Shouling Ji
Orcid: 0000-0003-4268-372XAffiliations:
- Zhejiang University, College of Computer Science and Technology, China
- Georgia Institute of Technology, Atlanta, GA, USA (PhD 2016)
According to our database1,
Shouling Ji
authored at least 321 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
On csauthors.net:
Bibliography
2025
AdversaFlow: Visual Red Teaming for Large Language Models with Multi-Level Adversarial Flow.
IEEE Trans. Vis. Comput. Graph., January, 2025
2024
MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework.
IEEE Internet Things J., July, 2024
Frontiers Inf. Technol. Electron. Eng., March, 2024
Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices.
IEEE Trans. Consumer Electron., February, 2024
Vis. Informatics, 2024
ACM Trans. Priv. Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing.
IEEE Trans. Inf. Forensics Secur., 2024
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
IEEE Trans. Dependable Secur. Comput., 2024
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples.
Knowl. Based Syst., 2024
FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Uncovering LLM-Generated Code: A Zero-Shot Synthetic Code Detector via Code Rewriting.
CoRR, 2024
Emulating Full Client Participation: A Long-Term Client Selection Strategy for Federated Learning.
CoRR, 2024
Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models.
CoRR, 2024
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events.
CoRR, 2024
SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems.
CoRR, 2024
The Risk of Federated Learning to Skew Fine-Tuning Features and Underperform Out-of-Distribution Robustness.
CoRR, 2024
Comput. Secur., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Protecting Object Detection Models from Model Extraction Attack via Feature Space Coverage.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
<i>SUB-PLAY: </i> Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
GaLileo: General Linear Relaxation Framework for Tightening Robustness Certification of Transformers.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
AdaCCD: Adaptive Semantic Contrasts Discovery Based Cross Lingual Adaptation for Code Clone Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
J. King Saud Univ. Comput. Inf. Sci., May, 2023
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art.
Comput. Secur., May, 2023
IEEE Trans. Neural Networks Learn. Syst., February, 2023
IEEE Trans. Mob. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction.
IEEE Trans. Pattern Anal. Mach. Intell., 2023
Query-efficient model extraction for text classification model in a hard label setting.
J. King Saud Univ. Comput. Inf. Sci., 2023
Multi-level feature disentanglement network for cross-dataset face forgery detection.
Image Vis. Comput., 2023
F<sup>2</sup>AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns.
CoRR, 2023
RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks.
CoRR, 2023
Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network.
IEEE Trans. Mob. Comput., 2022
Exploiting Heterogeneous Graph Neural Networks with Latent Worker/Task Correlation Information for Label Aggregation in Crowdsourcing.
ACM Trans. Knowl. Discov. Data, 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cybern., 2022
IEEE ACM Trans. Audio Speech Lang. Process., 2022
An interpretable outcome prediction model based on electronic health records and hierarchical attention.
Int. J. Intell. Syst., 2022
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022
Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study.
CoRR, 2022
All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning.
CoRR, 2022
Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning.
CoRR, 2022
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It.
CoRR, 2022
GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Mob. Comput., 2021
ACM Trans. Knowl. Discov. Data, 2021
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Image Process., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks.
Inf. Sci., 2021
Neurocomputing, 2021
Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art.
CoRR, 2021
Constructing Contrastive samples via Summarization for Text Classification with limited annotations.
CoRR, 2021
CoRR, 2021
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Enhancing Model Robustness by Incorporating Adversarial Knowledge into Semantic Representation.
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Constructing contrastive samples via summarization for text classification with limited annotations.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
IEEE Trans. Parallel Distributed Syst., 2020
Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack.
IEEE Trans. Netw. Sci. Eng., 2020
AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2020
HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM.
Trans. Data Sci., 2020
Inf. Process. Manag., 2020
THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network.
IEEE Internet Things J., 2020
IET Comput. Vis., 2020
TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask).
CoRR, 2020
Exploiting Heterogeneous Graph Neural Networks with Latent Worker/Task Correlation Information for Label Aggregation in Crowdsourcing.
CoRR, 2020
Big Data Min. Anal., 2020
Proceedings of the Companion of The 2020 Web Conference 2020, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020
Attention with Long-Term Interval-Based Gated Recurrent Units for Modeling Sequential User Behaviors.
Proceedings of the Database Systems for Advanced Applications, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Towards Fighting Cybercrime: Malicious URL Attack Type Detection using Multiclass Classification.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
IEEE Trans. Parallel Distributed Syst., 2019
Toward Optimal Adaptive Online Shortest Path Routing With Acceleration Under Jamming Attack.
IEEE/ACM Trans. Netw., 2019
IEEE Trans. Multim., 2019
Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Dependable Secur. Comput., 2019
Corrections to "A Privacy-Preserving Online Learning Approach for Incentive-Based Demand Response in Smart Grid".
IEEE Syst. J., 2019
A Privacy-Preserving Online Learning Approach for Incentive-Based Demand Response in Smart Grid.
IEEE Syst. J., 2019
Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment.
IEEE Internet Things J., 2019
Privacy-Preserving Online Task Allocation in Edge-Computing-Enabled Massive Crowdsensing.
IEEE Internet Things J., 2019
Neurocomputing, 2019
Towards understanding the security of modern image captchas and underground captcha-solving services.
Big Data Min. Anal., 2019
Spreading social influence with both positive and negative opinions in online networks.
Big Data Min. Anal., 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Neural Network Model for Classifying the Economic Recession and Construction of Financial Stress Index.
Proceedings of the Data Science, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Secur. Priv., 2018
Proceedings of the Services - SERVICES 2018, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
T-PriDO: A Tree-based Privacy-Preserving and Contextual Collaborative Online Big Data Processing System.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords.
IEEE Trans. Dependable Secur. Comput., 2017
Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey.
IEEE Commun. Surv. Tutorials, 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
Proceedings of the 2nd International Conference on Multimedia Systems and Signal Processing, 2017
Proceedings of the Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the Computing and Combinatorics - 23rd International Conference, 2017
Internet of Things (IoT)-based Learning Framework to Facilitate STEM Undergraduate Education.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017
2016
IEEE Trans. Mob. Comput., 2016
ACM Trans. Inf. Syst. Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Sapprox: Enabling Efficient and Accurate Approximations on Sub-datasets with Distribution-aware Online Sampling.
Proc. VLDB Endow., 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Broadcast Scheduling With Latency and Redundancy Analysis for Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2015
Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm.
Trans. Emerg. Telecommun. Technol., 2015
Optimal routing with scheduling and channel assignment in multi-power multi-radio wireless sensor networks.
Ad Hoc Networks, 2015
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.
Proceedings of the 24th USENIX Security Symposium, 2015
Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Wirel. Commun. Mob. Comput., 2014
Wirel. Commun. Mob. Comput., 2014
Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2014
Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Mob. Comput., 2014
Pers. Ubiquitous Comput., 2014
A Genetic Algorithm with Immigrants Schemes for Constructing a σ-Reliable MCDS in Probabilistic Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2014
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014
Minimum-sized influential node set selection for social networks under the independent cascade model.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
ACM Trans. Sens. Networks, 2013
Distributed Data Collection in Large-Scale Asynchronous Wireless Sensor Networks Under the Generalized Physical Interference Model.
IEEE/ACM Trans. Netw., 2013
Approximation algorithms for load-balanced virtual backbone construction in wireless sensor networks.
Theor. Comput. Sci., 2013
J. Parallel Distributed Comput., 2013
J. Comb. Optim., 2013
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
A Multi-Objective Genetic Algorithm for constructing load-balanced virtual backbones in probabilistic Wireless Sensor Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013
2012
Continuous Data Collection Capacity of Dual-Radio Multichannel Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012
Int. J. Sens. Networks, 2012
Int. J. Sens. Networks, 2012
Distributed data collection and its capacity in asynchronous wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Proceedings of the International Conference on Computing, Networking and Communications, 2012
Proceedings of the Combinatorial Optimization and Applications, 2012
2011
A Genetic Algorithm for Constructing a Reliable MCDS in Probabilistic Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011
Genetic-algorithm-based construction of Load-Balanced CDSs in Wireless Sensor Networks.
Proceedings of the MILCOM 2011, 2011
Continuous Data Collection Capacity of Wireless Sensor Networks under Physical Interference Model.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011
Capacity of dual-radio multi-channel wireless sensor networks for continuous data collection.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
ARM: An asynchronous receiver-initiated multichannel MAC protocol with duty cycling for WSNs.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010
M-cube: A Duty Cycle Based Multi-channel MAC Protocol with Multiple Channel Reservation for WSNs.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
RCS: A Random Channel Selection with Probabilistic Backoff for Multi-Channel MAC Protocols in WSNs.
Proceedings of the Global Communications Conference, 2010
2009
Proceedings of the MSN 2009, 2009
2008
Proceedings of the International Conference on Embedded Software and Systems, 2008