Kui Ren

According to our database1, Kui Ren authored at least 256 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Toward Hardware-Rooted Smartphone Authentication.
IEEE Wireless Commun., 2019

Privacy-Preserving Truth Discovery in Crowd Sensing Systems.
TOSN, 2019

TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints.
IEEE/ACM Trans. Netw., 2019

Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones.
IEEE Trans. Mob. Comput., 2019

GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy.
IEEE Trans. Information Forensics and Security, 2019

CIM: Camera in Motion for Smartphone Authentication.
IEEE Trans. Information Forensics and Security, 2019

PriWhisper+: An Enhanced Acoustic Short-Range Communication System for Smartphones.
IEEE Internet of Things Journal, 2019

EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics.
IEEE Internet of Things Journal, 2019

Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet of Things Journal, 2019

RFL: Robust fault localization on unreliable communication channels.
Computer Networks, 2019

FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

PeDSS: Privacy Enhanced and Database-Driven Dynamic spectrum Sharing.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Data Poisoning Attack against Knowledge Graph Embedding.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Distributionally Adversarial Attack.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback.
IEEE Trans. Wireless Communications, 2018

Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters.
IEEE Trans. Smart Grid, 2018

Security and Cloud Outsourcing Framework for Economic Dispatch.
IEEE Trans. Smart Grid, 2018

Enabling Generic, Verifiable, and Secure Data Search in Cloud Services.
IEEE Trans. Parallel Distrib. Syst., 2018

Secure Integrated Circuit Design via Hybrid Cloud.
IEEE Trans. Parallel Distrib. Syst., 2018

Security Policy Violations in SDN Data Plane.
IEEE/ACM Trans. Netw., 2018

Middlebox-Based Packet-Level Redundancy Elimination Over Encrypted Network Traffic.
IEEE/ACM Trans. Netw., 2018

Towards Privacy-Preserving and Practical Image-Centric Social Discovery.
IEEE Trans. Dependable Sec. Comput., 2018

Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.
IEEE Trans. Dependable Sec. Comput., 2018

Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing.
IEEE Trans. Cloud Computing, 2018

Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond.
IEEE Network, 2018

A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.
IEEE Network, 2018

My Smartphone Recognizes Genuine QR Codes!: Practical Unclonable QR Code via 3D Printing.
IMWUT, 2018

Practical Secure Computation Outsourcing: A Survey.
ACM Comput. Surv., 2018

Privacy-preserving power usage and supply control in smart grid.
Computers & Security, 2018

Privacy-Preserving Image Processing in the Cloud.
IEEE Cloud Computing, 2018

ABC: Enabling Smartphone Authentication with Built-in Camera.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Building Generic Scalable Middlebox Services Over Encrypted Protocols.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards Privacy-Preserving Malware Detection Systems for Android.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017

Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures.
IEEE/ACM Trans. Netw., 2017

Capability-Based Security Enforcement in Named Data Networking.
IEEE/ACM Trans. Netw., 2017

SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox.
IEEE/ACM Trans. Netw., 2017

Software Defined Cooperative Offloading for Mobile Cloudlets.
IEEE/ACM Trans. Netw., 2017

THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply.
IEEE Trans. Mob. Comput., 2017

DPPro: Differentially Private High-Dimensional Data Release via Random Projection.
IEEE Trans. Information Forensics and Security, 2017

Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data.
IEEE Trans. Information Forensics and Security, 2017

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Information Forensics and Security, 2017

Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Network, 2017

P2-SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System.
IEEE Journal on Selected Areas in Communications, 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2.
IEEE Communications Magazine, 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1.
IEEE Communications Magazine, 2017

User Capacity of Wireless Physical-Layer Identification.
IEEE Access, 2017

Data Independent Identification for Privacy Preservation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Privacy-Preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Understanding the Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Defending against Speaker Fingerprinting Based Device Tracking for Smartphones.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Proceedings of the Financial Cryptography and Data Security, 2017

Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

MINOS: regulating router dataplane actions in dynamic runtime environments.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks.
IEEE Trans. Vehicular Technology, 2016

Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement.
IEEE Trans. Parallel Distrib. Syst., 2016

SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing.
TOMCCAP, 2016

Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multimedia, 2016

DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud.
IEEE Trans. Multimedia, 2016

Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.
IEEE Trans. Image Processing, 2016

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.
IEEE Trans. Information Forensics and Security, 2016

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2016

Wireless Physical-Layer Identification: Modeling and Validation.
IEEE Trans. Information Forensics and Security, 2016

Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.
IEEE Trans. Information Forensics and Security, 2016

Password Extraction via Reconstructed Wireless Mouse Trajectory.
IEEE Trans. Dependable Sec. Comput., 2016

Guest Editorial: Introduction to the Special Section on Emerging Security Trends for Biomedical Computations, Devices, and Infrastructures.
IEEE/ACM Trans. Comput. Biology Bioinform., 2016

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming.
IEEE Trans. Computers, 2016

Special Issue on Security and Privacy in Mobile Clouds.
Pervasive and Mobile Computing, 2016

Securing acoustics-based short-range communication systems: an overview.
J. Comm. Inform. Networks, 2016

Ensuring Security and Privacy Preservation for Cloud Data Services.
ACM Comput. Surv., 2016

Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2016

P2-SAS: preserving users' privacy in centralized dynamic spectrum access systems.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Real-time hidden acoustic signal capture with smartphones: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Messages behind the sound: real-time hidden acoustic signal capture with smartphones.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

EyeVeri: A secure and usable approach for smartphone user authentication.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

On the synchronization bottleneck of OpenStack Swift-like cloud storage systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

User capacity of wireless physical-layer identification: An information-theoretic perspective.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016

Increasing User Capacity of Wireless Physical-Layer Identification in Internet of Things.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud.
IEEE Trans. Parallel Distrib. Syst., 2015

Enabling Cloud Storage Auditing With Key-Exposure Resistance.
IEEE Trans. Information Forensics and Security, 2015

Security and privacy in emerging networks: Part II [Guest Editorial].
IEEE Communications Magazine, 2015

Security and privacy in emerging networks: Part 1 [Guest Editorial].
IEEE Communications Magazine, 2015

GREP: Guaranteeing Reliability with Enhanced Protection in NFV.
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 2015

Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Rise of Mini-Drones: Applications and Issues.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015

Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.
Proceedings of the Computer Security - ESORICS 2015, 2015

Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Enabling IP Protection for Outsourced Integrated Circuit Design.
Proceedings of the 10th ACM Symposium on Information, 2015

Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible.
Proceedings of the 10th ACM Symposium on Information, 2015

Secure Outsourcing Image Feature Extraction: Challenges and Solutions.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Securing emerging short range wireless communications: the state of the art.
IEEE Wireless Commun., 2014

Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets.
IEEE Trans. Parallel Distrib. Syst., 2014

Proof-Carrying Cloud Computation: The Case of Convex Optimization.
IEEE Trans. Information Forensics and Security, 2014

PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications.
IEEE Trans. Dependable Sec. Comput., 2014

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IEEE Internet of Things Journal, 2014

Guest Editorial Special Issue on Security for IoT: The State of the Art.
IEEE Internet of Things Journal, 2014

Editorial: IEEE Communications Surveys & TutorialsSpecial Section on Energy and Smart Grid.
IEEE Communications Surveys and Tutorials, 2014

All your location are belong to us: breaking mobile social networks for automated user location tracking.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

SBVLC: Secure barcode-based visible light communication for smartphones.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Enabling efficient access control with dynamic policy updating for big data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Private image computation: The case of cloud based privacy-preserving SIFT.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Enabling private and non-intrusive smartphone calls with LipTalk.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

The power of indoor crowd: Indoor 3D maps from the crowd.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

AcousAuth: An acoustic-based mobile application for user authentication.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Enabling Privacy-Preserving Image-Centric Social Discovery.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Privacy-preserving outsourcing of image global feature detection.
Proceedings of the IEEE Global Communications Conference, 2014

Blind Recognition of Touched Keys on Mobile Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: LocMask: A Location Privacy Protection Framework in Android System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Opportunistic spectrum access: from stochastic channels to non-stochastic channels.
IEEE Wireless Commun., 2013

Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations.
IEEE Trans. Parallel Distrib. Syst., 2013

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
IEEE Trans. Parallel Distrib. Syst., 2013

Secure ad hoc trust initialization and key management in wireless body area networks.
TOSN, 2013

DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems.
IEEE Trans. Information Forensics and Security, 2013

Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud.
IEEE Trans. Emerging Topics Comput., 2013

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IEEE Trans. Computers, 2013

Security in cognitive radio networks [Guest Editorial].
IEEE Network, 2013

Toward privacy-assured and searchable cloud data storage services.
IEEE Network, 2013

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IACR Cryptology ePrint Archive, 2013

Effective signal region based analog mixed signal design considering variations and applications.
Proceedings of the 2013 IEEE International SOC Conference, Erlangen, Germany, 2013

A new data acquisition design for breast cancer detection system.
Proceedings of the 2013 IEEE International SOC Conference, Erlangen, Germany, 2013

How Privacy Leaks From Bluetooth Mouse?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

DAC-MACS: Effective data access control for multi-authority cloud storage systems.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Proof-carrying cloud computation: The case of convex optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Optimal budget deployment strategy against power grid interdiction.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.
Proceedings of the Financial Cryptography and Data Security, 2013

Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Attribute-based fine-grained access control with efficient revocation in cloud storage systems.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks.
IEEE Trans. Wireless Communications, 2012

Towards Optimal Electric Demand Management for Internet Data Centers.
IEEE Trans. Smart Grid, 2012

Toward Secure and Dependable Storage Services in Cloud Computing.
IEEE Trans. Services Computing, 2012

Distributed Privacy-Preserving Access Control in Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

Quantitative Analysis of Load Redistribution Attacks in Power Systems.
IEEE Trans. Parallel Distrib. Syst., 2012

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.
IEEE Trans. Parallel Distrib. Syst., 2012

Toward secure and effective data utilization in public cloud.
IEEE Network, 2012

Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication.
IEEE Journal on Selected Areas in Communications, 2012

Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels.
IEEE Journal on Selected Areas in Communications, 2012

Security Challenges for the Public Cloud.
IEEE Internet Computing, 2012

k-Indistinguishable Traffic Padding in Web Applications.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Joint UFH and power control for effective wireless anti-jamming communication.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Locating malicious nodes for data aggregation in wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Achieving usable and privacy-assured similarity search over outsourced cloud data.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

When cloud meets eBay: Towards effective pricing for cloud computing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Privacy-Preserving Authentication in Wireless Access Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Device Pairing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secret key generation exploiting channel characteristics in wireless communications.
IEEE Wireless Commun., 2011

Modeling Load Redistribution Attacks in Power Systems.
IEEE Trans. Smart Grid, 2011

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distrib. Syst., 2011

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
TOSN, 2011

Enhancing Attribute-Based Encryption with Attribute Hierarchy.
MONET, 2011

Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Wireless key establishment with asynchronous clocks.
Proceedings of the MILCOM 2011, 2011

Delay-bounded adaptive UFH-based anti-jamming wireless communication.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Fast and scalable secret key generation exploiting channel phase randomness in wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Secure and practical outsourcing of linear programming in cloud computing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Privacy-preserving multi-keyword ranked search over encrypted cloud data.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Anti-jamming communication in cognitive radio networks with unknown channel statistics.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Towards Secure and Effective Utilization over Encrypted Cloud Data.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

PEKSrand: Providing Predicate Privacy in Public-Key Encryption with Keyword Search.
Proceedings of IEEE International Conference on Communications, 2011

Jamming-Resilient Dynamic Spectrum Access for Cognitive Radio Networks.
Proceedings of IEEE International Conference on Communications, 2011

2010
Data security and privacy in wireless body area networks.
IEEE Wireless Commun., 2010

PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
IEEE Trans. Parallel Distrib. Syst., 2010

PCM: a privacy-preserving detection mechanism in mobile ad hoc networks.
Security and Communication Networks, 2010

Toward publicly auditable secure cloud data storage services.
IEEE Network, 2010

Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Proceedings of the Security and Privacy in Communication Networks, 2010

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Secure Ranked Keyword Search over Encrypted Cloud Data.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

Attribute based data sharing with attribute revocation.
Proceedings of the 5th ACM Symposium on Information, 2010

Attribute-based signature and its applications.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply.
Wireless Networks, 2009

Security, privacy, and accountability in wireless access networks.
IEEE Wireless Commun., 2009

Multi-User Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Vehicular Technology, 2009

Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation.
IEEE Trans. Vehicular Technology, 2009

On Address Privacy in Mobile Ad Hoc Networks.
MONET, 2009

The ring authenticated encryption scheme - How to provide a clue wisely.
Inf. Sci., 2009

Enabling Public Verifiability and Data Dynamics for Storage Security.
IACR Cryptology ePrint Archive, 2009

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IACR Cryptology ePrint Archive, 2009

Enhancing Attribute-based Encryption with Attribute Hierarchy.
IACR Cryptology ePrint Archive, 2009

Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
IACR Cryptology ePrint Archive, 2009

A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control.
IACR Cryptology ePrint Archive, 2009

A New Approach to Malware Detection.
Proceedings of the Advances in Information Security and Assurance, 2009

Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.
Proceedings of the Security and Privacy in Communication Networks, 2009

Ensuring data storage security in Cloud Computing.
Proceedings of the 17th International Workshop on Quality of Service, 2009

Privacy-Aware Attribute-Based Encryption with User Accountability.
Proceedings of the Information Security, 12th International Conference, 2009

DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009

Anonymous user communication for privacy protection in wireless metropolitan mesh networks.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2008

A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Anonymous ID-Based Group Key Agreement for Wireless Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy.
Proceedings of the Wireless Algorithms, 2008

Attribute-based on-demand multicast group setup with membership anonymity.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Towards address privacy in mobile ad hoc networks.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Efficient user revocation for privacy-aware PKI.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Anonymous Misbehavior Detection in Mobile Ad Hoc Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Optimized User Revocation for Group Signature Based Privacy-Aware PKI.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Time-Slotted Round-Trip Carrier Synchronization in Large-Scale Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2008

Multicast with an Application-Oriented Networking (AON) Approach.
Proceedings of IEEE International Conference on Communications, 2008

Towards Secure Link Quality Measurement in Multihop Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
On Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2007

Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability.
MONET, 2007

Multi-user Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

2006
A new approach for random key pre-distribution in large-scale wireless sensor networks.
Wireless Communications and Mobile Computing, 2006

A novel privacy preserving authentication and access control scheme for pervasive computing environments.
IEEE Trans. Vehicular Technology, 2006

Routing optimization security in mobile IPv6.
Computer Networks, 2006

On Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Fault-tolerant Event Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Privacy enhanced access control in pervasive computing environments.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

2004
Highly reliable trust establishment scheme in ad hoc networks.
Computer Networks, 2004

An enhanced lightweight authentication protocol for access control in wireless LANs.
Proceedings of the 12th IEEE International Conference on Networks, 2004


  Loading...