Long Cheng
Orcid: 0009-0004-4819-5406Affiliations:
- Clemson University, SC, USA
- Beihang University, State Key Lab of Virtual Reality Technology and Systems, China (former)
- Virginia Tech, VA, USA (former)
- Singapore University of Technology and Design, Singapore (former)
- Beijing University of Posts and Telecommunications, China (former)
According to our database1,
Long Cheng
authored at least 120 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., August, 2024
IEEE Trans. Mob. Comput., February, 2024
Adaptive Data Transport Mechanism for UAV Surveillance Missions in Lossy Environments.
CoRR, 2024
CoRR, 2024
Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities.
CoRR, 2024
Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces.
Proceedings of the ACM on Web Conference 2024, 2024
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
FreeEM: Uncovering Parallel Memory EMR Covert Communication in Volatile Environments.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024
An Initial Exploration of Employing Large Multimodal Models in Defending Against Autonomous Vehicles Attacks.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
COVID-19 and Sinophobia: Detecting Warning Signs of Radicalization on Twitter and Reddit.
Cyberpsychology Behav. Soc. Netw., July, 2023
IEEE Internet Comput., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
ChatGPT vs. Human Annotators: A Comprehensive Analysis of ChatGPT for Text Annotation.
Proceedings of the International Conference on Machine Learning and Applications, 2023
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Design and Evaluation of an Application-Oriented Data-Centric Communication Framework for Emerging Cyber-Physical Systems.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023
2022
IEEE Trans. Wirel. Commun., 2022
IEEE Trans. Serv. Comput., 2022
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities.
ACM Comput. Surv., 2022
SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild.
Proceedings of the 31st USENIX Security Symposium, 2022
Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance.
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the IEEE Secure Development Conference, 2022
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022
Multi-level Distillation of Semantic Knowledge for Pre-training Multilingual Language Model.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches.
ACM Trans. Priv. Secur., 2021
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Internet Things J., 2021
IEEE Secur. Priv., 2021
Proceedings of the IEEE Secure Development Conference, 2021
Proceedings of the IEEE Secure Development Conference, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
COVID-HateBERT: a Pre-trained Language Model for COVID-19 related Hate Speech Detection.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2020
IEEE Trans. Wirel. Commun., 2020
IEEE Trans. Ind. Informatics, 2020
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020
AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation.
Proceedings of the Smart Blockchain - Second International Conference, 2019
Proceedings of the 2019 IEEE Cybersecurity Development, 2019
Litedge: towards light-weight edge computing for efficient wireless surveillance system.
Proceedings of the International Symposium on Quality of Service, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
2018
IEEE Pervasive Comput., 2018
Introduction to the special issue on deep learning for biomedical and healthcare applications.
Neural Comput. Appl., 2018
PSOTrack: A RFID-Based System for Random Moving Objects Tracking in Unconstrained Indoor Environment.
IEEE Internet Things J., 2018
Towards minimum-delay and energy-efficient flooding in low-duty-cycle wireless sensor networks.
Comput. Networks, 2018
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
2017
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02354-5, 2017
WIREs Data Mining Knowl. Discov., 2017
Pallas: Self-Bootstrapping Fine-Grained Passive Indoor Localization Using WiFi Monitors.
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation.
Proc. Priv. Enhancing Technol., 2017
From mapping to indoor semantic queries: Enabling zero-effort indoor environmental sensing.
J. Netw. Comput. Appl., 2017
J. Netw. Comput. Appl., 2017
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017
POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
IEEE/ACM Trans. Netw., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Seamless Streaming Data Delivery in Cluster-Based Wireless Sensor Networks With Mobile Elements.
IEEE Syst. J., 2016
J. Netw. Comput. Appl., 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
2015
Comput. J., 2015
iMap: Automatic inference of indoor semantics exploiting opportunistic smartphone sensing.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
Energy-efficient statistical delay guarantee for duty-cycled wireless sensor networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Ind. Informatics, 2014
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Energy efficient flooding under minimum delay constraint in synchronous low-duty-cycle wireless sensor networks.
Proceedings of the IEEE Computers, 2014
2013
Wait, focus and spray: efficient data delivery in wireless sensor networks with ubiquitous mobile data collectors.
Telecommun. Syst., 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Minimum-delay and energy-efficient flooding tree in asynchronous low-duty-cycle wireless sensor networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013
Dynamic switching-based reliable flooding in low-duty-cycle wireless sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
A virtual area partition clustering protocol with assistant cluster heads for wireless sensor networks.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013
2012
Contention-based geographic forwarding in asynchronous duty-cycled wireless sensor networks.
Int. J. Commun. Syst., 2012
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012
2011
Towards intelligent contention-based geographic forwarding in wireless sensor networks.
IET Commun., 2011
A framework for multimodal sensing in heterogeneous and multimedia wireless sensor networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Streaming data delivery in multi-hop cluster-based wireless sensor networks with mobile sinks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Scalable and Energy-Efficient Broadcasting in Multi-Hop Cluster-Based Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011
Robust Forwarding for Reactive Routing Protocols in Wireless Ad Hoc Networks with Unreliable Links.
Proceedings of IEEE International Conference on Communications, 2011
2010
Comput. J., 2010
Exploiting geographic opportunistic routing for soft QoS provisioning in wireless sensor networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010
Distributed Minimum Transmission Multicast Routing Protocol for Wireless Sensor Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010
Efficient Data Delivery in Wireless Sensor Networks with Ubiquitous Mobile Data Collectors.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
Meeting Position Aware Routing for Query-Based Mobile Enabled Wireless Sensor Network.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009
RAML: Range-Boundary Aware Mobility-Assisted Localization Scheme for Wireless Sensor Networks.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008