DNN Real-Time Collaborative Inference Acceleration with Mobile Edge Computing.
Proceedings of the International Joint Conference on Neural Networks, 2022
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
IEEE Trans. Inf. Forensics Secur., 2021
An Evolutionary Study of IoT Malware.
,
,
,
,
,
,
,
,
,
,
,
IEEE Internet Things J., 2021
Modeling Marked Temporal Point Process Using Multi-relation Structure RNN.
Cogn. Comput., 2020
Enhancing the security of FinTech applications with map-based graphical password authentication.
Future Gener. Comput. Syst., 2019
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Empirical Study of Face Authentication Systems Under OSNFD Attacks.
IEEE Trans. Dependable Secur. Comput., 2018
Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Enhancing Anomaly Diagnosis of Automatic Train Supervision System Based on Operation Log.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Privacy leakage analysis in online social networks.
Comput. Secur., 2015
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Understanding OSN-based facial disclosure against face authentication systems.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013
What you want is not what you get: predicting sharing policies for text-based content on facebook.
Proceedings of the AISec'13, 2013