Ye Zhu

Orcid: 0000-0001-6459-204X

Affiliations:
  • Cleveland State University, Department of Electrical Engineering and Computer Science, OH, USA
  • Texas A&M University, College Station, TX, USA (PhD)


According to our database1, Ye Zhu authored at least 60 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On Account Association With Assistance From Mobile Networks.
IEEE Trans. Dependable Secur. Comput., 2023

A Survey of Wearable Devices Pairing Based on Biometric Signals.
IEEE Access, 2023

Compromising Random Linear Network Coding as A Cipher.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Cross Body Signal Pairing (CBSP): A Key Generation Protocol for Pairing Wearable Devices with Cardiac and Respiratory Sensors.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Generalizing Direct Sequence Spread-Spectrum to Mitigate Autocorrelation-Based Attacks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

2021
Towards Smartphone Operating System Identification.
IEEE Trans. Dependable Secur. Comput., 2021

Breath to Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices.
CoRR, 2021

Real Time Video based Heart and Respiration Rate Monitoring.
CoRR, 2021

Extending Direct Sequence Spread-Spectrum for Secure Communication.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

Identifying Account Association with Assistance from Mobile Networks using Cross-Service Attacks.
Proceedings of the ICC 2021, 2021

2019
HECTor: Homomorphic Encryption Enabled Onion Routing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices.
IEEE Access, 2018

RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Location Privacy Challenges in Spatial Crowdsourcing.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

DOPA: Detecting Open Ports in Android OS.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Multi-asymmetric cryptographic RSA scheme.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Location Privacy, Application Overhead and Congestion in VANET Location Based Services.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

Ambiguous Multi-symmetric Cryptography Proof of Concept and Experiments.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

Web Application Security Tools Analysis.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

2016
Implicit Authentication for Mobile Devices Using Typing Behavior.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Smartphone reconnaissance: Operating system identification.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Operating System Fingerprinting.
Proceedings of the Digital Fingerprinting, 2016

2015
MAPS: A Multi-Dimensional Password Scheme for Mobile Authentication.
Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces, 2015

Ambiguous Multi-Symmetric Cryptography.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2014

On Topology of Sensor Networks Deployed for Multitarget Tracking.
IEEE Trans. Intell. Transp. Syst., 2014

Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services.
Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, 2014

Evaluation of active position detection in Vehicular Ad Hoc Networks.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

2013
Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications.
Int. J. Interdiscip. Telecommun. Netw., 2013

2012
On Privacy of Encrypted Speech Communications.
IEEE Trans. Dependable Secur. Comput., 2012

On tracking multiple indistinguishable targets.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs).
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

Attacks and countermeasures in wireless cellular networks.
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

2011
Preserving Privacy in Time Series Data Mining.
Int. J. Data Warehous. Min., 2011

Traffic analysis attacks on Skype VoIP calls.
Comput. Commun., 2011

On Topology of Sensor Networks Deployed for Tracking.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Enhancing unlinkability in Vehicular Ad Hoc Networks.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

2010
Correlation-Based Traffic Analysis Attacks on Anonymity Networks.
IEEE Trans. Parallel Distributed Syst., 2010

On privacy-preserving time series data classification.
Int. J. Data Min. Model. Manag., 2010

A new class of attacks on time series data mining\m{1}.
Intell. Data Anal., 2010

On Privacy Leakage through Silence Suppression.
Proceedings of the Information Security - 13th International Conference, 2010

2009
On traffic analysis in anonymous communication networks.
PhD thesis, 2009

Information Leakage as a Model for Quality of Anonymity Networks.
IEEE Trans. Parallel Distributed Syst., 2009

Compromising anonymous communication systems using blind source separation.
ACM Trans. Inf. Syst. Secur., 2009

Preserving Privacy in Time Series Data Classification by Discretization.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009

On Privacy of Skype VoIP Calls.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Security Threats and Countermeasures for Intra-vehicle Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Position Verification in Multi-hop Vehicular Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks.
Int. J. Netw. Secur., 2008

On Privacy in Time Series Data Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008

2007
Analysis of flow-correlation attacks in anonymity network.
Int. J. Secur. Networks, 2007

Compromising Location Privacy inWireless Networks Using Sensors with Limited Information.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2005
Unmixing Mix Traffic.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Anonymity vs. Information Leakage in Anonymity Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

On Flow Marking Attacks in Wireless Anonymous Communication Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

SAS: A Scalar Anonymous Communication System.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Anonymity analysis of mix networks against flow-correlation attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
On Flow Correlation Attacks and Countermeasures in Mix Networks.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004


  Loading...