On the Security of Distributed Multi-Agent K-Means Clustering With Local Differential Privacy.
IEEE Access, 2024
Identity Authentication with Association Behavior Sequence in Machine-to-Machine Mobile Terminals.
Mob. Networks Appl., 2022
Sensitive Data Comparison Algorithm Based Spatio-temporal Label Distribution Fusion.
Proceedings of the 2022 2nd International Conference on Algorithms, 2022
Just Shake Them Together: Imitation-Resistant Secure Pairing of Smart Devices via Shaking.
Wirel. Commun. Mob. Comput., 2021
A Novel GAN based User Desensitization Data Generation Algorithm.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021
Continuous Trust Evaluation of Power Equipment and Users Based on Risk Measurement.
Sci. Program., 2020
ClickGuard: Exposing Hidden Click Fraud via Mobile Sensor Side-channel Analysis.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
iShake: Imitation-Resistant Secure Pairing of Smart Devices via Shaking.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019
An Associated Behavior Sequence Based User Authentication Approach in M2M Mobile Terminals.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
A Malicious Attack Correlation Analysis Method Integrating Interaction Process of Source-Grid-Load System.
Proceedings of the 5th IEEE International Conference on Cloud Computing and Intelligence Systems, 2018
A novel attack to track users based on the behavior patterns.
Concurr. Comput. Pract. Exp., 2017
I Am the UAV: A Wearable Approach for Manipulation of Unmanned Aerial Vehicle.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017
A Synthetical Performance Evaluation of OpenVZ, Xen and KVM.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010