Haojin Zhu

According to our database1, Haojin Zhu authored at least 149 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Privacy-Preserving Task Scheduling for Time-Sharing Services of Autonomous Vehicles.
IEEE Trans. Vehicular Technology, 2019

Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic.
IEEE Trans. Vehicular Technology, 2019

Smart contract for secure billing in ride-hailing service via blockchain.
Peer-to-Peer Networking and Applications, 2019

Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing.
Inf. Sci., 2019

Achieving Differentially Private Location Privacy in Edge-Assistant Connected Vehicles.
IEEE Internet of Things Journal, 2019

Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT.
IEEE Internet of Things Journal, 2019

Invisible Backdoor Attacks Against Deep Neural Networks.
CoRR, 2019

Securing android applications via edge assistant third-party library detection.
Computers & Security, 2019

EdgeSense: Edge-Mediated Spatial- Temporal Crowdsensing.
IEEE Access, 2019

Who Leaks My Privacy: Towards Automatic and Association Detection with GDPR Compliance.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Automated and Personalized Privacy Policy Extraction Under GDPR Consideration.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

No-jump-into-latency in China's internet!: toward last-mile hop count based IP geo-localization.
Proceedings of the International Symposium on Quality of Service, 2019

Dynamic Traffic Feature Camouflaging via Generative Adversarial Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures.
IEEE Wireless Commun., 2018

Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel.
IEEE Trans. Vehicular Technology, 2018

Demographic Information Inference through Meta-Data Analysis of Wi-Fi Traffic.
IEEE Trans. Mob. Comput., 2018

Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices.
IEEE Trans. Information Forensics and Security, 2018

Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense.
IEEE Trans. Dependable Sec. Comput., 2018

Differentially Private Data Generative Models.
CoRR, 2018

Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Computers & Security, 2018

Modeling Privacy Leakage Risks in Large-Scale Social Networks.
IEEE Access, 2018

Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

APPCLASSIFIER: Automated App Inference on Encrypted Traffic via Meta Data Analysis.
Proceedings of the IEEE Global Communications Conference, 2018

Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism.
Proceedings of the IEEE Global Communications Conference, 2018

HoMonit: Monitoring Smart Home Apps from Encrypted Traffic.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks.
IEEE Trans. Mob. Comput., 2017

NFC Secure Payment and Verification Scheme with CS E-Ticket.
Security and Communication Networks, 2017

Guest editorial: Special issue on algorithms, systems and applications in mobile social networks.
Peer-to-Peer Networking and Applications, 2017

SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud.
IEEE Internet of Things Journal, 2017

Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design.
IEICE Transactions, 2017

Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
CoRR, 2017

Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach.
CoRR, 2017

Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Security Modeling and Analysis on Intra Vehicular Network.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Speed-Based Location Tracking in Usage-Based Automotive Insurance.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Fake reviews tell no tales? Dissecting click farming in content-generated social networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

A Functional Co-Design towards Safe and Secure Vehicle Platooning.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Hybrid de-anonymization across real-world heterogeneous social networks.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks.
Security and Communication Networks, 2016

Cyber security, crime, and forensics of wireless networks and applications.
Security and Communication Networks, 2016

You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing.
IEEE Journal on Selected Areas in Communications, 2016

Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks.
IEEE Internet of Things Journal, 2016

NFC Secure Payment and Verification Scheme for Mobile Payment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Automatic Detection of SIP-Aware Attacks on VoLTE Device.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Demographics inference through Wi-Fi network traffic analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Efficient and secure message authentication in cooperative driving: A game-theoretic approach.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Traffic Based Lightweight Attack Detection Scheme for VoLTE.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Quality of experience and quality of protection provisions in emerging mobile networks [Guest Editorial].
IEEE Wireless Commun., 2015

Guest editorial: Security and privacy of P2P networks in emerging smart city.
Peer-to-Peer Networking and Applications, 2015

A novel design for content delivery over software defined mobile social networks.
IEEE Network, 2015

Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

De-anonymizing social networks: Using user interest as a side-channel.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Optimal strategies for defending location inference attack in database-driven CRNs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

UAV-assisted data gathering in wireless sensor networks.
The Journal of Supercomputing, 2014

Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid.
IEEE Systems Journal, 2014

An attack-and-defence game for security assessment in vehicular ad hoc networks.
Peer-to-Peer Networking and Applications, 2014

Constant-round adaptive zero-knowledge proofs for NP.
Inf. Sci., 2014

Security and privacy for storage and computation in cloud computing.
Inf. Sci., 2014

HVSTO: Efficient Privacy Preserving Hybrid Storage in Cloud Data Center.
CoRR, 2014

RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks.
Computing, 2014

Multicloud-Based Evacuation Services for Emergency Management.
IEEE Cloud Computing, 2014

A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

All your location are belong to us: breaking mobile social networks for automated user location tracking.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Where are you from?: confusing location distinction using virtual multipath camouflage.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Achieving privacy preservation in WiFi fingerprint-based localization.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

HVSTO: Efficient privacy preserving hybrid storage in cloud data center.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

You are where you have been: Sybil detection via geo-location analysis in OSNs.
Proceedings of the IEEE Global Communications Conference, 2014

Sybil-aware least cost rumor blocking in social networks.
Proceedings of the IEEE Global Communications Conference, 2014

POSTER: LocMask: A Location Privacy Protection Framework in Android System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Security Assessment in Vehicular Networks.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-9357-0, 2013

MixZone in Motion: Achieving Dynamically Cooperative Location Privacy Protection in Delay-Tolerant Networks.
IEEE Trans. Vehicular Technology, 2013

Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks.
IEEE Trans. Emerging Topics Comput., 2013

Security in cognitive radio networks [Guest Editorial].
IEEE Network, 2013

A Secure and Efficient Data Aggregation Framework in Vehicular Sensing Networks.
IJDSN, 2013

All Your Location are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking.
CoRR, 2013

SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs.
Ad Hoc & Sensor Wireless Networks, 2013

A localized backbone renovating algorithm for wireless ad hoc and sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Mutual privacy-preserving regression modeling in participatory sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

YouSense: Mitigating entropy selfishness in distributed collaborative spectrum sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A Scalable and Privacy-Preserving Named Data Networking Architecture Based on Bloom Filters.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio Network.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Detecting GPS information leakage in Android applications.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Security and privacy of collaborative spectrum sensing in cognitive radio networks.
IEEE Wireless Commun., 2012

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

Securing smart grid: cyber attacks, countermeasures, and challenges.
IEEE Communications Magazine, 2012

Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Location privacy preservation in collaborative spectrum sensing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Towards a game theoretical modeling of rational collaborative spectrum sensing in Cognitive Radio networks.
Proceedings of IEEE International Conference on Communications, 2012

PMDS: A probabilistic misbehavior detection scheme in DTN.
Proceedings of IEEE International Conference on Communications, 2012

Towards addressing group selfishness of cluster-based collaborative spectrum sensing in cognitive radio networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An Adaptive Deviation-tolerant Secure Scheme for distributed cooperative spectrum sensing.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

PriMatch: Fairness-aware secure friend discovery protocol in mobile social network.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Location privacy leaking from spectrum utilization information in database-driven cognitive radio network.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks.
IEEE Trans. Wireless Communications, 2011

: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2011

Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing
CoRR, 2011

Automatic inference of movements from contact histories.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs.
Proceedings of IEEE International Conference on Communications, 2011

Believe Yourself: A User-Centric Misbehavior Detection Scheme for Secure Collaborative Spectrum Sensing.
Proceedings of IEEE International Conference on Communications, 2011

MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks.
Proceedings of the Global Communications Conference, 2011

How to design space efficient revocable IBE from non-monotonic ABE.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011

2010
Pi: a practical incentive protocol for delay tolerant networks.
IEEE Trans. Wireless Communications, 2010

PIE: cooperative peer-to-peer information exchange in network coding enabled wireless networks.
IEEE Trans. Wireless Communications, 2010

An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications.
IEEE Trans. Vehicular Technology, 2010

An efficient dynamic-identity based signature scheme for secure network coding.
Computer Networks, 2010

An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

SecCloud: Bridging Secure Storage and Computation in Cloud.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

SAS: A Secure Data Aggregation Scheme in Vehicular Sensing Networks.
Proceedings of IEEE International Conference on Communications, 2010

How to Construct Interval Encryption from Binary Tree Encryption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Security in service-oriented vehicular networks.
IEEE Wireless Commun., 2009

PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks.
IEEE Trans. Vehicular Technology, 2009

SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks.
IEEE Trans. Vehicular Technology, 2009

A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy.
IEEE Trans. Vehicular Technology, 2009

SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Cooperative Peer-to-Peer Information Exchange via Wireless Network Coding.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
SLAB: A secure localized authentication and billing scheme for wireless mesh networks.
IEEE Trans. Wireless Communications, 2008

A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks.
IJSN, 2008

Security in vehicular ad hoc networks.
IEEE Communications Magazine, 2008

A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A New Dynamic Group Key Management Scheme with Low Rekeying Cost.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2008

Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings.
Proceedings of IEEE International Conference on Communications, 2008

BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
An enhanced authenticated key agreement protocol for wireless mobile communication.
Computer Standards & Interfaces, 2007

TTP Based Privacy Preserving Inter-WISP Roaming Architecture for Wireless Metropolitan Area Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Two-Factor Localized Authentication Scheme for WLAN Roaming.
Proceedings of IEEE International Conference on Communications, 2007

ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

Secure Localized Authentication and Billing for Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007

2006
Provably secure robust threshold partial blind signature.
Science in China Series F: Information Sciences, 2006

A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
A robust (k, n) + 1 threshold proxy signature scheme based on factoring.
Applied Mathematics and Computation, 2005


  Loading...