Bo Chen
Orcid: 0000-0001-9372-9607Affiliations:
- Michigan Technological University, Department of Computer Science, Houghton, USA
- New Jersey Institute of Technology, Newark, NJ, USA (PhD 2014)
According to our database1,
Bo Chen
authored at least 38 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on mtu.edu
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IEEE Internet Things J., April, 2025
J. Inf. Secur. Appl., 2025
2024
Discov. Internet Things, December, 2024
Enabling per-file data recovery from ransomware attacks via file system forensics and flash translation layer data extraction.
Cybersecur., December, 2024
IEEE Trans. Inf. Forensics Secur., 2024
J. Cybersecur. Priv., 2024
A Simple Mobile Plausibly Deniable System Using Image Steganography and Secure Hardware.
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023
2022
Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration.
J. Cybersecur. Priv., May, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage.
Inf., 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the 6th IEEE/ACM Symposium on Edge Computing, 2021
Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
IEEE Internet Things Mag., 2020
2019
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Ensuring data confidentiality via plausibly deniable encryption and secure deletion - a survey.
Cybersecur., 2018
2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010