Qiang Tang

Publications in the past five years have been listed below. See Google Scholar for citation information, and see DBLP for a publication list.


5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities
Abdelwahab Boualouache, Bouziane Brik, Qiang Tang, Abdelaziz Amara Korba, Sylvain Cherrier, Sidi-Mohammed Senouci, Enric Pardo, Yacine Ghamri-Doudane, Rami Langar, Thomas Engel
In Submission (IEEE Internet of Things Magazine)
Privacy-Preserving Solution for Vehicle Parking Services Complying with EU Legislation
Petr Dzurenda, Florian Jacques, Maryline Laurent, Lukas Malina, Manon Knockaert, Raimundas Matulevi\v{c}ius, Qiang Tang, Aimilia Tasidou
In Submission (PeerJ Computer Science)
A CNN-based Semi-Supervised Learning Approach for the Detection of SS7 Attacks
Orhan Ermis, Christophe Feltus, Qiang Tang, Cu D. Nguyen, Alexandre De Oliveira, Alain Hirtzig
ISPEC 2022
A Systematic Analysis of 5G Networks with a Focus on 5G Core Security
Qiang Tang, Orhan Ermis, Cu D. Nguyen, Alexandre De Oliveira, Alain Hirtzig
IEEE Access
Modular Framework for Constructing IoT-Server AKE in Post-quantum Setting
Bowen Liu, Qiang Tang, Jianying Zhou
IEEE Access
Another Look at Privacy-Preserving Automated Contact Tracing
Qiang Tang
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-preserving Easy
Jun Wang, Chao Jin, Qiang Tang, Zhe Liu, Khin Mi Mi Aung


Towards Using Blockchain Technology to Prevent Diploma Fraud
Qiang Tang
IEEE Access
Bigdata-facilitated Two-party Authenticated Key Exchange for IoT
Bowen Liu, Qiang Tang
ISC 2021
Post-Quantum Era Privacy Protection for Intelligent Infrastructures
Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevi\v{c}ius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
IEEE Access
Privacy-by-Design in Intelligent Infrastructures
Manon Knockaert, Maryline Laurent, Lukas Malina, Raimundas Matulevičius, Marinella Petrocchi, Mari Seeba, Qiang Tang, Aimilia Tasidou, Jake Tom
Book chapter of "Deep Diving into Data Protection 1979-2019: Celebrating 40 Years of Privacy and Data Protection at the CRIDS"
Software-Defined Location Privacy Protection for Vehicular Networks
Abdelwahab Boualouache, Ridha Soua, Qiang Tang, Thomas Engel
Book chapter of "Machine Intelligence and Data Analytics for Sustainable Future Smart Cities"


Cybersecurity and data privacy aspects in 5G-MOBIX
Djibrilla Amadou Kountche, Marwane El Bekri, Pedro J. Fernandez, Jose Santa, Antonio F. Skarmeta, Joao Almeida, Qiang Tang, Nuno Cruz
ITS European Congress, 9-10 November 2020
Privacy-Preserving Contact Tracing: current solutions and open questions
Qiang Tang
CoRR abs/2004.06818
******This work has been cited in the SPIEGEL article on contact tracing. ******


Novel Collaborative Filtering Recommender Friendly to Privacy Protection
Jun Wang, Qiang Tang, Afonso Arriaga, Peter Ryan
IJCAI 2019
Together or Alone: The Price of Privacy in Joint Learning
Balazs Pejo, Qiang Tang, Gergely Biczok
PoPETs/PETS 2019
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
Erman Ayday, Qiang Tang, Arif Yilmaz
TDSC - IEEE Transactions on Dependable and Secure Computing (IEEE)
Towards Blockchain-enabled Searchable Encryption
Qiang Tang
ICICS 2019
Privacy-preserving Decentralised Singular Value Decomposition
Bowen Liu, Qiang Tang
ICICS 2019
Privacy-preserving and yet Robust Collaborative Filtering Recommender as a Service
Qiang Tang
Inscrypt 2019


Privacy-preserving friendship-based recommender systems
Qiang Tang, Jun Wang
TDSC - IEEE Transactions on Dependable and Secure Computing (IEEE)
Power of Public-key Function-Private Functional Encryption
Vincenzo Iovino, Qiang Tang, Karol Zebrowski
IET Information Security (The Institution of Engineering and Technology)
Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE
Husen Wang, Qiang Tang
The Computer Journal (Oxford university Express)
Privacy in Collaborative Recommenders
Qiang Tang
Book chapter of Collaborative Recommendation: Algorithms, Practical Challenges and Applications (World Scientific Publishing)
Cybersecurity Education for Awareness and Compliance
Teemu Tokola, Thomas Schaberreiter, Gerald Quirchmayr, Ludwig Englbrecht, Guenther Pernul, Sokratis Katsikas, Bart Preneel, and Qiang Tang
Book chapter of A Collaborative Cybersecurity Education Programme (IGI Global)
POSTER: Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning
Jun Wang, Afonso Arriaga, Qiang Tang, Peter Ryan
ACM CCS 2018 (ACM)
POSTER: The Price of Privacy in Collaborative Learning
Balazs Pejo, Qiang Tang, Gergely Biczok
ACM CCS 2018 (ACM)


Differentially Private Neighborhood-based Recommender Systems
Jun Wang, Qiang Tang
IFIP SEC (Springer)
Privacy-preserving Hybrid Recommender System
Qiang Tang, Husen Wang
AsiaCCS SCC workshop (ACM)
To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Balazs Pejo, Qiang Tang
AsiaCCS SCC workshop (ACM)


Two More Efficient Variants of the J-PAKE Protocol
Jean Lancrenon, Marjan Skrobot, Qiang Tang
ACNS - Applied Cryptography and Network Security - 14th International Conference (Springer)
On the Power of Public-key Function-Private Functional Encryption
Vincenzo Iovino, Qiang Tang, Karol Zebrowski
CANS - Cryptology and Network Security - 15th International Conference (Springer)
Updatable functional encryption
Afonso Arriaga, Vincenzo Iovino, Qiang Tang
Mycrypt - The International Conference on Cryptology and Malicious Security (Springer)
Protect both integrity and confidentiality in outsourcing collaborative filtering computations
Qiang Tang, Balazs Pejo, Husen Wang
CLOUD - 2016 IEEE International Conference on Cloud Computing (IEEE)
A probabilistic view of neighborhood-based recommendation methods
Jun Wang, Qiang Tang
CLOUDMINE - ICDM-2016 Workshop on Data Mining Systems and their Applications on the Cloud (IEEE)
(poster) Game-theoretic framework for integrity verification in computation outsourcing
Qiang Tang, Balazs Pejo
Gamesec - 2016 Conference on Decision and Game Theory for Security (Springer)