
- SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels
Binghui Wang*, Le Zhang*, Neil Zhenqiang Gong
International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018
Acceptance rate: 33/145= 22.8%
- SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection
Peng Gao, Binghui Wang*, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal
IEEE Conference on Communications and Network Security (CNS), 2018.
Acceptance rate: 51/181 = 28.2%
- A Dynamic Taint Analysis Tool for Android App Forensics
Zhen Xu*, Chen Shi*, Chris Chao-Chun Cheng*, Neil Zhengqiang Gong, Yong Guan
International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), 2018
Best Paper Award
- SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection (Extended Abstract)
Peng Gao, Binghui Wang*, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Prateek Mittal
Workshop on Misinformation and Misbehavior Mining on the Web (MIS2), co-located with WSDM, 2018
- Attribute Inference Attacks in Online Social Networks
Neil Zhenqiang Gong, Bin Liu
ACM Transactions on Privacy and Security (TOPS), 21(1), 2018
- Structure-based Sybil Detection in Social Networks via Local Rule-based Propagation
Binghui Wang*, Jinyuan Jia*, Le Zhang*, Neil Zhenqiang Gong
IEEE Transactions on Network Science and Engineering (TNSE), 2018, to appear.
Fast tracked from our INFOCOM'17 paper.
Source code is available [here]
2017
- Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification
Xiaoyu Cao*, Neil Zhenqiang Gong
Annual Computer Security Applications Conference (ACSAC), 2017
Acceptance rate: 48/244=19.7%
- GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs
Binghui Wang*, Neil Zhenqiang Gong, Hao Fu
IEEE International Conference on Data Mining (ICDM), regular paper, 2017
Acceptance rate: 72/778=9.25%
- Robust Spammer Detection in Microblogs: Leveraging User Carefulness
Hao Fu, Xing Xie, Yong Rui, Neil Zhenqiang Gong, Guangzhong Sun, Enhong Chen
ACM Transactions on Intelligent Systems and Technology (TIST), 8(6), 2017
- Random Walk based Fake Account Detection in Online Social Networks
Jinyuan Jia*, Binghui Wang*, Neil Zhenqiang Gong
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017
Acceptance rate: 49/220=22.3%
- PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices
Neil Zhenqiang Gong, Altay Ozen*, Yu Wu, Xiaoyu Cao*, Richard Shin, Dawn Song, Hongxia Jin, Xuan Bao
IEEE International Conference on Distributed Computing Systems (ICDCS), short paper, 2017
Acceptance rate: (90 + a small number of short papers)/531=?
- SybilSCAR: Sybil Detection in Online Social Networks via Local Rule based Propagation
Binghui Wang*, Le Zhang*, Neil Zhenqiang Gong
IEEE International Conference on Computer Communications (INFOCOM), 2017
Acceptance rate: 292/1395=20.9%
Fast tracked to IEEE TNSE.
Only 10 papers were selected for fast tracking.
Source code is available [here]
- AttriInfer: Inferring User Attributes in Online Social Networks Using Markov Random Fields
Jinyuan Jia*, Binghui Wang*, Le Zhang*, Neil Zhenqiang Gong
ACM International World Wide Web Conference (WWW), 2017
Acceptance rate: 164/966=17.0%
- Fake Co-visitation Injection Attacks to Recommender Systems
Guolei Yang*, Neil Zhenqiang Gong, Ying Cai
ISOC Network and Distributed System Security Symposium (NDSS), 2017
Acceptance rate: 68/423=16.1%
2016
- Structural Analysis of User Choices for Mobile App Recommendation
Bin Liu, Yao Wu, Neil Zhenqiang Gong, Junjie Wu, Hui Xiong, Martin Ester
ACM Transactions on Knowledge Discovery from Data (TKDD), 11(2), 2016
- You are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors
Neil Zhenqiang Gong, Bin Liu
USENIX Security Symposium, 2016
Acceptance rate: 72/463=15.6%
- Seed-based De-anonymizability Quantification of Social Networks
Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem Beyah
IEEE Transactions on Information Forensics and Security (TIFS), 11(7), 2016
- Forgery-Resistant Touch-based Authentication on Mobile Devices
Neil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, Mario Frank
ACM Asia Conference on Computer and Communications Security (ASIACCS), 2016
Acceptance rate: 73/350=20.9% for full papers
2015
- Protecting Your Children from Inappropriate Content in Mobile Apps: An Automatic Maturity Rating Framework
Bing Hu, Bin Liu, Neil Zhenqiang Gong, Deguang Kong, Hongxia Jin
ACM International Conference on Information and Knowledge Management (CIKM), 2015
Acceptance rate: 87/484=18.0% for long papers
- Towards Secure and Privacy-Preserving Online Social Networking Services
Zhenqiang Gong
Ph.D Dissertation , 2015
- Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference
Bin Liu, Deguang Kong, Lei Cen, Neil Zhenqiang Gong, Hongxia Jin, Hui Xiong
ACM International Conference on Web Search and Data Mining (WSDM), 2015
Acceptance rate: 40/238=16.8%
- On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge
Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem Beyah
ISOC Network and Distributed System Security Symposium (NDSS), 2015
Acceptance rate: 51/302=16.9%
- New Directions in Social Authentication
Sakshi Jain, Neil Zhenqiang Gong, Sreya Basuroy, Juan Lang, Dawn Song, Prateek Mittal
Workshop on Usable Security (USEC), co-located with NDSS, 2015
- What You Submit is Who You Are: A Multi-Modal Approach for Deanonymizing Scientific Publications
Mathias Payer, Ling Huang, Neil Zhenqiang Gong, Kevin Borgolte, Mario Frank
IEEE Transactions on Information Forensics and Security (TIFS), 10(1), 2015
2014
- Connect the Dots by Understanding User Status and Transitions
Xuan Bao, Yilin Shen, Neil Zhenqiang Gong, Hongxia Jin, Bing Hu
UbiComp/ISWC Programming Competition, co-located with UbiComp, 2014
- On the Security of Trustee-based Social Authentications
Neil Zhenqiang Gong, Di Wang
IEEE Transactions on Information Forensics and Security (TIFS), 9(8), 2014
Featured in VentureBeat, etc.
- SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
Neil Zhenqiang Gong, Mario Frank, Prateek Mittal
IEEE Transactions on Information Forensics and Security (TIFS), 9(6), 2014
Source code is available [here]
- Reciprocal versus Parasocial Relationships in Online Social Networks
Neil Zhenqiang Gong, Wenchang Xu
Springer Social Network Analysis and Mining (SNAM), 4(1), 2014
- Joint Link Prediction and Attribute Inference using a Social-Attribute Network
Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Richard Shin, Emil Stefanov, Elaine Shi, Dawn Song
ACM Transactions on Intelligent Systems and Technology (TIST), 5(2), 2014
2012
- Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song
ACM/USENIX Internet Measurement Conference (IMC), 2012
Acceptance rate: 45/183=24.6%
Our Google+ dataset is available [here]
- Jointly Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN)
Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Richard Shin, Emil Stefanov, Elaine Shi, Dawn Song
ACM Workshop on Social Network Mining and Analysis (SNA-KDD), co-located with KDD, 2012
- On the Feasibility of Internet-Scale Author Identification [slides]
Arvind Narayanan, Hristo Paskov, Neil Zhenqiang Gong, John Bethencourt, Richard Shin, Emil Stefanov, Dawn Song
IEEE Symposium on Security and Privacy (IEEE S&P), 2012
Acceptance rate: 40/307=13.0%
Featured in WNYC Studios, Boing Boing, Slashdot, etc.
- The evolution of patterns on Conus shells
Zhenqiang Gong, Nick Matzke, Bard Ermentrout, Dawn Song, Jann E. Vendetti, Montgomery Slatkin, George Oster
Proceedings of the National Academy of Sciences (PNAS), 109(5), 2012
Featured as a breakthrough by WIRED, ScienceDaily, PhysOrg, etc.
Selected as “The Best Scientific Figures in 2012” by WIRED. Only 21 papers out of all scientific publications in 2012 were selected.
Before 2012 (work done during my undergraduate study)
- Efficient Approximate Top-k Query Algorithm Using Cube Index
Dongqu Chen, Guang-Zhong Sun, Neil Zhenqiang Gong
The 13th Asia-Pacific Web Conference (APWeb), 2011
- Parallel Algorithms for Top-k Query Processing
Zhenqiang Gong
ACM SIGMOD International Conference on Management of Data (SIGMOD), poster, 2010
- Protecting Privacy in Location-based Services Using K-anonymity without Cloaked Region
Zhenqiang Gong, Guangzhong Sun, Xing Xie
IEEE International Conference on Mobile Data Management (MDM) Workshops, 2010
- Efficient Top-k Query Algorithms Using K-Skyband Partition
Zhenqiang Gong, Guangzhong Sun, Jing Yuan, Yanjing Zhong
The 4th International ICST Conference on Scalable Information Systems (INFOSCALE), 2009
|