Kun He
Orcid: 0000-0003-3472-419XAffiliations:
- Wuhan University, China
According to our database1,
Kun He
authored at least 59 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., November, 2024
Incentive Mechanisms for Online Task Offloading With Privacy-Preserving in UAV-Assisted Mobile Edge Computing.
IEEE/ACM Trans. Netw., June, 2024
WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices.
IEEE Trans. Mob. Comput., June, 2024
UFinAKA: Fingerprint-Based Authentication and Key Agreement With Updatable Blind Credentials.
IEEE/ACM Trans. Netw., April, 2024
FACT: Sealed-Bid Auction With Full Privacy via Threshold Fully Homomorphic Encryption.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
MaskAuct: Seller-Autonomous Auction With Bidder Anonymity and Bidding Confidentiality.
IEEE Trans. Inf. Forensics Secur., 2024
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation.
IEEE Trans. Inf. Forensics Secur., 2024
DynaShard: Secure and Adaptive Blockchain Sharding Protocol with Hybrid Consensus and Dynamic Shard Management.
CoRR, 2024
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
CoRR, 2024
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph.
CoRR, 2024
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems.
CoRR, 2024
CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning.
CoRR, 2024
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR, 2024
CoRR, 2024
Corrigendum to "Model-agnostic Adversarial Example Detection via High-Frequency Amplification" [Computers & Security, Volume 141, June 2024, 103791].
Comput. Secur., 2024
Comput. Secur., 2024
Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning.
Proceedings of the IEEE INFOCOM 2024, 2024
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel.
IEEE Trans. Dependable Secur. Comput., 2022
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst., 2022
Online incentive mechanism for task offloading with privacy-preserving in UAV-assisted mobile edge computing.
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps.
IEEE Trans. Dependable Secur. Comput., 2021
Future Gener. Comput. Syst., 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2020
Secur. Commun. Networks, 2020
IEEE Internet Things J., 2020
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020
2019
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management.
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services.
IEEE Trans. Mob. Comput., 2018
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
IEEE Trans. Mob. Comput., 2017
Secure independent-update concise-expression access control for video on demand in cloud.
Inf. Sci., 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
2016
IEEE Trans. Computers, 2016
Secur. Commun. Networks, 2016
A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst., 2016
Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks.
Comput. Networks, 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
2012
Secur. Commun. Networks, 2012