Kui Ren
Orcid: 0000-0003-3441-6277Affiliations:
- Zhejiang University, School of Cyber Science and Technology, Hangzhou, China
- State University of New York af Buffalo, Department of Computer Science and Engineering, NY, USA (former)
- Illinois Institute of Technology, Chicago, IL, USA (former)
- Worcester Polytechnic Institute, MA, USA (former, PhD)
According to our database1,
Kui Ren
authored at least 594 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on acm.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Mob. Comput., December, 2024
Does Differential Privacy Really Protect Federated Learning From Gradient Leakage Attacks?
IEEE Trans. Mob. Comput., December, 2024
IEEE Trans. Knowl. Data Eng., December, 2024
IEEE/ACM Trans. Netw., October, 2024
Proc. VLDB Endow., August, 2024
Proc. VLDB Endow., June, 2024
Exploring Practical Acoustic Transduction Attacks on Inertial Sensors in MDOF Systems.
IEEE Trans. Mob. Comput., May, 2024
Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning.
IEEE/ACM Trans. Netw., April, 2024
IEEE Trans. Mob. Comput., March, 2024
Proc. VLDB Endow., March, 2024
IEEE Trans. Mob. Comput., February, 2024
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.
Proc. ACM Manag. Data, February, 2024
FlowValve<sup>+</sup>: Multi-Queue Packet Scheduling Framework on SoC-Based SmartNICs.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning.
IEEE Trans. Dependable Secur. Comput., 2024
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
$\mathsf {monoCash}$monoCash: A Channel-Free Payment Network via Trusted Monotonic Counters.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
FTDKD: Frequency-Time Domain Knowledge Distillation for Low-Quality Compressed Audio Deepfake Detection.
IEEE ACM Trans. Audio Speech Lang. Process., 2024
Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent.
CoRR, 2024
CoRR, 2024
Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning.
CoRR, 2024
Prompt-Consistency Image Generation (PCIG): A Unified Framework Integrating LLMs, Knowledge Graphs, and Controllable Diffusion Models.
CoRR, 2024
A Survey on Medical Large Language Models: Technology, Application, Trustworthiness, and Future Directions.
CoRR, 2024
CoRR, 2024
S-Eval: Automatic and Adaptive Test Generation for Benchmarking Safety Evaluation of Large Language Models.
CoRR, 2024
Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Differentially Private Zeroth-Order Methods for Scalable Large Language Model Finetuning.
CoRR, 2024
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution.
CoRR, 2024
CoRR, 2024
LLM-Guided Multi-View Hypergraph Learning for Human-Centric Explainable Recommendation.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel.
Proceedings of the 33rd USENIX Security Symposium, 2024
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition.
Proceedings of the 33rd USENIX Security Symposium, 2024
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
Proceedings of the 33rd USENIX Security Symposium, 2024
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Eagle: Toward Scalable and Near-Optimal Network-Wide Sketch Deployment in Network Measurement.
Proceedings of the ACM SIGCOMM 2024 Conference, 2024
EMTrig: Physical Adversarial Examples Triggered by Electromagnetic Injection towards LiDAR Perception.
Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems, 2024
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 29th International Conference on Intelligent User Interfaces, 2024
Towards Efficient Asynchronous Federated Learning in Heterogeneous Edge Environments.
Proceedings of the IEEE INFOCOM 2024, 2024
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning.
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Towards Reliable and Efficient Backdoor Trigger Inversion via Decoupling Benign Features.
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
CDS: An Anti-Aging Calibratable Digital Sensor for Detecting Multiple Types of Fault Injection Attacks.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Self-Para-Consistency: Improving Reasoning Tasks at Low Cost for Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Mob. Comput., November, 2023
Disguised as Privacy: Data Poisoning Attacks Against Differentially Private Crowdsensing Systems.
IEEE Trans. Mob. Comput., September, 2023
IEEE/ACM Trans. Netw., June, 2023
Mobile Communication Among COTS IoT Devices via a Resonant Gyroscope With Ultrasound.
IEEE/ACM Trans. Netw., June, 2023
IEEE Internet Things J., May, 2023
IEEE Trans. Software Eng., April, 2023
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023
VocalPrint: A mmWave-Based Unmediated Vocal Sensing System for Secure Authentication.
IEEE Trans. Mob. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope.
IEEE Trans. Dependable Secur. Comput., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Proc. VLDB Endow., 2023
Proc. VLDB Endow., 2023
Proc. ACM Manag. Data, 2023
VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Aegis: A Lightning Fast Privacy-preserving Machine Learning Platform against Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems.
ACM Comput. Surv., 2023
CoRR, 2023
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning (Extended Version).
CoRR, 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
WavoID: Robust and Secure Multi-modal User Identification via mmWave-voice Mechanism.
Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology, 2023
When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Ghost-Probe: NLOS Pedestrian Rushing Detection with Monocular Camera for Automated Driving.
Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023
FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge.
Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023
CAPP-130: A Corpus of Chinese Application Privacy Policy Summarization and Interpretation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
Cancelling Speech Signals for Speech Privacy Protection against Microphone Eavesdropping.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Nowhere to Hide: Detecting Live Video Forgery via Vision-WiFi Silhouette Correspondence.
Proceedings of the IEEE INFOCOM 2023, 2023
Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing.
Proceedings of the IEEE International Conference on Acoustics, 2023
Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
ANetQA: A Large-scale Benchmark for Fine-grained Compositional Reasoning over Untrimmed Videos.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Serv. Comput., 2022
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum.
ACM Trans. Softw. Eng. Methodol., 2022
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2022
Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.
Proc. VLDB Endow., 2022
J. Comput. Secur., 2022
Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
Reliable Digital Forensics in the Air: Exploring an RF-based Drone Identification System.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model.
CoRR, 2022
CoRR, 2022
CoRR, 2022
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training.
CoRR, 2022
IEEE Commun. Surv. Tutorials, 2022
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
KITE: Exploring the Practical Threat from Acoustic Transduction Attacks on Inertial Sensors.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022
Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022
FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Mask does not matter: anti-spoofing face authentication using mmWave without on-site registration.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
A non-intrusive and adaptive speaker de-identification scheme using adversarial examples.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
Proceedings of the Seventh IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2022
mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Fingersound: A Low-cost and Deployable Authentication System with Fingertip Sliding Sound.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV object detection.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
RegVault: hardware assisted selective data randomization for operating system kernels.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022
EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
IEEE/ACM Trans. Netw., 2021
Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
Proc. VLDB Endow., 2021
Proc. IEEE, 2021
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation.
ACM Comput. Surv., 2021
CoRR, 2021
Concurr. Comput. Pract. Exp., 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021
Wavoice: A Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021
FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFID.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting.
Proceedings of the ICC 2021, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation.
Proceedings of the Computer Security - ESORICS 2021, 2021
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.
Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021
Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the APSys '21: 12th ACM SIGOPS Asia-Pacific Workshop on Systems, 2021
2020
IEEE/ACM Trans. Netw., 2020
EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid.
IEEE Trans. Ind. Informatics, 2020
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs.
IEEE Trans. Inf. Forensics Secur., 2020
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Computers, 2020
Proc. IEEE, 2020
IACR Cryptol. ePrint Arch., 2020
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
CoRR, 2020
CoRR, 2020
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum.
CoRR, 2020
Towards Understanding the Adversarial Vulnerability of Skeleton-based Action Recognition.
CoRR, 2020
CoRR, 2020
VocalPrint: exploring a resilient and secure voice authentication via mmWave biometric interrogation.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
SonicPrint: a generally adoptable and secure fingerprint biometrics in smart devices.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
2019
IEEE Wirel. Commun., 2019
IEEE Trans. Veh. Technol., 2019
ACM Trans. Sens. Networks, 2019
IEEE/ACM Trans. Netw., 2019
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Internet Things J., 2019
EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis.
IACR Cryptol. ePrint Arch., 2019
ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels.
CoRR, 2019
Comput. Networks, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the Fourth International Workshop on Social Sensing, 2019
Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback.
IEEE Trans. Wirel. Commun., 2018
Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters.
IEEE Trans. Smart Grid, 2018
IEEE Trans. Smart Grid, 2018
IEEE Trans. Parallel Distributed Syst., 2018
IEEE Trans. Parallel Distributed Syst., 2018
IEEE/ACM Trans. Netw., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
IEEE Trans. Cloud Comput., 2018
IEEE Netw., 2018
A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.
IEEE Netw., 2018
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition.
Frontiers Inf. Technol. Electron. Eng., 2018
My Smartphone Recognizes Genuine QR Codes!: Practical Unclonable QR Code via 3D Printing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
Comput. Secur., 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017
IEEE/ACM Trans. Netw., 2017
IEEE/ACM Trans. Netw., 2017
IEEE/ACM Trans. Netw., 2017
IEEE/ACM Trans. Netw., 2017
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017
Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Netw., 2017
IEEE J. Sel. Areas Commun., 2017
IEEE Commun. Mag., 2017
IEEE Commun. Mag., 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2016
Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement.
IEEE Trans. Parallel Distributed Syst., 2016
ACM Trans. Multim. Comput. Commun. Appl., 2016
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multim., 2016
IEEE Trans. Multim., 2016
IEEE Trans. Mob. Comput., 2016
Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.
IEEE Trans. Image Process., 2016
IEEE Trans. Inf. Forensics Secur., 2016
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Dependable Secur. Comput., 2016
Guest Editorial: Introduction to the Special Section on Emerging Security Trends for Biomedical Computations, Devices, and Infrastructures.
IEEE ACM Trans. Comput. Biol. Bioinform., 2016
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming.
IEEE Trans. Computers, 2016
J. Commun. Inf. Networks, 2016
ACM Comput. Surv., 2016
Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.
CoRR, 2016
Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2016
<i>P</i><sup>2</sup>-SAS: preserving users' privacy in centralized dynamic spectrum access systems.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Messages behind the sound: real-time hidden acoustic signal capture with smartphones.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
User capacity of wireless physical-layer identification: An information-theoretic perspective.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016
Increasing User Capacity of Wireless Physical-Layer Identification in Internet of Things.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Commun. Mag., 2015
IEEE Commun. Mag., 2015
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 2015
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015
Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IEEE Wirel. Commun., 2014
Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Dependable Secur. Comput., 2014
IEEE Internet Things J., 2014
IEEE Internet Things J., 2014
Editorial: IEEE Communications Surveys & TutorialsSpecial Section on Energy and Smart Grid.
IEEE Commun. Surv. Tutorials, 2014
All your location are belong to us: breaking mobile social networks for automated user location tracking.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014
Enabling efficient access control with dynamic policy updating for big data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE Wirel. Commun., 2013
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations.
IEEE Trans. Parallel Distributed Syst., 2013
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
IEEE Trans. Parallel Distributed Syst., 2013
Secure ad hoc trust initialization and key management in wireless body area networks.
ACM Trans. Sens. Networks, 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Emerg. Top. Comput., 2013
IEEE Trans. Computers, 2013
IACR Cryptol. ePrint Arch., 2013
Effective signal region based analog mixed signal design considering variations and applications.
Proceedings of the 2013 IEEE International SOC Conference, Erlangen, Germany, 2013
Proceedings of the 2013 IEEE International SOC Conference, Erlangen, Germany, 2013
OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Attribute-based fine-grained access control with efficient revocation in cloud storage systems.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
IEEE Trans. Wirel. Commun., 2012
IEEE Trans. Smart Grid, 2012
IEEE Trans. Serv. Comput., 2012
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Trans. Parallel Distributed Syst., 2012
IEEE J. Sel. Areas Commun., 2012
Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels.
IEEE J. Sel. Areas Commun., 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Wirel. Commun., 2011
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2011
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2011
ACM Trans. Sens. Networks, 2011
Mob. Networks Appl., 2011
Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Anti-jamming communication in cognitive radio networks with unknown channel statistics.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks.
IEEE Trans. Veh. Technol., 2010
PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
IEEE Trans. Parallel Distributed Syst., 2010
Secur. Commun. Networks, 2010
IACR Cryptol. ePrint Arch., 2010
Comput. Networks, 2010
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply.
Wirel. Networks, 2009
IEEE Wirel. Commun., 2009
IEEE Trans. Veh. Technol., 2009
Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation.
IEEE Trans. Veh. Technol., 2009
Inf. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009
2008
IEEE Trans. Wirel. Commun., 2008
IEEE Trans. Mob. Comput., 2008
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the Wireless Algorithms, 2008
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
IEEE Trans. Wirel. Commun., 2007
Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability.
Mob. Networks Appl., 2007
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
2006
A new approach for random key pre-distribution in large-scale wireless sensor networks.
Wirel. Commun. Mob. Comput., 2006
A novel privacy preserving authentication and access control scheme for pervasive computing environments.
IEEE Trans. Veh. Technol., 2006
Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005
2004
Comput. Networks, 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the 12th IEEE International Conference on Networks, 2004
2003
Proceedings of the Applied Cryptography and Network Security, 2003