Chenglong Fu

Orcid: 0000-0001-6555-9858

Affiliations:
  • Temple University, Philadelphia, PA, USA


According to our database1, Chenglong Fu authored at least 22 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

TrustEvent: Cross-Platform IoT Trigger Event Verification Using Edge Computing.
Proceedings of the IEEE International Conference on Communications, 2024

2023
MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Discovering Complex Correlations Among Multiple IoT Devices in Smart Environments.
Proceedings of the IEEE Global Communications Conference, 2023

VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Virtual-Device-Based Policy Enforcement in Multi-Admin Smart Environments.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

Transformer-based Compound Correlation Miner for Smart Home Anomaly Detection.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

2022
Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals.
CoRR, 2022

Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals.
Proceedings of the 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2022) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022), 2022

IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes.
Proceedings of the 30th USENIX Security Symposium, 2021

SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Decision-Tree Based Root Cause Localization for Anomalies in Smart IoT Systems.
Proceedings of the ICC 2021, 2021

2020
Multi-layer security scheme for implantable medical devices.
Neural Comput. Appl., 2020

2019
Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access.
CoRR, 2019

POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices.
Proceedings of the Security and Privacy in Communication Networks, 2019

Effective UAV and Ground Sensor Authentication.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
CoRR, 2018

POKs Based Low Energy Authentication Scheme for Implantable Medical Devices.
CoRR, 2018

An Location-aware Authentication Scheme for Cross-domain Internet of Thing Systems.
Proceedings of the 2018 International Conference on Computing, 2018


  Loading...