Qiang Zeng

I am an Assistant Professor in the Department of Computer Science and Engineering at University of South Carolina. I received my Ph.D. from Penn State University, and my Bachelor's and Master's degrees from Beihang University. The easiest way to contact me is through email at zeng1 (at) cse.sc.edu.

My main research interest is Computer Systems Security, with a focus on Internet of Things and Mobile Computing. I also work on the security aspect of machine learning. I have rich industry experience and have worked in the IBM T.J. Watson Research Center, the NEC Lab America, Symantec and Yahoo.

Our lab is recruiting PhD, Master and Undergraduate students.

Our HBCU-USC Collaborative Lab looks for students from underrepresented groups to join us.

08/17/20 Our work about attacking graph-based classification is accepted to ACSAC'20.

07/28/20 Our work about secure and usable IoT pairing is accepted to CCS'20.

07/09/20 Our proposal about building IoT Testbeds is funded by NSF.

03/04/20 Our work that, being the first in the literature, systematically categorizes and detects cross-app interference threats in appified smart environments is accepted to DSN'20 (acceptance rate 16.5%).

07/11/19 A novel IoT authentication work is accepted to MobiCom'19.

05/29/19 AEPecker, which not only detects adversarial examples but also rectifies the classification results, is accepted to RAID'19.

03/04/19 Our work that detects audio adversarial examples at accuracies over 99% is accepted to DSN'19.

03/04/19 Our work that can automatically patch for (almost) ALL heap vulnerabilities without changing the binary code is accepted to DSN'19.

11/06/18 Our work that pioneers the direction of Natural Language Processing Inspired Binary Code Analysis is accepted to NDSS'19.

10/01/18 Our proposal about Insecurity Analysis of Middleware on Mobile Platforms is funded by NSF (Lead PI: Qiang Zeng).

10/31/17 Our work that builds resilient repackaging-detection capability into mobile apps through binary code instrumentation is accepted to CGO'18.

06/19/17 We have opensourced our tool for Symbolic Execution of Android Framework (presented in MobiSys'17).

02/25/17 Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation is accepted to MobiSys'17.