[By year][By topic]
Publications
Authors with a star * are students advised, co-advised, or mentored by me at Iowa State University.
Social networks and web privacy: de-anonymization, attribute privacy, link privacy, etc.
- AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
Jinyuan Jia*, Neil Zhenqiang Gong
USENIX Security Symposium, 2018
Acceptance rate: 100/524= 19.1%
- Attribute Inference Attacks in Online Social Networks
Neil Zhenqiang Gong, Bin Liu
ACM Transactions on Privacy and Security (TOPS), 21(1), 2018
- AttriInfer: Inferring User Attributes in Online Social Networks Using Markov Random Fields
Jinyuan Jia*, Binghui Wang*, Le Zhang*, Neil Zhenqiang Gong
ACM International World Wide Web Conference (WWW), 2017
Acceptance rate: 164/966=17.0%
- You are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors
Neil Zhenqiang Gong, Bin Liu
USENIX Security Symposium, 2016
Acceptance rate: 72/463=15.6%
- Seed-based De-anonymizability Quantification of Social Networks
Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem Beyah
IEEE Transactions on Information Forensics and Security (TIFS), 11(7), 2016
- On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge
Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem Beyah
ISOC Network and Distributed System Security Symposium (NDSS), 2015
Acceptance rate: 51/302=16.9%
- Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference
Bin Liu, Deguang Kong, Lei Cen, Neil Zhenqiang Gong, Hongxia Jin, Hui Xiong
ACM International Conference on Web Search and Data Mining (WSDM), 2015
Acceptance rate: 16.8%
- What You Submit is Who You Are: A Multi-Modal Approach for Deanonymizing Scientific Publications
Mathias Payer, Ling Huang, Neil Zhenqiang Gong, Kevin Borgolte, Mario Frank
IEEE Transactions on Information Forensics and Security (TIFS), 10(1), 2015
- Joint Link Prediction and Attribute Inference using a Social-Attribute Network
Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Richard Shin, Emil Stefanov, Elaine Shi, Dawn Song
ACM Transactions on Intelligent Systems and Technology (TIST), 5(2), 2014
- Jointly Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN)
Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Richard Shin, Emil Stefanov, Elaine Shi, Dawn Song
ACM Workshop on Social Network Mining and Analysis (SNA-KDD), co-located with KDD, 2012
- On the Feasibility of Internet-Scale Author Identification [slides]
Arvind Narayanan, Hristo Paskov, Neil Zhenqiang Gong, John Bethencourt, Richard Shin, Emil Stefanov, Dawn Song
IEEE Symposium on Security and Privacy (IEEE S&P), 2012
Acceptance rate: 40/307=13.0%
Featured in WNYC Studios, Boing Boing, Slashdot, etc.
- Protecting Privacy in Location-based Services Using K-anonymity without Cloaked Region
Zhenqiang Gong, Guangzhong Sun, Xing Xie
IEEE International Conference on Mobile Data Management (MDM) Workshops, 2010
Detecting fake accounts, compromised accounts, and spammers in social networks and web applications.
- Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation
Binghui Wang*, Jinyuan Jia*, and Neil Zhenqiang Gong
ISOC Network and Distributed System Security Symposium (NDSS), 2019
Acceptance rate: 89/521= 17.1%
- SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels
Binghui Wang*, Le Zhang*, Neil Zhenqiang Gong
International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018.
Acceptance rate: 33/145= 22.8%
- Structure-based Sybil Detection in Social Networks via Local Rule-based Propagation
Binghui Wang*, Jinyuan Jia*, Le Zhang*, Neil Zhenqiang Gong
IEEE Transactions on Network Science and Engineering (TNSE), 2018, to appear.
Fast tracked from our INFOCOM'17 paper.
Source code is available [here]
- SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection
Peng Gao, Binghui Wang*, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal
IEEE Conference on Communications and Network Security (CNS), 2018, to appear.
Acceptance rate: 51/181 = 28.2%
- SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection (Extended Abstract)
Peng Gao, Binghui Wang*, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Prateek Mittal
Workshop on Misinformation and Misbehavior Mining on the Web (MIS2), co-located with WSDM, 2018
- GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs
Binghui Wang, Neil Zhenqiang Gong, Hao Fu
IEEE International Conference on Data Mining (ICDM), regular paper, 2017
Acceptance rate: 72/778=9.25%
- Robust Spammer Detection in Microblogs: Leveraging User Carefulness
Hao Fu, Xing Xie, Yong Rui, Neil Zhenqiang Gong, Guangzhong Sun, Enhong Chen
ACM Transactions on Intelligent Systems and Technology (TIST), 8(6), 2017
- SybilSCAR: Sybil Detection in Online Social Networks via Local Rule based Propagation
Binghui Wang*, Le Zhang*, Neil Zhenqiang Gong
IEEE International Conference on Computer Communications (INFOCOM), 2017
Acceptance rate: 292/1395=20.9%
Fast tracked to IEEE TNSE.
Only 10 papers were selected for fast tracking.
Source code is available [here]
- SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
Neil Zhenqiang Gong, Mario Frank, Prateek Mittal
IEEE Transactions on Information Forensics and Security (TIFS), 9(6), 2014
Source code is available [here]
Adversarial machine learning and data mining
- AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
Jinyuan Jia*, Neil Zhenqiang Gong
USENIX Security Symposium, 2018
Acceptance rate: 100/524= 19.1%
- Stealing Hyperparameters in Machine Learning
Binghui Wang*, Neil Zhenqiang Gong
IEEE Symposium on Security and Privacy (IEEE S&P), 2018
Acceptance rate: 63/549= 11.5%
- Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification
Xiaoyu Cao*, Neil Zhenqiang Gong
Annual Computer Security Applications Conference (ACSAC), 2017
Acceptance rate: 48/244=19.7%
- Fake Co-visitation Injection Attacks to Recommender Systems
Guolei Yang*, Neil Zhenqiang Gong, Ying Cai
ISOC Network and Distributed System Security Symposium (NDSS), 2017
Acceptance rate: 16.1%
- Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference
Bin Liu, Deguang Kong, Lei Cen, Neil Zhenqiang Gong, Hongxia Jin, Hui Xiong
ACM International Conference on Web Search and Data Mining (WSDM), 2015
Acceptance rate: 16.8%
User authentication
- PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices
Neil Zhenqiang Gong, Altay Ozen*, Yu Wu, Xiaoyu Cao*, Richard Shin, Dawn Song, Hongxia Jin, Xuan Bao
IEEE International Conference on Distributed Computing Systems (ICDCS), short paper, 2017
Acceptance rate: (90 + a small number of short papers)/531=?
- Forgery-Resistant Touch-based Authentication on Mobile Devices
Neil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, Mario Frank
ACM Asia Conference on Computer and Communications Security (ASIACCS), 2016
Acceptance rate: 73/350=20.9% for full papers
- New Directions in Social Authentication
Sakshi Jain, Neil Zhenqiang Gong, Sreya Basuroy, Juan Lang, Dawn Song, Prateek Mittal
Workshop on Usable Security (USEC), co-located with NDSS, 2015
- On the Security of Trustee-based Social Authentications
Neil Zhenqiang Gong, Di Wang
IEEE Transactions on Information Forensics and Security (TIFS), 9(8), 2014
Featured in VentureBeat, etc.
Social network measurement and modeling
- Reciprocal versus Parasocial Relationships in Online Social Networks
Neil Zhenqiang Gong, Wenchang Xu
Springer Social Network Analysis and Mining (SNAM), 4(1), 2014
- Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song
ACM/USENIX Internet Measurement Conference (IMC), 2012
Acceptance rate: 45/183=24.6%
Our Google+ dataset is available [here]
Recommender systems
- Fake Co-visitation Injection Attacks to Recommender Systems
Guolei Yang*, Neil Zhenqiang Gong, Ying Cai
ISOC Network and Distributed System Security Symposium (NDSS), 2017
Acceptance rate: 16.1%
- Structural Analysis of User Choices for Mobile App Recommendation
Bin Liu, Yao Wu, Neil Zhenqiang Gong, Junjie Wu, Hui Xiong, Martin Ester
ACM Transactions on Knowledge Discovery from Data (TKDD), 11(2), 2016
- Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference
Bin Liu, Deguang Kong, Lei Cen, Neil Zhenqiang Gong, Hongxia Jin, Hui Xiong
ACM International Conference on Web Search and Data Mining (WSDM), 2015
Acceptance rate: 16.8%
Computational neuroscience
- The evolution of patterns on Conus shells
Zhenqiang Gong, Nick Matzke, Bard Ermentrout, Dawn Song, Jann E. Vendetti, Montgomery Slatkin, George Oster
Proceedings of the National Academy of Sciences (PNAS), 109(5), 2012
Featured as a breakthrough by WIRED, ScienceDaily, PhysOrg, etc.
Selected as “The Best Scientific Figures in 2012” by WIRED. Only 21 papers out of all scientific publications in 2012 were selected.
Database query processing (work done during my undergraduate study)
- Efficient Approximate Top-k Query Algorithm Using Cube Index
Dongqu Chen, Guang-Zhong Sun, Neil Zhenqiang Gong
The 13th Asia-Pacific Web Conference (APWeb), 2011
- Parallel Algorithms for Top-k Query Processing
Zhenqiang Gong
ACM SIGMOD International Conference on Management of Data (SIGMOD), poster, 2010
- Protecting Privacy in Location-based Services Using K-anonymity without Cloaked Region
Zhenqiang Gong, Guangzhong Sun, Xing Xie
IEEE International Conference on Mobile Data Management (MDM) Workshops, 2010
- Efficient Top-k Query Algorithms Using K-Skyband Partition
Zhenqiang Gong, Guangzhong Sun, Jing Yuan, Yanjing Zhong
The 4th International ICST Conference on Scalable Information Systems (INFOSCALE), 2009
|