Qin Wang

@csiro.au

Research Scientist, Data61
CSIRO



                             

https://researchid.co/qinwang

I am a research scientist at CSIRO Data61 and an adjunct lecturer at the University of New South Wales (UNSW) and the University of Technology Sydney (UTS). I’m broadly interested in technologies that can help achieve decentralised intelligence, such as leveraging blockchain technologies and AI. My research mainly covers the techniques from distributed computing systems, applied cryptography and artificial intelligence.

EDUCATION

PhD career at Swinburne University of Technology, Australia.
Master's study at Beihang University (BUAA), China.
Bachelor’s study at Northwestern Polytechnical Univerisity (NPU), China.

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Science, Information Systems, Artificial Intelligence, Computer Networks and Communications

3964

Scholar Citations

26

Scholar h-index

51

Scholar i10-index

RECENT SCHOLAR PUBLICATIONS

  • Clawed and Dangerous: Can We Trust Open Agentic Systems?
    S Chen, Q Wang, G Yu, X Wang, L Zhu
    arXiv preprint arXiv:2603.26221 2026

  • In the Margins: An Empirical Study of Ethereum Inscriptions
    X Xiong, M Qi, S Chen, G Yu, Z Wang, Q Wang
    arXiv preprint arXiv:2603.19086 2026

  • PlanTwin: Privacy-Preserving Planning Abstractions for Cloud-Assisted LLM Agents
    G Yu, Q Wang, R Lang, S Su, X Wang
    arXiv preprint arXiv:2603.18377 2026

  • Deanonymizing Bitcoin Transactions via Network Traffic Analysis with Semi-supervised Learning
    S Zhang, B Han, C Tian, R Shi, L Lan, Q Wang
    arXiv preprint arXiv:2603.17261 2026

  • Why Neural Structural Obfuscation Can't Kill White-Box Watermarks for Good!
    Y Jiang, G Yu, Q Yu, Y Chen, Q Wang
    arXiv preprint arXiv:2603.12679 2026

  • Client-Cooperative Split Learning
    H Deng, Y Jiang, G Yu, Q Wang, X Wang, W Ni, S Chen, RP Liu
    IEEE Transactions on Services Computing 2026

  • Split Learning with Local Epoch Regulation and Time-aware Detection
    Y Zhao, Z Tari, N Sohrabi, Q Wang, X Xia
    IEEE Transactions on Dependable and Secure Computing 2026

  • SoK: Agentic Skills - Beyond Tool Use in LLM Agents
    Y Jiang, D Li, H Deng, B Ma, X Wang, Q Wang, G Yu
    arXiv preprint arXiv:2602.20867 2026

  • Counted NFT Transfers
    Q Wang, M Qi, G Yu, S Chen
    arXiv preprint arXiv:2602.19199 2026

  • MEV in Binance Builder
    Q Wang, R Li, G Yu, V Gramoli, S Chen
    arXiv preprint arXiv:2602.15395 2026

  • CryptoCatch: Cryptomining Hidden Nowhere
    R Shi, Z Lin, H Sun, Q Wang, S Zhang, L Lan, Z Peng, C Wang
    IEEE Transactions on Dependable and Secure Computing 2026

  • Eclipse Attacks on Ethereum's Peer-to-Peer Network
    R Shi, Y Liang, Z Guo, Q Wang, L Lan, C Wang, Z Zheng
    Proceedings of the ACM Web Conference (WWW) 2026

  • VIPER Strike: Defeating Visual Reasoning CAPTCHAs via Structured Vision-Language Inference
    M Qi, D He, Q Wang, L Zhang
    USENIX Security Symposium (USENIX Sec) 2026

  • Prompt to Pwn: Automated Exploit Generation for Smart Contracts
    Z Xiao, Q Wang, Y Li, S Chen
    Australasian Conference on Information Security and Privacy (ACISP) 2026

  • SoK: Stablecoins in Retail Payments
    Y Li, Y Xiang, Q Wang, TH Yuen, A Deppeler, J Yu
    IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2026

  • Measuring Memecoin Fragility
    Y Xiang, Q Fu, Y Li, Q Wang, TH Yuen, J Yu
    IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2026

  • EIP-7702 Phishing Attack
    M Qi, Q Wang, R Li, T Zhu, S Chen
    arXiv preprint arXiv:2512.12174 2025

  • PlainDrop: Practical Asynchronous Proactive Secret Sharing with Silent Setup
    Y Yang, B Li, Q Liu, Q Wang, Q Wu, B Qin, W Susilo
    IEEE Internet of Things Journal 2025

  • Leveraging Large Language Models to Bridge On-chain and Off-chain Transparency in Stablecoins
    Y Xiang, Y Lei, Y Zhang, Q Wang, TH Yuen, J Yu
    arXiv preprint arXiv:2512.02418 2025

  • Split Unlearning
    Y Jiang, G Yu, Q Wang, X Wang, B Ma, C Sun, W Ni, RP Liu
    ACM SIGSAC Conference on Computer and Communications Security (CCS) 2025

MOST CITED SCHOLAR PUBLICATIONS