Haotian Chi

Orcid: 0000-0002-0222-4660

According to our database1, Haotian Chi authored at least 29 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Sample Efficient Offline-to-Online Reinforcement Learning.
IEEE Trans. Knowl. Data Eng., March, 2024

Perception-oriented generative adversarial network for retinal fundus image super-resolution.
Comput. Biol. Medicine, January, 2024

2023
Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes.
Proceedings of the 32nd USENIX Security Symposium, 2023

No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

EAKM: Efficient Conditional Privacy-Preserving Authentication Scheme with On-Chain Key Management in VANETs.
Proceedings of the IEEE Global Communications Conference, 2023

DCAMM: Dynamic Curve-Based Automated Market Maker.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

DICE-Enabled Distributed Security Schemes for the Air Force Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2022

IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems.
CoRR, 2019

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
CoRR, 2019

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
IEEE Access, 2019

2018
A Secure Proxy-based Access Control Scheme for Implantable Medical Devices.
CoRR, 2018

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins.
IEEE Trans. Veh. Technol., 2017

2016
Personalized Location Recommendations with Local Feature Awareness.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Privacy-preserving use of genomic data on mobile devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Cloud-assisted privacy-preserving genetic paternity test.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Lightweight and privacy-preserving agent data transmission for mobile Healthcare.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Verification of Boolean Queries over Outsourced Encrypted Data Based on Counting Bloom Filter.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Privacy and Authentication Protocol for Mobile RFID Systems.
Wirel. Pers. Commun., 2014

Using dynamic pseudo-IDs to protect privacy in location-based services.
Proceedings of the IEEE International Conference on Communications, 2014

Two-party and multi-party private matching for proximity-based mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014

2013
3PLUS: Privacy-preserving pseudo-location updating system in location-based services.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

MobiCache: When k-anonymity meets cache.
Proceedings of the 2013 IEEE Global Communications Conference, 2013


  Loading...