Bo Chen
Orcid: 0000-0001-9372-9607Affiliations:
- Michigan Technological University, Department of Computer Science, Houghton, USA
- New Jersey Institute of Technology, Newark, NJ, USA (PhD 2014)
According to our database1,
Bo Chen
authored at least 25 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on mtu.edu
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Discov. Internet Things, December, 2024
Enabling per-file data recovery from ransomware attacks via file system forensics and flash translation layer data extraction.
Cybersecur., December, 2024
IEEE Trans. Inf. Forensics Secur., 2024
A Simple Mobile Plausibly Deniable System Using Image Steganography and Secure Hardware.
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023
2022
Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration.
J. Cybersecur. Priv., May, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage.
Inf., 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the 6th IEEE/ACM Symposium on Edge Computing, 2021
Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
IEEE Internet Things Mag., 2020
2017
2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010