Publication
Papers marked with Alpha use alphabetic ordering of authors, following the convention of theoretical computer science and mathematics.
🎉 Papers by area:
Coding theory and Combinatorics
2025
On the maximum size of variable-length non-overlapping codes
Geyang Wang, Qi Wang
Designs, Codes and Cryptography (DCC), vol. 93, no. 4, pp. 871-878, 2025.
Quasi complementary sequence sets: New bounds and optimal constructions via quasi-Florentine Rectangles
Avik Ranjan Adhikary, Hui Zhang, Zhengchun Zhou, Qi Wang, Sihem Mesnager
IEEE Transactions on Information Theory (TIT), vol. 71, no. 3, pp. 2271-2291, 2025.
2024
On the size distribution of the fixed-length Levenshtein balls with radius oneAlpha
Geyang Wang, Qi Wang
Designs, Codes and Cryptography (DCC), vol. 92, no. 4, pp. 2253-2265, 2024.
Two families of linear codes with desirable properties from some functions over finite fields
Ziling Heng, Xiaoru Li, Yansheng Wu, Qi Wang
IEEE Transactions on Information Theory (TIT), vol. 70, no. 11, pp. 8320-8342, 2024.
2023
The solution to an open problem on the bentness of Mesnager's functions
Chunming Tang, Peng Han, Qi Wang, Jun Zhang, Yanfeng Qi
Finite Fields and Their Applications (FFA), vol. 88, 102170, 2023.
2022
Steiner systems supported by a family of extended cyclic codes
Qi Wang
Advances in Mathematics of Communications (AMC), vol. 16, no. 4, pp. 1011-1022, 2022.
Two classes of LDPC codes from the space of hermitian matrices over finite fields
Meng Zhao, Changli Ma, Yanan Feng, and Qi Wang
Advances in Mathematics of Communications (AMC), vol. 16, no. 4, pp. 1211-1222, 2022.
Q-ary non-overlapping codes: a generating function approach
Geyang Wang, Qi Wang
IEEE Transactions on Information Theory (TIT), vol. 68, pp. 5154-5164, 2022.
The subfield codes and subfield subcodes of a family of MDS codes
Chunming Tang, Qi Wang, Cunsheng Ding
IEEE Transactions on Information Theory (TIT), vol. 68, pp. 5792-5801, 2022.
A class of binary cyclic codes with optimal parameters
Kaiqiang Liu, Qi Wang, and Haode Yan
Cryptography and Communications (CCDS), vol. 14, pp. 663-675, 2022.
Infinite families of 2-designs from linear codes
Xiaoni Du, Rong Wang, Chunming Tang, and Qi Wang
Applicable Algebra in Engineering, Communication and Computing (AAECC), vol. 22, pp. 193-211, 2022.
On the size distribution of Levenshtein balls with radius oneAlpha
Geyang Wang, Qi Wang
The Twelfth International Workshop on Coding and Cryptography (WCC'22), Rostock, Germany, Mar. 7-11, 2022
Parameters and characterizations of hulls of some projective narrow-sense BCH codes
Yuwen Huang, Chengju Li, Qi Wang, and Zongrun Du
Designs Codes and Cryptography, vol. 90, pp. 87-106, 2022
Infinite families of 2-designs from two classes of binary cyclic codes with three nonzeros
Xiaoni Du, Rong Wang, Chunming Tang, and Qi Wang
Advances in Mathematics of Communications, vol. 16, pp. 157-168, 2022
2021
New construction of optimal type-II binary Z-complementary pairs
Zhi Gu, Zhengchun Zhou, Qi Wang, and Pingzhi Fan
IEEE Transactions on Information Theory, vol. 67, pp. 3497-3508, 2021
2020
Placement delivery arrays from combinations of strong edge colorings Alpha
Jerod Michel and Qi Wang
IEEE Transactions on Communications, vol. 68, pp. 5953-5964, 2020
New nonexistence results on -generalized bent functions Alpha
Ka Hin Leung and Qi Wang
Designs Codes and Cryptography, vol. 88, pp. 755-770, 2020
Combinatorial -designs from quadratic functions
Can Xiang, Xin Ling, and Qi Wang
Designs Codes and Cryptography, vol. 88, pp. 553-565, 2020
2019
Cyclotomy, difference sets, sequences with low correlation, strongly regular graphs and related geometric substructures
Koji Momihara, Qi Wang and Qing Xiang
In Kai-Uwe Schmidt, Arne Winterhof (Eds.) Combinatorics and Finite Fields, RICAM Radon Series on Computational and Applied Mathematics vol. 23, pp. 173-198, Berlin, Boston: De Gruyter, 2019
An OACF-preserving operation based on Parker's transformation Alpha
Geyang Wang and Qi Wang,
The 9th International Workshop on Signal Design and its Applications in Communications (IWSDA'19), Dongguan, China, Oct. 20-24, 2019.
Partial geometric designs from group actions Alpha
Jerod Michel and Qi Wang
Designs Codes and Cryptography, vol. 87, pp. 2655-2670, 2019
Differential spectrum of Kasami power permutations over odd characteristic finite fields
Haode Yan, Zhengchun Zhou, Jian Weng, Jinming Wen, Tor Helleseth, and Qi Wang
IEEE Transactions on Information Theory, vol. 65, pp. 6819-6826, 2019
Almost designs and their links with balanced incomplete block designs Alpha
Jerod Michel and Qi Wang
Designs Codes and Cryptography, vol. 87, pp. 1945-1960, 2019
Almost difference sets in nonabelian groups Alpha
Jerod Michel and Qi Wang
Designs Codes and Cryptography, vol. 87, pp. 1243-1251, 2019
Some new balanced and almost balanced quaternary sequences with low autocorrelation Alpha
Jerod Michel and Qi Wang
Cryptography and Communications, vol. 11, pp. 191-206, 2019
2017
LDPC codes based on the space of symmetric matrices over finite fields Alpha
Changli Ma, Qi Wang, and Meng Zhao
IEEE Transactions on Information Theory, vol. 63, no. 7, pp. 4332-4343, 2017
Some cyclic codes with prime length from cyclotomy of order 4
Qi Wang
Cryptography and Communications, vol. 9, no. 1, pp. 85-92, 2017
2015
Difference balanced functions and their generalized difference sets Alpha
Alexander Pott and Qi Wang
Journal of Combinatorial Theory, Series A, vol. 131, pp. 61-70, 2015
Skew Hadamard difference sets from Dickson polynomials of order 7 Alpha
Cunsheng Ding, Alexander Pott, and Qi Wang,
Journal of Combinatorial Designs, vol. 23, no. 10, pp. 436-461, 2015
2014
Some results on difference balanced functions Alpha
Alexander Pott and Qi Wang
The International Workshop on the Arithmetic of finite fields (WAIFI'14), LNCS no. 9061, Springer, Heidelberg, Gebze, Turkey, Sep. 26-28, 2014
Three new families of zero-difference balanced functions with applications Alpha
Cunsheng Ding, Qi Wang, and Maosheng Xiong
IEEE Transactions on Information Theory, vol. 60, no. 4, pp. 2407-2413, 2014
Sets of zero-difference balanced functions and their applications Alpha
Qi Wang and Yue Zhou
Advances in Mathematics of Communications, vol. 8, no. 1, pp. 83-101, 2014
Constructions of almost difference sets from finite fields Alpha
Cunsheng Ding, Alexander Pott, and Qi Wang
Designs Codes and Cryptography, vol. 72, no. 3, pp. 581-592, 2014
2013
On the size of Kakeya sets in finite vector spaces Alpha
Gohar Kyureghyan, Peter Müller, and Qi Wang
The Electronic Journal of Combinatorics, vol. 20, no. 3, #P36, 2013
An upper bound on the size of Kakeya sets in finite vector spaces Alpha
Gohar Kyureghyan and Qi Wang
International Workshop on Coding and Cryptography (WCC'13), Bergen, Norway, Apr. 15-19, 2013
2012
Sequences and functions derived from projective planes and their difference sets Alpha
Alexander Pott, Qi Wang, and Yue Zhou
The International Workshop on the Arithmetic of finite fields (WAIFI'12), LNCS no. 7369, Springer, Heidelberg, Bochum, Germany, Jul. 16-19, 2012
2011
The linear span of the frequency hopping sequences in optimal sets
Qi Wang
Designs Codes and Cryptography, vol.61, pp. 331-344, 2011
2010
The linear complexity of binary sequences with optimal autocorrelation (presented in part at ISIT 2010))
Qi Wang and Xiaoni Du
IEEE Transactions on Information Theory, vol. 56, no. 12, pp. 6388-6397, 2010
The linear complexity of binary sequences with optimal autocorrelation
Qi Wang and Xiaoni Du
The 2010 IEEE International Symposium on Information Theory (ISIT 2010), Austin, Texas, USA, Jun. 13-18, 2010.
The linear complexity of some binary sequences with three-level autocorrelation
Qi Wang
IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 4046-4052, 2010
Optimal sets of frequency hopping sequences with large linear spans
Qi Wang
IEEE Transactions on Information Theory, vol. 56, no. 4, pp. 1729-1736, 2010
Cryptography and Security
2025
Safe Delta: Consistently preserving safety when fine-tuning LLMs on diverse datasets
Ning Lu, Shengcai Liu, Jiahao Wu, Weiyu Chen, Zhirui Zhang, Yew-Soon Ong, Qi Wang, Ke Tang
In Proceedings of The 42nd International Conference on Machine Learning (ICML 2025), Vancouver, Canada, July 13-19, 2025.
Multi-class item mining under local differential privacy
Yulian Mao, Qingqing Ye, Rong Du, Qi Wang, Kai Huang, Haibo Hu
In Proceedings of The 41st IEEE International Conference on Data Engineering (ICDE 2025), Hong Kong SAR, China, May 19-23, 2025.
Towards efficient and practical multi-party computation under inconsistent trust in TEEs
Xuanwei Hu, Rujia Li, Yi Liu, Qi Wang
In Proceedings of The 46th IEEE Symposium on Security and Privacy (S&P 2025), San Francisco, USA, May 12-15, 2025.
Highly efficient actively secure two-party computation with one-bit advantage bound
Yi Liu, Junzuo Lai, Peng Yang, Anjia Yang, Qi Wang, Siu-Ming Yiu, Jian Weng
In Proceedings of The 46th IEEE Symposium on Security and Privacy (S&P 2025), San Francisco, USA, May 12-15, 2025.
Understanding security issues in the DAO governance process
Junjie Ma, Muhui Jiang, Jinan Jiang, Xiapu Luo, Yufeng Hu, Yajin Zhou, Qi Wang, Fengwei Zhang
IEEE Transactions on Software Engineering (TSE), vol. 51, no. 4, pp. 1188-1204, 2025.
Accountable decryption made formal and practical
Rujia Li, Yuanzhao Li, Qin Wang, Sisi Duan, Qi Wang, Mark Ryan
IEEE Transactions on Information Forensics and Security (TIFS), vol. 20, pp. 620-635, 2025.
Bringing smart contract confidentiality via trusted hardware: Fact and fiction
Rujia Li, Qin Wang, Yuanzhao Li, Sisi Duan, Qi Wang, David Galindo
IEEE Transactions on Information Forensics and Security (TIFS), vol. 20, pp. 159-174, 2025.
2024
Less is More: Understanding Word-level Textual Adversarial Attack via n-gram Frequency Descend
Ning Lu, Shengcai Liu, Zhirui Zhang, Qi Wang, Haifeng Liu, Ke Tang
In Proceedings of The IEEE Conference on Artificial Intelligence (CAI 2024), Singapore, Jun. 25-27, 2024.
PrivShape: Extracting shapes in time series under user-level local differential privacy
Yulian Mao, Qingqing Ye, Haibo Hu, Qi Wang, Kai Huang
In Proceedings of The 40th IEEE International Conference on Data Engineering (ICDE 2024), Utrecht, Netherlands, May 13-17, 2024.
Large Language Models can be Guided to Evade AI-generated Text Detection
Ning Lu, Shengcai Liu, Rui He, Yew-Soon Ong, Qi Wang, Ke Tang
Transactions on Machine Learning Research (TMLR), 2024.
Differential privacy for time series: A survey
Yulian Mao, Qingqing Ye, Qi Wang, Haibo Hu
IEEE Data Engineering Bulletin (DE Bulletin), vol. 47, no. 2, pp. 67-92, 2024.
Utility-aware time series data release with anomalies under TLDP
Yulian Mao, Qingqing Ye, Qi Wang, Haibo Hu
IEEE Transactions on Mobile Computing (TMC), vol. 23, no. 6, pp. 7135-7147, 2024.
2023
Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead
Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng
In Proceedings of The 29th Annual International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt 2023), Guangzhou, China, Dec. 4-8, 2023.
Transparent registration-based encryption through blockchain
Qin Wang, Rujia Li, Qi Wang, David Galindo, Shiping Chen, Yang Xiang
ACM Distributed Ledger Technologies: Research and Practice, vol. 2, no. 1, pp. 1-14, 2023.
Time-manipulation attack: breaking fairness against proof of authority Aura
Xinrui Zhang, Rujia Li, Qin Wang, Qi Wang
The 2023 ACM Web Conference (WWW), Austin, USA, Apr. 30-May 4, 2023.
2022
Towards practical homomorphic time-lock puzzles: applicability and verifiability
Yi Liu, Qi Wang, Siu-Ming Yiu
The 27th European Symposium on Research in Computer Security (ESORICS'22), Copenhagen, Denmark, Sep. 26-30, 2022.
SoK: TEE-assisted confidential smart contract
Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan
The 22nd Privacy Enhancing Technologies Symposium (PETS'22), Sydney, Australia, Jul. 11-15, 2022
Exploring unfairness on proof of authority: order manipulation attacks and remidies
Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang
The 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS'22), Nagasaki, Japan, May 30-June 2, 2022
Frontrunning block attack in PoA Clique: a case study
Xinrui Zhang, Qin Wang, Rujia Li, Qi Wang
The 4th IEEE International Conference on Blockchain and Cryptocurrency (ICBC'22), online, May 2-5, 2022
Making Private Function Evaluation Safer, Faster, and Simpler
Yi Liu, Qi Wang, Siu-Ming Yiu
The 25th International Conference on Practice and Theory of Public-Key Cryptography (PKC 2022), virtually, March 8–11, 2022. [ePrintopen in new window]
2021
Improved Zero-Knowledge Argument of Encrypted Extended Permutation
Yi Liu, Qi Wang, Siu-Ming Yiu
The 17th International Conference on Information Security and Cryptology (Inscrypt'21), virtually, Aug. 12-14, 2021. [ePrintopen in new window] [Slidesopen in new window]
Blind Polynomial Evaluation and Data Trading
Yi Liu, Qi Wang, Siu-Ming Yiu
The 19th International Conference on Applied Cryptography and Network Security (ACNS'21), online, Kamakura, Japan, Jun. 21-24, 2021. [ePrintopen in new window] [Slidesopen in new window]
A Weak Consensus Algorithm and Its Application to High-Performance Blockchain
Qin Wang, Rujia Li
40th IEEE Conference on Computer Communications (INFOCOM 2021), Online, Vancouver, BC, Canada, May 10-13, 2021
An offline delegatable cryptocurrency system
Rujia Li, Qin Wang, Xinrui Zhang, Qi Wang, David Galindo, Yang Xiang
The 3rd IEEE International Conference on Blockchain and Cryptocurrency (ICBC'21), online, May 3-6, 2021.
An Offline Delegatable Cryptocurrency System Poster
Rujia Li, Qin Wang, Xinrui Zhang, Qi Wang, David Galindo, Yang Xiang
28th Annual Network and Distributed System Security Symposium, (NDSS 2021), virtually, Feb. 21-25, 2021
A Weak Consensus Algorithm and Its Application to High-Performance Blockchain Poster
Qin Wang, Rujia Li, Qi Wang
28th Annual Network and Distributed System Security Symposium, (NDSS 2021), virtually, Feb. 21-25, 2021
2020
An Accountable Decryption System Based on Privacy-Preserving Smart Contracts
Rujia Li, Qin Wang, Feng Liu, Qi Wang, David Galindo
The 23rd International Conference on Information Security (ISC'20), Bali, Indonesia, Dec. 16-18, 2020
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster
Yi Liu, Qi Wang, Siu-Ming Yiu
The 16th International Conference on Information Security and Cryptology (Inscrypt'20), Guangzhou, China, Dec. 11-14, 2020. [ePrintopen in new window] [Slidesopen in new window]
Transparent Certificate Revocation for CBE Based on Blockchain Poster
Qin Wang, Rujia Li, Qi Wang, David Galindo
The 41st IEEE Symposium on Security and Privacy (S&P'20), online, May 18-20, 2020
2019
IBRS: an efficient identity-based batch verification scheme for VANETs based on ring signature
Feng Liu and Qi Wang
The 2019 IEEE Vehicular Networking Conference (VNC'19), Los Angeles, California, USA, Dec. 4-6, 2019.
Auditable credential anonymity revocation based on privacy-preserving smart contracts
Rujia Li, David Galindo, Qi Wang
The 3rd International Workshop on Cryptocurrencies and Blockchain Technology (CBT'19), LNCS no. 11737, Luxembourg, Sep. 26-27, 2019