Xukai Zou

Orcid: 0000-0001-5762-8876

According to our database1, Xukai Zou authored at least 94 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Multimodal Vertical Federated Learning: A Traffic Analysis Case Study.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Subjective Logic-based Decentralized Federated Learning for Non-IID Data.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Can We Trust the Similarity Measurement in Federated Learning?
CoRR, 2023

DSSP: A Distributed, SLO-aware, Sensing-domain-privacy-Preserving Architecture for Sensing-as-a-Service.
CoRR, 2023

Case Study: Mapping an E-Voting Based Curriculum to CSEC2017.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 1, 2023

Advancing Active Authentication for User Privacy and Revocability with BioCapsules.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

Unsupervised Deep Learning for an Image Based Network Intrusion Detection System.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Solving the Federated Edge Learning Participation Dilemma: A Truthful and Correlated Perspective.
IEEE Trans. Veh. Technol., 2022

Distributed Swift and Stealthy Backdoor Attack on Federated Learning.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022

An Experimental Evaluation of a Privacy-Preserving Authentication and Authorization Scheme.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
Learning Discriminative Features for Adversarial Robustness.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Hardware Speculation Vulnerabilities and Mitigations.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education.
Proceedings of the Information Security Education for Cyber Resilience, 2021

Energy-Efficient Device Selection in Federated Edge Learning.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Usability and Security of Different Authentication Methods for an Electronic Health Records System.
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021

2020
Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey.
IEEE Access, 2020

AuthN-AuthZ: Integrated, User-Friendly and Privacy-Preserving Authentication and Authorization.
Proceedings of the Second IEEE International Conference on Trust, 2020

Multi-Armed-Bandit-based Shilling Attack on Collaborative Filtering Recommender Systems.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

Continuous Security through Integration Testing in an Electronic Health Records System.
Proceedings of the International Conference on Software Security and Assurance, 2020

User-Friendly Design of Cryptographically-Enforced Hierarchical Role-based Access Control Models.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Deep Dynamic Clustering of Spam Reviewers using Behavior-Anomaly-based Graph Embedding.
Proceedings of the IEEE Global Communications Conference, 2020

Correlated Participation Decision Making for Federated Edge Learning.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Control.
Proceedings of the First IEEE International Conference on Trust, 2019

Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Koinonia: verifiable e-voting with long-term privacy.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model.
IEEE Trans. Comput. Soc. Syst., 2018

2017
Receipt-freeness and coercion resistance in remote E-voting systems.
Int. J. Secur. Networks, 2017

Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election.
Cryptogr., 2017

Preserving Local Differential Privacy in Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Cancellable and Privacy-Preserving Facial Biometric Authentication Scheme.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

2016
Survey of return-oriented programming defense mechanisms.
Secur. Commun. Networks, 2016

Privacy Preservation in Location Based Services.
J. Comput., 2016

A Survey of Secure Multiparty Computation Protocols for Privacy Preserving Genetic Tests.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
A 3D modeling approach to complex faults with multi-source data.
Comput. Geosci., 2015

Enhancing and Implementing Fully Transparent Internet Voting.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Temporal coverage based content distribution in heterogeneous smart device networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Behavioral Malware Detection in Delay Tolerant Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method.
IEEE Trans. Computers, 2014

A Two-Stage Deanonymization Attack against Anonymized Social Networks.
IEEE Trans. Computers, 2014

A taxonomy of privilege escalation attacks in Android applications.
Int. J. Secur. Networks, 2014

Analysis and Implementation of Internet Based Remote Voting.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A taxonomy and comparison of remote voting schemes.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces.
Proceedings of the IEEE International Conference on Communications, 2014

2013
The Virtue of Patience: Offloading Topical Cellular Content through Opportunistic Links.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Smartphone strategic sampling in defending enterprise network security.
Proceedings of IEEE International Conference on Communications, 2013

T-dominance: Prioritized defense deployment for BYOD security.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A viewable e-voting scheme for environments with conflict of interest.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Active User Authentication for Mobile Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Secure and privacy-preserving biometrics based active authentication.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

A privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Seed and Grow: An attack against anonymized social networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

2011
New threats to health data privacy.
BMC Bioinform., 2011

Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

A New Approach to Weighted Multi-Secret Sharing.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Biometrics-Based Authentication: A New Approach.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

A New Scheme for Anonymous Secure Group Communication.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Personal genome privacy protection with feature-based hierarchical dual-stage encryption.
Proceedings of the 2011 IEEE International Workshop on Genomic Signal Processing and Statistics, 2011

2010
An efficient scheme for removing compromised sensor nodes from wireless sensor networks.
Secur. Commun. Networks, 2010

Fuzzy Closeness-Based Delegation Forwarding in Delay Tolerant Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

2009
A Proactive Secret Sharing Scheme in matrix projection method.
Int. J. Secur. Networks, 2009

An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy.
Proceedings of the MSN 2009, 2009

A Multiple Secret Sharing Scheme based on Matrix Projection.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
An efficient and attack-resistant key agreement scheme for secure group communications in mobile ad-hoc networks.
Wirel. Commun. Mob. Comput., 2008

A novel Conference Key Management solution for Secure Dynamic Conferencing.
Int. J. Secur. Networks, 2008

A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Notes on the CRTDH Group Key Agreement Protocol.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

A security framework for wireless sensor networks utilizing a unique session key.
Proceedings of the 5th International ICST Conference on Broadband Communications, 2008

Pervasive and Trustworthy Healthcare.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Trust and Security in Collaborative Computing
Computer and Network Security 2, World Scientific, ISBN: 978-981-4476-62-1, 2008

2007
A Hierarchical Modeling and Analysis for Grid Service Reliability.
IEEE Trans. Computers, 2007

A dynamic key management solution to access hierarchy.
Int. J. Netw. Manag., 2007

Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups.
Future Gener. Comput. Syst., 2007

KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Dependability and Security in Medical Information System.
Proceedings of the Human-Computer Interaction. HCI Applications and Services, 2007

2006
An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2006

A New Cryptographic Scheme for Securing Dynamic Conferences in Data Networks.
Proceedings of IEEE International Conference on Communications, 2006

Composing Access Control Policies of Distributed Components.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

2005
An effective method for 3D geological modeling with multi-source data integration.
Comput. Geosci., 2005

KTDCKM-SDC: A Distributed Conference Key Management Scheme for Secure Dynamic Conferencing.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Secure Group Instant Messaging Using Cryptographic Primitives.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A balanced key tree approach for dynamic secure group communication.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2005

2004
A block-free TGDH key agreement protocol for secure group communications.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

A GCD attack resistant CRTHACS for secure group communications.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Simple Group Diffie-Hellman Key Agreement Protocol Without Member Serialization.
Proceedings of the Computational and Information Science, First International Symposium, 2004

2002
Efficient Key Management for Secure Group Communications with Bursty Behavior.
Proceedings of the IASTED International Conference on Communications, 2002

2001
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Hierarchy-based access control in distributed environments.
Proceedings of the IEEE International Conference on Communications, 2001


  Loading...