Dr. Qi Zhong
Assistant Professor Master Supervisor
Email:qizhong@cityu.edu.mo
Tel:(853)8590 2263
Office address: Room T406, Tai Fung Building, City University of Macau (Taipa)
Educational qualifications
2023, Doctor of Philosophy in IT, Deakin University, Australia
2017, Master of Mathematics, Guilin University of Electronic Technology, China
2014, Bachelor of Mathematics and Applied Mathematics, Nanchang Hangkong University, China
Incumbent
Assistant Professor, Faculty of Data Science, City University of Macau
Research direction
Copyright protection of machine learning models, Machine learning backdoors, Adversarial machine learning, Data privacy protection in cloud and Internet of Things
Research and publishing
Zhang X., Zhang Z., Zhong Q., Zheng X., Zhang Y., Hu S., & Zhang L. Y. (2023). Masked Language Model Based Textual Adversarial Example Detection. In AsiaCCS.
-
Zhong Q., Zhang L. Y., Hu S., Gao L., Zhang J., & Xiang Y. (2022). Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. In ICME.
-
Abbasi B. H., Zhong Q., Zhang L. Y., Gao S., Kelly A. R., & Doss R. (2022). A Generic Enhancer for Backdoor Attacks on Deep Learning Networks. In ICONIP. (Abbasi B. H. and Zhong Q. are Co-first authors)
-
Zhao F., Zhou L., Zhong Q.*, Lan R., & Zhang L. Y. (2022). Natural Backdoor Attacks on Deep Neural Networks via Raindrops. Security and Communication Networks. (Zhong Q. is the corresponding author)
-
Zhong Q., Zhang L. Y., Zhang J., Gao L., & Xiang Y. (2020). Protecting IP of Deep Neural Networks with Watermarking: A New Label Helps. In PAKDD
-
Li M., Zhong Q., Zhang L. Y., Du Y., Zhang J., & Xiang Y. (2020). Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach. In TrustCom. (Li M. and Zhong Q. are Co-first authors)
-
Song J., Zhong Q., Wang W., Su C., Tan Z., & Liu Y. (2020). FPDP: Flexible Privacy-preserving Data Publishing Scheme for Smart Agriculture. IEEE Sensors Journal.
-
Liu Y., Zhong Q., Chang L., Xia Z., He D., & Cheng C. (2017). A Secure Data Backup Scheme Using Multi-factor Authentication. IET Information Security. (This paper receives The IET Information Security Premium Award in 2019.)
-
Liu Y., Guo W., Zhong Q., & Yao G. (2017). LVAP: Lightweight V2I Authentication Protocol Using Group Communication in VANETs. International Journal of Communication Systems.
-
Liu Y., Zhong Q., Xie M., Chen Z. (2017). A Novel Multiple-level Secret Image Sharing Scheme. Multimedia Tools and Applications.
-
Liu Y., Zhong Q., Shen J., Chang C.C. (2017). A Novel Image Protection Scheme Using Bit-plane Compression and Secret Sharing. Journal of the Chinese Institute of Engineers.