BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning.
CoRR, 2024
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
TriSAS: Toward Dependable Inter-SAS Coordination with Auditability.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
BD-SAS: Enabling Dynamic Spectrum Sharing in Low-Trust Environment.
IEEE Trans. Cogn. Commun. Netw., August, 2023
SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol.
IEEE Trans. Dependable Secur. Comput., 2023
MANDA: On Adversarial Example Detection for Network Intrusion Detection System.
IEEE Trans. Dependable Secur. Comput., 2023
CANShield: Deep-Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal Level.
IEEE Internet Things J., 2023
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction.
CoRR, 2023
MS-PTP: Protecting Network Timing from Byzantine Attacks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
ARI: Attestation of Real-time Mission Execution Integrity.
Proceedings of the 32nd USENIX Security Symposium, 2023
UCBlocker: Unwanted Call Blocking Using Anonymous Authentication.
Proceedings of the 32nd USENIX Security Symposium, 2023
A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem.
Proceedings of the IEEE INFOCOM 2023, 2023
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities.
Proceedings of the Computer Security - ESORICS 2023, 2023
Rethinking Single Sign-On: A Reliable and Privacy-Preserving Alternative with Verifiable Credentials.
Proceedings of the 10th ACM Workshop on Moving Target Defense, 2023
Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution.
IEEE Wirel. Commun., 2022
CANShield: Signal-based Intrusion Detection for Controller Area Networks.
CoRR, 2022
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022
Challenges and New Directions in Securing Spectrum Access Systems.
IEEE Internet Things J., 2021
Offloading Decision in Edge Computing for Continuous Applications Under Uncertainty.
IEEE Trans. Wirel. Commun., 2020
A Survey of Distributed Consensus Protocols for Blockchain Networks.
IEEE Commun. Surv. Tutorials, 2020
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
Proceedings of the Computer Security - ESORICS 2020, 2020
Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution.
CoRR, 2019