Rui Zhang

Orcid: 0000-0001-5230-5998

Affiliations:
  • University of Delaware, Newark, DE, USA
  • University of Hawaii, Honolulu, HI, USA (2013 - 2016)
  • Arizona State University, Tempe, AZ, USA (PhD 2013)


According to our database1, Rui Zhang authored at least 79 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Ridesharing via Probabilistic Matching.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

2023
Rhythmic RFID Authentication.
IEEE/ACM Trans. Netw., April, 2023

VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof.
IEEE Trans. Dependable Secur. Comput., 2023

Freshness Authentication for Outsourced Multi-Version Key-Value Stores.
IEEE Trans. Dependable Secur. Comput., 2023

Locally Differentially Private and Fair Key-Value Aggregation.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023

Sybil Detection in Connected Vehicle Systems via Angle-of-Arrival Estimation.
Proceedings of the IEEE International Conference on Mobility, 2023

Location Inference under Temporal Correlation.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Authenticating Outsourced Location-Based Skyline Queries under Shortest Path Distance.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
SpecKriging: GNN-Based Secure Cooperative Spectrum Sensing.
IEEE Trans. Wirel. Commun., 2022

(In)secure Acoustic Mobile Authentication.
IEEE Trans. Mob. Comput., 2022

PriHorus: Privacy-Preserving RSS-Based Indoor Positioning.
Proceedings of the IEEE International Conference on Communications, 2022

ImPos: An Image-Based Indoor Positioning System.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Locally Differentially Private Quantile Summary Aggregation in Wireless Sensor Networks.
Proceedings of the Intelligent Information and Database Systems - 14th Asian Conference, 2022

2021
Verifiable Query Processing Over Outsourced Social Graph.
IEEE/ACM Trans. Netw., 2021

Secure Connected Vehicle-based Traffic Signal Systems Against Data Spoofing Attacks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

SecQSA: Secure Sampling-Based Quantile Summary Aggregation in Wireless Sensor Networks.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Secure Outsourced Top-k Selection Queries against Untrusted Cloud Service Providers.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Differential Privacy-Preserving User Linkage across Online Social Networks.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
IndoorWaze: A Crowdsourcing-Based Context-Aware Indoor Navigation System.
IEEE Trans. Wirel. Commun., 2020

A Spatiotemporal Approach for Secure Crowdsourced Radio Environment Map Construction.
IEEE/ACM Trans. Netw., 2020

RF-Rhythm: Secure and Usable Two-Factor RFID Authentication.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

KV-Fresh: Freshness Authentication for Outsourced Multi-Version Key-Value Stores.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Verifiable outsourced computation over encrypted data.
Inf. Sci., 2019

Secure indoor positioning against signal strength attacks via optimized multi-voting.
Proceedings of the International Symposium on Quality of Service, 2019

Differentially-Private Incentive Mechanism for Crowdsourced Radio Environment Map Construction.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

A Blockchain-Based Architecture for Traffic Signal Control Systems.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

Secure Data Aggregation in Wireless Sensor Networks: Enumeration Attack and Countermeasure.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
SpecGuard: Spectrum Misuse Detection in Dynamic Spectrum Access Systems.
IEEE Trans. Mob. Comput., 2018

The Rise of Social Botnets: Attacks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2018

Beware of What You Share: Inferring User Locations in Venmo.
IEEE Internet Things J., 2018

EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Privacy-Preserving Social Media Data Outsourcing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Secure Crowdsourced Indoor Positioning Systems.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Secure RSS-Fingerprint-Based Indoor Positioning: Attacks and Countermeasures.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A Multisecret Value Access Control Framework for Airliner in Multinational Air Traffic Management.
IEEE Internet Things J., 2017

Verifiable social data outsourcing.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Your face your heart: Secure mobile face authentication with photoplethysmograms.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

POWERFUL: Mobile app fingerprinting via power analysis.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Secure crowdsourced radio environment map construction.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

2016
SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing.
IEEE Trans. Wirel. Commun., 2016

TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter.
IEEE/ACM Trans. Netw., 2016

Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications.
IEEE Internet Things J., 2016

VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Secure outsourced skyline query processing via untrusted cloud service providers.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A framework to mitigate airliner risk in air traffic management.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

DPSense: Differentially Private Crowdsourced Spectrum Sensing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2015

Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers.
IEEE Trans. Dependable Secur. Comput., 2015

Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Your actions tell where you are: Uncovering Twitter users in a metropolitan area.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
TIGHT: A Geographic Routing Protocol for Cognitive Radio Mobile Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2014

Secure Top-k Query Processing in Unattended Tiered Sensor Networks.
IEEE Trans. Veh. Technol., 2014

TouchIn: Sightless two-factor authentication on multi-touch mobile devices.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking.
IEEE J. Sel. Areas Commun., 2013

Verifiable Privacy-Preserving Aggregation in People-Centric Urban Sensing Systems.
IEEE J. Sel. Areas Commun., 2013

Privacy-preserving spatiotemporal matching.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Secure crowdsourcing-based cooperative pectrum sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On the impact of social botnets for spam distribution and digital-influence manipulation.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Distributed Privacy-Preserving Access Control in Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks.
IEEE J. Sel. Areas Commun., 2012

Secure top-k query processing via untrusted location-based service providers.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Fine-grained private matching for proximity-based mobile social networking.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
AOS: an anonymous overlay system for mobile ad hoc networks.
Wirel. Networks, 2011

A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks.
IEEE Trans. Wirel. Commun., 2011

Fast identification of the missing tags in a large RFID system.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Traffic Inference in Anonymous MANETs.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Verifiable Fine-Grained Top-k Queries in Tiered Sensor Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Secure multidimensional range queries in sensor networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

DP<sup>2</sup>AC: Distributed Privacy-Preserving Access Control in Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Secure Range Queries in Tiered Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009


  Loading...