2024
TBP: Temporal Beam Prediction for Mobile Millimeter-Wave Networks.
IEEE Internet Things J., July, 2024
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification.
IEEE Trans. Inf. Forensics Secur., 2024
Optical Lens Attack on Monocular Depth Estimation for Autonomous Driving.
CoRR, 2024
Decoding Emotions: Unveiling Facial Expressions through Acoustic Sensing with Contrastive Attention.
CoRR, 2024
Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving.
CoRR, 2024
Optical Lens Attack on Deep Learning Based Monocular Depth Estimation.
CoRR, 2024
Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation.
CoRR, 2024
The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs.
CoRR, 2024
Privacy-Preserving Diffusion Model Using Homomorphic Encryption.
CoRR, 2024
SoilCares: Towards Low-cost Soil Macronutrients and Moisture Monitoring Using RF-VNIR Sensing.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024
A Distributed System for Optimization of Carbon Emitting Resource Consumption in Supply Chains.
Proceedings of the International Symposium on Networks, Computers and Communications, 2024
End-to-End Decentralized Tracking of Carbon Footprint using Internet of Things and Distributed Databases.
Proceedings of the 7th Conference on Cloud and Internet of Things, 2024
Sync-Millibottleneck Attack on Microservices Cloud Architecture.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot Models.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IoTCom: Dissecting Interaction Threats in IoT Systems.
IEEE Trans. Software Eng., April, 2023
AutoThing: A Secure Transaction Framework for Self-Service Things.
IEEE Trans. Serv. Comput., 2023
Motif-Level Anomaly Detection in Dynamic Graphs.
IEEE Trans. Inf. Forensics Secur., 2023
TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts.
IEEE Trans. Inf. Forensics Secur., 2023
Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data.
Proc. ACM Manag. Data, 2023
Security Threat Mitigation for Smart Contracts: A Comprehensive Survey.
ACM Comput. Surv., 2023
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
CoRR, 2023
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems.
CoRR, 2023
ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems.
CoRR, 2023
A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2023
Security Threat Mitigation For Smart Contracts: A Survey.
CoRR, 2023
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
FacER: Contrastive Attention based Expression Recognition via Smartphone Earpiece Speaker.
Proceedings of the IEEE INFOCOM 2023, 2023
Federated IoT Interaction Vulnerability Analysis.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders.
Proceedings of the IEEE International Conference on Communications, 2023
Jailbreaker in Jail: Moving Target Defense for Large Language Models.
Proceedings of the 10th ACM Workshop on Moving Target Defense, 2023
2022
A Systematical Study on Application Performance Management Libraries for Apps.
IEEE Trans. Software Eng., 2022
AuthIoT: A Transferable Wireless Authentication Scheme for IoT Devices Without Input Interface.
IEEE Internet Things J., 2022
URadio: Wideband Ultrasound Communication for Smart Home Applications.
IEEE Internet Things J., 2022
Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens.
CoRR, 2022
Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering.
CoRR, 2022
Mining Function Homology of Bot Loaders from Honeypot Logs.
CoRR, 2022
DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems.
Proceedings of the 31st USENIX Security Symposium, 2022
GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Scalable Privacy-preserving Geo-distance Evaluation for Precision Agriculture IoT Systems.
ACM Trans. Sens. Networks, 2021
SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation.
IEEE Trans. Inf. Forensics Secur., 2021
Structured Sparsity Model Based Trajectory Tracking Using Private Location Data Release.
IEEE Trans. Dependable Secur. Comput., 2021
DM-COM: Combining Device-to-Device and MU-MIMO Communications for Cellular Networks.
IEEE Internet Things J., 2021
Effective detection of mobile malware behavior based on explainable deep neural network.
Neurocomputing, 2021
On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications.
Comput. Stand. Interfaces, 2021
Constraint-Based Inference of Heuristics for Foreign Exchange Trade Model Optimization.
CoRR, 2021
Security and Privacy in the Emerging Cyber-Physical World: A Survey.
IEEE Commun. Surv. Tutorials, 2021
Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning.
Comput. Secur., 2021
Osprey: A fast and accurate patch presence test framework for binaries.
Comput. Commun., 2021
NELoRa: Towards Ultra-low SNR LoRa Communication with Neural-enhanced Demodulation.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021
System-Wide Security for Offline Payment Terminals.
Proceedings of the Security and Privacy in Communication Networks, 2021
JammingBird: Jamming-Resilient Communications for Vehicular Ad Hoc Networks.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021
UD-MIMO: Uplink Distributed MIMO for Wireless LANs.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021
SoundFence: Securing Ultrasonic Sensors in Vehicles Using Physical-Layer Defense.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021
IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Rectifying Administrated ERC20 Tokens.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Blockumulus: A Scalable Framework for Smart Contracts on the Cloud.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server.
Proceedings of the Database Systems for Advanced Applications, 2021
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack.
IEEE Trans. Netw. Sci. Eng., 2020
DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code.
IEEE Trans. Inf. Forensics Secur., 2020
A Practical Downlink NOMA Scheme for Wireless LANs.
IEEE Trans. Commun., 2020
Multi-attributed heterogeneous graph convolutional network for bot detection.
Inf. Sci., 2020
Deep and broad URL feature mining for android malware detection.
Inf. Sci., 2020
Tree decomposition based anomalous connected subgraph scanning for detecting and forecasting events in attributed social media networks.
Neurocomputing, 2020
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data.
Comput. Secur., 2020
SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot.
Proceedings of the Security and Privacy in Communication Networks, 2020
Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
SDR receiver using commodity wifi via physical-layer signal reconstruction.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020
Generating Robust Audio Adversarial Examples with Temporal Dependency.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
2019
A mobile malware detection method using behavior features in network traffic.
J. Netw. Comput. Appl., 2019
Special issue on advances in security and privacy in IoT.
J. Netw. Comput. Appl., 2019
Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment.
IEEE Internet Things J., 2019
Obfusifier: Obfuscation-Resistant Android Malware Detection System.
Proceedings of the Security and Privacy in Communication Networks, 2019
Demystifying Application Performance Management Libraries for Android.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Characterizing Location-based Mobile Tracking in Mobile Ad Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
Significant Permission Identification for Machine-Learning-Based Android Malware Detection.
IEEE Trans. Ind. Informatics, 2018
Detecting Android Malware Leveraging Text Semantics of Network Flows.
IEEE Trans. Inf. Forensics Secur., 2018
Machine learning based mobile malware detection using highly imbalanced network traffic.
Inf. Sci., 2018
Internet of Things: Security and privacy in a connected world.
Future Gener. Comput. Syst., 2018
Lexical Mining of Malicious URLs for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2018
GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2018
Uplink MU-MIMO in Asynchronous Wireless LANs.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018
Deep and Broad Learning Based Detection of Android Malware via Network Traffic.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
High-bandwidth ultrasonic communication using graphene-based acoustic devices.
Proceedings of the IEEE INFOCOM 2018, 2018
Tracking location privacy leakage of mobile ad networks at scale.
Proceedings of the IEEE INFOCOM 2018, 2018
Towards best secure coding practice for implementing SSL/TLS.
Proceedings of the IEEE INFOCOM 2018, 2018
MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing Applications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Efficient Signature Generation for Classifying Cross-Architecture IoT Malware.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Enabling Technologies towards 5G Mobile Networks.
Mob. Inf. Syst., 2017
Very Short Intermittent DDoS Attacks in an Unsaturated System.
Proceedings of the Security and Privacy in Communication Networks, 2017
Security analysis of Internet-of-Things: A case study of august smart lock.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
TextDroid: Semantics-based detection of mobile malware using network flows.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Identity management using blockchain for cognitive cellular networks.
Proceedings of the IEEE International Conference on Communications, 2017
Design and analysis of elastic handoff in cognitive cellular networks.
Proceedings of the IEEE International Conference on Communications, 2017
Black penguin: On the feasibility of detecting intrusion with homogeneous memory.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Enabling jamming-resistant communications in wireless MIMO networks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
SPRIDE: Scalable and private continual geo-distance evaluation for precision agriculture.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Jamming Resilient Communication Using MIMO Interference Cancellation.
IEEE Trans. Inf. Forensics Secur., 2016
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2016
SigPID: significant permission identification for android malware detection.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Achieving 5As in Cloud Centric Cognitive Cellular Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
A First Look at Android Malware Traffic in First Few Minutes.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015
PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
A Real-time Android Malware Detection System Based on Network Traffic Analysis.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2014
MIMO-based jamming resilient communication in wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2013
Proximity-Based Security Techniques for Mobile Users in Wireless Networks.
IEEE Trans. Inf. Forensics Secur., 2013
Non-parametric passive traffic monitoring in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proximity-based security using ambient radio signals.
Proceedings of IEEE International Conference on Communications, 2013
2012
On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication.
IEEE Wirel. Commun. Lett., 2012
Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2012
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012