Long Cheng

Orcid: 0009-0004-4819-5406

Affiliations:
  • Clemson University, SC, USA
  • Beihang University, State Key Lab of Virtual Reality Technology and Systems, China (former)
  • Virginia Tech, VA, USA (former)
  • Singapore University of Technology and Design, Singapore (former)
  • Beijing University of Posts and Telecommunications, China (former)


According to our database1, Long Cheng authored at least 120 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., August, 2024

BlockSense: Towards Trustworthy Mobile Crowdsensing via Proof-of-Data Blockchain.
IEEE Trans. Mob. Comput., February, 2024

A Survey on Network Attack Surface Mapping.
DTRAP, 2024

Adaptive Data Transport Mechanism for UAV Surveillance Missions in Lossy Environments.
CoRR, 2024

Automated Software Vulnerability Patching using Large Language Models.
CoRR, 2024

AI-Cybersecurity Education Through Designing AI-based Cyberharassment Detection Lab.
CoRR, 2024

Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities.
CoRR, 2024

Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces.
Proceedings of the ACM on Web Conference 2024, 2024

Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

FreeEM: Uncovering Parallel Memory EMR Covert Communication in Volatile Environments.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024

An Initial Exploration of Employing Large Multimodal Models in Defending Against Autonomous Vehicles Attacks.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2024

A First Look at Security and Privacy Risks in the RapidAPI Ecosystem.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
COVID-19 and Sinophobia: Detecting Warning Signs of Radicalization on Twitter and Reddit.
Cyberpsychology Behav. Soc. Netw., July, 2023

A Zero-Trust Architecture for Connected and Autonomous Vehicles.
IEEE Internet Comput., 2023

PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023

Analysis of COVID-19 Offensive Tweets and Their Targets.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

ChatGPT vs. Human Annotators: A Comprehensive Analysis of ChatGPT for Text Annotation.
Proceedings of the International Conference on Machine Learning and Applications, 2023

SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Design and Evaluation of an Application-Oriented Data-Centric Communication Framework for Emerging Cyber-Physical Systems.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

2022
Collision-Free Dynamic Convergecast in Low-Duty-Cycle Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2022

Rethinking Fine-Grained Measurement From Software-Defined Perspective: A Survey.
IEEE Trans. Serv. Comput., 2022

Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities.
ACM Comput. Surv., 2022

SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild.
Proceedings of the 31st USENIX Security Symposium, 2022

Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance.
Proceedings of the 43rd IEEE Security and Privacy, 2022

A Comparative Study of Log4Sheil Test Tools.
Proceedings of the IEEE Secure Development Conference, 2022

BYOZ: Protecting BYOD Through Zero Trust Network Security.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022

AAEBERT: Debiasing BERT-based Hate Speech Detection Models via Adversarial Learning.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Towards Connecting the Disconnected Internet.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Multi-level Distillation of Semantic Knowledge for Pre-training Multilingual Language Model.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Understanding and Detecting Remote Infection on Linux-based IoT Devices.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches.
ACM Trans. Priv. Secur., 2021

Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2021

Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT.
IEEE Internet Things J., 2021

Problematic Privacy Policies of Voice Assistant Applications.
IEEE Secur. Priv., 2021

Understanding and Measuring Robustness of Multimodal Learning.
CoRR, 2021

Compressing Network Attack Surfaces for Practical Security Analysis.
Proceedings of the IEEE Secure Development Conference, 2021

Tutorial: Investigating Advanced Exploits for System Security Assurance.
Proceedings of the IEEE Secure Development Conference, 2021

Towards Understanding and Detecting Cyberbullying in Real-world Images.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

COVID-HateBERT: a Pre-trained Language Model for COVID-19 related Hate Speech Detection.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021

Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Adaptive Forwarding With Probabilistic Delay Guarantee in Low-Duty-Cycle WSNs.
IEEE Trans. Wirel. Commun., 2020

Blockchain-Based Mobile Crowd Sensing in Industrial Systems.
IEEE Trans. Ind. Informatics, 2020

SLoRa: towards secure LoRa communications with fine-grained physical layer features.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

Network Attack Surface Simplification for Red and Blue Teams.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

On Analyzing COVID-19-related Hate Speech Using BERT Attention.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Exploitation Techniques and Defenses for Data-Oriented Attacks.
CoRR, 2019

Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation.
Proceedings of the Smart Blockchain - Second International Conference, 2019

Exploitation Techniques and Defenses for Data-Oriented Attacks.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

Litedge: towards light-weight edge computing for efficient wireless surveillance system.
Proceedings of the International Symposium on Quality of Service, 2019

B-IoT: Blockchain Driven Internet of Things with Credit-Based Consensus Mechanism.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
Program Anomaly Detection Against Data-Oriented Attacks.
PhD thesis, 2018

Low-Overhead WiFi Fingerprinting.
IEEE Trans. Mob. Comput., 2018

Privacy-Preserving Incentive Mechanisms for Mobile Crowdsensing.
IEEE Pervasive Comput., 2018

Introduction to the special issue on deep learning for biomedical and healthcare applications.
Neural Comput. Appl., 2018

PSOTrack: A RFID-Based System for Random Moving Objects Tracking in Unconstrained Indoor Environment.
IEEE Internet Things J., 2018

Towards minimum-delay and energy-efficient flooding in low-duty-cycle wireless sensor networks.
Comput. Networks, 2018

Stop Unauthorized Access to Your Smart Devices.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

2017
Anomaly Detection as a Service: Challenges, Advances, and Opportunities
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02354-5, 2017

Enterprise data breach: causes, challenges, prevention, and future directions.
WIREs Data Mining Knowl. Discov., 2017

Pallas: Self-Bootstrapping Fine-Grained Passive Indoor Localization Using WiFi Monitors.
IEEE Trans. Mob. Comput., 2017

FACT: A Framework for Authentication in Cloud-Based IP Traceback.
IEEE Trans. Inf. Forensics Secur., 2017

Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation.
Proc. Priv. Enhancing Technol., 2017

From mapping to indoor semantic queries: Enabling zero-effort indoor environmental sensing.
J. Netw. Comput. Appl., 2017

Compressive sensing based data quality improvement for crowd-sensing applications.
J. Netw. Comput. Appl., 2017

LiPS: Learning Social Relationships in Probe Space.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

On Threat Modeling and Mitigation of Medical Cyber-Physical Systems.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Achieving Efficient Reliable Flooding in Low-Duty-Cycle Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2016

Opportunistic Piggyback Marking for IP Traceback.
IEEE Trans. Inf. Forensics Secur., 2016

Seamless Streaming Data Delivery in Cluster-Based Wireless Sensor Networks With Mobile Elements.
IEEE Syst. J., 2016

Accuracy-aware wireless indoor localization: Feasibility and applications.
J. Netw. Comput. Appl., 2016

Taming collisions for delay reduction in low-duty-cycle wireless sensor networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Resource-Efficient Data Gathering in Sensor Networks for Environment Reconstruction.
Comput. J., 2015

iMap: Automatic inference of indoor semantics exploiting opportunistic smartphone sensing.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Energy-efficient statistical delay guarantee for duty-cycled wireless sensor networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Deco: False data detection and correction framework for participatory sensing.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

WicLoc: An indoor localization system based on WiFi fingerprints and crowdsourcing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Achieving Asymmetric Sensing Coverage for Duty Cycled Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2014

R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2014

Exploiting Sender-Based Link Correlation in Wireless Sensor Networks.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Predicting social networks and psychological outcomes through mobile phone sensing.
Proceedings of the IEEE International Conference on Communications, 2014

Energy efficient flooding under minimum delay constraint in synchronous low-duty-cycle wireless sensor networks.
Proceedings of the IEEE Computers, 2014

2013
Wait, focus and spray: efficient data delivery in wireless sensor networks with ubiquitous mobile data collectors.
Telecommun. Syst., 2013

ZiLoc: Energy efficient WiFi fingerprint-based localization with low-power radio.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Minimum-delay and energy-efficient flooding tree in asynchronous low-duty-cycle wireless sensor networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Social-Loc: improving indoor localization with social sensing.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

Dynamic switching-based reliable flooding in low-duty-cycle wireless sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A virtual area partition clustering protocol with assistant cluster heads for wireless sensor networks.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

2012
Contention-based geographic forwarding in asynchronous duty-cycled wireless sensor networks.
Int. J. Commun. Syst., 2012

Improving indoor localization with social interactions.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

2011
Towards intelligent contention-based geographic forwarding in wireless sensor networks.
IET Commun., 2011

A framework for multimodal sensing in heterogeneous and multimedia wireless sensor networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Streaming data delivery in multi-hop cluster-based wireless sensor networks with mobile sinks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Scalable and Energy-Efficient Broadcasting in Multi-Hop Cluster-Based Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011

Robust Forwarding for Reactive Routing Protocols in Wireless Ad Hoc Networks with Unreliable Links.
Proceedings of IEEE International Conference on Communications, 2011

2010
Efficient Query-Based Data Collection for Mobile Wireless Monitoring Applications.
Comput. J., 2010

Exploiting geographic opportunistic routing for soft QoS provisioning in wireless sensor networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Decentralized service composition in pervasive computing environments.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Cooperative contention-based forwarding for wireless sensor networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Distributed Minimum Transmission Multicast Routing Protocol for Wireless Sensor Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Efficient Data Delivery in Wireless Sensor Networks with Ubiquitous Mobile Data Collectors.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Meeting Position Aware Routing for Query-Based Mobile Enabled Wireless Sensor Network.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

Wireless Sensor Network for Data Sensing in Intelligent Transportation System.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

RAML: Range-Boundary Aware Mobility-Assisted Localization Scheme for Wireless Sensor Networks.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

Query-based data collection in wireless sensor networks with mobile sinks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Residual Time Aware Forwarding for Randomly Duty-Cycled Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A Group-Level Incentive Scheme for Data Collection in Wireless Sensor Networks.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Sharing Worldwide Sensor Network.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008


  Loading...