I am currently recruiting Master and PhD students for cutting-edge research in the following areas: LLM for Security, LLM Security, Mobile Security, IoT Security, and Program Analysis. Join us to explore innovative solutions and advance the field of cybersecurity! Please feel free to reach out via email at zyueinfosec@gmail.com.
Bio:
I am currently a professor of School of Computer Science and Technology at Shandong University, working with Professor Xiuzhen Cheng. Before joining Shandong University, I was a tenure-track assistant professor in the Department of Computer Science at Drexel University (2024 - 2025). I spent three years as a postdoc researcher at The Ohio State University (OSU) (2020 - 2023), working with Prof. Zhiqiang Lin. Before coming to OSU, I graduated from Jinan University (2016 - 2020), under the supervision of Jian Weng and Weiqi Luo. Also, I ever visited/worked at University of Central Florida (UCF) / University of Massachusetts Lowell (UML) (2018 -2020), under the supervision of Xinwen Fu.
You can also visit my Chinese page (中文页面).
News:
✯ [2025/03] - One paper accepted by IEEE S&P 2025 - 𝕟𝕖𝕨 !
✯ [2025/03] - I joined Shandong University as a Full Professor. - 𝕟𝕖𝕨 !
✯ [2025/02] - I’m excited to share that I was recognized as an NDSS Distinguished Reviewer 2025 - 𝕟𝕖𝕨 !
✯ [2025/01] - Two papers accepted by USENIX Security 2025 - 𝕟𝕖𝕨 !
✯ [2024/12] - One paper accepted by USENIX Security 2025
✯ [2025/11] - One paper accepted by The Network and Distributed System Security (NDSS) Symposium 2025
✯ [2024/10] - I will serve as a TPC Member (Network Security Track) for ACM CCS 2025
✯ [2024/10] - I will serve as a TPC Member for WWW 2025 (Security and Privacy Track)
Recent Research Interests:
LLM for Security: [IEEE S&P 25],[EAAI 2024],[EMNLP 2024]
LLM Security: [USENIX Security 25c],[IoT-J25],[CCS 23a]
Mobile Security: [USENIX Security 25b],[NDSS 25b],[CCS 23a],[CCS 23b],[NDSS 23c],[USENIX Security 23],[ICSE 23],[CCS 22b]
IoT Security: [USENIX Security 25a],[NDSS 25a],[CCS 24a],[CCS 24c],[NDSS 23b],[CCS 24b], [USENIX Security 24],[NDSS 23a],[CCS 22a]
Program Analysis: [CCS 24b],[USENIX Security 23],[ICSE 23],[NDSS 23a],[USENIX Security 25b],[NDSS 25b],[CCS 23a],[CCS 23b],[NDSS 23c],[CCS 22b]
Selected Publications (Complete List):
I have published more than 40 papers. My publications appeared in top-tier conferences (e.g., IEEE S&P, USENIX Security, ACM CCS, NDSS), and top-tier journals (e.g., TDSC).
Top-tier security venues (19 papers): IEEE S&P (‘25), USENIX-Security (‘24, ‘23, ‘20, ‘25x3), CCS (‘24x3, ‘23x2, ‘22x2), NDSS (‘23x3, ‘25x2)
Ranking Statistics: CCF A: 29 papers, CCF B: 6 papers, CCF C: 5 papers
Authors with “_” are the students under my supervision.
2025:
- [IEEE S&P 25] - Xiao Li, Yue Li, Hao Wu, Yue Zhang, Kaidi Xu, Xiuzhen Cheng, Sheng Zhong, and Fengyuan Xu. Make a Feint to the East While Attacking in the West: Blinding LLM-Based Code Auditors with Flashboom Attacks. IEEE Symposium on Security and Privacy. [Tier 1] [BIG4] [CCF-A]
- [USENIX Security 25c] - Yumingzhi Pan, Zhen Ling, Yue Zhang, Hongze Wang, Guangchi Liu, Junzhou Luo, Xinwen Fu. “TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the TOR Network.” To appear in Proceedings of the 34th USENIX Security Symposium. [Tier 1] [BIG4] [CCF-A]
- [USENIX Security 25b] - Yifan Yao, Shawn McCollum, Zhibo Sun,Yue Zhang. “Easy As Child’s Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps.” To appear in Proceedings of the 34th USENIX Security Symposium. [Tier 1] [BIG4] [CCF-A]
- [IoT-J25] - Ye Cheng, Minghui Xu, Yue Zhang, Kun Li, Ruoxi Wang, and Lian Yang. “AutoIoT: Automated IoT Platform Using Large Language Models.” IEEE Internet of Things Journal (2025).[JCR-Q1][CCF-C]
- [USENIX Security 25a] - Xinhui Shao, Zhen Ling, Yue Zhang, Huaiyu Yan, Yumeng Wei, Lan Luo, Zixia Liu, Junzhou Luo, Xinwen Fu. “The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks”. To appear in Proceedings of the 34th USENIX Security Symposium. [Tier 1] [BIG4] [CCF-A]
- [NDSS 25b] - Christopher Ellis, Yue Zhang, Mohit Kumar Jangid, Shixuan Zhao, Zhiqiang Lin. “Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs and Mitigation.” To appear in The Network and Distributed System Security Symposium (NDSS), 2025.[Tier 1] [BIG4] [CCF-A]
- [NDSS 25a] - Yuqing Yang, Yue Zhang, Zhiqiang Lin. “Understanding the Miniapp Malware: Identification, Dissection, and Characterization.” To appear in The Network and Distributed System Security Symposium (NDSS), 2025.[Tier 1] [BIG4] [CCF-A]
2024:
- [EAAI 2024] - Zhiyuan Wang, Jinhao Duan, Chenxi Yuan, Qingyu Chen, Tianlong Chen, Huaxiu Yao, Yue Zhang, Ren Wang, Kaidi Xu, Xiaoshuang Shi. “Word-Sequence Entropy: Towards Uncertainty Estimation in Free-Form Medical Question Answering Applications and Beyond”, Engineering Applications of Artificial Intelligence. [CCF-C]
- [EMNLP 2024] - Zhiyuan Wang, Jinhao Duan, Lu Cheng, Yue Zhang, Qingni Wang, Hengtao Shen, Xiaofeng Zhu, Xiaoshuang Shi, and Kaidi Xu. “ConU: Conformal Uncertainty in Large Language Models with Correctness Coverage Guarantees.” in Proceedings of The 2024 Conference on Empirical Methods in Natural Language Processing, Miami, Florida, U.S.A. [Tier 1] [CCF-B]
- [CCS 2024c] - Yue Zhang, Zhen Ling, Michael Cash, Qiguang Zhang, Christopher Morales-Gonzalez, Qun Zhou Sun, Xinwen Fu, “Collapse Like A House of Cards: Hacking Building Automation System Through Fuzzing”, in Proceedings of the 31th ACM Conference on Computer and Communications Security, Salt Lake City, USA, October 14-18, 2024.[Tier 1] [BIG4] [CCF-A]
- [CCS 2024b] - Yue Zhang, Melih Sirlanci, Ruoyu “Fish” Wang, and Zhiqiang Lin, When Compiler Optimizations Meet Symbolic Execution: An Empirical Study, in Proceedings of ACM CCS, October 14-18, 2024, Salt Lake City, U.S.A.[Tier 1] [BIG4] [CCF-A]
- [CCS 2024a] - Kaizhen Liu, Ming Yang, Zhen Ling, Yue Zhang, Chongqing Lei, Junzhou Luo and Xinwen Fu, RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices, in Proceedings of ACM CCS, October 14-18, 2024, Salt Lake City, U.S.A.[Tier 1] [BIG4] [CCF-A]
- [JSA 2024] - Shan Wang, Ming Yang, Shan Jiang, Fei Chen, Yue Zhang, Xinwen Fu, “BBS: A Secure and Autonomous Blockchain-based Big-Data Sharing System”, Elsevier Journal of Systems Architecture (JSA). [CCF-B][JCR Q1]
- [ICMC 24] - Biwei Yan, Kun Li, Minghui Xu*, Yueyan Dong, Yue Zhang, Zhaochun Ren, Xiuzhen Cheng, “On Protecting the Data Privacy of Large Language Models (LLMs): A Survey”, IEEE International Conference on Meta Computing (ICMC), 2024
- [HCC 24] - Yifan Yao, Jinhao Duan, Kaidi Xu, Yuanfang Cai, Eric Sun, Yue Zhang. A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly. High-Confidence Computing.
- [USENIX Security 24] - Chongqing Lei, Zhen Ling, Yue Zhang, Yan Yang, Junzhou Luo, Xinwen Fu, A Friend’s Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Driver, in Proceedings of the 33rd USENIX Security Symposium, August 14–16, 2024 Philadephia, PA, USA. [Tier 1] [BIG4] [CCF-A]
- [AsiaCCS 24] - Chao Wang, Yue Zhang, and Zhiqiang Lin. RootFree Attacks: Exploiting Mobile Super Apps From Desktop Platforms. The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024). [Tier 2] [CCF-C]
- [INFOCOM 24] - Shan Wang, Ming Yang, Wenxuan Dai, Yu Liu, Yue Zhang, and Xinwen Fu, “Deanonymizing Ethereum Users behind Third-Party RPC Services”, accepted to appear in Proceedings of the 43rd IEEE International Conference on Computer Communications (INFOCOM’24), Vancouver, Canada, May 20-23, 2024. [CCF-A][AR 19.6%]
2023 and Before:
- [USENIX Security 23] - Chao Wang, Yue Zhang, and Zhiqiang Lin. One Size Does Not Fit All: Uncovering And Exploiting Cross Platform Discrepant APIs in Wechat. In 31st USENIX Security Symposium (USENIX Security 23), 2023. [Tier 1] [BIG4] [CCF-A]
- [CCS 23b] - Chao Wang, Yue Zhang, and Zhiqiang Lin. Uncovering and Exploiting Hidden APIs in Mobile Super Apps. In Proceedings of the 30th ACM Conference on Computer and Communications Security. November 2023. [Tier 1] [BIG4] [CCF-A]
- [CCS 23a] - Yue Zhang, Yuqing Yang, and Zhiqiang Lin. Don’t Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs. In Proceedings of the 30th ACM Conference on Computer and Communications Security. November 2023. [Tier 1] [BIG4] [CCF-A]
- [ICSE 23] - Chao Wang, Ronny Ko, Yue Zhang, Yuqing Yang, Zhiqiang Lin. TAINTMINI: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis. To appear in The International Conference on Software Engineering (ICSE), 2023. [Tier 1] [CCF-A]
- [NDSS 23c] - Chongqing Lei, Zhen Ling, Yue Zhang, Kai Dong, Kaizheng Liu, Junzhou Luo, Xinwen Fu, ‘Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks’. In Proceedings of the 30th Network and Distributed System Security, San Diego, CA, April 2023. [Tier 1] [BIG4] [CCF-A]
- [NDSS 23b] Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, and Shun Hu. “Fusion: Efficient and Secure Inference Resilient to Malicious Servers”. In Proceedings of the 30th ISOC Network and Distributed System Security Symposium, San Diego, CA, April 2023. [Tier 1] [BIG4] [CCF-A]
- [NDSS 23a] - Mohit K. Jangid, Yue Zhang, Zhiqiang Lin. “Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing”. In Proceedings of the 30th ISOC Network and Distributed System Security Symposium, San Diego, CA, April 2023. [Tier 1] [BIG4] [CCF-A] (Co-First Author)
- [CCS 22b] - Allen Y. Yang, Yue Zhang, Zhiqiang Lin. “Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection”. In Proceedings of the 29th ACM Conference on Computer and Communications Security. November 2022. [CCF-A][Tier 1] [BIG4]
- [ICDCS 22] - Shan Wang, Zhen Ling, Yue Zhang, Ruizhao Liu, Joshua Kraunelisk, Kang Jia, Bryan Pearson, Xinwen Fu. “Implication of Animation on Android Security”, In Proceedings of the International Conference on Distributed Computing Systems. [CCF-B]
- [CCS 22a] - Yue Zhang, Zhiqiang Lin. “When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure”. In Proceedings of the 29th ACM Conference on Computer and Communications Security. November 2022. [Best Paper Honorable Mention][CCF-A] [Tier] [BIG4]
- [INFOCOM 22] - Pearson Bryan, Yue Zhang, Cliff Zou, and Xinwen Fu. “FUME: Fuzzing Message Queuing Telemetry Transport Brokers.” In Proceedings of the IEEE International Conference on Computer Communications, 2022
- [SIGMETRICS 21] - Yue Zhang, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, and Zhiqiang Lin. “A Measurement Study of Wechat Mini-Apps”, In Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS). June 2021. [Tier 1][AR 12.1%] [CCF-B]
- [ICDCS 21] - Shan Wang, Ming Yang, Yue Zhang, Yan Luo, Tingjian Ge, Xinwen Fu, Wei Zhao. “On Private Data Collection of Hyperledger Fabric”, In Proceedings of the International Conference on Distributed Computing Systems. [CCF-B][AR 19.8 %]
- [TDSC 21b] -Shao, Zhijian, Jian Weng, Yue Zhang, Yongdong Wu, Ming Li, Jiasi Weng, Weiqi Luo, and Shui Yu. “Peripheral-free Device Pairing by Randomly Switching Power.” IEEE Transactions on Dependable and Secure Computing, 2021. [CCF-A]
- [TDSC 21a] -Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, and Anjia Yang, DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks, IEEE Transactions on Dependable and Secure Computing, 2021.[CCF-A]
- [INFOCOM 21] - Zhen Ling, Ruizhao Liu, Yue Zhang, Kang Jia, Bryan Pearson, Xinwen Fu, Junzhou Luo, “Prison Break of Android Reflection Restriction and Defense”, In Proceedings of the 40th IEEE International Conference on Computer Communications, May 10-13, 2021. [CCF-A][AR 19.9%]
- [USENIX Security 20] - Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, and Xinwen Fu. “Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks”, In Proceedings of the Usenix Security 2020. [CCF-A][Tier 1] [BIG4] [AR 16.1%]
- [BlackHat Asia 20] - Zhijian Shao, Jian Weng, Yue Zhang. “3d Red Pill: A Guest-to-Host Escape on QEMU/KVM Virtio Device” , To appear in BlackHat Asia 2020.
- [INFOCOM 20]- Yue Zhang, Jian Weng, Zhen Ling, Bryan Pearson, and Xinwen Fu. “BLESS: A BLE Application Security Scanning Framework.” In Proceedings of the IEEE International Conference on Computer Communications, 2020. [CCF-A][AR 19.8%]
- [Encyclopedia of Wireless Networks] - Yue Zhang, Jian Weng, Rajib Dey and Xinwen Fu, Bluetooth Low Energy (BLE) Security and Privacy, Encyclopedia of Wireless Networks, Springer Nature Switzerland AG, 2019
- [TDSC 19b] - Weng Jia-Si, Jian Weng, Ming Li, Yue Zhang, and Weiqi Luo. “DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive.”, IEEE Transactions on Dependable and Secure Computing (2019). [CCF-A] [Highly Cited Paper]
- [TDSC 19a] - Yue Zhang, Jian Weng, Jiasi Weng, Lin Hou, Anjia Yang, Ming Li, Yang Xiang, and Robert Deng. “Looking Back! Using Early Versions of Android Apps as Attack Vectors.” IEEE Transactions on Dependable and Secure Computing (2019). [CCF-A]
- [RAID 19]-Wenrui Diao, Yue Zhang, Li Zhang, Zhou Li, Fenghao Xu, Xiaorui Pan, Xiangyu Liu, Jian Weng, Kehuan Zhang, XiaoFeng Wang. Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android. In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses, Beijing, China, September, 2019. [CCF-B][AR 22%]
- [TPDS 18] - Li, Ming, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, and Robert H. Deng. “CrowdBC: A blockchain-based decentralized framework for crowdsourcing.” IEEE Transactions on Parallel and Distributed Systems ,30, no. 6 (2018): 1251-1266. [CCF-A] [Highly Cited Paper]
Honors and Awards
I have been recognized for my contributions to cybersecurity research and peer review, earning awards such as the NDSS 2025 Distinguished Reviewer, CCS 2022 Best Paper Honorable Mention, and multiple Outstanding Research Paper Awards from the Guangdong Computer Federation. My work spans blockchain security, IoT, and Bluetooth vulnerabilities, with high-impact findings, including 45 vulnerabilities (29 zero-days, 25 CVEs) in 2024, affecting 12.71 million devices across 148 countries and valued at $312,000, which gained 190K+ views on Hacker News. My research has influenced major companies like Apple, Google, Tencent, and Texas Instruments, leading to critical patches and bug bounties. Additionally, my findings on cloud storage security were widely covered by China Central Television (CCTV), further highlighting the impact of my work. Please see more details in the awards page.
Services:
I am actively engaged in organizing and contributing to major security conferences, serving as TPC Chair (STIM 2024), General Chair (EAI ICECI 2024), Session Chair (NDSS 2024, ACM SaTS 2023), Track Chair (MASS 2024, MSN 2023), and Publicity Chair (ACM SaTS 2023). I have also served as a TPC Member for top-tier conferences, including ACM CCS, USENIX Security, and NDSS from 2023 to 2025. I hold key editorial roles, including Associate Editor for IEEE TIFS and High-Confidence Computing, along with Guest Editor for special issues on cybersecurity, IoT security, and AI security in various journals. Please see more details in the services page.