2024
Fool Attackers by Imperceptible Noise: A Privacy-Preserving Adversarial Representation Mechanism for Collaborative Learning.
IEEE Trans. Mob. Comput., December, 2024
XSema: A Novel Framework for Semantic Extraction of Cross-chain Transactions.
CoRR, 2024
BM-PAW: A Profitable Mining Attack in the PoW-based Blockchain System.
CoRR, 2024
Preserving Individual User's Right to Be Forgotten in Enterprise-Level Federated Learning.
Proceedings of the PRICAI 2024: Trends in Artificial Intelligence, 2024
From the Perspective of Prototypes: A Privacy-Preserving Personalized Federated Learning Framework.
Proceedings of the Information Security Practice and Experience, 2024
Client-Free Federated Unlearning via Training Reconstruction with Anchor Subspace Calibration.
Proceedings of the IEEE International Conference on Acoustics, 2024
FXChain: A Multi-consortium Permissioned Blockchain with Flexible Privacy-Preserving Strategies.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
A General Quantitative Analysis Framework for Attacks in Blockchain.
IEEE/ACM Trans. Netw., April, 2023
Deep multi-locality convolutional neural network for DDoS detection in smart home IoT.
Int. J. Inf. Comput. Secur., 2023
Temporal Gradient Inversion Attacks with Robust Optimization.
CoRR, 2023
Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Adversarial Representation Sharing: A Quantitative and Secure Collaborative Learning Framework.
CoRR, 2022
Secure Collaboration Between Consortiums in Permissioned Blockchains.
Proceedings of the Provable and Practical Security, 2022
2021
MSOM: Efficient Mechanism for Defense against DDoS Attacks in VANET.
Wirel. Commun. Mob. Comput., 2021
Improving the Efficiency and Robustness of Deepfakes Detection Through Precise Geometric Features.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Ursa: Robust Performance for <i>Nakamoto</i> Consensus with Self-adaptive Throughput.
ACM Trans. Internet Techn., 2020
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., 2020
WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features.
IEEE Trans. Big Data, 2020
Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication.
IEICE Trans. Inf. Syst., 2020
Label Smoothing and Adversarial Robustness.
CoRR, 2020
GADM: Manual fake review detection for O2O commercial platforms.
Comput. Secur., 2020
How to Model the Bribery Attack: A Practical Quantification Method in Blockchain.
Proceedings of the Computer Security - ESORICS 2020, 2020
Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Time-Sync Video Tag Extraction Using Semantic Association Graph.
ACM Trans. Knowl. Discov. Data, 2019
FraudJudger: Real-World Data Oriented Fraud Detection on Digital Payment Platforms.
CoRR, 2019
Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful.
CoRR, 2019
Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets.
IEEE Access, 2019
Ethereum Analysis via Node Clustering.
Proceedings of the Network and System Security - 13th International Conference, 2019
FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
A Robust Throughput Scheme for Bitcoin Network without Block Reward.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
Pseudonym Inference in Cooperative Vehicular Traffic Scenarios.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Privacy-Preserving Selective Aggregation of Online User Behavior Data.
IEEE Trans. Computers, 2017
A novel broadcast authentication protocol for internet of vehicles.
Peer-to-Peer Netw. Appl., 2017
SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud.
IEEE Internet Things J., 2017
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design.
IEICE Trans. Inf. Syst., 2017
On the Strategy and Behavior of Bitcoin Mining with N-attackers.
IACR Cryptol. ePrint Arch., 2017
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017
Crowdsourced time-sync video tagging using semantic association graph.
Proceedings of the 2017 IEEE International Conference on Multimedia and Expo, 2017
2016
Automatic Detection of SIP-Aware Attacks on VoLTE Device.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016
Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree.
Proceedings of the Information Security Practice and Experience, 2016
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Efficient and secure message authentication in cooperative driving: A game-theoretic approach.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
A Traffic Based Lightweight Attack Detection Scheme for VoLTE.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
De-anonymizing social networks: Using user interest as a side-channel.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
2012
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network.
J. Networks, 2012
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs.
J. Inf. Process., 2012
2011
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Proceedings of the IEEE 10th International Conference on Trust, 2011
A generic evaluation method for key management schemes in wireless sensor network.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011