2025
Model Inversion in Split Learning for Personalized LLMs: New Insights from Information Bottleneck Theory.
CoRR, January, 2025
2024
De-Anonymizing Avatars in Virtual Reality: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., December, 2024
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability.
IEEE Trans. Mob. Comput., August, 2024
Backdoor Attacks against Learning-Based Algorithms
Wireless Networks, Springer, ISBN: 978-3-031-57388-0, 2024
LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing.
IEEE Trans. Serv. Comput., 2024
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables.
IEEE Trans. Inf. Forensics Secur., 2024
Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces.
IEEE Trans. Dependable Secur. Comput., 2024
Preface: Security and privacy for space-air-ground integrated networks.
Secur. Saf., 2024
DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection.
Proceedings of the 33rd USENIX Security Symposium, 2024
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Detection and Attribution of Diffusion Model of Character Animation Based on Spatio-Temporal Attention.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
VPVet: Vetting Privacy Policies of Virtual Reality Apps.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network.
IEEE Trans. Veh. Technol., August, 2023
An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023
An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023
Security in Smart Home Networks
Wireless Networks, Springer, ISBN: 978-3-031-24184-0, 2023
Unleashing Cheapfakes through Trojan Plugins of Large Language Models.
CoRR, 2023
POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices.
Proceedings of the 32nd USENIX Security Symposium, 2023
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Vetting Privacy Policies in VR: A Data Minimization Principle Perspective.
Proceedings of the IEEE INFOCOM 2023, 2023
De-anonymization Attacks on Metaverse.
Proceedings of the IEEE INFOCOM 2023, 2023
MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging.
Proceedings of the IEEE INFOCOM 2023, 2023
GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
EM-Whisperer: A Voice Injection Attack via Powerline for Virtual Meeting Scenarios.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks.
Proceedings of the IEEE International Conference on Communications, 2023
Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps.
Proceedings of the IEEE Global Communications Conference, 2023
Privacy Computing with Right to Be Forgotten in Trusted Execution Environment.
Proceedings of the IEEE Global Communications Conference, 2023
Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
2022
Wireless Training-Free Keystroke Inference Attack and Defense.
IEEE/ACM Trans. Netw., 2022
A Federated Learning Based Privacy-Preserving Smart Healthcare System.
IEEE Trans. Ind. Informatics, 2022
WiCapose: Multi-modal fusion based transparent authentication in mobile environments.
J. Inf. Secur. Appl., 2022
Backdoors Against Natural Language Processing: A Review.
IEEE Secur. Priv., 2022
Secure Hierarchical Deterministic Wallet Supporting Stealth Address.
IACR Cryptol. ePrint Arch., 2022
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Proceedings of the 31st USENIX Security Symposium, 2022
Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems.
Proceedings of the IEEE INFOCOM 2022, 2022
Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Tradeoff between Privacy and Utility for Location-based Recommendation Services.
Proceedings of the IEEE International Conference on Communications, 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment.
IEEE Trans. Dependable Secur. Comput., 2021
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.
IEEE Trans. Dependable Secur. Comput., 2021
Grus: Toward Unified-memory-efficient High-performance Graph Processing on GPU.
ACM Trans. Archit. Code Optim., 2021
Advances in privacy-preserving computing.
Peer-to-Peer Netw. Appl., 2021
Collective Memory for Detecting Nonconcurrent Clones: A Localized Approach for Global Topology and Identity Tracing in IoT Networks.
IEEE Internet Things J., 2021
Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications.
IEEE Internet Things J., 2021
Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence.
IEEE Internet Things J., 2021
Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks.
CoRR, 2021
BatFL: Backdoor Detection on Federated Learning in e-Health.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Toward Automatically Generating Privacy Policy for Smart Home Apps.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Dissecting Click Fraud Autonomy in the Wild.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Hidden Backdoors in Human-Centric Language Models.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., 2020
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020
A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks.
J. Parallel Distributed Comput., 2020
MobiKey: Mobility-Based Secret Key Generation in Smart Home.
IEEE Internet Things J., 2020
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Proceedings of the 29th USENIX Security Symposium, 2020
Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Securing App Behaviors in Smart Home: A Human-App Interaction Perspective.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
2019
Privacy-Preserving Task Scheduling for Time-Sharing Services of Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2019
Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic.
IEEE Trans. Veh. Technol., 2019
Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2019
Smart contract for secure billing in ride-hailing service via blockchain.
Peer-to-Peer Netw. Appl., 2019
Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing.
Inf. Sci., 2019
Achieving Differentially Private Location Privacy in Edge-Assistant Connected Vehicles.
IEEE Internet Things J., 2019
Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT.
IEEE Internet Things J., 2019
Invisible Backdoor Attacks Against Deep Neural Networks.
CoRR, 2019
Securing android applications via edge assistant third-party library detection.
Comput. Secur., 2019
EdgeSense: Edge-Mediated Spatial- Temporal Crowdsensing.
IEEE Access, 2019
Who Leaks My Privacy: Towards Automatic and Association Detection with GDPR Compliance.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Automated and Personalized Privacy Policy Extraction Under GDPR Consideration.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2019
No-jump-into-latency in China's internet!: toward last-mile hop count based IP geo-localization.
Proceedings of the International Symposium on Quality of Service, 2019
Dynamic Traffic Feature Camouflaging via Generative Adversarial Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures.
IEEE Wirel. Commun., 2018
Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel.
IEEE Trans. Veh. Technol., 2018
Demographic Information Inference through Meta-Data Analysis of Wi-Fi Traffic.
IEEE Trans. Mob. Comput., 2018
Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817].
IEEE Trans. Inf. Forensics Secur., 2018
Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices.
IEEE Trans. Inf. Forensics Secur., 2018
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense.
IEEE Trans. Dependable Secur. Comput., 2018
Differentially Private Data Generative Models.
CoRR, 2018
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Comput. Secur., 2018
Modeling Privacy Leakage Risks in Large-Scale Social Networks.
IEEE Access, 2018
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018
APPCLASSIFIER: Automated App Inference on Encrypted Traffic via Meta Data Analysis.
Proceedings of the IEEE Global Communications Conference, 2018
Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism.
Proceedings of the IEEE Global Communications Conference, 2018
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks.
IEEE Trans. Mob. Comput., 2017
NFC Secure Payment and Verification Scheme with CS E-Ticket.
Secur. Commun. Networks, 2017
Guest editorial: Special issue on algorithms, systems and applications in mobile social networks.
Peer-to-Peer Netw. Appl., 2017
SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud.
IEEE Internet Things J., 2017
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design.
IEICE Trans. Inf. Syst., 2017
Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach.
CoRR, 2017
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Security Modeling and Analysis on Intra Vehicular Network.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017
Speed-Based Location Tracking in Usage-Based Automotive Insurance.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Fake reviews tell no tales? Dissecting click farming in content-generated social networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017
A Functional Co-Design towards Safe and Secure Vehicle Platooning.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Hybrid de-anonymization across real-world heterogeneous social networks.
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks.
Secur. Commun. Networks, 2016
Cyber security, crime, and forensics of wireless networks and applications.
Secur. Commun. Networks, 2016
You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing.
IEEE J. Sel. Areas Commun., 2016
Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks.
IEEE Internet Things J., 2016
NFC Secure Payment and Verification Scheme for Mobile Payment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Automatic Detection of SIP-Aware Attacks on VoLTE Device.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016
Demographics inference through Wi-Fi network traffic analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Efficient and secure message authentication in cooperative driving: A game-theoretic approach.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
A Traffic Based Lightweight Attack Detection Scheme for VoLTE.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Quality of experience and quality of protection provisions in emerging mobile networks [Guest Editorial].
IEEE Wirel. Commun., 2015
Guest editorial: Security and privacy of P2P networks in emerging smart city.
Peer-to-Peer Netw. Appl., 2015
A novel design for content delivery over software defined mobile social networks.
IEEE Netw., 2015
Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
De-anonymizing social networks: Using user interest as a side-channel.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Optimal strategies for defending location inference attack in database-driven CRNs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks.
IEEE Trans. Parallel Distributed Syst., 2014
UAV-assisted data gathering in wireless sensor networks.
J. Supercomput., 2014
Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid.
IEEE Syst. J., 2014
An attack-and-defence game for security assessment in vehicular ad hoc networks.
Peer-to-Peer Netw. Appl., 2014
Constant-round adaptive zero-knowledge proofs for NP.
Inf. Sci., 2014
Security and privacy for storage and computation in cloud computing.
Inf. Sci., 2014
RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks.
Computing, 2014
Multicloud-Based Evacuation Services for Emergency Management.
IEEE Cloud Comput., 2014
A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014
All your location are belong to us: breaking mobile social networks for automated user location tracking.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014
Where are you from?: confusing location distinction using virtual multipath camouflage.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
Achieving privacy preservation in WiFi fingerprint-based localization.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
HVSTO: Efficient privacy preserving hybrid storage in cloud data center.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
You are where you have been: Sybil detection via geo-location analysis in OSNs.
Proceedings of the IEEE Global Communications Conference, 2014
Sybil-aware least cost rumor blocking in social networks.
Proceedings of the IEEE Global Communications Conference, 2014
POSTER: LocMask: A Location Privacy Protection Framework in Android System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Security Assessment in Vehicular Networks.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-9357-0, 2013
MixZone in Motion: Achieving Dynamically Cooperative Location Privacy Protection in Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2013
Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks.
IEEE Trans. Emerg. Top. Comput., 2013
Security in cognitive radio networks [Guest Editorial].
IEEE Netw., 2013
A Secure and Efficient Data Aggregation Framework in Vehicular Sensing Networks.
Int. J. Distributed Sens. Networks, 2013
SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs.
Ad Hoc Sens. Wirel. Networks, 2013
A localized backbone renovating algorithm for wireless ad hoc and sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Mutual privacy-preserving regression modeling in participatory sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
YouSense: Mitigating entropy selfishness in distributed collaborative spectrum sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
A Scalable and Privacy-Preserving Named Data Networking Architecture Based on Bloom Filters.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio Network.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
ANTS: Pushing the rapid event notification in wireless sensor and actor networks.
Proceedings of the International Joint Conference on Awareness Science and Technology & Ubi-Media Computing, 2013
Detecting GPS information leakage in Android applications.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Security and privacy of collaborative spectrum sensing in cognitive radio networks.
IEEE Wirel. Commun., 2012
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012
Securing smart grid: cyber attacks, countermeasures, and challenges.
IEEE Commun. Mag., 2012
Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Location privacy preservation in collaborative spectrum sensing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Towards a game theoretical modeling of rational collaborative spectrum sensing in Cognitive Radio networks.
Proceedings of IEEE International Conference on Communications, 2012
PMDS: A probabilistic misbehavior detection scheme in DTN.
Proceedings of IEEE International Conference on Communications, 2012
Towards addressing group selfishness of cluster-based collaborative spectrum sensing in cognitive radio networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
An Adaptive Deviation-tolerant Secure Scheme for distributed cooperative spectrum sensing.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
PriMatch: Fairness-aware secure friend discovery protocol in mobile social network.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Location privacy leaking from spectrum utilization information in database-driven cognitive radio network.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks.
IEEE Trans. Wirel. Commun., 2011
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011
Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing
CoRR, 2011
Automatic inference of movements from contact histories.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs.
Proceedings of IEEE International Conference on Communications, 2011
Believe Yourself: A User-Centric Misbehavior Detection Scheme for Secure Collaborative Spectrum Sensing.
Proceedings of IEEE International Conference on Communications, 2011
MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks.
Proceedings of the Global Communications Conference, 2011
How to design space efficient revocable IBE from non-monotonic ABE.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011
A Routing-Compatible Credit-Based Incentive Scheme for DTNs.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011
2010
Pi: a practical incentive protocol for delay tolerant networks.
IEEE Trans. Wirel. Commun., 2010
PIE: cooperative peer-to-peer information exchange in network coding enabled wireless networks.
IEEE Trans. Wirel. Commun., 2010
An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications.
IEEE Trans. Veh. Technol., 2010
An efficient dynamic-identity based signature scheme for secure network coding.
Comput. Networks, 2010
An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
SecCloud: Bridging Secure Storage and Computation in Cloud.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010
SAS: A Secure Data Aggregation Scheme in Vehicular Sensing Networks.
Proceedings of IEEE International Conference on Communications, 2010
How to Construct Interval Encryption from Binary Tree Encryption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Security in service-oriented vehicular networks.
IEEE Wirel. Commun., 2009
PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks.
IEEE Trans. Veh. Technol., 2009
SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2009
A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy.
IEEE Trans. Veh. Technol., 2009
SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Cooperative Peer-to-Peer Information Exchange via Wireless Network Coding.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
SLAB: A secure localized authentication and billing scheme for wireless mesh networks.
IEEE Trans. Wirel. Commun., 2008
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks.
Int. J. Secur. Networks, 2008
Security in vehicular ad hoc networks.
IEEE Commun. Mag., 2008
A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
A New Dynamic Group Key Management Scheme with Low Rekeying Cost.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008
AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2008
Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings.
Proceedings of IEEE International Conference on Communications, 2008
BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
An enhanced authenticated key agreement protocol for wireless mobile communication.
Comput. Stand. Interfaces, 2007
TTP Based Privacy Preserving Inter-WISP Roaming Architecture for Wireless Metropolitan Area Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Two-Factor Localized Authentication Scheme for WLAN Roaming.
Proceedings of IEEE International Conference on Communications, 2007
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007
Secure Localized Authentication and Billing for Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007
2006
Provably secure robust threshold partial blind signature.
Sci. China Ser. F Inf. Sci., 2006
A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
A robust (k, n) + 1 threshold proxy signature scheme based on factoring.
Appl. Math. Comput., 2005