Qian Wang

Orcid: 0000-0002-8967-8525

Affiliations:
  • Wuhan University, School of Cyber Science and Engineering, Hubei, China
  • Wuhan University, State Key Laboratory of Software Engineering, School of Computer Science, China
  • Illinois Institute of Technology, Department of Electrical and Computer Engineering, Chicago, IL, USA (former)


According to our database1, Qian Wang authored at least 271 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Risk-Aware Federated Reinforcement Learning-Based Secure IoV Communications.
IEEE Trans. Mob. Comput., December, 2024

Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns.
IEEE Trans. Mob. Comput., October, 2024

FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction Sound.
IEEE Trans. Mob. Comput., June, 2024

Multi-Agent Attention Double Actor-Critic Framework for Intelligent Traffic Light Control in Urban Scenarios With Hybrid Traffic.
IEEE Trans. Mob. Comput., January, 2024

Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models.
IEEE Trans. Inf. Forensics Secur., 2024

DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios.
IEEE Trans. Inf. Forensics Secur., 2024

No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures.
IEEE Trans. Inf. Forensics Secur., 2024

FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency.
IEEE Trans. Inf. Forensics Secur., 2024

Backdoor Attack With Sparse and Invisible Trigger.
IEEE Trans. Inf. Forensics Secur., 2024

Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases.
IEEE Trans. Dependable Secur. Comput., 2024

Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models.
IEEE Trans. Dependable Secur. Comput., 2024

KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework.
IEEE Trans. Dependable Secur. Comput., 2024

Towards Benchmarking and Evaluating Deepfake Detection.
IEEE Trans. Dependable Secur. Comput., 2024

Effective and Evasive Fuzz Testing-Driven Jailbreaking Attacks against LLMs.
CoRR, 2024

ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification.
CoRR, 2024

IDRetracor: Towards Visual Forensics Against Malicious Face Swapping.
CoRR, 2024

A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication.
CoRR, 2024

Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
CoRR, 2024

ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving.
CoRR, 2024

Enhancing Adversarial Transferability Through Neighborhood Conditional Sampling.
CoRR, 2024

A Survey of Deep Learning Library Testing Methods.
CoRR, 2024

Hijacking Attacks against Neural Networks by Analyzing Training Data.
CoRR, 2024

Whole Page Unbiased Learning to Rank.
Proceedings of the ACM on Web Conference 2024, 2024

More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
Proceedings of the 33rd USENIX Security Symposium, 2024

Hijacking Attacks against Neural Network by Analyzing Training Data.
Proceedings of the 33rd USENIX Security Symposium, 2024

PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Spectral and Geometric Spaces Representation Regularization for Multi-Modal Sequential Recommendation.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Spoofing Attacks and Anti-Spoofing Methods for Face Authentication Over Smartphones.
IEEE Commun. Mag., December, 2023

Data Poisoning and Backdoor Attacks on Audio Intelligence Systems.
IEEE Commun. Mag., December, 2023

B<sup>3</sup>: Backdoor Attacks against Black-box Machine Learning Models.
ACM Trans. Priv. Secur., November, 2023

Differential privacy in deep learning: Privacy and beyond.
Future Gener. Comput. Syst., November, 2023

An end-to-end network for co-saliency detection in one single image.
Sci. China Inf. Sci., November, 2023

SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices.
IEEE Trans. Circuits Syst. Video Technol., August, 2023

Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions.
IEEE Wirel. Commun., April, 2023

Depth map guided triplet network for deepfake face detection.
Neural Networks, February, 2023

Towards Privacy-Driven Truthful Incentives for Mobile Crowdsensing Under Untrusted Platform.
IEEE Trans. Mob. Comput., 2023

Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
IEEE Trans. Inf. Forensics Secur., 2023

LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2023

MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs.
IEEE Trans. Inf. Forensics Secur., 2023

A GAN-Based Defense Framework Against Model Inversion Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

AdvDDoS: Zero-Query Adversarial Attacks Against Commercial Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2023

PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds.
IEEE Trans. Dependable Secur. Comput., 2023

SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals.
IEEE Trans. Dependable Secur. Comput., 2023

CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics.
IEEE Trans. Dependable Secur. Comput., 2023

Securing Liveness Detection for Voice Authentication via Pop Noises.
IEEE Trans. Dependable Secur. Comput., 2023

Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Practical Auditing of Dynamic Data in Decentralized Storage.
IEEE Trans. Dependable Secur. Comput., 2023

Shielding Graph for eXact Analytics With SGX.
IEEE Trans. Dependable Secur. Comput., 2023

${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services.
IEEE Trans. Dependable Secur. Comput., 2023

Interpreting Adversarial Examples in Deep Learning: A Review.
ACM Comput. Surv., 2023

Backdoor Attack with Sparse and Invisible Trigger.
CoRR, 2023

NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples.
Proceedings of the ACM Web Conference 2023, 2023

KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Poisoning Self-supervised Learning Based Sequential Recommendations.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

Multi-Scenario Ranking with Adaptive Feature Learning.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

Boomerang: Metadata-Private Messaging under Hardware Trust.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

Orion: Online Backdoor Sample Detection via Evolution Deviance.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Downstream-agnostic Adversarial Examples.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Adversarial Network Pruning by Filter Robustness Estimation.
Proceedings of the IEEE International Conference on Acoustics, 2023

Improving Adversarial Transferability with Ghost Samples.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

Implicit Identity Driven Deepfake Face Swapping Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Poster: Metadata-private Messaging without Coordination.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
G-VCFL: Grouped Verifiable Chained Privacy-Preserving Federated Learning.
IEEE Trans. Netw. Serv. Manag., December, 2022

Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams.
IEEE/ACM Trans. Netw., 2022

Hear Sign Language: A Real-Time End-to-End Sign Language Recognition System.
IEEE Trans. Mob. Comput., 2022

GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy.
IEEE Trans. Knowl. Data Eng., 2022

Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure.
IEEE Trans. Inf. Forensics Secur., 2022

Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
IEEE Trans. Inf. Forensics Secur., 2022

SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2022

An Automated Multi-Tab Website Fingerprinting Attack.
IEEE Trans. Dependable Secur. Comput., 2022

WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave.
IEEE Trans. Dependable Secur. Comput., 2022

Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions.
IEEE Trans. Dependable Secur. Comput., 2022

Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain.
IEEE Trans. Dependable Secur. Comput., 2022

SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation.
IEEE Trans. Dependable Secur. Comput., 2022

Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers.
IEEE Netw., 2022

Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls.
IACR Cryptol. ePrint Arch., 2022

WaveFuzz: A Clean-Label Poisoning Attack to Protect Your Voice.
CoRR, 2022

Towards Benchmarking and Evaluating Deepfake Detection.
CoRR, 2022

Practical differentially private online advertising.
Comput. Secur., 2022

Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions.
IEEE Commun. Mag., 2022

RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Proceedings of the 31st USENIX Security Symposium, 2022

ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A Few Seconds Can Change Everything: Fast Decision-based Attacks against DNNs.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Verifying the Quality of Outsourced Training on Clouds.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
IEEE Trans. Parallel Distributed Syst., 2021

BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication.
IEEE Trans. Parallel Distributed Syst., 2021

Silhouette: Efficient Cloud Configuration Exploration for Large-Scale Analytics.
IEEE Trans. Parallel Distributed Syst., 2021

Stealing Your Android Patterns via Acoustic Signals.
IEEE Trans. Mob. Comput., 2021

Towards Personalized Task-Oriented Worker Recruitment in Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2021

SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment With Social Networks.
IEEE Trans. Mob. Comput., 2021

Publicly Verifiable Databases With All Efficient Updating Operations.
IEEE Trans. Knowl. Data Eng., 2021

Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach.
IEEE Trans. Dependable Secur. Comput., 2021

Towards Private and Scalable Cross-Media Retrieval.
IEEE Trans. Dependable Secur. Comput., 2021

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
IEEE Trans. Dependable Secur. Comput., 2021

PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing.
IEEE Trans. Dependable Secur. Comput., 2021

Building In-the-Cloud Network Functions: Security and Privacy Challenges.
Proc. IEEE, 2021

Secure Prediction of Neural Network in the Cloud.
IEEE Netw., 2021

Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment.
IEEE J. Sel. Areas Commun., 2021

Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions.
ACM Comput. Surv., 2021

Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns.
CoRR, 2021

Joint Knowledge Pruning and Recurrent Graph Convolution for News Recommendation.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Recent Advances in Adversarial Training for Adversarial Robustness.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

CARTL: Cooperative Adversarially-Robust Transfer Learning.
Proceedings of the 38th International Conference on Machine Learning, 2021

Rethinking Adversarial Examples Exploiting Frequency-Based Analysis.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server.
Proceedings of the Database Systems for Advanced Applications, 2021

Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Collaborative Fairness in Federated Learning.
Proceedings of the Federated Learning - Privacy and Incentive, 2020

Towards Demand-Driven Dynamic Incentive for Mobile Crowdsensing Systems.
IEEE Trans. Wirel. Commun., 2020

Robust Lane Detection From Continuous Driving Scenes Using Deep Neural Networks.
IEEE Trans. Veh. Technol., 2020

Deep Learning-Based Gait Recognition Using Smartphones in the Wild.
IEEE Trans. Inf. Forensics Secur., 2020

Privacy-Preserving Collaborative Deep Learning With Unreliable Participants.
IEEE Trans. Inf. Forensics Secur., 2020

PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing.
IEEE Trans. Inf. Forensics Secur., 2020

LVID: A Multimodal Biometrics Authentication System on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2020

Deep Domain Adaptation With Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2020

The Security of Autonomous Driving: Threats, Defenses, and Future Directions.
Proc. IEEE, 2020

Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments.
IEEE Netw., 2020

Analyzing User-Level Privacy Attack Against Federated Learning.
IEEE J. Sel. Areas Commun., 2020

Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models.
IEEE Commun. Mag., 2020

A scalable ledger-assisted architecture for secure query processing over distributed IoT data.
CCF Trans. Netw., 2020

Towards compression-resistant privacy-preserving photo sharing on social networks.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Attention-over-Attention Field-Aware Factorization Machine.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars.
IEEE Wirel. Commun., 2019

Privacy-Preserving Spectrum Auction Design: Challenges, Solutions, and Research Directions.
IEEE Wirel. Commun., 2019

Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum.
IEEE/ACM Trans. Netw., 2019

A Context-Aware User-Item Representation Learning for Item Recommendation.
ACM Trans. Inf. Syst., 2019

Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones.
IEEE Trans. Mob. Comput., 2019

Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server.
IEEE Trans. Mob. Comput., 2019

Personalized Privacy-Preserving Task Allocation for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2019

ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum.
IEEE Trans. Mob. Comput., 2019

DeepCrack: Learning Hierarchical Convolutional Features for Crack Detection.
IEEE Trans. Image Process., 2019

CReam: A Smart Contract Enabled Collusion-Resistant e-Auction.
IEEE Trans. Inf. Forensics Secur., 2019

<i>PROST</i>: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
IEEE Trans. Inf. Forensics Secur., 2019

Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions.
IEEE Netw., 2019

Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks.
IEEE Internet Things J., 2019

AirMouse: Turning a Pair of Glasses Into a Mouse in the Air.
IEEE Internet Things J., 2019

Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection.
CoRR, 2019

An End-to-End Network for Co-Saliency Detection in One Single Image.
CoRR, 2019

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019

When Mobile Crowdsensing Meets Privacy.
IEEE Commun. Mag., 2019

Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing.
IEEE Commun. Mag., 2019

Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures.
IEEE Commun. Mag., 2019

Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Hardening Database Padding for Searchable Encryption.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Detecting Fake Accounts in Online Social Networks at the Time of Registrations.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback.
IEEE Trans. Wirel. Commun., 2018

MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems.
IEEE Trans. Veh. Technol., 2018

Dynamic Proofs of Retrievability for Coded Cloud Storage Systems.
IEEE Trans. Serv. Comput., 2018

Enabling Generic, Verifiable, and Secure Data Search in Cloud Services.
IEEE Trans. Parallel Distributed Syst., 2018

Ensuring Minimum Spectrum Requirement in Matching-Based Spectrum Allocation.
IEEE Trans. Mob. Comput., 2018

Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training.
IEEE Trans. Knowl. Data Eng., 2018

Differentially Private Distributed Online Learning.
IEEE Trans. Knowl. Data Eng., 2018

Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
IEEE Trans. Inf. Forensics Secur., 2018

Outsourced Biometric Identification With Privacy.
IEEE Trans. Inf. Forensics Secur., 2018

Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2018

Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2018

Searchable Encryption over Feature-Rich Data.
IEEE Trans. Dependable Secur. Comput., 2018

Robust Gait Recognition by Integrating Inertial and RGBD Sensors.
IEEE Trans. Cybern., 2018

Cross-Urban Point-of-Interest Recommendation for Non-Natives.
Int. J. Web Serv. Res., 2018

A fast multi-level algorithm for community detection in directed online social networks.
J. Inf. Sci., 2018

Deep Learning Based Gait Recognition Using Smartphones in the Wild.
CoRR, 2018

Instance Similarity Deep Hashing for Multi-Label Image Retrieval.
CoRR, 2018

Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals.
Comput. Networks, 2018

Dating ancient paintings of Mogao Grottoes using deeply learnt visual codes.
Sci. China Inf. Sci., 2018

Image Feature Extraction in Encrypted Domain With Privacy-Preserving Hahn Moments.
IEEE Access, 2018

Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

InstantCryptoGram: Secure Image Retrieval Service.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Pay On-Demand: Dynamic Incentive and Task Selection for Location-Dependent Mobile Crowdsensing Systems.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Local Pattern Collocations Using Regional Co-occurrence Factorization.
IEEE Trans. Multim., 2017

THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply.
IEEE Trans. Mob. Comput., 2017

Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications.
IEEE Trans. Inf. Forensics Secur., 2017

Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources.
IEEE Trans. Inf. Forensics Secur., 2017

Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey.
IEEE Netw., 2017

Private and Truthful Aggregative Game for Large-Scale Spectrum Sharing.
IEEE J. Sel. Areas Commun., 2017

A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications.
J. Parallel Distributed Comput., 2017

Tell me the truth: Practically public authentication for outsourced databases with multi-user modification.
Inf. Sci., 2017

A Context-Aware User-Item Representation Learning for Item Recommendation.
CoRR, 2017

Mitigating Link-flooding Attacks With Active Link Obfuscation.
CoRR, 2017

Achieving location error tolerant barrier coverage for wireless sensor networks.
Comput. Networks, 2017

Cost-effective barrier coverage formation in heterogeneous wireless sensor networks.
Ad Hoc Networks, 2017

Stable Matching for Spectrum Market with Guaranteed Minimum Requirement.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

Poster: Enabling Secure Location Authentication in Drone.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Exploiting social influence for context-aware event recommendation in event-based social networks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2016

A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs.
IEEE Trans. Veh. Technol., 2016

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2016

Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.
IEEE Trans. Image Process., 2016

Who Leads the Clothing Fashion: Style, Color, or Texture? A Computational Study.
CoRR, 2016

Securing Fast Learning! Ridge Regression over Encrypted Big Data.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2016

Real-time hidden acoustic signal capture with smartphones: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Messages behind the sound: real-time hidden acoustic signal capture with smartphones.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Path voting based pavement crack detection from laser range images.
Proceedings of the 2016 IEEE International Conference on Digital Signal Processing, 2016

Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Geodesic-based pavement shadow removal revisited.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Deep Learning Based Feature Selection for Remote Sensing Scene Classification.
IEEE Geosci. Remote. Sens. Lett., 2015

Robust energy-efficient power loading for MIMO system under imperfect CSI.
Int. J. Sens. Networks, 2015

Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015

Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Securing emerging short range wireless communications: the state of the art.
IEEE Wirel. Commun., 2014

Economic Viability of Paris Metro Pricing for Digital Services.
ACM Trans. Internet Techn., 2014

Efficient privacy-preserved data query over ciphertext in cloud computing.
Secur. Commun. Networks, 2014

Energy efficient opportunistic cooperative transmission with different ratio combinings: from a new perspective.
Sci. China Inf. Sci., 2014

Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

2013
Opportunistic spectrum access: from stochastic channels to non-stochastic channels.
IEEE Wirel. Commun., 2013

Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations.
IEEE Trans. Parallel Distributed Syst., 2013

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IEEE Trans. Computers, 2013

Proof-carrying cloud computation: The case of convex optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A reverse transmission mechanism for surveillance network in smart grid.
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

Optimal budget deployment strategy against power grid interdiction.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Toward Secure and Dependable Storage Services in Cloud Computing.
IEEE Trans. Serv. Comput., 2012

Toward secure and effective data utilization in public cloud.
IEEE Netw., 2012

Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication.
IEEE J. Sel. Areas Commun., 2012

Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels.
IEEE J. Sel. Areas Commun., 2012

Security Challenges for the Public Cloud.
IEEE Internet Comput., 2012

Joint UFH and power control for effective wireless anti-jamming communication.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Locating malicious nodes for data aggregation in wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

When cloud meets eBay: Towards effective pricing for cloud computing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Secret key generation exploiting channel characteristics in wireless communications.
IEEE Wirel. Commun., 2011

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2011

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
ACM Trans. Sens. Networks, 2011

Enhancing Attribute-Based Encryption with Attribute Hierarchy.
Mob. Networks Appl., 2011

Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Wireless key establishment with asynchronous clocks.
Proceedings of the MILCOM 2011, 2011

Delay-bounded adaptive UFH-based anti-jamming wireless communication.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Fast and scalable secret key generation exploiting channel phase randomness in wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Anti-jamming communication in cognitive radio networks with unknown channel statistics.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Towards Secure and Effective Utilization over Encrypted Cloud Data.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Jamming-Resilient Dynamic Spectrum Access for Cognitive Radio Networks.
Proceedings of IEEE International Conference on Communications, 2011

2010
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

On the Viability of Paris Metro Pricing for Communication and Service Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

2009
Ensuring Data Storage Security in Cloud Computing.
IACR Cryptol. ePrint Arch., 2009

Enabling Public Verifiability and Data Dynamics for Storage Security.
IACR Cryptol. ePrint Arch., 2009

Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
IACR Cryptol. ePrint Arch., 2009

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009

2008
Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy.
Proceedings of the Wireless Algorithms, 2008

ISP uplink pricing in a competitive market.
Proceedings of the 2008 International Conference on Telecommunications, 2008

Time-Slotted Round-Trip Carrier Synchronization in Large-Scale Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2008

2006
A grouped and proportional-fair subcarrier allocation scheme for multiuser OFDM systems.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
A Low-Complexity Power Allocation Scheme for Distributed Wireless Links in Rayleigh Fading Channels with Capacity Optimization.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005


  Loading...