Ye Zhu
Orcid: 0000-0001-6459-204XAffiliations:
- Cleveland State University, Department of Electrical Engineering and Computer Science, OH, USA
- Texas A&M University, College Station, TX, USA (PhD)
According to our database1,
Ye Zhu
authored at least 60 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Cross Body Signal Pairing (CBSP): A Key Generation Protocol for Pairing Wearable Devices with Cardiac and Respiratory Sensors.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Generalizing Direct Sequence Spread-Spectrum to Mitigate Autocorrelation-Based Attacks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
CoRR, 2021
Proceedings of the International Symposium on Networks, Computers and Communications, 2021
Identifying Account Association with Assistance from Mobile Networks using Cross-Service Attacks.
Proceedings of the ICC 2021, 2021
2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
IEEE Access, 2018
RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017
Location Privacy, Application Overhead and Congestion in VANET Location Based Services.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
2016
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
2015
Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
IEEE Trans. Wirel. Commun., 2014
IEEE Trans. Intell. Transp. Syst., 2014
Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services.
Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, 2014
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014
2013
Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications.
Int. J. Interdiscip. Telecommun. Netw., 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs).
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012
2011
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
2010
IEEE Trans. Parallel Distributed Syst., 2010
Int. J. Data Min. Model. Manag., 2010
Proceedings of the Information Security - 13th International Conference, 2010
2009
IEEE Trans. Parallel Distributed Syst., 2009
ACM Trans. Inf. Syst. Secur., 2009
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks.
Int. J. Netw. Secur., 2008
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008
2007
Int. J. Secur. Networks, 2007
Compromising Location Privacy inWireless Networks Using Sensors with Limited Information.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004