% csauthors.net - beta - BibTeX bibliography of Kui Ren 001
@inproceedings{conf/acns/YaoRBDF03,
title = {Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.},
year = {2003},
booktitle = {ACNS},
author = {{Gang Yao} and {Kui Ren 001} and {Feng Bao 001} and {Robert H. Deng} and {Dengguo Feng}},
publisher = {Springer},
booktitle = {Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings}
}
@inproceedings{conf/icon/RenLHPK04,
title = {An enhanced lightweight authentication protocol for access control in wireless LANs.},
year = {2004},
booktitle = {ICON},
author = {{Kui Ren 001} and {Hyunrok Lee} and {Kyusuk Han} and {Jaemin Park} and {Kwangjo Kim}},
publisher = {IEEE},
booktitle = {12th IEEE International Conference on Networks, ICON 2004, Singapore, November 16-19 2004}
}
@inproceedings{conf/wisa/RenLKY04,
title = {Efficient Authenticated Key Agreement Protocol for Dynamic Groups.},
year = {2004},
booktitle = {WISA},
author = {{Kui Ren 001} and {Hyunrok Lee} and {Kwangjo Kim} and {Taewhan Yoo}},
publisher = {Springer},
booktitle = {Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}
}
@article{journals/cn/RenLWBDK04,
title = {Highly reliable trust establishment scheme in ad hoc networks.},
year = {2004},
journal = {Comput. Networks},
author = {{Kui Ren 001} and {Tieyan Li} and {Zhiguo Wan} and {Feng Bao 001} and {Robert H. Deng} and {Kwangjo Kim}}
}
@inproceedings{conf/broadnets/RenL05,
title = {Privacy enhanced access control in pervasive computing environments.},
year = {2005},
booktitle = {BROADNETS},
author = {{Kui Ren 001} and {Wenjing Lou}},
publisher = {IEEE},
booktitle = {2nd International Conference on Broadband Networks (BROADNETS 2005), 3-7 October 2005, Boston, Massachusetts, USA}
}
@inproceedings{conf/globecom/RenZL06,
title = {Fault-tolerant Event Boundary Detection in Wireless Sensor Networks.},
year = {2006},
booktitle = {GLOBECOM},
author = {{Kui Ren 001} and {Kai Zeng 001} and {Wenjing Lou}},
publisher = {IEEE},
booktitle = {Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November - 1 December 2006}
}
@inproceedings{conf/qshine/ZengRLM06,
title = {Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply.},
year = {2006},
booktitle = {QSHINE},
author = {{Kai Zeng 001} and {Kui Ren 001} and {Wenjing Lou} and {Patrick J. Moran}},
publisher = {ACM},
booktitle = {3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, QSHINE 2006, Waterloo, Canada, August 7-9, 2006}
}
@article{journals/cn/RenLZBZD06,
title = {Routing optimization security in mobile IPv6.},
year = {2006},
journal = {Comput. Networks},
author = {{Kui Ren 001} and {Wenjing Lou} and {Kai Zeng 001} and {Feng Bao 001} and {Jianying Zhou 001} and {Robert H. Deng}}
}
@article{journals/tvt/RenLKD06,
title = {A novel privacy preserving authentication and access control scheme for pervasive computing environments.},
year = {2006},
journal = {IEEE Trans. Veh. Technol.},
author = {{Kui Ren 001} and {Wenjing Lou} and {Kwangjo Kim} and {Robert H. Deng}}
}
@article{journals/wicomm/RenZL06,
title = {A new approach for random key pre-distribution in large-scale wireless sensor networks.},
year = {2006},
journal = {Wirel. Commun. Mob. Comput.},
author = {{Kui Ren 001} and {Kai Zeng 001} and {Wenjing Lou}}
}
@inproceedings{conf/secon/RenLZ07,
title = {Multi-user Broadcast Authentication in Wireless Sensor Networks.},
year = {2007},
booktitle = {SECON},
author = {{Kui Ren 001} and {Wenjing Lou} and {Yanchao Zhang}},
publisher = {IEEE},
booktitle = {Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2007, Merged with IEEE International Workshop on Wireless Ad-hoc and Sensor Networks (IWWAN), June 18-21, 2007, San Diego, California, USA}
}
@article{journals/monet/RenL07,
title = {Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability.},
year = {2007},
journal = {Mob. Networks Appl.},
author = {{Kui Ren 001} and {Wenjing Lou}}
}
@article{journals/twc/RenLZM07,
title = {On Broadcast Authentication in Wireless Sensor Networks.},
year = {2007},
journal = {IEEE Trans. Wirel. Commun.},
author = {{Kui Ren 001} and {Wenjing Lou} and {Kai Zeng 001} and {Patrick J. Moran}}
}
@inproceedings{conf/globecom/HaoCR08,
title = {Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs.},
year = {2008},
booktitle = {GLOBECOM},
author = {{Yong Hao} and {Yu Cheng 003} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008}
}
@inproceedings{conf/globecom/ZengYRLZ08,
title = {Towards Secure Link Quality Measurement in Multihop Wireless Networks.},
year = {2008},
booktitle = {GLOBECOM},
author = {{Kai Zeng 001} and {Shucheng Yu} and {Kui Ren 001} and {Wenjing Lou} and {Yanchao Zhang}},
publisher = {IEEE},
booktitle = {Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008}
}
@inproceedings{conf/icc/TianCRL08,
title = {Multicast with an Application-Oriented Networking (AON) Approach.},
year = {2008},
booktitle = {ICC},
author = {{Xiaohua Tian} and {Yu Cheng 003} and {Kui Ren 001} and {Bin Liu 001}},
publisher = {IEEE},
booktitle = {Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008}
}
@inproceedings{conf/icc/WangR08,
title = {Time-Slotted Round-Trip Carrier Synchronization in Large-Scale Wireless Networks.},
year = {2008},
booktitle = {ICC},
author = {{Qian Wang 002} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008}
}
@inproceedings{conf/icdcs/RenL08,
title = {A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.},
year = {2008},
booktitle = {ICDCS},
author = {{Kui Ren 001} and {Wenjing Lou}},
publisher = {IEEE Computer Society},
booktitle = {28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China}
}
@inproceedings{conf/icdcsw/RenRL08,
title = {Optimized User Revocation for Group Signature Based Privacy-Aware PKI.},
year = {2008},
booktitle = {ICDCS Workshops},
author = {{Wei Ren 002} and {Kui Ren 001} and {Wenjing Lou}},
publisher = {IEEE Computer Society},
booktitle = {28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China}
}
@inproceedings{conf/icdcsw/ZhuRW08,
title = {Anonymous Misbehavior Detection in Mobile Ad Hoc Networks.},
year = {2008},
booktitle = {ICDCS Workshops},
author = {{Bo Zhu 001} and {Kui Ren 001} and {Lingyu Wang 001}},
publisher = {IEEE Computer Society},
booktitle = {28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China}
}
@inproceedings{conf/qshine/RenRLZ08,
title = {Efficient user revocation for privacy-aware PKI.},
year = {2008},
booktitle = {QSHINE},
author = {{Wei Ren 002} and {Kui Ren 001} and {Wenjing Lou} and {Yanchao Zhang}},
publisher = {ICST},
booktitle = {5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2008, Hong Kong, July 28-31, 2008}
}
@inproceedings{conf/qshine/ZhangR08,
title = {Towards address privacy in mobile ad hoc networks.},
year = {2008},
booktitle = {QSHINE},
author = {{Yanchao Zhang} and {Kui Ren 001}},
publisher = {ICST},
booktitle = {5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2008, Hong Kong, July 28-31, 2008}
}
@inproceedings{conf/wasa/WangRZZ08,
title = {Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy.},
year = {2008},
booktitle = {WASA},
author = {{Qian Wang 002} and {Kui Ren 001} and {Yanchao Zhang} and {Bo Zhu 001}},
publisher = {Springer},
booktitle = {Wireless Algorithms, Systems, and Applications, Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings}
}
@inproceedings{conf/wcnc/WanRLP08,
title = {Anonymous ID-Based Group Key Agreement for Wireless Networks.},
year = {2008},
booktitle = {WCNC},
author = {{Zhiguo Wan} and {Kui Ren 001} and {Wenjing Lou} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings}
}
@inproceedings{conf/wisec/WanRP08,
title = {A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks.},
year = {2008},
booktitle = {WISEC},
author = {{Zhiguo Wan} and {Kui Ren 001} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008}
}
@article{journals/tmc/RenLZ08,
title = {LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks.},
year = {2008},
journal = {IEEE Trans. Mob. Comput.},
author = {{Kui Ren 001} and {Wenjing Lou} and {Yanchao Zhang}}
}
@article{journals/twc/RenZL08,
title = {Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks.},
year = {2008},
journal = {IEEE Trans. Wirel. Commun.},
author = {{Kui Ren 001} and {Kai Zeng 001} and {Wenjing Lou}}
}
@inproceedings{conf/esorics/WangWLRL09,
title = {Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.},
year = {2009},
booktitle = {ESORICS},
author = {{Qian Wang 002} and {Cong Wang 001} and {Jin Li 002} and {Kui Ren 001} and {Wenjing Lou}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}
}
@inproceedings{conf/infocom/WangRLZ09,
title = {Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.},
year = {2009},
booktitle = {INFOCOM},
author = {{Qian Wang 002} and {Kui Ren 001} and {Wenjing Lou} and {Yanchao Zhang}},
publisher = {IEEE},
booktitle = {INFOCOM 2009. 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}
}
@inproceedings{conf/infocom/ZhangZR09,
title = {DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks.},
year = {2009},
booktitle = {INFOCOM},
author = {{Rui Zhang 007} and {Yanchao Zhang} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {INFOCOM 2009. 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}
}
@inproceedings{conf/sersc-isa/TangZR09,
title = {A New Approach to Malware Detection.},
year = {2009},
booktitle = {ISA},
author = {{Hongying Tang} and {Bo Zhu 001} and {Kui Ren 001}},
publisher = {Springer},
booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings}
}
@article{journals/iacr/LiRK09,
title = {A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jin Li 002} and {Kui Ren 001} and {Kwangjo Kim}}
}
@article{journals/iacr/LiRZW09,
title = {Privacy-aware Attribute-based Encryption with User Accountability.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jin Li 002} and {Kui Ren 001} and {Bo Zhu 001} and {Zhiguo Wan}}
}
@article{journals/iacr/LiWWCRL09,
title = {Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jin Li 002} and {Qian Wang 002} and {Cong Wang 001} and {Ning Cao 001} and {Kui Ren 001} and {Wenjing Lou}}
}
@article{journals/iacr/WangWLRL09,
title = {Enabling Public Verifiability and Data Dynamics for Storage Security.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Qian Wang 002} and {Cong Wang 001} and {Jin Li 002} and {Kui Ren 001} and {Wenjing Lou}}
}
@article{journals/iacr/WangWRL09,
title = {Ensuring Data Storage Security in Cloud Computing.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Cong Wang 001} and {Qian Wang 002} and {Kui Ren 001} and {Wenjing Lou}}
}
@article{journals/iacr/YuRLL09,
title = {Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Shucheng Yu} and {Kui Ren 001} and {Wenjing Lou} and {Jin Li 002}}
}
@article{journals/isci/LvRCK09,
title = {The ring authenticated encryption scheme - How to provide a clue wisely.},
year = {2009},
journal = {Inf. Sci.},
author = {{Jiqiang Lv} and {Kui Ren 001} and {Xiaofeng Chen 001} and {Kwangjo Kim}}
}
@article{journals/monet/ZhangR09,
title = {On Address Privacy in Mobile Ad Hoc Networks.},
year = {2009},
journal = {Mob. Networks Appl.},
author = {{Yanchao Zhang} and {Kui Ren 001}}
}
@article{journals/tvt/RenLZJ09,
title = {Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation.},
year = {2009},
journal = {IEEE Trans. Veh. Technol.},
author = {{Kui Ren 001} and {Wenjing Lou} and {Bo Zhu 001} and {Sushil Jajodia}}
}
@article{journals/tvt/RenYLZ09,
title = {Multi-User Broadcast Authentication in Wireless Sensor Networks.},
year = {2009},
journal = {IEEE Trans. Veh. Technol.},
author = {{Kui Ren 001} and {Shucheng Yu} and {Wenjing Lou} and {Yanchao Zhang}}
}
@article{journals/wc/LouR09,
title = {Security, privacy, and accountability in wireless access networks.},
year = {2009},
journal = {IEEE Wirel. Commun.},
author = {{Wenjing Lou} and {Kui Ren 001}}
}
@article{journals/winet/ZengRLM09,
title = {Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply.},
year = {2009},
journal = {Wirel. Networks},
author = {{Kai Zeng 001} and {Kui Ren 001} and {Wenjing Lou} and {Patrick J. Moran}}
}
@inproceedings{conf/ccs/LiASXR10,
title = {Attribute-based signature and its applications.},
year = {2010},
booktitle = {AsiaCCS},
author = {{Jin Li 002} and {Man Ho Au} and {Willy Susilo} and {Dongqing Xie} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010}
}
@inproceedings{conf/ccs/YuWRL10,
title = {Attribute based data sharing with attribute revocation.},
year = {2010},
booktitle = {AsiaCCS},
author = {{Shucheng Yu} and {Cong Wang 001} and {Kui Ren 001} and {Wenjing Lou}},
publisher = {ACM},
booktitle = {Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010}
}
@inproceedings{conf/icc/CaoWRL10,
title = {Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks.},
year = {2010},
booktitle = {ICC},
author = {{Ning Cao 001} and {Qian Wang 002} and {Kui Ren 001} and {Wenjing Lou}},
publisher = {IEEE},
booktitle = {Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010}
}
@inproceedings{conf/icdcs/WangCLRL10,
title = {Secure Ranked Keyword Search over Encrypted Cloud Data.},
year = {2010},
booktitle = {ICDCS},
author = {{Cong Wang 001} and {Ning Cao 001} and {Jin Li 002} and {Kui Ren 001} and {Wenjing Lou}},
publisher = {IEEE Computer Society},
booktitle = {2010 International Conference on Distributed Computing Systems, ICDCS 2010, Genova, Italy, June 21-25, 2010}
}
@inproceedings{conf/infocom/LiWWCRL10,
title = {Fuzzy Keyword Search over Encrypted Data in Cloud Computing.},
year = {2010},
booktitle = {INFOCOM},
author = {{Jin Li 002} and {Qian Wang 002} and {Cong Wang 001} and {Ning Cao 001} and {Kui Ren 001} and {Wenjing Lou}},
publisher = {IEEE},
booktitle = {INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA}
}
@inproceedings{conf/infocom/LiYLR10,
title = {Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.},
year = {2010},
booktitle = {INFOCOM},
author = {{Ming Li 003} and {Shucheng Yu} and {Wenjing Lou} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA}
}
@inproceedings{conf/infocom/WangWRL10,
title = {Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.},
year = {2010},
booktitle = {INFOCOM},
author = {{Cong Wang 001} and {Qian Wang 002} and {Kui Ren 001} and {Wenjing Lou}},
publisher = {IEEE},
booktitle = {INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA}
}
@inproceedings{conf/infocom/YuWRL10,
title = {Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.},
year = {2010},
booktitle = {INFOCOM},
author = {{Shucheng Yu} and {Cong Wang 001} and {Kui Ren 001} and {Wenjing Lou}},
publisher = {IEEE},
booktitle = {INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA}
}
@inproceedings{conf/securecomm/LiYRL10,
title = {Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.},
year = {2010},
booktitle = {SecureComm},
author = {{Ming Li 003} and {Shucheng Yu} and {Kui Ren 001} and {Wenjing Lou}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}
}
@article{journals/cn/YuRL10,
title = {Attribute-based on-demand multicast group setup with membership anonymity.},
year = {2010},
journal = {Comput. Networks},
author = {{Shucheng Yu} and {Kui Ren 001} and {Wenjing Lou}}
}
@article{journals/iacr/ZhuZR10,
title = {PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Benwen Zhu} and {Bo Zhu 001} and {Kui Ren 001}}
}
@article{journals/network/WangRLL10,
title = {Toward publicly auditable secure cloud data storage services.},
year = {2010},
journal = {IEEE Netw.},
author = {{Cong Wang 001} and {Kui Ren 001} and {Wenjing Lou} and {Jin Li 002}}
}
@article{journals/scn/ZhuRWD10,
title = {PCM: a privacy-preserving detection mechanism in mobile ad hoc networks.},
year = {2010},
journal = {Secur. Commun. Networks},
author = {{Bo Zhu 001} and {Kui Ren 001} and {Lingyu Wang 001} and {Mourad Debbabi}}
}
@article{journals/tpds/RenYLZ10,
title = {PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.},
year = {2010},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Kui Ren 001} and {Shucheng Yu} and {Wenjing Lou} and {Yanchao Zhang}}
}
@article{journals/tvt/WanRZPG10,
title = {Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks.},
year = {2010},
journal = {IEEE Trans. Veh. Technol.},
author = {{Zhiguo Wan} and {Kui Ren 001} and {Bo Zhu 001} and {Bart Preneel} and {Ming Gu 001}}
}
@article{journals/wc/LiLR10,
title = {Data security and privacy in wireless body area networks.},
year = {2010},
journal = {IEEE Wirel. Commun.},
author = {{Ming Li 003} and {Wenjing Lou} and {Kui Ren 001}}
}
@inproceedings{conf/icc/SuWRX11,
title = {Jamming-Resilient Dynamic Spectrum Access for Cognitive Radio Networks.},
year = {2011},
booktitle = {ICC},
author = {{Hai Su} and {Qian Wang 002} and {Kui Ren 001} and {Kai Xing}},
publisher = {IEEE},
booktitle = {Proceedings of IEEE International Conference on Communications, ICC 2011, Kyoto, Japan, 5-9 June, 2011}
}
@inproceedings{conf/icdcs/CaoYWRL11,
title = {Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing.},
year = {2011},
booktitle = {ICDCS},
author = {{Ning Cao 001} and {Zhenyu Yang 007} and {Cong Wang 001} and {Kui Ren 001} and {Wenjing Lou}},
publisher = {IEEE Computer Society},
booktitle = {2011 International Conference on Distributed Computing Systems, ICDCS 2011, Minneapolis, Minnesota, USA, June 20-24, 2011}
}
@inproceedings{conf/icdcs/WangRWU11,
title = {Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations.},
year = {2011},
booktitle = {ICDCS},
author = {{Cong Wang 001} and {Kui Ren 001} and {Jia Wang} and {Karthik Mahendra Raje Urs}},
publisher = {IEEE Computer Society},
booktitle = {2011 International Conference on Distributed Computing Systems, ICDCS 2011, Minneapolis, Minnesota, USA, June 20-24, 2011}
}
@inproceedings{conf/icdcsw/WangWR11,
title = {Towards Secure and Effective Utilization over Encrypted Cloud Data.},
year = {2011},
booktitle = {ICDCS Workshops},
author = {{Cong Wang 001} and {Qian Wang 002} and {Kui Ren 001}},
publisher = {IEEE Computer Society},
booktitle = {31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 20-24 June 2011, Minneapolis, Minnesota, USA}
}
@inproceedings{conf/icnp/WangRN11,
title = {Anti-jamming communication in cognitive radio networks with unknown channel statistics.},
year = {2011},
booktitle = {ICNP},
author = {{Qian Wang 002} and {Kui Ren 001} and {Peng Ning}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the 19th annual IEEE International Conference on Network Protocols, ICNP 2011, Vancouver, BC, Canada, October 17-20, 2011}
}
@inproceedings{conf/infocom/WangRW11,
title = {Secure and practical outsourcing of linear programming in cloud computing.},
year = {2011},
booktitle = {INFOCOM},
author = {{Cong Wang 001} and {Kui Ren 001} and {Jia Wang}},
publisher = {IEEE},
booktitle = {INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China}
}
@inproceedings{conf/infocom/WangSRK11,
title = {Fast and scalable secret key generation exploiting channel phase randomness in wireless networks.},
year = {2011},
booktitle = {INFOCOM},
author = {{Qian Wang 002} and {Hai Su} and {Kui Ren 001} and {Kwangjo Kim}},
publisher = {IEEE},
booktitle = {INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China}
}
@inproceedings{conf/infocom/WangXRL11,
title = {Delay-bounded adaptive UFH-based anti-jamming wireless communication.},
year = {2011},
booktitle = {INFOCOM},
author = {{Qian Wang 002} and {Ping Xu} and {Kui Ren 001} and {Xiang-Yang Li 001}},
publisher = {IEEE},
booktitle = {INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China}
}
@inproceedings{conf/milcom/XuWR11,
title = {Wireless key establishment with asynchronous clocks.},
year = {2011},
booktitle = {MILCOM},
author = {{Kaihe Xu} and {Qian Wang 002} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {MILCOM 2011 - 2011 IEEE Military Communications Conference, Baltimore, MD, USA, November 7-10, 2011}
}
@inproceedings{conf/wasa/SuWR11,
title = {Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks.},
year = {2011},
booktitle = {WASA},
author = {{Hai Su} and {Qian Wang 002} and {Kui Ren 001}},
publisher = {Springer},
booktitle = {Wireless Algorithms, Systems, and Applications - 6th International Conference, WASA 2011, Chengdu, China, August 11-13, 2011. Proceedings}
}
@article{journals/monet/LiWWR11,
title = {Enhancing Attribute-Based Encryption with Attribute Hierarchy.},
year = {2011},
journal = {Mob. Networks Appl.},
author = {{Jin Li 002} and {Qian Wang 002} and {Cong Wang 001} and {Kui Ren 001}}
}
@article{journals/tosn/WangRYL11,
title = {Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.},
year = {2011},
journal = {ACM Trans. Sens. Networks},
author = {{Qian Wang 002} and {Kui Ren 001} and {Shucheng Yu} and {Wenjing Lou}}
}
@article{journals/tpds/WangWRLL11,
title = {Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.},
year = {2011},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Qian Wang 002} and {Cong Wang 001} and {Kui Ren 001} and {Wenjing Lou} and {Jin Li 002}}
}
@article{journals/tpds/YuRL11,
title = {FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks.},
year = {2011},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Shucheng Yu} and {Kui Ren 001} and {Wenjing Lou}}
}
@article{journals/tsg/YuanLR11,
title = {Modeling Load Redistribution Attacks in Power Systems.},
year = {2011},
journal = {IEEE Trans. Smart Grid},
author = {{Yanling Yuan} and {Zuyi Li} and {Kui Ren 001}}
}
@article{journals/wc/RenSW11,
title = {Secret key generation exploiting channel characteristics in wireless communications.},
year = {2011},
journal = {IEEE Wirel. Commun.},
author = {{Kui Ren 001} and {Hai Su} and {Qian Wang 002}}
}
@incollection{reference/crypt/LiLR11,
title = {Secure Device Pairing.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Ming Li 003} and {Wenjing Lou} and {Kui Ren 001}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/YuLR11,
title = {Privacy-Preserving Authentication in Wireless Access Networks.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Shucheng Yu} and {Wenjing Lou} and {Kui Ren 001}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@inproceedings{conf/infocom/WangRM12,
title = {When cloud meets eBay: Towards effective pricing for cloud computing.},
year = {2012},
booktitle = {INFOCOM},
author = {{Qian Wang 002} and {Kui Ren 001} and {Xiaoqiao Meng}},
publisher = {IEEE},
booktitle = {Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012}
}
@inproceedings{conf/infocom/WangRYU12,
title = {Achieving usable and privacy-assured similarity search over outsourced cloud data.},
year = {2012},
booktitle = {INFOCOM},
author = {{Cong Wang 001} and {Kui Ren 001} and {Shucheng Yu} and {Karthik Mahendra Raje Urs}},
publisher = {IEEE},
booktitle = {Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012}
}
@inproceedings{conf/infocom/XuWCWRC12,
title = {Locating malicious nodes for data aggregation in wireless networks.},
year = {2012},
booktitle = {INFOCOM},
author = {{XiaoHua Xu} and {Qian Wang 002} and {Jiannong Cao 001} and {Peng-Jun Wan} and {Kui Ren 001} and {Yuanfang Chen}},
publisher = {IEEE},
booktitle = {Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012}
}
@inproceedings{conf/infocom/XuWR12,
title = {Joint UFH and power control for effective wireless anti-jamming communication.},
year = {2012},
booktitle = {INFOCOM},
author = {{Kaihe Xu} and {Qian Wang 002} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012}
}
@inproceedings{conf/pet/LiuWRCD12,
title = {k-Indistinguishable Traffic Padding in Web Applications.},
year = {2012},
booktitle = {Privacy Enhancing Technologies},
author = {{Wen Ming Liu} and {Lingyu Wang 001} and {Kui Ren 001} and {Pengsu Cheng} and {Mourad Debbabi}},
publisher = {Springer},
booktitle = {Privacy Enhancing Technologies - 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings}
}
@article{journals/internet/RenWW12,
title = {Security Challenges for the Public Cloud.},
year = {2012},
journal = {IEEE Internet Comput.},
author = {{Kui Ren 001} and {Cong Wang 001} and {Qian Wang 002}}
}
@article{journals/jsac/WangXR12,
title = {Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels.},
year = {2012},
journal = {IEEE J. Sel. Areas Commun.},
author = {{Qian Wang 002} and {Kaihe Xu} and {Kui Ren 001}}
}
@article{journals/jsac/WangXRL12,
title = {Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication.},
year = {2012},
journal = {IEEE J. Sel. Areas Commun.},
author = {{Qian Wang 002} and {Ping Xu} and {Kui Ren 001} and {Xiang-Yang Li 001}}
}
@article{journals/network/RenWW12,
title = {Toward secure and effective data utilization in public cloud.},
year = {2012},
journal = {IEEE Netw.},
author = {{Kui Ren 001} and {Cong Wang 001} and {Qian Wang 002}}
}
@article{journals/tpds/WangCRL12,
title = {Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.},
year = {2012},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Cong Wang 001} and {Ning Cao 001} and {Kui Ren 001} and {Wenjing Lou}}
}
@article{journals/tpds/YuanLR12,
title = {Quantitative Analysis of Load Redistribution Attacks in Power Systems.},
year = {2012},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Yanling Yuan} and {Zuyi Li} and {Kui Ren 001}}
}
@article{journals/tpds/ZhangZR12,
title = {Distributed Privacy-Preserving Access Control in Sensor Networks.},
year = {2012},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Rui Zhang 007} and {Yanchao Zhang} and {Kui Ren 001}}
}
@article{journals/tsc/WangWRCL12,
title = {Toward Secure and Dependable Storage Services in Cloud Computing.},
year = {2012},
journal = {IEEE Trans. Serv. Comput.},
author = {{Cong Wang 001} and {Qian Wang 002} and {Kui Ren 001} and {Ning Cao 001} and {Wenjing Lou}}
}
@article{journals/tsg/LiLRL12,
title = {Towards Optimal Electric Demand Management for Internet Data Centers.},
year = {2012},
journal = {IEEE Trans. Smart Grid},
author = {{Jie Li} and {Zuyi Li} and {Kui Ren 001} and {Xue Liu 001}}
}
@article{journals/twc/WanRG12,
title = {USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks.},
year = {2012},
journal = {IEEE Trans. Wirel. Commun.},
author = {{Zhiguo Wan} and {Kui Ren 001} and {Ming Gu 001}}
}
@inproceedings{conf/ccs/YangJR13,
title = {Attribute-based fine-grained access control with efficient revocation in cloud storage systems.},
year = {2013},
booktitle = {AsiaCCS},
author = {{Kan Yang 001} and {Xiaohua Jia} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013}
}
@inproceedings{conf/cloudcom/LiuWRD13,
title = {Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications.},
year = {2013},
booktitle = {CloudCom (1)},
author = {{Wen Ming Liu} and {Lingyu Wang 001} and {Kui Ren 001} and {Mourad Debbabi}},
publisher = {IEEE Computer Society},
booktitle = {IEEE 5th International Conference on Cloud Computing Technology and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5, 2013, Volume 1}
}
@inproceedings{conf/fc/ZhangLWR13,
title = {Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.},
year = {2013},
booktitle = {Financial Cryptography},
author = {{Bingsheng Zhang} and {Helger Lipmaa} and {Cong Wang 001} and {Kui Ren 001}},
publisher = {Springer},
booktitle = {Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}
}
@inproceedings{conf/infocom/LiuRYLW13,
title = {Optimal budget deployment strategy against power grid interdiction.},
year = {2013},
booktitle = {INFOCOM},
author = {{Xuan Liu 003} and {Kui Ren 001} and {Yanling Yuan} and {Zuyi Li} and {Qian Wang 002}},
publisher = {IEEE},
booktitle = {Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013}
}
@inproceedings{conf/infocom/XuWWRW13,
title = {Proof-carrying cloud computation: The case of convex optimization.},
year = {2013},
booktitle = {INFOCOM},
author = {{Zhen Xu} and {Cong Wang 001} and {Qian Wang 002} and {Kui Ren 001} and {Lingyu Wang 001}},
publisher = {IEEE},
booktitle = {Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013}
}
@inproceedings{conf/infocom/YangJRZ13,
title = {DAC-MACS: Effective data access control for multi-authority cloud storage systems.},
year = {2013},
booktitle = {INFOCOM},
author = {{Kan Yang 001} and {Xiaohua Jia} and {Kui Ren 001} and {Bo Zhang 036}},
publisher = {IEEE},
booktitle = {Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013}
}
@inproceedings{conf/ndss/PanLPYR0F13,
title = {How Privacy Leaks From Bluetooth Mouse?},
year = {2013},
booktitle = {NDSS},
author = {{Xian Pan} and {Zhen Ling} and {Aniket Pingley} and {Wei Yu 002} and {Kui Ren 001} and {Nan Zhang 004} and {Xinwen Fu}},
publisher = {The Internet Society},
booktitle = {20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013}
}
@inproceedings{conf/ndss/X13,
title = {OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance.},
year = {2013},
booktitle = {NDSS},
author = {{Cong Wang 001} and {Zhen Xu} and {Kui Ren 001} and {Janet Meiling Wang}},
publisher = {The Internet Society},
booktitle = {20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013}
}
@inproceedings{conf/socc/NguyenRR13,
title = {A new data acquisition design for breast cancer detection system.},
year = {2013},
booktitle = {SoCC},
author = {{Dung Nguyen} and {Kui Ren 001} and {Janet Roveda}},
publisher = {IEEE},
booktitle = {2013 IEEE International SOC Conference, Erlangen, Germany, September 4-6, 2013}
}
@inproceedings{conf/socc/RovedaNPRF13,
title = {Effective signal region based analog mixed signal design considering variations and applications.},
year = {2013},
booktitle = {SoCC},
author = {{Janet Roveda} and {Dung Nguyen} and {Linda S. Powers} and {Kui Ren 001} and {Jerrie Fairbanks}},
publisher = {IEEE},
booktitle = {2013 IEEE International SOC Conference, Erlangen, Germany, September 4-6, 2013}
}
@article{journals/iacr/ZhangZWRWM13,
title = {PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.},
year = {2013},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Bingsheng Zhang} and {Zhan Qin} and {Junfei Wang} and {Kui Ren 001} and {Cong Wang 001} and {Di Ma}}
}
@article{journals/network/LiYRLH13,
title = {Toward privacy-assured and searchable cloud data storage services.},
year = {2013},
journal = {IEEE Netw.},
author = {{Ming Li 003} and {Shucheng Yu} and {Kui Ren 001} and {Wenjing Lou} and {Y. Thomas Hou 001}}
}
@article{journals/network/RenZHP13,
title = {Security in cognitive radio networks [Guest Editorial].},
year = {2013},
journal = {IEEE Netw.},
author = {{Kui Ren 001} and {Haojin Zhu} and {Zhu Han 001} and {Radha Poovendran}}
}
@article{journals/tc/WangCWRL13,
title = {Privacy-Preserving Public Auditing for Secure Cloud Storage.},
year = {2013},
journal = {IEEE Trans. Computers},
author = {{Cong Wang 001} and {Sherman S. M. Chow} and {Qian Wang 002} and {Kui Ren 001} and {Wenjing Lou}}
}
@article{journals/tetc/WangZRR13,
title = {Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud.},
year = {2013},
journal = {IEEE Trans. Emerg. Top. Comput.},
author = {{Cong Wang 001} and {Bingsheng Zhang} and {Kui Ren 001} and {Janet Roveda}}
}
@article{journals/tifs/YangJRZX13,
title = {DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems.},
year = {2013},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Kan Yang 001} and {Xiaohua Jia} and {Kui Ren 001} and {Bo Zhang 036} and {Ruitao Xie}}
}
@article{journals/tosn/LiYGLR13,
title = {Secure ad hoc trust initialization and key management in wireless body area networks.},
year = {2013},
journal = {ACM Trans. Sens. Networks},
author = {{Ming Li 003} and {Shucheng Yu} and {Joshua D. Guttman} and {Wenjing Lou} and {Kui Ren 001}}
}
@article{journals/tpds/LiYZRL13,
title = {Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.},
year = {2013},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Ming Li 003} and {Shucheng Yu} and {Yao Zheng} and {Kui Ren 001} and {Wenjing Lou}}
}
@article{journals/tpds/WangRWW13,
title = {Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations.},
year = {2013},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Cong Wang 001} and {Kui Ren 001} and {Jia Wang} and {Qian Wang 002}}
}
@article{journals/wc/RenW13,
title = {Opportunistic spectrum access: from stochastic channels to non-stochastic channels.},
year = {2013},
journal = {IEEE Wirel. Commun.},
author = {{Kui Ren 001} and {Qian Wang 002}}
}
@inproceedings{conf/ccs/XiaoCYLZLR14,
title = {POSTER: LocMask: A Location Privacy Protection Framework in Android System.},
year = {2014},
booktitle = {CCS},
author = {{Qiuyu Xiao} and {Jiayi Chen} and {Le Yu} and {Huaxin Li} and {Haojin Zhu} and {Muyuan Li} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}
}
@inproceedings{conf/ccs/YueLFLRZ14,
title = {Blind Recognition of Touched Keys on Mobile Devices.},
year = {2014},
booktitle = {CCS},
author = {{Qinggang Yue} and {Zhen Ling} and {Xinwen Fu} and {Benyuan Liu} and {Kui Ren 001} and {Wei Zhao 001}},
publisher = {ACM},
booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}
}
@inproceedings{conf/globecom/QinYRCWF14,
title = {Privacy-preserving outsourcing of image global feature detection.},
year = {2014},
booktitle = {GLOBECOM},
author = {{Zhan Qin} and {Jingbo Yan} and {Kui Ren 001} and {Chang Wen Chen} and {Cong Wang 001} and {Xinwen Fu}},
publisher = {IEEE},
booktitle = {IEEE Global Communications Conference, GLOBECOM 2014, Austin, TX, USA, December 8-12, 2014}
}
@inproceedings{conf/icdcs/YuanWWSR14,
title = {Enabling Privacy-Preserving Image-Centric Social Discovery.},
year = {2014},
booktitle = {ICDCS},
author = {{Xingliang Yuan} and {Xinyu Wang 007} and {Cong Wang 001} and {Anna Cinzia Squicciarini} and {Kui Ren 001}},
publisher = {IEEE Computer Society},
booktitle = {IEEE 34th International Conference on Distributed Computing Systems, ICDCS 2014, Madrid, Spain, June 30 - July 3, 2014}
}
@inproceedings{conf/icnp/SunWRJ14,
title = {Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply.},
year = {2014},
booktitle = {ICNP},
author = {{Qihang Sun} and {Qian Wang 002} and {Kui Ren 001} and {Xiaohua Jia}},
publisher = {IEEE Computer Society},
booktitle = {22nd IEEE International Conference on Network Protocols, ICNP 2014, Raleigh, NC, USA, October 21-24, 2014}
}
@inproceedings{conf/infocom/ChenLQZR14,
title = {AcousAuth: An acoustic-based mobile application for user authentication.},
year = {2014},
booktitle = {INFOCOM Workshops},
author = {{Si Chen} and {Muyuan Li} and {Zhan Qin} and {Bingsheng Zhang} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}
}
@inproceedings{conf/infocom/ChenLR14,
title = {The power of indoor crowd: Indoor 3D maps from the crowd.},
year = {2014},
booktitle = {INFOCOM Workshops},
author = {{Si Chen} and {Muyuan Li} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}
}
@inproceedings{conf/infocom/LiCR14,
title = {Enabling private and non-intrusive smartphone calls with LipTalk.},
year = {2014},
booktitle = {INFOCOM Workshops},
author = {{Muyuan Li} and {Si Chen} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}
}
@inproceedings{conf/infocom/QinYR14,
title = {Private image computation: The case of cloud based privacy-preserving SIFT.},
year = {2014},
booktitle = {INFOCOM Workshops},
author = {{Zhan Qin} and {Jingbo Yan} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}
}
@inproceedings{conf/infocom/WangZRRCX14,
title = {A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing.},
year = {2014},
booktitle = {INFOCOM},
author = {{Cong Wang 001} and {Bingsheng Zhang} and {Kui Ren 001} and {Janet Meiling Wang Roveda} and {Chang Wen Chen} and {Zhen Xu}},
publisher = {IEEE},
booktitle = {2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014}
}
@inproceedings{conf/infocom/YangJRXH14,
title = {Enabling efficient access control with dynamic policy updating for big data in the cloud.},
year = {2014},
booktitle = {INFOCOM},
author = {{Kan Yang 001} and {Xiaohua Jia} and {Kui Ren 001} and {Ruitao Xie} and {Liusheng Huang}},
publisher = {IEEE},
booktitle = {2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014}
}
@inproceedings{conf/mm/QinYRCW14,
title = {Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing.},
year = {2014},
booktitle = {ACM Multimedia},
author = {{Zhan Qin} and {Jingbo Yan} and {Kui Ren 001} and {Chang Wen Chen} and {Cong Wang 001}},
publisher = {ACM},
booktitle = {Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03 - 07, 2014}
}
@inproceedings{conf/mobihoc/LiZGCYHR14,
title = {All your location are belong to us: breaking mobile social networks for automated user location tracking.},
year = {2014},
booktitle = {MobiHoc},
author = {{Muyuan Li} and {Haojin Zhu} and {Zhaoyu Gao} and {Si Chen} and {Le Yu} and {Shangqian Hu} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {The Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'14, Philadelphia, PA, USA, August 11-14, 2014}
}
@article{journals/comsur/RadGRDCJL14,
title = {Editorial: IEEE Communications Surveys & TutorialsSpecial Section on Energy and Smart Grid.},
year = {2014},
journal = {IEEE Commun. Surv. Tutorials},
author = {{Hamed Mohsenian Rad} and {Fabrizio Granelli} and {Kui Ren 001} and {Chris Develder} and {Lijun Chen 001} and {Tao Jiang 002} and {Xue Liu 001}}
}
@article{journals/iotj/RenSGNL14,
title = {Guest Editorial Special Issue on Security for IoT: The State of the Art.},
year = {2014},
journal = {IEEE Internet Things J.},
author = {{Kui Ren 001} and {Pierangela Samarati} and {Marco Gruteser} and {Peng Ning} and {Yunhao Liu 001}}
}
@article{journals/iotj/ZhangZCLRWM14,
title = {PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.},
year = {2014},
journal = {IEEE Internet Things J.},
author = {{Bingsheng Zhang} and {Zhan Qin} and {Si Chen} and {Muyuan Li} and {Kui Ren 001} and {Cong Wang 001} and {Di Ma}}
}
@article{journals/tdsc/LiuWCRZD14,
title = {PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications.},
year = {2014},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Wen Ming Liu} and {Lingyu Wang 001} and {Pengsu Cheng} and {Kui Ren 001} and {Shunzhi Zhu} and {Mourad Debbabi}}
}
@article{journals/tifs/XuWRWZ14,
title = {Proof-Carrying Cloud Computation: The Case of Convex Optimization.},
year = {2014},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Zhen Xu} and {Cong Wang 001} and {Kui Ren 001} and {Lingyu Wang 001} and {Bingsheng Zhang}}
}
@article{journals/tpds/CaoWLRL14,
title = {Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.},
year = {2014},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Ning Cao 001} and {Cong Wang 001} and {Ming Li 003} and {Kui Ren 001} and {Wenjing Lou}}
}
@article{journals/tpds/ShaoRWLWR14,
title = {Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets.},
year = {2014},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Hua-Jie Shao} and {Lei Rao} and {Zhi Wang 003} and {Xue Liu 001} and {Zhibo Wang 001} and {Kui Ren 001}}
}
@article{journals/wc/RenWMJ14,
title = {Securing emerging short range wireless communications: the state of the art.},
year = {2014},
journal = {IEEE Wirel. Commun.},
author = {{Kui Ren 001} and {Qian Wang 002} and {Di Ma} and {Xiaohua Jia}}
}
@inproceedings{conf/ccs/ChengYGZR15,
title = {Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation.},
year = {2015},
booktitle = {AsiaCCS},
author = {{Rong Cheng} and {Jingbo Yan} and {Chaowen Guan} and {Fangguo Zhang} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015}
}
@inproceedings{conf/ccs/Ren15,
title = {Secure Outsourcing Image Feature Extraction: Challenges and Solutions.},
year = {2015},
booktitle = {SCC@ASIACCS},
author = {{Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015}
}
@inproceedings{conf/ccs/TianZR15,
title = {Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible.},
year = {2015},
booktitle = {AsiaCCS},
author = {{Haibo Tian} and {Fangguo Zhang} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015}
}
@inproceedings{conf/ccs/WangRLXCWZ15,
title = {Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.},
year = {2015},
booktitle = {CCS},
author = {{Qian Wang 002} and {Kui Ren 001} and {Guancheng Li} and {Chenbo Xia} and {Xiaobing Chen} and {Zhibo Wang 001} and {Qin Zou 001}},
publisher = {ACM},
booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}
}
@inproceedings{conf/ccs/YuanWR15,
title = {Enabling IP Protection for Outsourced Integrated Circuit Design.},
year = {2015},
booktitle = {AsiaCCS},
author = {{Xingliang Yuan} and {Cong Wang 001} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015}
}
@inproceedings{conf/dbsec/ChunRJ15,
title = {Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid.},
year = {2015},
booktitle = {DBSec},
author = {{Hu Chun} and {Kui Ren 001} and {Wei Jiang}},
publisher = {Springer},
booktitle = {Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings}
}
@inproceedings{conf/esorics/GuanRZKY15,
title = {Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.},
year = {2015},
booktitle = {ESORICS (1)},
author = {{Chaowen Guan} and {Kui Ren 001} and {Fangguo Zhang} and {Florian Kerschbaum} and {Jia Yu 005}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I}
}
@inproceedings{conf/esorics/WangHRHDW15,
title = {CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.},
year = {2015},
booktitle = {ESORICS (2)},
author = {{Qian Wang 002} and {Shengshan Hu} and {Kui Ren 001} and {Meiqi He} and {Minxin Du} and {Zhibo Wang 001}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II}
}
@inproceedings{conf/icdcs/ChenLRQ15,
title = {Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos.},
year = {2015},
booktitle = {ICDCS},
author = {{Si Chen} and {Muyuan Li} and {Kui Ren 001} and {Chunming Qiao}},
publisher = {IEEE Computer Society},
booktitle = {35th IEEE International Conference on Distributed Computing Systems, ICDCS 2015, Columbus, OH, USA, June 29 - July 2, 2015}
}
@inproceedings{conf/icdcs/WangZRLLW15,
title = {Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes.},
year = {2015},
booktitle = {ICDCS},
author = {{Qian Wang 002} and {Man Zhou} and {Kui Ren 001} and {Tao Lei} and {Jikun Li} and {Zhibo Wang 001}},
publisher = {IEEE Computer Society},
booktitle = {35th IEEE International Conference on Distributed Computing Systems, ICDCS 2015, Columbus, OH, USA, June 29 - July 2, 2015}
}
@inproceedings{conf/mobihoc/LiuLLFRR15,
title = {Rise of Mini-Drones: Applications and Issues.},
year = {2015},
booktitle = {PAMCO@MobiHoc},
author = {{Zhongli Liu} and {Zupei Li} and {Benyuan Liu} and {Xinwen Fu} and {Ioannis A. Raptis} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, PAMCO@MobiHoc 2015, Hangzhou, China, June 22, 2015}
}
@inproceedings{conf/sensys/ChenLRFQ15,
title = {Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing.},
year = {2015},
booktitle = {SenSys},
author = {{Si Chen} and {Muyuan Li} and {Kui Ren 001} and {Xinwen Fu} and {Chunming Qiao}},
publisher = {ACM},
booktitle = {Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, SenSys 2015, Seoul, South Korea, November 1-4, 2015}
}
@inproceedings{conf/sensys/MiaoJSLGQXGR15,
title = {Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems.},
year = {2015},
booktitle = {SenSys},
author = {{Chenglin Miao} and {Wenjun Jiang} and {Lu Su} and {Yaliang Li} and {Suxin Guo} and {Zhan Qin} and {Houping Xiao} and {Jing Gao 004} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, SenSys 2015, Seoul, South Korea, November 1-4, 2015}
}
@inproceedings{conf/sigcomm/FanYGGRQ15,
title = {GREP: Guaranteeing Reliability with Enhanced Protection in NFV.},
year = {2015},
booktitle = {HotMiddlebox@SIGCOMM},
author = {{Jingyuan Fan} and {Zilong Ye} and {Chaowen Guan} and {Xiujiao Gao} and {Kui Ren 001} and {Chunming Qiao}},
publisher = {ACM},
booktitle = {Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, HotMiddlebox@SIGCOMM 2015, London, United Kingdom, August 21, 2015}
}
@article{journals/cm/GuizaniHRRCZ15,
title = {Security and privacy in emerging networks: Part 1 [Guest Editorial].},
year = {2015},
journal = {IEEE Commun. Mag.},
author = {{Mohsen Guizani} and {Daojing He} and {Kui Ren 001} and {Joel J. P. C. Rodrigues} and {Sammy Chan} and {Yan Zhang 002}}
}
@article{journals/cm/GuizaniHRRCZ15a,
title = {Security and privacy in emerging networks: Part II [Guest Editorial].},
year = {2015},
journal = {IEEE Commun. Mag.},
author = {{Mohsen Guizani} and {Daojing He} and {Kui Ren 001} and {Joel J. P. C. Rodrigues} and {Sammy Chan} and {Yan Zhang 002}}
}
@article{journals/tifs/YuRWV15,
title = {Enabling Cloud Storage Auditing With Key-Exposure Resistance.},
year = {2015},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Jia Yu 005} and {Kui Ren 001} and {Cong Wang 001} and {Vijay Varadharajan}}
}
@article{journals/tpds/YangJR15,
title = {Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud.},
year = {2015},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Kan Yang 001} and {Xiaohua Jia} and {Kui Ren 001}}
}
@inproceedings{conf/ccs/QinYYKXR16,
title = {Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy.},
year = {2016},
booktitle = {CCS},
author = {{Zhan Qin} and {Yin Yang 001} and {Ting Yu 001} and {Issa Khalil} and {Xiaokui Xiao} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}
}
@inproceedings{conf/ccs/SongLBRZX16,
title = {My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.},
year = {2016},
booktitle = {CCS},
author = {{Chen Song 001} and {Feng Lin 004} and {Zhongjie Ba} and {Kui Ren 001} and {Chi Zhou 004} and {Wenyao Xu}},
publisher = {ACM},
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}
}
@inproceedings{conf/ccs/TangCGWWR16,
title = {Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control.},
year = {2016},
booktitle = {AsiaCCS},
author = {{Heyi Tang} and {Yong Cui 001} and {Chaowen Guan} and {Jianping Wu} and {Jian Weng 001} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}
}
@inproceedings{conf/ccs/WangWHZR16,
title = {SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud.},
year = {2016},
booktitle = {AsiaCCS},
author = {{Qian Wang 002} and {Jingjun Wang} and {Shengshan Hu} and {Qin Zou 001} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}
}
@inproceedings{conf/globecom/WangSRZ16,
title = {Increasing User Capacity of Wireless Physical-Layer Identification in Internet of Things.},
year = {2016},
booktitle = {GLOBECOM},
author = {{Wenhao Wang} and {Zhi Sun} and {Kui Ren 001} and {Bocheng Zhu}},
publisher = {IEEE},
booktitle = {2016 IEEE Global Communications Conference, GLOBECOM 2016, Washington, DC, USA, December 4-8, 2016}
}
@inproceedings{conf/hotweb/KangJKRM16,
title = {Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.},
year = {2016},
booktitle = {HotWeb},
author = {{Ah Reum Kang} and {Seong Hoon Jeong 001} and {Steven Y. Ko} and {Kui Ren 001} and {Aziz Mohaisen}},
publisher = {IEEE Computer Society},
booktitle = {Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2016, Washington, DC, USA, October 24-25, 2016}
}
@inproceedings{conf/icc/WangSRZ16,
title = {User capacity of wireless physical-layer identification: An information-theoretic perspective.},
year = {2016},
booktitle = {ICC},
author = {{Wenhao Wang} and {Zhi Sun} and {Kui Ren 001} and {Bocheng Zhu}},
publisher = {IEEE},
booktitle = {2016 IEEE International Conference on Communications, ICC 2016, Kuala Lumpur, Malaysia, May 22-27, 2016}
}
@inproceedings{conf/icdcs/DouLZLYGR16,
title = {Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems.},
year = {2016},
booktitle = {ICDCS},
author = {{Yanzhi Dou} and {He Li 007} and {Kexiong Curtis Zeng} and {Jinshan Liu} and {Yaling Yang} and {Bo Gao} and {Kui Ren 001}},
publisher = {IEEE Computer Society},
booktitle = {36th IEEE International Conference on Distributed Computing Systems, ICDCS 2016, Nara, Japan, June 27-30, 2016}
}
@inproceedings{conf/icdcs/WangHWR16,
title = {Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor.},
year = {2016},
booktitle = {ICDCS},
author = {{Qian Wang 002} and {Shengshan Hu} and {Jingjun Wang} and {Kui Ren 001}},
publisher = {IEEE Computer Society},
booktitle = {36th IEEE International Conference on Distributed Computing Systems, ICDCS 2016, Nara, Japan, June 27-30, 2016}
}
@inproceedings{conf/infocom/ChekamZLCR16,
title = {On the synchronization bottleneck of OpenStack Swift-like cloud storage systems.},
year = {2016},
booktitle = {INFOCOM},
author = {{Thierry Titcheu Chekam} and {Ennan Zhai} and {Zhenhua Li 001} and {Yong Cui 001} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {35th Annual IEEE International Conference on Computer Communications, INFOCOM 2016, San Francisco, CA, USA, April 10-14, 2016}
}
@inproceedings{conf/infocom/SongWRX16,
title = {EyeVeri: A secure and usable approach for smartphone user authentication.},
year = {2016},
booktitle = {INFOCOM},
author = {{Chen Song 001} and {Aosen Wang} and {Kui Ren 001} and {Wenyao Xu}},
publisher = {IEEE},
booktitle = {35th Annual IEEE International Conference on Computer Communications, INFOCOM 2016, San Francisco, CA, USA, April 10-14, 2016}
}
@inproceedings{conf/infocom/WangHRWWD16,
title = {Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data.},
year = {2016},
booktitle = {INFOCOM},
author = {{Qian Wang 002} and {Shengshan Hu} and {Kui Ren 001} and {Jingjun Wang} and {Zhibo Wang 001} and {Minxin Du}},
publisher = {IEEE},
booktitle = {35th Annual IEEE International Conference on Computer Communications, INFOCOM 2016, San Francisco, CA, USA, April 10-14, 2016}
}
@inproceedings{conf/infocom/WangZLWQR16,
title = {RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.},
year = {2016},
booktitle = {INFOCOM},
author = {{Qian Wang 002} and {Yan Zhang} and {Xiao Lu} and {Zhibo Wang 001} and {Zhan Qin} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {35th Annual IEEE International Conference on Computer Communications, INFOCOM 2016, San Francisco, CA, USA, April 10-14, 2016}
}
@inproceedings{conf/mobicom/DouZYR16,
title = {Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems: poster.},
year = {2016},
booktitle = {MobiCom},
author = {{Yanzhi Dou} and {Kexiong Curtis Zeng} and {Yaling Yang} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, MobiCom 2016, New York City, NY, USA, October 3-7, 2016}
}
@inproceedings{conf/mobicom/WangRZLKS16,
title = {Messages behind the sound: real-time hidden acoustic signal capture with smartphones.},
year = {2016},
booktitle = {MobiCom},
author = {{Qian Wang 002} and {Kui Ren 001} and {Man Zhou} and {Tao Lei} and {Dimitrios Koutsonikolas} and {Lu Su}},
publisher = {ACM},
booktitle = {Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, MobiCom 2016, New York City, NY, USA, October 3-7, 2016}
}
@inproceedings{conf/mobicom/WangRZLKS16a,
title = {Real-time hidden acoustic signal capture with smartphones: demo.},
year = {2016},
booktitle = {MobiCom},
author = {{Qian Wang 002} and {Kui Ren 001} and {Man Zhou} and {Tao Lei} and {Dimitrios Koutsonikolas} and {Lu Su}},
publisher = {ACM},
booktitle = {Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, MobiCom 2016, New York City, NY, USA, October 3-7, 2016}
}
@inproceedings{conf/mobihoc/DouZLYGGRL16,
title = {P2-SAS: preserving users' privacy in centralized dynamic spectrum access systems.},
year = {2016},
booktitle = {MobiHoc},
author = {{Yanzhi Dou} and {Kexiong Curtis Zeng} and {He Li 007} and {Yaling Yang} and {Bo Gao} and {Chaowen Guan} and {Kui Ren 001} and {Shaoqian Li}},
publisher = {ACM},
booktitle = {Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2016, Paderborn, Germany, July 4-8, 2016}
}
@inproceedings{conf/securecomm/WangLZWQR16,
title = {SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.},
year = {2016},
booktitle = {SecureComm},
author = {{Qian Wang 002} and {Xiao Lu} and {Yan Zhang} and {Zhibo Wang 001} and {Zhan Qin} and {Kui Ren 001}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}
}
@inproceedings{conf/wisa/MohaisenKR16,
title = {Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment.},
year = {2016},
booktitle = {WISA},
author = {{Aziz Mohaisen} and {Ah Reum Kang} and {Kui Ren 001}},
booktitle = {Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}
}
@article{journals/corr/FangCYCJYRT16,
title = {Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.},
year = {2016},
journal = {CoRR},
author = {{Jun-bin Fang} and {Zhen Che} and {Xiaolong Yu} and {Zhe Chen} and {Zoe Lin Jiang} and {Siu-Ming Yiu} and {Kui Ren 001} and {Xiaoqing Tan}}
}
@article{journals/csur/TangCLRLB16,
title = {Ensuring Security and Privacy Preservation for Cloud Data Services.},
year = {2016},
journal = {ACM Comput. Surv.},
author = {{Jun Tang} and {Yong Cui 001} and {Qi Li 002} and {Kui Ren 001} and {Jiangchuan Liu} and {Rajkumar Buyya}}
}
@article{journals/jcin/ChenQXR16,
title = {Securing acoustics-based short-range communication systems: an overview.},
year = {2016},
journal = {J. Commun. Inf. Networks},
author = {{Si Chen} and {Zhan Qin} and {Guoliang Xing} and {Kui Ren 001}}
}
@article{journals/percom/ChowHLR16,
title = {Special Issue on Security and Privacy in Mobile Clouds.},
year = {2016},
journal = {Pervasive Mob. Comput.},
author = {{Sherman S. M. Chow} and {Urs Hengartner} and {Joseph K. Liu} and {Kui Ren 001}}
}
@article{journals/tc/WangRW16,
title = {Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming.},
year = {2016},
journal = {IEEE Trans. Computers},
author = {{Cong Wang 001} and {Kui Ren 001} and {Jia Wang}}
}
@article{journals/tcbb/KermaniARB16,
title = {Guest Editorial: Introduction to the Special Section on Emerging Security Trends for Biomedical Computations, Devices, and Infrastructures.},
year = {2016},
journal = {IEEE ACM Trans. Comput. Biol. Bioinform.},
author = {{Mehran Mozaffari Kermani} and {Reza Azarderakhsh} and {Kui Ren 001} and {Jean-Luc Beuchat}}
}
@article{journals/tdsc/PanLPY0RF16,
title = {Password Extraction via Reconstructed Wireless Mouse Trajectory.},
year = {2016},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Xian Pan} and {Zhen Ling} and {Aniket Pingley} and {Wei Yu 002} and {Nan Zhang 004} and {Kui Ren 001} and {Xinwen Fu}}
}
@article{journals/tifs/FuWGSR16,
title = {Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.},
year = {2016},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Zhangjie Fu} and {Xinle Wu} and {Chaowen Guan} and {Xingming Sun} and {Kui Ren 001}}
}
@article{journals/tifs/WangSPZR16,
title = {Wireless Physical-Layer Identification: Modeling and Validation.},
year = {2016},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Wenhao Wang} and {Zhi Sun} and {Sixu Piao} and {Bocheng Zhu} and {Kui Ren 001}}
}
@article{journals/tifs/XiaWZQSR16,
title = {A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.},
year = {2016},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Zhihua Xia} and {Xinhui Wang} and {Liangao Zhang} and {Zhan Qin} and {Xingming Sun} and {Kui Ren 001}}
}
@article{journals/tifs/YuRW16,
title = {Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.},
year = {2016},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Jia Yu 005} and {Kui Ren 001} and {Cong Wang 001}}
}
@article{journals/tip/HuWWQR16,
title = {Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.},
year = {2016},
journal = {IEEE Trans. Image Process.},
author = {{Shengshan Hu} and {Qian Wang 002} and {Jingjun Wang} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/tmc/ZhangRXFW16,
title = {SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones.},
year = {2016},
journal = {IEEE Trans. Mob. Comput.},
author = {{Bingsheng Zhang} and {Kui Ren 001} and {Guoliang Xing} and {Xinwen Fu} and {Cong Wang 001}}
}
@article{journals/tmm/QinRYW16,
title = {DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud.},
year = {2016},
journal = {IEEE Trans. Multim.},
author = {{Zhan Qin} and {Kui Ren 001} and {Ting Yu 001} and {Jian Weng 001}}
}
@article{journals/tmm/YuanWWWR16,
title = {Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.},
year = {2016},
journal = {IEEE Trans. Multim.},
author = {{Xingliang Yuan} and {Xinyu Wang 007} and {Cong Wang 001} and {Jian Weng 001} and {Kui Ren 001}}
}
@article{journals/tomccap/QinYRCW16,
title = {SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing.},
year = {2016},
journal = {ACM Trans. Multim. Comput. Commun. Appl.},
author = {{Zhan Qin} and {Jingbo Yan} and {Kui Ren 001} and {Chang Wen Chen} and {Cong Wang 001}}
}
@article{journals/tpds/FuRSSH16,
title = {Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement.},
year = {2016},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Zhangjie Fu} and {Kui Ren 001} and {Jiangang Shu} and {Xingming Sun} and {Fengxiao Huang}}
}
@article{journals/tvt/WangRNH16,
title = {Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks.},
year = {2016},
journal = {IEEE Trans. Veh. Technol.},
author = {{Qian Wang 002} and {Kui Ren 001} and {Peng Ning} and {Shengshan Hu}}
}
@inproceedings{conf/acm/XuXSRFGC17,
title = {MINOS: regulating router dataplane actions in dynamic runtime environments.},
year = {2017},
booktitle = {ACM TUR-C},
author = {{Lei Xu 019} and {Ke Xu 002} and {Meng Shen 001} and {Kui Ren 001} and {Jingyuan Fan} and {Chaowen Guan} and {Wenlong Chen}},
publisher = {ACM},
booktitle = {Proceedings of the ACM Turing 50th Celebration Conference - China, TUR-C 2017, Shanghai, China, May 12-14, 2017}
}
@inproceedings{conf/ccs/QinYYKX017,
title = {Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.},
year = {2017},
booktitle = {CCS},
author = {{Zhan Qin} and {Ting Yu 001} and {Yin Yang 001} and {Issa Khalil} and {Xiaokui Xiao} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017}
}
@inproceedings{conf/cisc/Ren17,
title = {The Dual Role of Smartphones in IoT Security.},
year = {2017},
booktitle = {Inscrypt},
author = {{Kui Ren 001}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}
}
@inproceedings{conf/fc/Wang0DLM17,
title = {SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.},
year = {2017},
booktitle = {Financial Cryptography},
author = {{Qian Wang 002} and {Kui Ren 001} and {Minxin Du} and {Qi Li 002} and {Aziz Mohaisen}},
publisher = {Springer},
booktitle = {Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}
}
@inproceedings{conf/icdcs/BaR17,
title = {Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies.},
year = {2017},
booktitle = {ICDCS},
author = {{Zhongjie Ba} and {Kui Ren 001}},
publisher = {IEEE Computer Society},
booktitle = {37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017}
}
@inproceedings{conf/icdcs/ChenRPWWWSM17,
title = {You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.},
year = {2017},
booktitle = {ICDCS},
author = {{Si Chen} and {Kui Ren 001} and {Sixu Piao} and {Cong Wang 001} and {Qian Wang 002} and {Jian Weng 001} and {Lu Su} and {Aziz Mohaisen}},
publisher = {IEEE Computer Society},
booktitle = {37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017}
}
@inproceedings{conf/icdcs/DouLZLYGR17,
title = {Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access Systems.},
year = {2017},
booktitle = {ICDCS},
author = {{Yanzhi Dou} and {He Li 007} and {Kexiong Curtis Zeng} and {Jinshan Liu} and {Yaling Yang} and {Bo Gao} and {Kui Ren 001}},
publisher = {IEEE Computer Society},
booktitle = {37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017}
}
@inproceedings{conf/icdcs/GuanMSSRY17,
title = {When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access.},
year = {2017},
booktitle = {ICDCS},
author = {{Chaowen Guan} and {Aziz Mohaisen} and {Zhi Sun} and {Lu Su} and {Kui Ren 001} and {Yaling Yang}},
publisher = {IEEE Computer Society},
booktitle = {37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017}
}
@inproceedings{conf/icdcs/MohaisenGR17,
title = {Privacy Implications of DNSSEC Look-Aside Validation.},
year = {2017},
booktitle = {ICDCS},
author = {{Aziz Mohaisen} and {Zhongshu Gu} and {Kui Ren 001}},
publisher = {IEEE Computer Society},
booktitle = {37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017}
}
@inproceedings{conf/infocom/GaoPXHK17,
title = {FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks.},
year = {2017},
booktitle = {INFOCOM},
author = {{Shang Gao 006} and {Zhe Peng} and {Bin Xiao 001} and {Aiqun Hu} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017}
}
@inproceedings{conf/infocom/WangHDWR17,
title = {Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval.},
year = {2017},
booktitle = {INFOCOM},
author = {{Qian Wang 002} and {Shengshan Hu} and {Minxin Du} and {Jingjun Wang} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017}
}
@inproceedings{conf/iwqos/ZhangCQZYR17,
title = {When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid.},
year = {2017},
booktitle = {IWQoS},
author = {{Zijian Zhang 001} and {Wenqiang Cao} and {Zhan Qin} and {Liehuang Zhu} and {Zhengtao Yu 001} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {25th IEEE/ACM International Symposium on Quality of Service, IWQoS 2017, Vilanova i la Geltrú, Spain, June 14-16, 2017}
}
@inproceedings{conf/mobicom/LinSZXL017,
title = {Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System.},
year = {2017},
booktitle = {MobiCom},
author = {{Feng Lin 004} and {Chen Song 001} and {Yan Zhuang} and {Wenyao Xu} and {Changzhi Li} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, MobiCom 2017, Snowbird, UT, USA, October 16 - 20, 2017}
}
@inproceedings{conf/pac/BaP017,
title = {Defending against Speaker Fingerprinting Based Device Tracking for Smartphones.},
year = {2017},
booktitle = {PAC},
author = {{Zhongjie Ba} and {Sixu Piao} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, August 1-4, 2017}
}
@inproceedings{conf/pac/MohaisenG0NKN17,
title = {Understanding the Privacy Implications of DNSSEC Look-Aside Validation.},
year = {2017},
booktitle = {PAC},
author = {{Aziz Mohaisen} and {Zhongshu Gu} and {Kui Ren 001} and {Laurent Njilla} and {Charles A. Kamhoua} and {DaeHun Nyang}},
publisher = {IEEE},
booktitle = {IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, August 1-4, 2017}
}
@inproceedings{conf/pac/Shan0Q17,
title = {Privacy-Preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction.},
year = {2017},
booktitle = {PAC},
author = {{Zihao Shan} and {Kui Ren 001} and {Zhan Qin}},
publisher = {IEEE},
booktitle = {IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, August 1-4, 2017}
}
@inproceedings{conf/pac/ZhengS017,
title = {Data Independent Identification for Privacy Preservation.},
year = {2017},
booktitle = {PAC},
author = {{Tianhang Zheng} and {Zhi Sun} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, August 1-4, 2017}
}
@article{journals/access/WangSRZ17,
title = {User Capacity of Wireless Physical-Layer Identification.},
year = {2017},
journal = {IEEE Access},
author = {{Wenhao Wang} and {Zhi Sun} and {Kui Ren 001} and {Bocheng Zhu}}
}
@article{journals/cm/KongRKLRDN17,
title = {Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1.},
year = {2017},
journal = {IEEE Commun. Mag.},
author = {{Linghe Kong} and {Kui Ren 001} and {Muhammad Khurram Khan} and {Qi Li 002} and {Ammar Rayes} and {Mérouane Debbah} and {Yuichi Nakamura 002}}
}
@article{journals/cm/KongRKLRDN17a,
title = {Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2.},
year = {2017},
journal = {IEEE Commun. Mag.},
author = {{Linghe Kong} and {Kui Ren 001} and {Muhammad Khurram Khan} and {Qi Li 002} and {Ammar Rayes} and {Mérouane Debbah} and {Yuichi Nakamura 002}}
}
@article{journals/jsac/DouZLYGRL17,
title = {P2-SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System.},
year = {2017},
journal = {IEEE J. Sel. Areas Commun.},
author = {{Yanzhi Dou} and {Kexiong Curtis Zeng} and {He Li 007} and {Yaling Yang} and {Bo Gao} and {Kui Ren 001} and {Shaoqian Li}}
}
@article{journals/network/ZhuZQWR17,
title = {Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.},
year = {2017},
journal = {IEEE Netw.},
author = {{Liehuang Zhu} and {Zijian Zhang 001} and {Zhan Qin} and {Jian Weng 001} and {Kui Ren 001}}
}
@article{journals/tifs/FuHRWW17,
title = {Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.},
year = {2017},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Zhangjie Fu} and {Fengxiao Huang} and {Kui Ren 001} and {Jian Weng 001} and {Cong Wang 001}}
}
@article{journals/tifs/FuWWR17,
title = {Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data.},
year = {2017},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Zhangjie Fu} and {Xinle Wu} and {Qian Wang 002} and {Kui Ren 001}}
}
@article{journals/tifs/XuRZQR17,
title = {DPPro: Differentially Private High-Dimensional Data Release via Random Projection.},
year = {2017},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Chugui Xu} and {Ju Ren 001} and {Yaoxue Zhang} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/tmc/WangSRJ17,
title = {THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply.},
year = {2017},
journal = {IEEE Trans. Mob. Comput.},
author = {{Qian Wang 002} and {Qihang Sun} and {Kui Ren 001} and {Xiaohua Jia}}
}
@article{journals/ton/CuiSRLLRZ17,
title = {Software Defined Cooperative Offloading for Mobile Cloudlets.},
year = {2017},
journal = {IEEE/ACM Trans. Netw.},
author = {{Yong Cui 001} and {Jian Song} and {Kui Ren 001} and {Minming Li} and {Zongpeng Li} and {Qingmei Ren} and {Yangjun Zhang}}
}
@article{journals/ton/FanGRCQ17,
title = {SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox.},
year = {2017},
journal = {IEEE/ACM Trans. Netw.},
author = {{Jingyuan Fan} and {Chaowen Guan} and {Kui Ren 001} and {Yong Cui 001} and {Chunming Qiao}}
}
@article{journals/ton/LiLZSHR17,
title = {Capability-Based Security Enforcement in Named Data Networking.},
year = {2017},
journal = {IEEE/ACM Trans. Netw.},
author = {{Qi Li 002} and {Patrick P. C. Lee} and {Peng Zhang 011} and {Purui Su} and {Liang He} and {Kui Ren 001}}
}
@article{journals/ton/MohaisenR17,
title = {Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures.},
year = {2017},
journal = {IEEE/ACM Trans. Netw.},
author = {{Aziz Mohaisen} and {Kui Ren 001}}
}
@article{journals/tsg/ZhangQZWR17,
title = {Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.},
year = {2017},
journal = {IEEE Trans. Smart Grid},
author = {{Zijian Zhang 001} and {Zhan Qin} and {Liehuang Zhu} and {Jian Weng 001} and {Kui Ren 001}}
}
@inproceedings{conf/ccs/ShanQY018,
title = {SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction.},
year = {2018},
booktitle = {AsiaCCS},
author = {{Zihao Shan} and {Zhan Qin} and {Leslie Ying} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}
}
@inproceedings{conf/icpads/CuiZWLR18,
title = {Towards Privacy-Preserving Malware Detection Systems for Android.},
year = {2018},
booktitle = {ICPADS},
author = {{Helei Cui} and {Yajin Zhou} and {Cong Wang 001} and {Qi Li 002} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {24th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2018, Singapore, December 11-13, 2018}
}
@inproceedings{conf/infocom/HuCWWL018,
title = {Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.},
year = {2018},
booktitle = {INFOCOM},
author = {{Shengshan Hu} and {Chengjun Cai} and {Qian Wang 002} and {Cong Wang 001} and {Xiangyang Luo} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2018 IEEE Conference on Computer Communications, INFOCOM 2018, Honolulu, HI, USA, April 16-19, 2018}
}
@inproceedings{conf/infocom/LiuCTF0W18,
title = {Building Generic Scalable Middlebox Services Over Encrypted Protocols.},
year = {2018},
booktitle = {INFOCOM},
author = {{Cong Liu} and {Yong Cui 001} and {Kun Tan} and {Quan Fan} and {Kui Ren 001} and {Jianping Wu}},
publisher = {IEEE},
booktitle = {2018 IEEE Conference on Computer Communications, INFOCOM 2018, Honolulu, HI, USA, April 16-19, 2018}
}
@inproceedings{conf/kdd/LiMSGLDQ018,
title = {An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery.},
year = {2018},
booktitle = {KDD},
author = {{Yaliang Li} and {Chenglin Miao} and {Lu Su} and {Jing Gao 004} and {Qi Li 012} and {Bolin Ding} and {Zhan Qin} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD 2018, London, UK, August 19-23, 2018}
}
@inproceedings{conf/ndss/BaPFKM018,
title = {ABC: Enabling Smartphone Authentication with Built-in Camera.},
year = {2018},
booktitle = {NDSS},
author = {{Zhongjie Ba} and {Sixu Piao} and {Xinwen Fu} and {Dimitrios Koutsonikolas} and {Aziz Mohaisen} and {Kui Ren 001}},
publisher = {The Internet Society},
booktitle = {25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018}
}
@article{journals/cloudcomp/QinW0018,
title = {Privacy-Preserving Image Processing in the Cloud.},
year = {2018},
journal = {IEEE Cloud Comput.},
author = {{Zhan Qin} and {Jian Weng 001} and {Yong Cui 001} and {Kui Ren 001}}
}
@article{journals/compsec/ChunRJ18,
title = {Privacy-preserving power usage and supply control in smart grid.},
year = {2018},
journal = {Comput. Secur.},
author = {{Hu Chun} and {Kui Ren 001} and {Wei Jiang}}
}
@article{journals/corr/abs-1804-03385,
title = {What's (Not) Validating Network Paths: A Survey.},
year = {2018},
journal = {CoRR},
author = {{Kai Bu} and {Yutian Yang} and {Avery Laird} and {Jiaqing Luo} and {Yingjiu Li} and {Kui Ren 001}}
}
@article{journals/corr/abs-1812-01687,
title = {Learning Saliency Maps for Adversarial Point-Cloud Generation.},
year = {2018},
journal = {CoRR},
author = {{Tianhang Zheng} and {Changyou Chen} and {Junsong Yuan} and {Kui Ren 001}}
}
@article{journals/csur/ShanRBW18,
title = {Practical Secure Computation Outsourcing: A Survey.},
year = {2018},
journal = {ACM Comput. Surv.},
author = {{Zihao Shan} and {Kui Ren 001} and {Marina Blanton} and {Cong Wang 001}}
}
@article{journals/imwut/HanQYWDLR18,
title = {Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID.},
year = {2018},
journal = {Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.},
author = {{Jinsong Han} and {Chen Qian 001} and {Yuqin Yang} and {Ge Wang 003} and {Han Ding 002} and {Xin Li 057} and {Kui Ren 001}}
}
@article{journals/imwut/SongLXZJR18,
title = {My Smartphone Recognizes Genuine QR Codes!: Practical Unclonable QR Code via 3D Printing.},
year = {2018},
journal = {Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.},
author = {{Chen Song 001} and {Zhengxiong Li} and {Wenyao Xu} and {Chi Zhou 004} and {Zhanpeng Jin} and {Kui Ren 001}}
}
@article{journals/jzusc/ZhangLYZGR18,
title = {Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition.},
year = {2018},
journal = {Frontiers Inf. Technol. Electron. Eng.},
author = {{Fan Zhang 010} and {Ziyuan Liang} and {Bolin Yang} and {Xinjie Zhao 001} and {Shize Guo} and {Kui Ren 001}}
}
@article{journals/network/GaoZSSWR18,
title = {A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.},
year = {2018},
journal = {IEEE Netw.},
author = {{Feng Gao 019} and {Liehuang Zhu} and {Meng Shen 001} and {Kashif Sharif} and {Zhiguo Wan} and {Kui Ren 001}}
}
@article{journals/network/WangYCR18,
title = {Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond.},
year = {2018},
journal = {IEEE Netw.},
author = {{Cong Wang 001} and {Xingliang Yuan} and {Yong Cui 001} and {Kui Ren 001}}
}
@article{journals/tcc/XiaZSQR18,
title = {Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing.},
year = {2018},
journal = {IEEE Trans. Cloud Comput.},
author = {{Zhihua Xia} and {Yi Zhu} and {Xingming Sun} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/tches/0010L0BHDQR18,
title = {Persistent Fault Analysis on Block Ciphers.},
year = {2018},
journal = {IACR Trans. Cryptogr. Hardw. Embed. Syst.},
author = {{Fan Zhang 010} and {Xiaoxuan Lou} and {Xinjie Zhao 001} and {Shivam Bhasin} and {Wei He 015} and {Ruyi Ding} and {Samiya Qureshi} and {Kui Ren 001}}
}
@article{journals/tdsc/WangZLWQR18,
title = {Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.},
year = {2018},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Qian Wang 002} and {Yan Zhang} and {Xiao Lu} and {Zhibo Wang 001} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/tdsc/YuanWWSR18,
title = {Towards Privacy-Preserving and Practical Image-Centric Social Discovery.},
year = {2018},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Xingliang Yuan} and {Xinyu Wang 007} and {Cong Wang 001} and {Anna Cinzia Squicciarini} and {Kui Ren 001}}
}
@article{journals/ton/FanGRQ18,
title = {Middlebox-Based Packet-Level Redundancy Elimination Over Encrypted Network Traffic.},
year = {2018},
journal = {IEEE/ACM Trans. Netw.},
author = {{Jingyuan Fan} and {Chaowen Guan} and {Kui Ren 001} and {Chunming Qiao}}
}
@article{journals/ton/LiCLXR18,
title = {Security Policy Violations in SDN Data Plane.},
year = {2018},
journal = {IEEE/ACM Trans. Netw.},
author = {{Qi Li 002} and {Yanyu Chen} and {Patrick P. C. Lee} and {Mingwei Xu} and {Kui Ren 001}}
}
@article{journals/tpds/YuanWWR18,
title = {Secure Integrated Circuit Design via Hybrid Cloud.},
year = {2018},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Xingliang Yuan} and {Jian Weng 001} and {Cong Wang 001} and {Kui Ren 001}}
}
@article{journals/tpds/ZhuLWYWR18,
title = {Enabling Generic, Verifiable, and Secure Data Search in Cloud Services.},
year = {2018},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Jie Zhu} and {Qi Li 002} and {Cong Wang 001} and {Xingliang Yuan} and {Qian Wang 002} and {Kui Ren 001}}
}
@article{journals/tsc/BahlCCCHIINRRSS18,
title = {Editorial.},
year = {2018},
journal = {IEEE Trans. Serv. Comput.},
author = {{Victor Bahl} and {Barbara Carminati} and {James Caverlee} and {Ing-Ray Chen} and {Wynne Hsu} and {Toru Ishida 001} and {Valérie Issarny} and {Surya Nepal} and {Indrakshi Ray} and {Kui Ren 001} and {Shamik Sural} and {Mei-Ling Shyu}}
}
@article{journals/tsg/SarkerWLR18,
title = {Security and Cloud Outsourcing Framework for Economic Dispatch.},
year = {2018},
journal = {IEEE Trans. Smart Grid},
author = {{Mushfiqur R. Sarker} and {Jianhui Wang 001} and {Zuyi Li} and {Kui Ren 001}}
}
@article{journals/tsg/ZhaoLQR18,
title = {Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters.},
year = {2018},
journal = {IEEE Trans. Smart Grid},
author = {{Jia Zhao 005} and {Jiqiang Liu} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/twc/ZhouWLWR18,
title = {Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback.},
year = {2018},
journal = {IEEE Trans. Wirel. Commun.},
author = {{Man Zhou} and {Qian Wang 002} and {Tao Lei} and {Zhibo Wang 001} and {Kui Ren 001}}
}
@incollection{books/sp/18/ZhangHZ019,
title = {Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid.},
year = {2019},
booktitle = {Advances in Cyber Security},
author = {{Zijian Zhang 001} and {Jialing He} and {Liehuang Zhu} and {Kui Ren 001}},
publisher = {Springer},
booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications.}
}
@inproceedings{conf/aaai/ZhengC019,
title = {Distributionally Adversarial Attack.},
year = {2019},
booktitle = {AAAI},
author = {{Tianhang Zheng} and {Changyou Chen} and {Kui Ren 001}},
publisher = {AAAI Press},
booktitle = {The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI 2019, The Thirty-First Innovative Applications of Artificial Intelligence Conference, IAAI 2019, The Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019, Honolulu, Hawaii, USA, January 27 - February 1, 2019.}
}
@inproceedings{conf/asianhost/ZhangYYZB019,
title = {Fluctuating Power Logic: SCA Protection by \$V_\{DD\}\$ Randomization at the Cell-level.},
year = {2019},
booktitle = {AsianHOST},
author = {{Fan Zhang 010} and {Bolin Yang} and {Bojie Yang} and {Yiran Zhang} and {Shivam Bhasin} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2019, Xi'an, China, December 16-17, 2019}
}
@inproceedings{conf/blockchain2/WanGZ019,
title = {zk-AuthFeed: How to Feed Authenticated Data into Smart Contract with Zero Knowledge.},
year = {2019},
booktitle = {Blockchain},
author = {{Zhiguo Wan} and {Zhangshuang Guan} and {Yan Zhou} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}
}
@inproceedings{conf/ccs/DuanWYZW019,
title = {LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.},
year = {2019},
booktitle = {CCS},
author = {{Huayi Duan} and {Cong Wang 001} and {Xingliang Yuan} and {Yajin Zhou} and {Qian Wang 002} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019.}
}
@inproceedings{conf/cisc/Lou0XL0G019,
title = {Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance.},
year = {2019},
booktitle = {Inscrypt},
author = {{Xiaoxuan Lou} and {Fan Zhang 010} and {Guorui Xu} and {Ziyuan Liang} and {Xinjie Zhao 001} and {Shize Guo} and {Kui Ren 001}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}
}
@inproceedings{conf/cpsweek/HanLSR19,
title = {Trustworthy Authentication for IoT with Human-and-Environment-in-the-Loop.},
year = {2019},
booktitle = {SocialSens@CPSIoTWeek},
author = {{Jinsong Han} and {Feng Lin 004} and {Wenbo Shen} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the Fourth International Workshop on Social Sensing, SocialSens@CPSIoTWeek 2019. Montreal, QC, Canada, April 15, 2019}
}
@inproceedings{conf/desec/Zhang0YXSZ019,
title = {Persistent Fault Injection in FPGA via BRAM Modification.},
year = {2019},
booktitle = {DSC},
author = {{Yiran Zhang} and {Fan Zhang 010} and {Bolin Yang} and {Guorui Xu} and {Bin Shao} and {Xinjie Zhao 001} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2019 IEEE Conference on Dependable and Secure Computing, DSC 2019, Hangzhou, China, November 18-20, 2019}
}
@inproceedings{conf/globecom/WangHL019,
title = {WiPIN: Operation-Free Passive Person Identification Using Wi-Fi Signals.},
year = {2019},
booktitle = {GLOBECOM},
author = {{Fei Wang} and {Jinsong Han} and {Feng Lin 004} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2019 IEEE Global Communications Conference, GLOBECOM 2019, Waikoloa, HI, USA, December 9-13, 2019}
}
@inproceedings{conf/iccv/ZhengCYL019,
title = {PointCloud Saliency Maps.},
year = {2019},
booktitle = {ICCV},
author = {{Tianhang Zheng} and {Changyou Chen} and {Junsong Yuan} and {Bo Li} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2019 IEEE/CVF International Conference on Computer Vision, ICCV 2019, Seoul, Korea (South), October 27 - November 2, 2019}
}
@inproceedings{conf/icdcs/BaZQ019,
title = {CFP: Enabling Camera Fingerprint Concealment for Privacy-Preserving Image Sharing.},
year = {2019},
booktitle = {ICDCS},
author = {{Zhongjie Ba} and {Xinyu Zhang 016} and {Zhan Qin} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019, Dallas, TX, USA, July 7-10, 2019}
}
@inproceedings{conf/icmcs/WeiFWZCHC019,
title = {InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks.},
year = {2019},
booktitle = {ICME},
author = {{Qi Wei} and {Kai Fan 002} and {Wenlin Wang} and {Tianhang Zheng} and {Amit Chakraborty} and {Katherine A. Heller} and {Changyou Chen} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Multimedia and Expo, ICME 2019, Shanghai, China, July 8-12, 2019}
}
@inproceedings{conf/ijcai/ZhangZGMSL019,
title = {Data Poisoning Attack against Knowledge Graph Embedding.},
year = {2019},
booktitle = {IJCAI},
author = {{Hengtong Zhang} and {Tianhang Zheng} and {Jing Gao 004} and {Chenglin Miao} and {Lu Su} and {Yaliang Li} and {Kui Ren 001}},
publisher = {ijcai.org},
booktitle = {Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, Macao, China, August 10-16, 2019}
}
@inproceedings{conf/infocom/LiYDP019,
title = {PeDSS: Privacy Enhanced and Database-Driven Dynamic spectrum Sharing.},
year = {2019},
booktitle = {INFOCOM},
author = {{He Li 007} and {Yaling Yang} and {Yanzhi Dou} and {Jung-Min "Jerry" Park} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29 - May 2, 2019}
}
@inproceedings{conf/infocom/PiaoBSKL019,
title = {Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution.},
year = {2019},
booktitle = {INFOCOM},
author = {{Sixu Piao} and {Zhongjie Ba} and {Lu Su} and {Dimitrios Koutsonikolas} and {Shi Li 001} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29 - May 2, 2019}
}
@inproceedings{conf/infocom/ZhengS019,
title = {FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification.},
year = {2019},
booktitle = {INFOCOM},
author = {{Tianhang Zheng} and {Zhi Sun} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29 - May 2, 2019}
}
@inproceedings{conf/raid/ChengHLZLLR19,
title = {Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum.},
year = {2019},
booktitle = {RAID},
author = {{Zhen Cheng} and {Xinrui Hou} and {Runhuai Li} and {Yajin Zhou} and {Xiapu Luo} and {Jinku Li} and {Kui Ren 001}},
publisher = {USENIX Association},
booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019.}
}
@article{journals/cn/WuXLLRYSR19,
title = {RFL: Robust fault localization on unreliable communication channels.},
year = {2019},
journal = {Comput. Networks},
author = {{Bo Wu} and {Ke Xu 002} and {Qi Li 002} and {Bingyang Liu} and {Shoushou Ren} and {Fan Yang} and {Meng Shen 001} and {Kui Ren 001}}
}
@article{journals/corr/abs-1904-12052,
title = {Towards Data Poisoning Attack against Knowledge Graph Embedding.},
year = {2019},
journal = {CoRR},
author = {{Hengtong Zhang} and {Tianhang Zheng} and {Jing Gao 004} and {Chenglin Miao} and {Lu Su} and {Yaliang Li} and {Kui Ren 001}}
}
@article{journals/corr/abs-1912-10666,
title = {ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels.},
year = {2019},
journal = {CoRR},
author = {{Yutian Yang} and {Songbo Zhu} and {Wenbo Shen} and {Yajin Zhou} and {Jiadong Sun} and {Kui Ren 001}}
}
@article{journals/iacr/PanB0R19,
title = {One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis.},
year = {2019},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jingyu Pan} and {Shivam Bhasin} and {Fan Zhang 010} and {Kui Ren 001}}
}
@article{journals/iotj/LiLWRB19,
title = {Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Fenghua Li} and {Hui Li 006} and {Cong Wang 001} and {Kui Ren 001} and {Elisa Bertino}}
}
@article{journals/iotj/MaLLMR19,
title = {Lightweight Privacy-Preserving Ensemble Classification for Face Recognition.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Zhuo Ma} and {Yang Liu 118} and {Ximeng Liu} and {Jianfeng Ma 001} and {Kui Ren 001}}
}
@article{journals/iotj/XuRSZQR19,
title = {EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Chugui Xu} and {Ju Ren 001} and {Liang She} and {Yaoxue Zhang} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/iotj/ZhangLCKR19,
title = {PriWhisper+: An Enhanced Acoustic Short-Range Communication System for Smartphones.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Xiao Zhang 023} and {Jiqiang Liu} and {Si Chen} and {Yongjun Kong} and {Kui Ren 001}}
}
@article{journals/sensors/GuWSTRL19,
title = {A Practical Neighbor Discovery Framework for Wireless Sensor Networks.},
year = {2019},
journal = {Sensors},
author = {{Zhaoquan Gu} and {Yuexuan Wang} and {Wei Shi 001} and {Zhihong Tian} and {Kui Ren 001} and {Francis C. M. Lau 001}}
}
@article{journals/tifs/BaQFR19,
title = {CIM: Camera in Motion for Smartphone Authentication.},
year = {2019},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Zhongjie Ba} and {Zhan Qin} and {Xinwen Fu} and {Kui Ren 001}}
}
@article{journals/tifs/XuRZZQR19,
title = {GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy.},
year = {2019},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Chugui Xu} and {Ju Ren 001} and {Deyu Zhang} and {Yaoxue Zhang} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/tmc/ZhouWRKSC19,
title = {Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones.},
year = {2019},
journal = {IEEE Trans. Mob. Comput.},
author = {{Man Zhou} and {Qian Wang 002} and {Kui Ren 001} and {Dimitrios Koutsonikolas} and {Lu Su} and {Yanjiao Chen}}
}
@article{journals/ton/CuiDLLLHRC19,
title = {TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints.},
year = {2019},
journal = {IEEE/ACM Trans. Netw.},
author = {{Yong Cui 001} and {Ningwei Dai} and {Zeqi Lai} and {Minming Li} and {Zhenhua Li 001} and {Yuming Hu} and {Kui Ren 001} and {Yuchi Chen}}
}
@article{journals/tosn/MiaoJSLGQXGR19,
title = {Privacy-Preserving Truth Discovery in Crowd Sensing Systems.},
year = {2019},
journal = {ACM Trans. Sens. Networks},
author = {{Chenglin Miao} and {Wenjun Jiang} and {Lu Su} and {Yaliang Li} and {Suxin Guo} and {Zhan Qin} and {Houping Xiao} and {Jing Gao 004} and {Kui Ren 001}}
}
@article{journals/tvt/MaZLLR19,
title = {Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory.},
year = {2019},
journal = {IEEE Trans. Veh. Technol.},
author = {{Zhuo Ma} and {Tian Zhang} and {Ximeng Liu} and {Xinghua Li 001} and {Kui Ren 001}}
}
@article{journals/wc/RenQB19,
title = {Toward Hardware-Rooted Smartphone Authentication.},
year = {2019},
journal = {IEEE Wirel. Commun.},
author = {{Kui Ren 001} and {Zhan Qin} and {Zhongjie Ba}}
}
@article{journals/wc/ZhouQLHWR19,
title = {Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars.},
year = {2019},
journal = {IEEE Wirel. Commun.},
author = {{Man Zhou} and {Zhan Qin} and {Xiu Lin} and {Shengshan Hu} and {Qian Wang 002} and {Kui Ren 001}}
}
@inproceedings{conf/ccs/LuFHH0QZ020,
title = {Faster Secure Multiparty Computation of Adaptive Gradient Descent.},
year = {2020},
booktitle = {PPMLP@CCS},
author = {{Wen-jie Lu} and {Yixuan Fang} and {Zhicong Huang} and {Cheng Hong} and {Chaochao Chen 001} and {Hunter Qu} and {Yajin Zhou} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, Virtual Event, USA, November, 2020}
}
@inproceedings{conf/codaspy/SunZSZ020,
title = {PESC: A Per System-Call Stack Canary Design for Linux Kernel.},
year = {2020},
booktitle = {CODASPY},
author = {{Jiadong Sun} and {Xia Zhou} and {Wenbo Shen} and {Yajin Zhou} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020.}
}
@inproceedings{conf/dac/ZhangSXYYQ020,
title = {From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices.},
year = {2020},
booktitle = {DAC},
author = {{Fan Zhang 010} and {Bin Shao} and {Guorui Xu} and {Bolin Yang} and {Ziqi Yang} and {Zhan Qin} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {57th ACM/IEEE Design Automation Conference, DAC 2020, San Francisco, CA, USA, July 20-24, 2020}
}
@inproceedings{conf/icdcs/00010LJ0ZWC020,
title = {HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services.},
year = {2020},
booktitle = {ICDCS},
author = {{Kui Ren 001} and {Yu Guo 003} and {Jiaqi Li} and {Xiaohua Jia} and {Cong Wang 001} and {Yajin Zhou} and {Sheng Wang 011} and {Ning Cao 001} and {Feifei Li 001}},
publisher = {IEEE},
booktitle = {40th IEEE International Conference on Distributed Computing Systems, ICDCS 2020, Singapore, November 29 - December 1, 2020}
}
@inproceedings{conf/icdcs/LiXQMSG0D20,
title = {Towards Differentially Private Truth Discovery for Crowd Sensing Systems.},
year = {2020},
booktitle = {ICDCS},
author = {{Yaliang Li} and {Houping Xiao} and {Zhan Qin} and {Chenglin Miao} and {Lu Su} and {Jing Gao 004} and {Kui Ren 001} and {Bolin Ding}},
publisher = {IEEE},
booktitle = {40th IEEE International Conference on Distributed Computing Systems, ICDCS 2020, Singapore, November 29 - December 1, 2020}
}
@inproceedings{conf/icdcs/LiuMLMND020,
title = {Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing.},
year = {2020},
booktitle = {ICDCS},
author = {{Yang Liu 118} and {Zhuo Ma} and {Ximeng Liu} and {Siqi Ma} and {Surya Nepal} and {Robert H. Deng} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {40th IEEE International Conference on Distributed Computing Systems, ICDCS 2020, Singapore, November 29 - December 1, 2020}
}
@inproceedings{conf/iotdi/WangFWLR20,
title = {Poster Abstract: Secure Remote Key Initialization of Wireless IoT.},
year = {2020},
booktitle = {IoTDI},
author = {{Chao Wang 097} and {Linzhu Fang} and {Yongdong Wu} and {Feng Lin 004} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, IoTDI 2020, Sydney, Australia, April 21-24, 2020}
}
@inproceedings{conf/issta/JiangZLWL020,
title = {An empirical study on ARM disassembly tools.},
year = {2020},
booktitle = {ISSTA},
author = {{Muhui Jiang} and {Yajin Zhou} and {Xiapu Luo} and {Ruoyu Wang 001} and {Yang Liu 003} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, USA, July 18-22, 2020}
}
@inproceedings{conf/iwqos/LiuZH0020,
title = {BioDraw: Reliable Multi-Factor User Authentication with One Single Finger Swipe.},
year = {2020},
booktitle = {IWQoS},
author = {{Jianwei Liu 008} and {Xiang Zou} and {Jinsong Han} and {Feng Lin 004} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {28th IEEE/ACM International Symposium on Quality of Service, IWQoS 2020, Hangzhou, China, June 15-17, 2020}
}
@inproceedings{conf/mobicom/BaZQYLLLR20,
title = {Accelerometer-based smartphone eavesdropping.},
year = {2020},
booktitle = {MobiCom},
author = {{Zhongjie Ba} and {Tianhang Zheng} and {Zhan Qin} and {Hanlin Yu} and {Liu Liu} and {Baochun Li} and {Xue Liu 001} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, London, United Kingdom, September 21-25, 2020}
}
@inproceedings{conf/mobicom/Gao0XNHX020,
title = {Deaf-aid: mobile IoT communication exploiting stealthy speaker-to-gyroscope channel.},
year = {2020},
booktitle = {MobiCom},
author = {{Ming Gao} and {Feng Lin 004} and {Weiye Xu} and {Muertikepu Nuermaimaiti} and {Jinsong Han} and {Wenyao Xu} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, London, United Kingdom, September 21-25, 2020}
}
@inproceedings{conf/mobisys/RathoreZDXWL0X20,
title = {SonicPrint: a generally adoptable and secure fingerprint biometrics in smart devices.},
year = {2020},
booktitle = {MobiSys},
author = {{Aditya Singh Rathore} and {Weijin Zhu} and {Afee Daiyan} and {Chenhan Xu} and {Kun Wang 005} and {Feng Lin 004} and {Kui Ren 001} and {Wenyao Xu}},
publisher = {ACM},
booktitle = {MobiSys '20: The 18th Annual International Conference on Mobile Systems, Applications, and Services, Toronto, Ontario, Canada, June 15-19, 2020}
}
@inproceedings{conf/ndss/BaZZQLL020,
title = {Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.},
year = {2020},
booktitle = {NDSS},
author = {{Zhongjie Ba} and {Tianhang Zheng} and {Xinyu Zhang 016} and {Zhan Qin} and {Baochun Li} and {Xue Liu 001} and {Kui Ren 001}},
publisher = {The Internet Society},
booktitle = {27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020}
}
@inproceedings{conf/ndss/TanZB020,
title = {PhantomCache: Obfuscating Cache Conflicts with Localized Randomization.},
year = {2020},
booktitle = {NDSS},
author = {{Qinhan Tan} and {Zhihua Zeng} and {Kai Bu} and {Kui Ren 001}},
publisher = {The Internet Society},
booktitle = {27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020}
}
@inproceedings{conf/sensys/LiXRLZ0WSL0X20,
title = {VocalPrint: exploring a resilient and secure voice authentication via mmWave biometric interrogation.},
year = {2020},
booktitle = {SenSys},
author = {{Huining Li} and {Chenhan Xu} and {Aditya Singh Rathore} and {Zhengxiong Li} and {Hanbin Zhang} and {Chen Song 001} and {Kun Wang 005} and {Lu Su} and {Feng Lin 004} and {Kui Ren 001} and {Wenyao Xu}},
publisher = {ACM},
booktitle = {SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, Virtual Event, Japan, November 16-19, 2020}
}
@article{journals/chinaf/ZhangXYLR20,
title = {Theoretical analysis of persistent fault attack.},
year = {2020},
journal = {Sci. China Inf. Sci.},
author = {{Fan Zhang 010} and {Guorui Xu} and {Bolin Yang} and {Ziyuan Liang} and {Kui Ren 001}}
}
@article{journals/cn/MaBWLR20,
title = {Atlas: A First Step Toward Multipath Validation.},
year = {2020},
journal = {Comput. Networks},
author = {{Lin Ma} and {Kai Bu} and {Ningchao Wu} and {Tianxiang Luo} and {Kui Ren 001}}
}
@article{journals/corr/abs-2004-03961,
title = {Adversary Helps: Gradient-based Device-Free Domain-Independent Gesture Recognition.},
year = {2020},
journal = {CoRR},
author = {{Jianwei Liu 008} and {Jinsong Han} and {Feng Lin 004} and {Kui Ren 001}}
}
@article{journals/corr/abs-2004-04909,
title = {A Framework for Behavior Privacy Preserving in Radio Frequency Signal.},
year = {2020},
journal = {CoRR},
author = {{Jianwei Liu 008} and {Jinsong Han} and {Lei Yang} and {Fei Wang} and {Feng Lin 004} and {Kui Ren 001}}
}
@article{journals/corr/abs-2005-07151,
title = {Towards Understanding the Adversarial Vulnerability of Skeleton-based Action Recognition.},
year = {2020},
journal = {CoRR},
author = {{Tianhang Zheng} and {Sheng Liu} and {Changyou Chen} and {Junsong Yuan} and {Baochun Li} and {Kui Ren 001}}
}
@article{journals/corr/abs-2005-08278,
title = {EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum.},
year = {2020},
journal = {CoRR},
author = {{Lei Wu 012} and {Siwei Wu} and {Yajin Zhou} and {Runhuai Li} and {Zhi Wang 004} and {Xiapu Luo} and {Cong Wang 001} and {Kui Ren 001}}
}
@article{journals/corr/abs-2009-13738,
title = {DUMP: A Dummy-Point-Based Framework for Histogram Estimation in Shuffle Model.},
year = {2020},
journal = {CoRR},
author = {{Xiaochen Li} and {Weiran Liu} and {Ziyi Chen} and {Kunzhe Huang} and {Zhan Qin} and {Lei Zhang} and {Kui Ren 001}}
}
@article{journals/corr/abs-2010-12252,
title = {Towards understanding flash loan and its applications in defi ecosystem.},
year = {2020},
journal = {CoRR},
author = {{Dabao Wang} and {Siwei Wu} and {Ziling Lin} and {Lei Wu 012} and {Xingliang Yuan} and {Yajin Zhou} and {Haoyu Wang 001} and {Kui Ren 001}}
}
@article{journals/corr/abs-2010-12400,
title = {Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.},
year = {2020},
journal = {CoRR},
author = {{Yuan Chen} and {Jiaqi Li} and {Guorui Xu} and {Yajin Zhou} and {Zhi Wang 004} and {Cong Wang 001} and {Kui Ren 001}}
}
@article{journals/corr/abs-2011-02796,
title = {FederBoost: Private Federated Learning for GBDT.},
year = {2020},
journal = {CoRR},
author = {{Zhihua Tian} and {Rui Zhang} and {Xiaoyang Hou} and {Jian Liu 012} and {Kui Ren 001}}
}
@article{journals/iacr/LiangLZZLZR20,
title = {A Framework of Private Set Intersection Protocols.},
year = {2020},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ziyuan Liang} and {Weiran Liu} and {Fan Zhang 010} and {Bingsheng Zhang} and {Jian Liu 012} and {Lei Zhang} and {Kui Ren 001}}
}
@article{journals/iacr/LuZLZR20,
title = {Silent Two-party Computation Assisted by Semi-trusted Hardware.},
year = {2020},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yibiao Lu} and {Bingsheng Zhang} and {Weiran Liu} and {Lei Zhang} and {Kui Ren 001}}
}
@article{journals/pieee/RenWWQL20,
title = {The Security of Autonomous Driving: Threats, Defenses, and Future Directions.},
year = {2020},
journal = {Proc. IEEE},
author = {{Kui Ren 001} and {Qian Wang 002} and {Cong Wang 001} and {Zhan Qin} and {Xiaodong Lin 001}}
}
@article{journals/tc/0010YDG00Z020,
title = {Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE.},
year = {2020},
journal = {IEEE Trans. Computers},
author = {{Fan Zhang 010} and {Bolin Yang} and {Xiaofei Dong} and {Sylvain Guilley} and {Zhe Liu 001} and {Wei He 015} and {Fangguo Zhang} and {Kui Ren 001}}
}
@article{journals/tches/ZhangZJZBZLGR20,
title = {Persistent Fault Attack in Practice.},
year = {2020},
journal = {IACR Trans. Cryptogr. Hardw. Embed. Syst.},
author = {{Fan Zhang 010} and {Yiran Zhang} and {Huilong Jiang} and {Xiang Zhu} and {Shivam Bhasin} and {Xinjie Zhao 001} and {Zhe Liu 001} and {Dawu Gu} and {Kui Ren 001}}
}
@article{journals/tdsc/MohaisenGRLKNN20,
title = {Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation.},
year = {2020},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Aziz Mohaisen} and {Zhongshu Gu} and {Kui Ren 001} and {Zhenhua Li 001} and {Charles A. Kamhoua} and {Laurent L. Njilla} and {DaeHun Nyang}}
}
@article{journals/tdsc/ZhangYHWR20,
title = {Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.},
year = {2020},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Yue Zhang 035} and {Jia Yu 005} and {Rong Hao} and {Cong Wang 001} and {Kui Ren 001}}
}
@article{journals/tdsc/ZhangZWWSR20,
title = {You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.},
year = {2020},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Leo Yu Zhang} and {Yifeng Zheng} and {Jian Weng 001} and {Cong Wang 001} and {Zihao Shan} and {Kui Ren 001}}
}
@article{journals/tifs/0002LWW0N0020,
title = {Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Xiao Chen 002} and {Chaoran Li} and {Derui Wang} and {Sheng Wen} and {Jun Zhang 010} and {Surya Nepal} and {Yang Xiang 001} and {Kui Ren 001}}
}
@article{journals/tifs/HeBLCGR20,
title = {Atomos: Constant-Size Path Validation Proof.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Anxiao He} and {Kai Bu} and {Yucong Li} and {Eikoh Chida} and {Qianping Gu} and {Kui Ren 001}}
}
@article{journals/tifs/Yuan000020,
title = {PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Dong Yuan} and {Qi Li 002} and {Guoliang Li 001} and {Qian Wang 002} and {Kui Ren 001}}
}
@article{journals/tifs/ZhangDYZR20,
title = {A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Fan Zhang 010} and {Xiaofei Dong} and {Bolin Yang} and {Yajin Zhou} and {Kui Ren 001}}
}
@article{journals/tifs/ZhouCQD020,
title = {LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Jun Zhou 018} and {Zhenfu Cao} and {Zhan Qin} and {Xiaolei Dong} and {Kui Ren 001}}
}
@article{journals/tii/MaYLLMRY20,
title = {EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid.},
year = {2020},
journal = {IEEE Trans. Ind. Informatics},
author = {{Zhuo Ma} and {Yilong Yang 004} and {Ximeng Liu} and {Yang Liu 118} and {Siqi Ma} and {Kui Ren 001} and {Chang Yao}}
}
@article{journals/ton/GaoPXHSR20,
title = {Detection and Mitigation of DoS Attacks in Software Defined Networks.},
year = {2020},
journal = {IEEE/ACM Trans. Netw.},
author = {{Shang Gao 006} and {Zhe Peng} and {Bin Xiao 001} and {Aiqun Hu} and {Yubo Song} and {Kui Ren 001}}
}
@inproceedings{conf/apsys/MaXSZXSC021,
title = {Revisiting challenges for selective data protection of real applications.},
year = {2021},
booktitle = {APSys},
author = {{Lin Ma} and {Jinyan Xu} and {Jiadong Sun} and {Yajin Zhou} and {Xun Xie} and {Wenbo Shen} and {Rui Chang} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {APSys '21: 12th ACM SIGOPS Asia-Pacific Workshop on Systems, Hong Kong, China, August 24-25, 2021}
}
@inproceedings{conf/asiaccs/Ren21,
title = {Encrypted Databases: Progresses and Challenges.},
year = {2021},
booktitle = {AsiaCCS},
author = {{Kui Ren 001}},
publisher = {ACM},
booktitle = {ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021.}
}
@inproceedings{conf/ccs/JiangMZLZWLW021,
title = {ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels.},
year = {2021},
booktitle = {CCS},
author = {{Muhui Jiang} and {Lin Ma} and {Yajin Zhou} and {Qiang Liu} and {Cen Zhang} and {Zhi Wang 004} and {Xiapu Luo} and {Lei Wu 012} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}
}
@inproceedings{conf/ccs/YangSLYLXZQY0021,
title = {Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.},
year = {2021},
booktitle = {CCS},
author = {{Nanzi Yang} and {Wenbo Shen} and {Jinku Li} and {Yutian Yang} and {Kangjie Lu} and {Jietao Xiao} and {Tianyu Zhou} and {Chenggang Qin} and {Wang Yu} and {Jianfeng Ma 001} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}
}
@inproceedings{conf/esorics/LuZZLZR21,
title = {Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation.},
year = {2021},
booktitle = {ESORICS (2)},
author = {{Yibiao Lu} and {Bingsheng Zhang} and {Hong-Sheng Zhou} and {Weiran Liu} and {Lei Zhang} and {Kui Ren 001}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II}
}
@inproceedings{conf/esorics/ZhangCLZTZ021,
title = {Succinct Scriptable NIZK via Trusted Hardware.},
year = {2021},
booktitle = {ESORICS (1)},
author = {{Bingsheng Zhang} and {Yuan Chen} and {Jiaqi Li} and {Yajin Zhou} and {Phuc Thai} and {Hong-Sheng Zhou} and {Kui Ren 001}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I}
}
@inproceedings{conf/esorics/ZhouCLZR21,
title = {Zero Knowledge Contingent Payments for Trained Neural Networks.},
year = {2021},
booktitle = {ESORICS (2)},
author = {{Zhelei Zhou} and {Xinle Cao} and {Jian Liu 012} and {Bingsheng Zhang} and {Kui Ren 001}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II}
}
@inproceedings{conf/icc/LiuYBLL021,
title = {PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting.},
year = {2021},
booktitle = {ICC},
author = {{Liu Liu} and {Hanlin Yu} and {Zhongjie Ba} and {Li Lu 008} and {Feng Lin 004} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {ICC 2021 - IEEE International Conference on Communications, Montreal, QC, Canada, June 14-23, 2021}
}
@inproceedings{conf/iccv/WangGZLQ021,
title = {Feature Importance-aware Transferable Adversarial Attacks.},
year = {2021},
booktitle = {ICCV},
author = {{Zhibo Wang 001} and {Hengchang Guo} and {Zhifei Zhang} and {Wenxin Liu} and {Zhan Qin} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {2021 IEEE/CVF International Conference on Computer Vision, ICCV 2021, Montreal, QC, Canada, October 10-17, 2021}
}
@inproceedings{conf/icdcs/LiuSSHXR21,
title = {MandiPass: Secure and Usable User Authentication via Earphone IMU.},
year = {2021},
booktitle = {ICDCS},
author = {{Jianwei Liu 008} and {Wenfan Song} and {Leming Shen} and {Jinsong Han} and {Xian Xu} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {41st IEEE International Conference on Distributed Computing Systems, ICDCS 2021, Washington DC, USA, July 7-10, 2021}
}
@inproceedings{conf/icdcs/LiuZLHXR21,
title = {Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFID.},
year = {2021},
booktitle = {ICDCS},
author = {{Jianwei Liu 008} and {Xiang Zou} and {Feng Lin 004} and {Jinsong Han} and {Xian Xu} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {41st IEEE International Conference on Distributed Computing Systems, ICDCS 2021, Washington DC, USA, July 7-10, 2021}
}
@inproceedings{conf/infocom/XuLZZ0H0021,
title = {RFace: Anti-Spoofing Facial Authentication Using COTS RFID.},
year = {2021},
booktitle = {INFOCOM},
author = {{Weiye Xu} and {Jianwei Liu 008} and {Shimin Zhang} and {Yuanqing Zheng} and {Feng Lin 004} and {Jinsong Han} and {Fu Xiao 001} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {40th IEEE Conference on Computer Communications, INFOCOM 2021, Vancouver, BC, Canada, May 10-13, 2021}
}
@inproceedings{conf/iwqos/LiuXCHX0M21,
title = {A Behavior Privacy Preserving Method towards RF Sensing.},
year = {2021},
booktitle = {IWQoS},
author = {{Jianwei Liu 008} and {Chaowei Xiao} and {Kaiyan Cui} and {Jinsong Han} and {Xian Xu} and {Kui Ren 001} and {XuFei Mao}},
publisher = {IEEE},
booktitle = {29th IEEE/ACM International Symposium on Quality of Service, IWQOS 2021, Tokyo, Japan, June 25-28, 2021}
}
@inproceedings{conf/kbse/LiuZMJZWSLL021,
title = {FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution.},
year = {2021},
booktitle = {ASE},
author = {{Qiang Liu} and {Cen Zhang} and {Lin Ma} and {Muhui Jiang} and {Yajin Zhou} and {Lei Wu 012} and {Wenbo Shen} and {Xiapu Luo} and {Yang Liu 003} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {36th IEEE/ACM International Conference on Automated Software Engineering, ASE 2021, Melbourne, Australia, November 15-19, 2021}
}
@inproceedings{conf/sensys/0002G0WBHX021,
title = {Wavoice: A Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals.},
year = {2021},
booktitle = {SenSys},
author = {{Tiantian Liu 002} and {Ming Gao} and {Feng Lin 004} and {Chao Wang 097} and {Zhongjie Ba} and {Jinsong Han} and {Wenyao Xu} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15 - 17, 2021}
}
@inproceedings{conf/sensys/XiaoLH021,
title = {OneFi: One-Shot Recognition for Unseen Gesture via COTS WiFi.},
year = {2021},
booktitle = {SenSys},
author = {{Rui Xiao 002} and {Jianwei Liu 008} and {Jinsong Han} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15 - 17, 2021}
}
@inproceedings{conf/tpsisa/YangSRLR21,
title = {Security Challenges in the Container Cloud.},
year = {2021},
booktitle = {TPS-ISA},
author = {{Yutian Yang} and {Wenbo Shen} and {Bonan Ruan} and {Wenmao Liu} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021, Atlanta, GA, USA, December 13-15, 2021}
}
@inproceedings{conf/www/WuHZWLW0021,
title = {Towards Understanding and Demystifying Bitcoin Mixing Services.},
year = {2021},
booktitle = {WWW},
author = {{Lei Wu 012} and {Yufeng Hu} and {Yajin Zhou} and {Haoyu Wang 001} and {Xiapu Luo} and {Zhi Wang 004} and {Fan Zhang 010} and {Kui Ren 001}},
publisher = {ACM / IW3C2},
booktitle = {WWW '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021.}
}
@article{journals/concurrency/LinLJR21,
title = {Multiple-replica integrity auditing schemes for cloud data storage.},
year = {2021},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Yangfei Lin} and {Jie Li 002} and {Xiaohua Jia} and {Kui Ren 001}}
}
@article{journals/corr/abs-2104-15068,
title = {DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications.},
year = {2021},
journal = {CoRR},
author = {{Siwei Wu} and {Dabao Wang} and {Jianting He} and {Yajin Zhou} and {Lei Wu 012} and {Xingliang Yuan} and {Qinming He} and {Kui Ren 001}}
}
@article{journals/corr/abs-2105-14298,
title = {A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices.},
year = {2021},
journal = {CoRR},
author = {{Dingding Wang 003} and {Muhui Jiang} and {Rui Chang} and {Yajin Zhou} and {Baolei Hou} and {Xiapu Luo} and {Lei Wu 012} and {Kui Ren 001}}
}
@article{journals/corr/abs-2106-05756,
title = {Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE.},
year = {2021},
journal = {CoRR},
author = {{Zhuo Chen} and {Lei Wu 012} and {Jing Cheng} and {Yubo Hu} and {Yajin Zhou} and {Zhushou Tang} and {Yexuan Chen} and {Jinku Li} and {Kui Ren 001}}
}
@article{journals/corr/abs-2108-09454,
title = {"Adversarial Examples" for Proof-of-Learning.},
year = {2021},
journal = {CoRR},
author = {{Rui Zhang} and {Jian Liu 012} and {Yuan Ding} and {Qingbiao Wu} and {Kui Ren 001}}
}
@article{journals/csur/BuLYCLLR20,
title = {Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation.},
year = {2021},
journal = {ACM Comput. Surv.},
author = {{Kai Bu} and {Avery Laird} and {Yutian Yang} and {Linfeng Cheng} and {Jiaqing Luo} and {Yingjiu Li} and {Kui Ren 001}}
}
@article{journals/iacr/JiZLLR21,
title = {UC Secure Private Branching Program and Decision Tree Evaluation.},
year = {2021},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Keyu Ji} and {Bingsheng Zhang} and {Tianpei Lu} and {Lichun Li} and {Kui Ren 001}}
}
@article{journals/iacr/ZhouCLZR21,
title = {ZK Contingent Payments for Trained Neural Networks.},
year = {2021},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Zhelei Zhou} and {Xinle Cao} and {Jian Liu 012} and {Bingsheng Zhang} and {Kui Ren 001}}
}
@article{journals/pieee/JiangWHWLSR21,
title = {Building In-the-Cloud Network Functions: Security and Privacy Challenges.},
year = {2021},
journal = {Proc. IEEE},
author = {{Peipei Jiang 002} and {Qian Wang 002} and {Muqi Huang} and {Cong Wang 001} and {Qi Li 002} and {Chao Shen 001} and {Kui Ren 001}}
}
@article{journals/pvldb/CaoLLR21,
title = {Cryptanalysis of An Encrypted Database in SIGMOD '14.},
year = {2021},
journal = {Proc. VLDB Endow.},
author = {{Xinle Cao} and {Jian Liu 012} and {Hao Lu} and {Kui Ren 001}}
}
@article{journals/pvldb/LiuLZR0L0PS21,
title = {Demonstration of Dealer: An End-to-End Model Marketplace with Differential Privacy.},
year = {2021},
journal = {Proc. VLDB Endow.},
author = {{Jinfei Liu} and {Qiongqiong Lin} and {Jiayao Zhang 006} and {Kui Ren 001} and {Jian Lou 001} and {Junxu Liu} and {Li Xiong 001} and {Jian Pei} and {Jimeng Sun 001}}
}
@article{journals/tcad/XuZYZHR21,
title = {Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers.},
year = {2021},
journal = {IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.},
author = {{Guorui Xu} and {Fan Zhang 010} and {Bolin Yang} and {Xinjie Zhao 001} and {Wei He 015} and {Kui Ren 001}}
}
@article{journals/tcad/ZhangYYZRBR21,
title = {Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level.},
year = {2021},
journal = {IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.},
author = {{Fan Zhang 010} and {Bolin Yang} and {Bojie Yang} and {Yiran Zhang} and {Xuanle Ren} and {Shivam Bhasin} and {Kui Ren 001}}
}
@article{journals/tcsv/WangZWWQR21,
title = {Are You Confident That You Have Successfully Generated Adversarial Examples?},
year = {2021},
journal = {IEEE Trans. Circuits Syst. Video Technol.},
author = {{Bo Wang 024} and {Mengnan Zhao} and {Wei Wang 025} and {Fei Wei} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/tifs/RajendranSLR21,
title = {Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things.},
year = {2021},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Sekhar Rajendran} and {Zhi Sun} and {Feng Lin 004} and {Kui Ren 001}}
}
@article{journals/ton/WeiCMHR21,
title = {Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging.},
year = {2021},
journal = {IEEE/ACM Trans. Netw.},
author = {{Jianghong Wei} and {Xiaofeng Chen 001} and {Jianfeng Ma 001} and {Xuexian Hu} and {Kui Ren 001}}
}
@article{journals/tpds/SaadQRNM21,
title = {e-PoS: Making Proof-of-Stake Decentralized and Fair.},
year = {2021},
journal = {IEEE Trans. Parallel Distributed Syst.},
author = {{Muhammad Saad 001} and {Zhan Qin} and {Kui Ren 001} and {DaeHun Nyang} and {David Mohaisen}}
}
@inproceedings{conf/acsac/YangSXLWZQY022,
title = {Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms.},
year = {2022},
booktitle = {ACSAC},
author = {{Yutian Yang} and {Wenbo Shen} and {Xun Xie} and {Kangjie Lu} and {Mingsen Wang} and {Tianyu Zhou} and {Chenggang Qin} and {Wang Yu} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022}
}
@inproceedings{conf/asplos/JiangXZHZWL022,
title = {EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM.},
year = {2022},
booktitle = {ASPLOS},
author = {{Muhui Jiang} and {Tianyi Xu} and {Yajin Zhou} and {Yufeng Hu} and {Ming Zhong 009} and {Lei Wu 012} and {Xiapu Luo} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022 - 4 March 2022}
}
@inproceedings{conf/cbd/LiuYZCHZHHR22,
title = {Device-free Crowd Density Estimation with Off-the-shelf WiFi Traffic.},
year = {2022},
booktitle = {CBD},
author = {{Jianwei Liu 008} and {Guozheng Yang} and {Cheng Zang} and {Jiajun Chen} and {Xianming Hu} and {Jingzhi Zhang} and {Yinghui He} and {Jinsong Han} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {Tenth International Conference on Advanced Cloud and Big Data, CBD 2022, Guilin, China, November 4-5, 2022}
}
@inproceedings{conf/cvpr/WangDXZCW022,
title = {Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models.},
year = {2022},
booktitle = {CVPR},
author = {{Zhibo Wang 001} and {Xiaowei Dong} and {Henry Xue} and {Zhifei Zhang} and {Weifeng Chiu} and {Tao Wei} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022, New Orleans, LA, USA, June 18-24, 2022}
}
@inproceedings{conf/dac/0010WSYW022,
title = {DARPT: defense against remote physical attack based on TDC in multi-tenant scenario.},
year = {2022},
booktitle = {DAC},
author = {{Fan Zhang 010} and {Zhiyong Wang} and {Haoting Shen} and {Bolin Yang} and {Qianmei Wu} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10 - 14, 2022}
}
@inproceedings{conf/dac/XuLYSZC0022,
title = {RegVault: hardware assisted selective data randomization for operating system kernels.},
year = {2022},
booktitle = {DAC},
author = {{Jinyan Xu} and {Haoran Lin} and {Ziqi Yuan} and {Wenbo Shen} and {Yajin Zhou} and {Rui Chang} and {Lei Wu 012} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10 - 14, 2022}
}
@inproceedings{conf/dac/XuXLSZW022,
title = {Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV object detection.},
year = {2022},
booktitle = {DAC},
author = {{Junge Xu} and {Bohan Xuan} and {Anlin Liu} and {Mo Sun} and {Fan Zhang 010} and {Zeke Wang} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10 - 14, 2022}
}
@inproceedings{conf/eurosys/ZhouLZZS022,
title = {OPEC: operation-based security isolation for bare-metal embedded systems.},
year = {2022},
booktitle = {EuroSys},
author = {{Xia Zhou} and {Jiaqi Li} and {Wenlong Zhang} and {Yajin Zhou} and {Wenbo Shen} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5 - 8, 2022}
}
@inproceedings{conf/icdcs/LuBLHR22,
title = {ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures.},
year = {2022},
booktitle = {ICDCS},
author = {{Li Lu 008} and {Zhongjie Ba} and {Feng Lin 004} and {Jinsong Han} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {42nd IEEE International Conference on Distributed Computing Systems, ICDCS 2022, Bologna, Italy, July 10-13, 2022}
}
@inproceedings{conf/iclr/Huang0WQ022,
title = {Backdoor Defense via Decoupling the Training Process.},
year = {2022},
booktitle = {ICLR},
author = {{Kunzhe Huang} and {Yiming Li 004} and {Baoyuan Wu} and {Zhan Qin} and {Kui Ren 001}},
publisher = {OpenReview.net},
booktitle = {The Tenth International Conference on Learning Representations, ICLR 2022, Virtual Event, April 25-29, 2022}
}
@inproceedings{conf/icpads/ShuWYZMLR22,
title = {Fingersound: A Low-cost and Deployable Authentication System with Fingertip Sliding Sound.},
year = {2022},
booktitle = {ICPADS},
author = {{Zhanglei Shu} and {Zhangsen Wang} and {Guozheng Yang} and {Cheng Zang} and {Zhe Ma} and {Feng Lin 004} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {28th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2022, Nanjing, China, January 10-12, 2023}
}
@inproceedings{conf/infocom/ChenGLZLLHR22,
title = {Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers.},
year = {2022},
booktitle = {INFOCOM},
author = {{Yike Chen} and {Ming Gao} and {Yimin Li} and {Lingfeng Zhang} and {Li Lu 008} and {Feng Lin 004} and {Jinsong Han} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, London, United Kingdom, May 2-5, 2022}
}
@inproceedings{conf/infocom/ChenLBR22,
title = {PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition.},
year = {2022},
booktitle = {INFOCOM},
author = {{Meng Chen} and {Li Lu 008} and {Zhongjie Ba} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, London, United Kingdom, May 2-5, 2022}
}
@inproceedings{conf/infocom/LiuHXHCR22,
title = {Physical-World Attack towards WiFi-based Behavior Recognition.},
year = {2022},
booktitle = {INFOCOM},
author = {{Jianwei Liu 008} and {Yinghui He} and {Chaowei Xiao} and {Jinsong Han} and {Le Cheng} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, London, United Kingdom, May 2-5, 2022}
}
@inproceedings{conf/infocom/WangLLLSBLXR22,
title = {mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect.},
year = {2022},
booktitle = {INFOCOM},
author = {{Chao Wang 097} and {Feng Lin 004} and {Tiantian Liu 002} and {Ziwei Liu} and {Yijie Shen} and {Zhongjie Ba} and {Li Lu 008} and {Wenyao Xu} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, London, United Kingdom, May 2-5, 2022}
}
@inproceedings{conf/iotdi/LiuXLWR22,
title = {CTJammer: A Cross-Technology Reactive Jammer towards Unlicensed LTE.},
year = {2022},
booktitle = {IoTDI},
author = {{Ziwei Liu} and {Linzhong Xu} and {Feng Lin 004} and {Zhangsen Wang} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {Seventh IEEE/ACM International Conference on Internet-of-Things Design and Implementation, IoTDI 2022, Milano, Italy, May 4-6, 2022}
}
@inproceedings{conf/mobicom/Chen0YCB0022,
title = {A non-intrusive and adaptive speaker de-identification scheme using adversarial examples.},
year = {2022},
booktitle = {MobiCom},
author = {{Meng Chen} and {Li Lu 008} and {Jiadi Yu} and {Yingying Chen 001} and {Zhongjie Ba} and {Feng Lin 004} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17 - 21, 2022}
}
@inproceedings{conf/mobicom/Wang00ZWLHX022,
title = {mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device.},
year = {2022},
booktitle = {MobiCom},
author = {{Chao Wang 097} and {Feng Lin 004} and {Tiantian Liu 002} and {Kaidi Zheng} and {Zhibo Wang 001} and {Zhengxiong Li} and {Ming-Chun Huang} and {Wenyao Xu} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17 - 21, 2022}
}
@inproceedings{conf/mobicom/XuSLLCZHW022,
title = {Mask does not matter: anti-spoofing face authentication using mmWave without on-site registration.},
year = {2022},
booktitle = {MobiCom},
author = {{Weiye Xu} and {Wenfan Song} and {Jianwei Liu 008} and {Yajie Liu} and {Xin Cui} and {Yuanqing Zheng} and {Jinsong Han} and {Xinhuai Wang} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17 - 21, 2022}
}
@inproceedings{conf/ndss/LiCCLX0L0X22,
title = {SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing.},
year = {2022},
booktitle = {NDSS},
author = {{Zhengxiong Li} and {Baicheng Chen} and {Xingyu Chen} and {Huining Li} and {Chenhan Xu} and {Feng Lin 004} and {Chris Xiaoxuan Lu} and {Kui Ren 001} and {Wenyao Xu}},
publisher = {The Internet Society},
booktitle = {29th Annual Network and Distributed System Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022}
}
@inproceedings{conf/ndss/RathoreSXSH0L0X22,
title = {FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing.},
year = {2022},
booktitle = {NDSS},
author = {{Aditya Singh Rathore} and {Yijie Shen} and {Chenhan Xu} and {Jacob Snyderman} and {Jinsong Han} and {Fan Zhang 010} and {Zhengxiong Li} and {Feng Lin 004} and {Wenyao Xu} and {Kui Ren 001}},
publisher = {The Internet Society},
booktitle = {29th Annual Network and Distributed System Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022}
}
@inproceedings{conf/sensys/ChenCLYCWBL022,
title = {Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.},
year = {2022},
booktitle = {SenSys},
author = {{Qianniu Chen} and {Meng Chen} and {Li Lu 008} and {Jiadi Yu} and {Yingying Chen 001} and {Zhibo Wang 001} and {Zhongjie Ba} and {Feng Lin 004} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, SenSys 2022, Boston, Massachusetts, November 6-9, 2022}
}
@inproceedings{conf/sensys/GaoZSZH0022,
title = {KITE: Exploring the Practical Threat from Acoustic Transduction Attacks on Inertial Sensors.},
year = {2022},
booktitle = {SenSys},
author = {{Ming Gao} and {Lingfeng Zhang} and {Leming Shen} and {Xiang Zou} and {Jinsong Han} and {Feng Lin 004} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, SenSys 2022, Boston, Massachusetts, November 6-9, 2022}
}
@inproceedings{conf/sp/ZhangLDWW022,
title = {"Adversarial Examples" for Proof-of-Learning.},
year = {2022},
booktitle = {SP},
author = {{Rui Zhang} and {Jian Liu 012} and {Yuan Ding} and {Zhibo Wang 001} and {Qingbiao Wu} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022}
}
@inproceedings{conf/uss/ChenLXZ00022,
title = {SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.},
year = {2022},
booktitle = {USENIX Security Symposium},
author = {{Yuan Chen} and {Jiaqi Li} and {Guorui Xu} and {Yajin Zhou} and {Zhi Wang 004} and {Cong Wang 001} and {Kui Ren 001}},
publisher = {USENIX Association},
booktitle = {31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022}
}
@article{journals/comsur/WangLSPSLLR22,
title = {A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses.},
year = {2022},
journal = {IEEE Commun. Surv. Tutorials},
author = {{Zhibo Wang 001} and {Defang Liu} and {Yunan Sun} and {Xiaoyi Pang} and {Peng Sun 003} and {Feng Lin 004} and {John C. S. Lui} and {Kui Ren 001}}
}
@article{journals/corr/abs-2206-02158,
title = {Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training.},
year = {2022},
journal = {CoRR},
author = {{Guodong Cao} and {Zhibo Wang 001} and {Xiaowei Dong} and {Zhifei Zhang} and {Hengchang Guo} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/corr/abs-2207-01837,
title = {iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps.},
year = {2022},
journal = {CoRR},
author = {{Jingyi Guo} and {Min Zheng} and {Yajin Zhou} and {Haoyu Wang 001} and {Lei Wu 012} and {Xiapu Luo} and {Kui Ren 001}}
}
@article{journals/corr/abs-2209-07936,
title = {PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot.},
year = {2022},
journal = {CoRR},
author = {{Zhuoruo Zhang} and {Chenyang Yu} and {He Huang} and {Rui Chang} and {Mingshuai Chen} and {Qinming Dai} and {Wenbo Shen} and {Yongwang Zhao} and {Kui Ren 001}}
}
@article{journals/corr/abs-2210-08723,
title = {Private Data Valuation and Fair Payment in Data Marketplaces.},
year = {2022},
journal = {CoRR},
author = {{Zhihua Tian} and {Jian Liu 012} and {Jingyu Li} and {Xinle Cao} and {Ruoxi Jia 001} and {Kui Ren 001}}
}
@article{journals/corr/abs-2211-05446,
title = {Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples.},
year = {2022},
journal = {CoRR},
author = {{Meng Chen} and {Li Lu 008} and {Jiadi Yu} and {Yingying Chen 001} and {Zhongjie Ba} and {Feng Lin 004} and {Kui Ren 001}}
}
@article{journals/corr/abs-2211-07160,
title = {FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model.},
year = {2022},
journal = {CoRR},
author = {{Shuo Shao} and {Wenyuan Yang} and {Hanlin Gu} and {Jian Lou 001} and {Zhan Qin} and {Lixin Fan} and {Qiang Yang 001} and {Kui Ren 001}}
}
@article{journals/corr/abs-2211-15286,
title = {Masked Autoencoders for Egocentric Video Understanding @ Ego4D Challenge 2022.},
year = {2022},
journal = {CoRR},
author = {{Jiachen Lei} and {Shuang Ma} and {Zhongjie Ba} and {Sai Vemprala} and {Ashish Kapoor} and {Kui Ren 001}}
}
@article{journals/iacr/LiuLWR22,
title = {Improved Constant-weight PIR with an Extension for Multi-query.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jian Liu 012} and {Jingyu Li} and {Di Wu} and {Kui Ren 001}}
}
@article{journals/iacr/ZhouZZ022,
title = {GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Zhelei Zhou} and {Bingsheng Zhang} and {Hong-Sheng Zhou} and {Kui Ren 001}}
}
@article{journals/iacr/ZhouZZR22,
title = {Endemic Oblivious Transfer via Random Oracles, Revisited.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Zhelei Zhou} and {Bingsheng Zhang} and {Hong-Sheng Zhou} and {Kui Ren 001}}
}
@article{journals/imwut/LiCCXCLLDRX22,
title = {Reliable Digital Forensics in the Air: Exploring an RF-based Drone Identification System.},
year = {2022},
journal = {Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.},
author = {{Zhengxiong Li} and {Baicheng Chen} and {Xingyu Chen} and {Chenhan Xu} and {Yuyang Chen} and {Feng Lin 004} and {Changzhi Li} and {Karthik Dantu} and {Kui Ren 001} and {Wenyao Xu}}
}
@article{journals/imwut/LiuLWSBLXR22,
title = {CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations.},
year = {2022},
journal = {Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.},
author = {{Ziwei Liu} and {Feng Lin 004} and {Chao Wang 097} and {Yijie Shen} and {Zhongjie Ba} and {Li Lu 008} and {Wenyao Xu} and {Kui Ren 001}}
}
@article{journals/imwut/WangLBZXR22,
title = {Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices.},
year = {2022},
journal = {Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.},
author = {{Chao Wang 097} and {Feng Lin 004} and {Zhongjie Ba} and {Fan Zhang 010} and {Wenyao Xu} and {Kui Ren 001}}
}
@article{journals/isci/LiLZLHR22,
title = {Compound adversarial examples in deep neural networks.},
year = {2022},
journal = {Inf. Sci.},
author = {{Yanchun Li} and {Zhetao Li} and {Li Zeng} and {Saiqin Long} and {Feiran Huang} and {Kui Ren 001}}
}
@article{journals/jcs/ZhouZCLZLRTZ22,
title = {Scriptable and composable SNARKs in the trusted hardware model.},
year = {2022},
journal = {J. Comput. Secur.},
author = {{Zhelei Zhou} and {Bingsheng Zhang} and {Yuan Chen} and {Jiaqi Li} and {Yajin Zhou} and {Yibiao Lu} and {Kui Ren 001} and {Phuc Thai} and {Hong-Sheng Zhou}}
}
@article{journals/pvldb/LiHL0PH0Q22,
title = {OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.},
year = {2022},
journal = {Proc. VLDB Endow.},
author = {{Xiaochen Li} and {Yuke Hu} and {Weiran Liu} and {Hanwen Feng 001} and {Li Peng} and {Yuan Hong} and {Kui Ren 001} and {Zhan Qin}}
}
@article{journals/tc/LiuR22,
title = {Improving Blockchains With Client-Assistance.},
year = {2022},
journal = {IEEE Trans. Computers},
author = {{Jian Liu 012} and {Kui Ren 001}}
}
@article{journals/tches/ZhangFLRZ22,
title = {Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers.},
year = {2022},
journal = {IACR Trans. Cryptogr. Hardw. Embed. Syst.},
author = {{Fan Zhang 010} and {Tianxiang Feng} and {Zhiqi Li} and {Kui Ren 001} and {Xinjie Zhao 001}}
}
@article{journals/tdsc/LiuMYLMR22,
title = {RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning.},
year = {2022},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Yang Liu 118} and {Zhuo Ma} and {Yilong Yang 004} and {Ximeng Liu} and {Jianfeng Ma 001} and {Kui Ren 001}}
}
@article{journals/tdsc/ZhangZKZR22,
title = {An Efficient E2E Crowd Verifiable E-Voting System.},
year = {2022},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Xinyu Zhang 016} and {Bingsheng Zhang} and {Aggelos Kiayias} and {Thomas Zacharias 001} and {Kui Ren 001}}
}
@article{journals/tdsc/ZhuFMWCXR22,
title = {CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation.},
year = {2022},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Xiaogang Zhu 001} and {Xiaotao Feng} and {Xiaozhu Meng} and {Sheng Wen} and {Seyit Camtepe} and {Yang Xiang 001} and {Kui Ren 001}}
}
@article{journals/tifs/LiuMLMR22,
title = {Privacy-Preserving Object Detection for Medical Images With Faster R-CNN.},
year = {2022},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Yang Liu 118} and {Zhuo Ma} and {Ximeng Liu} and {Siqi Ma} and {Kui Ren 001}}
}
@article{journals/tifs/WangXGQR22,
title = {snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning.},
year = {2022},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Yanbin Wang} and {Haitao Xu 002} and {Zhenhao Guo} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/tifs/YinZXLR22,
title = {Bool Network: An Open, Distributed, Secure Cross-Chain Notary Platform.},
year = {2022},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Zeyuan Yin} and {Bingsheng Zhang} and {Jingzhong Xu} and {Kaiyu Lu} and {Kui Ren 001}}
}
@article{journals/tifs/ZhaoWWKZR22,
title = {Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection.},
year = {2022},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Mengnan Zhao} and {Bo Wang 024} and {Wei Wang 025} and {Yuqiu Kong} and {Tianhang Zheng} and {Kui Ren 001}}
}
@article{journals/tmc/RathoreXZDWLRX22,
title = {Scanning the Voice of Your Fingerprint With Everyday Surfaces.},
year = {2022},
journal = {IEEE Trans. Mob. Comput.},
author = {{Aditya Singh Rathore} and {Chenhan Xu} and {Weijin Zhu} and {Afee Daiyan} and {Kun Wang 005} and {Feng Lin 004} and {Kui Ren 001} and {Wenyao Xu}}
}
@article{journals/tosem/WuWZLWLWR22,
title = {Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum.},
year = {2022},
journal = {ACM Trans. Softw. Eng. Methodol.},
author = {{Siwei Wu} and {Lei Wu 012} and {Yajin Zhou} and {Runhuai Li} and {Zhi Wang 004} and {Xiapu Luo} and {Cong Wang 001} and {Kui Ren 001}}
}
@article{journals/tsc/TianYZXWR22,
title = {Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus.},
year = {2022},
journal = {IEEE Trans. Serv. Comput.},
author = {{Chengliang Tian} and {Jia Yu 005} and {Hanlin Zhang} and {Haiyang Xue} and {Cong Wang 001} and {Kui Ren 001}}
}
@inproceedings{conf/aaai/YangWYW0CZ023,
title = {Purifier: Defending Data Inference Attacks via Transforming Confidence Scores.},
year = {2023},
booktitle = {AAAI},
author = {{Ziqi Yang} and {Lijin Wang} and {Da Yang} and {Jie Wan} and {Ziming Zhao 008} and {Ee-Chien Chang} and {Fan Zhang 010} and {Kui Ren 001}},
publisher = {AAAI Press},
booktitle = {Thirty-Seventh AAAI Conference on Artificial Intelligence, AAAI 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, IAAI 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2023, Washington, DC, USA, February 7-14, 2023}
}
@inproceedings{conf/asplos/YuanHCZS023,
title = {VDom: Fast and Unlimited Virtual Domains on Multiple Architectures.},
year = {2023},
booktitle = {ASPLOS (2)},
author = {{Ziqi Yuan} and {Siyu Hong} and {Rui Chang} and {Yajin Zhou} and {Wenbo Shen} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2, ASPLOS 2023, Vancouver, BC, Canada, March 25-29, 2023}
}
@inproceedings{conf/ccs/He0Q023,
title = {FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis.},
year = {2023},
booktitle = {CCS},
author = {{Yiling He} and {Jian Lou 001} and {Zhan Qin} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023}
}
@inproceedings{conf/ccs/LiuFCWBLL023,
title = {FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.},
year = {2023},
booktitle = {CCS},
author = {{Liu Liu} and {Xinwen Fu} and {Xiaodong Chen} and {Jianpeng Wang} and {Zhongjie Ba} and {Feng Lin} and {Li Lu 008} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023}
}
@inproceedings{conf/cvpr/00010JZHWSYLR23,
title = {Privacy-preserving Adversarial Facial Features.},
year = {2023},
booktitle = {CVPR},
author = {{Zhibo Wang 001} and {He Wang 005} and {Shuaifan Jin} and {Wenwen Zhang} and {Jiahui Hu} and {Yan Wang} and {Peng Sun 003} and {Wei Yuan} and {Kaixin Liu} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, Vancouver, BC, Canada, June 17-24, 2023}
}
@inproceedings{conf/cvpr/0001YFSGZR23,
title = {Towards Transferable Targeted Adversarial Examples.},
year = {2023},
booktitle = {CVPR},
author = {{Zhibo Wang 001} and {Hongshan Yang} and {Yunhe Feng} and {Peng Sun 003} and {Hengchang Guo} and {Zhifei Zhang} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, Vancouver, BC, Canada, June 17-24, 2023}
}
@inproceedings{conf/cvpr/0001ZZ000Y23,
title = {ANetQA: A Large-scale Benchmark for Fine-grained Compositional Reasoning over Untrimmed Videos.},
year = {2023},
booktitle = {CVPR},
author = {{Zhou Yu 001} and {Lixiang Zheng} and {Zhou Zhao} and {Fei Wu 001} and {Jianping Fan 001} and {Kui Ren 001} and {Jun Yu 002}},
publisher = {IEEE},
booktitle = {IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, Vancouver, BC, Canada, June 17-24, 2023}
}
@inproceedings{conf/dac/XuZZCGR23,
title = {Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models.},
year = {2023},
booktitle = {DAC},
author = {{Guorui Xu} and {Fan Zhang 010} and {Xinjie Zhao} and {Yuan Chen} and {Shize Guo} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {60th ACM/IEEE Design Automation Conference, DAC 2023, San Francisco, CA, USA, July 9-13, 2023}
}
@inproceedings{conf/icassp/WangLBLR23,
title = {Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing.},
year = {2023},
booktitle = {ICASSP},
author = {{Junhao Wang} and {Li Lu 008} and {Zhongjie Ba} and {Feng Lin} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2023, Rhodes Island, Greece, June 4-10, 2023}
}
@inproceedings{conf/icassp/WangZXQRM23,
title = {A Large-Scale Pretrained Deep Model for Phishing URL Detection.},
year = {2023},
booktitle = {ICASSP},
author = {{Yanbin Wang} and {Weifan Zhu} and {Haitao Xu 002} and {Zhan Qin} and {Kui Ren 001} and {Wenrui Ma}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2023, Rhodes Island, Greece, June 4-10, 2023}
}
@inproceedings{conf/iccv/Wang0WGZJW023,
title = {Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks.},
year = {2023},
booktitle = {ICCV},
author = {{Xue Wang} and {Zhibo Wang 001} and {Haiqin Weng} and {Hengchang Guo} and {Zhifei Zhang} and {Lu Jin} and {Tao Wei} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE/CVF International Conference on Computer Vision, ICCV 2023, Paris, France, October 1-6, 2023}
}
@inproceedings{conf/iccv/Zhang0DFPZ023,
title = {Towards Fairness-aware Adversarial Network Pruning.},
year = {2023},
booktitle = {ICCV},
author = {{Lei Zhang} and {Zhibo Wang 001} and {Xiaowei Dong} and {Yunhe Feng} and {Xiaoyi Pang} and {Zhifei Zhang} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {IEEE/CVF International Conference on Computer Vision, ICCV 2023, Paris, France, October 1-6, 2023}
}
@inproceedings{conf/icde/0006XSL0P023,
title = {Dynamic Shapley Value Computation.},
year = {2023},
booktitle = {ICDE},
author = {{Jiayao Zhang 006} and {Haocheng Xia} and {Qiheng Sun} and {Jinfei Liu} and {Li Xiong 001} and {Jian Pei} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {39th IEEE International Conference on Data Engineering, ICDE 2023, Anaheim, CA, USA, April 3-7, 2023}
}
@inproceedings{conf/icde/LinGSL00WPWL23,
title = {EulerFD: An Efficient Double-Cycle Approximation of Functional Dependencies.},
year = {2023},
booktitle = {ICDE},
author = {{Qiongqiong Lin} and {Yunfan Gu} and {Jingyan Sai} and {Jinfei Liu} and {Kui Ren 001} and {Li Xiong 001} and {Tianzhen Wang} and {Yanbei Pang} and {Sheng Wang 011} and {Feifei Li 001}},
publisher = {IEEE},
booktitle = {39th IEEE International Conference on Data Engineering, ICDE 2023, Anaheim, CA, USA, April 3-7, 2023}
}
@inproceedings{conf/ijcai/Yang0LLZ00023,
title = {Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization.},
year = {2023},
booktitle = {IJCAI},
author = {{Yuheng Yang} and {Haipeng Chen 002} and {Zhenguang Liu} and {Yingda Lyu} and {Beibei Zhang} and {Shuang Wu 002} and {Zhibo Wang 001} and {Kui Ren 001}},
publisher = {ijcai.org},
booktitle = {Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI 2023, 19th-25th August 2023, Macao, SAR, China}
}
@inproceedings{conf/infocom/FangLCHRC23,
title = {Nowhere to Hide: Detecting Live Video Forgery via Vision-WiFi Silhouette Correspondence.},
year = {2023},
booktitle = {INFOCOM},
author = {{Xinyue Fang} and {Jianwei Liu 008} and {Yike Chen} and {Jinsong Han} and {Kui Ren 001} and {Gang Chen}},
publisher = {IEEE},
booktitle = {IEEE INFOCOM 2023 - IEEE Conference on Computer Communications, New York City, NY, USA, May 17-20, 2023}
}
@inproceedings{conf/kbse/YaoKSFWR23,
title = {Demystifying Template-Based Invariant Generation for Bit-Vector Programs.},
year = {2023},
booktitle = {ASE},
author = {{Peisen Yao} and {Jingyu Ke} and {Jiahui Sun} and {Hongfei Fu 001} and {Rongxin Wu} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, Luxembourg, September 11-15, 2023}
}
@inproceedings{conf/kdd/SunL00LLQ023,
title = {ShapleyFL: Robust Federated Learning Based on Shapley Value.},
year = {2023},
booktitle = {KDD},
author = {{Qiheng Sun} and {Xiang Li} and {Jiayao Zhang 006} and {Li Xiong 001} and {Weiran Liu} and {Jinfei Liu} and {Zhan Qin} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2023, Long Beach, CA, USA, August 6-10, 2023}
}
@inproceedings{conf/mm/0004fLZWLC023,
title = {Cross-Modal and Multi-Attribute Face Recognition: A Benchmark.},
year = {2023},
booktitle = {ACM Multimedia},
author = {{Feng Lin 004} and {Kaiqiang fu} and {Hao Luo} and {Ziyue Zhan} and {Zhibo Wang 001} and {Zhenguang Liu} and {Lorenzo Cavallaro} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 31st ACM International Conference on Multimedia, MM 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}
}
@inproceedings{conf/mm/PanYW0BL0C023,
title = {DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues.},
year = {2023},
booktitle = {ACM Multimedia},
author = {{Kun Pan} and {Yifang Yin} and {Yao Wei} and {Feng Lin 004} and {Zhongjie Ba} and {Zhenguang Liu} and {Zhibo Wang 001} and {Lorenzo Cavallaro} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 31st ACM International Conference on Multimedia, MM 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}
}
@inproceedings{conf/mm/ShuaiZ0LWBLC023,
title = {Locate and Verify: A Two-Stream Network for Improved Deepfake Detection.},
year = {2023},
booktitle = {ACM Multimedia},
author = {{Chao Shuai} and {Jieming Zhong} and {Shuang Wu 002} and {Feng Lin 004} and {Zhibo Wang 001} and {Zhongjie Ba} and {Zhenguang Liu} and {Lorenzo Cavallaro} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 31st ACM International Conference on Multimedia, MM 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}
}
@inproceedings{conf/mobicom/GaoCLXH023,
title = {Cancelling Speech Signals for Speech Privacy Protection against Microphone Eavesdropping.},
year = {2023},
booktitle = {MobiCom},
author = {{Ming Gao} and {Yike Chen} and {Yajie Liu} and {Jie Xiong 001} and {Jinsong Han} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, ACM MobiCom 2023, Madrid, Spain, October 2-6, 2023}
}
@inproceedings{conf/mobicom/He0LYH023,
title = {SenCom: Integrated Sensing and Communication with Practical WiFi.},
year = {2023},
booktitle = {MobiCom},
author = {{Yinghui He} and {Jianwei Liu 008} and {Mo Li 001} and {Guanding Yu} and {Jinsong Han} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, ACM MobiCom 2023, Madrid, Spain, October 2-6, 2023}
}
@inproceedings{conf/ndss/ChenLCZLP0X0Q23,
title = {MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags.},
year = {2023},
booktitle = {NDSS},
author = {{Xingyu Chen} and {Zhengxiong Li} and {Baicheng Chen} and {Yi Zhu} and {Chris Xiaoxuan Lu} and {Zhengyu Peng} and {Feng Lin 004} and {Wenyao Xu} and {Kui Ren 001} and {Chunming Qiao}},
publisher = {The Internet Society},
booktitle = {30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023}
}
@inproceedings{conf/ndss/HuangWCB000023,
title = {InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.},
year = {2023},
booktitle = {NDSS},
author = {{Peng Huang} and {Yao Wei} and {Peng Cheng 007} and {Zhongjie Ba} and {Li Lu 008} and {Feng Lin 004} and {Fan Zhang 010} and {Kui Ren 001}},
publisher = {The Internet Society},
booktitle = {30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023}
}
@inproceedings{conf/nips/00030Q023,
title = {Certified Minimax Unlearning with Generalization Rates and Deletion Capacity.},
year = {2023},
booktitle = {NeurIPS},
author = {{Jiaqi Liu 003} and {Jian Lou 001} and {Zhan Qin} and {Kui Ren 001}},
booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023.}
}
@inproceedings{conf/nips/ZhuWLX00023,
title = {CAPP-130: A Corpus of Chinese Application Privacy Policy Summarization and Interpretation.},
year = {2023},
booktitle = {NeurIPS},
author = {{Pengyun Zhu} and {Long Wen} and {Jinfei Liu} and {Feng Xue} and {Jian Lou 001} and {Zhibo Wang 001} and {Kui Ren 001}},
booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023.}
}
@inproceedings{conf/nsdi/00020C0XWWL023,
title = {Boomerang: Metadata-Private Messaging under Hardware Trust.},
year = {2023},
booktitle = {NSDI},
author = {{Peipei Jiang 002} and {Qian Wang 002} and {Jianhao Cheng} and {Cong Wang 001} and {Lei Xu 019} and {Xinyu Wang 007} and {Yihao Wu} and {Xiaoyuan Li} and {Kui Ren 001}},
publisher = {USENIX Association},
booktitle = {20th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2023, Boston, MA, April 17-19, 2023.}
}
@inproceedings{conf/sp/LiuLWWBLXR23,
title = {MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.},
year = {2023},
booktitle = {SP},
author = {{Tiantian Liu 002} and {Feng Lin 004} and {Zhangsen Wang} and {Chao Wang 097} and {Zhongjie Ba} and {Li Lu 008} and {Wenyao Xu} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023}
}
@inproceedings{conf/sp/MaZWZCXWR23,
title = {When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel.},
year = {2023},
booktitle = {SP},
author = {{Lin Ma} and {Duoming Zhou} and {Hanjie Wu} and {Yajin Zhou} and {Rui Chang} and {Hao Xiong} and {Lei Wu 012} and {Kui Ren 001}},
publisher = {IEEE},
booktitle = {44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023}
}
@inproceedings{conf/uist/000200XZLXH023,
title = {WavoID: Robust and Secure Multi-modal User Identification via mmWave-voice Mechanism.},
year = {2023},
booktitle = {UIST},
author = {{Tiantian Liu 002} and {Feng Lin 004} and {Chao Wang 097} and {Chenhan Xu} and {Xiaoyu Zhang} and {Zhengxiong Li} and {Wenyao Xu} and {Ming-Chun Huang} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology, UIST 2023, San Francisco, CA, USA, 29 October 2023- 1 November 2023}
}
@inproceedings{conf/uss/CaiZSYCWL023,
title = {Demystifying Pointer Authentication on Apple M1.},
year = {2023},
booktitle = {USENIX Security Symposium},
author = {{Zechao Cai} and {Jiaxun Zhu} and {Wenbo Shen} and {Yutian Yang} and {Rui Chang} and {Yu Wang} and {Jinku Li} and {Kui Ren 001}},
publisher = {USENIX Association},
booktitle = {32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}
}
@article{journals/corr/abs-2304-06607,
title = {False Claims against Model Ownership Resolution.},
year = {2023},
journal = {CoRR},
author = {{Jian Liu 012} and {Rui Zhang} and {Sebastian Szyller} and {Kui Ren 001} and {N. Asokan}}
}
@article{journals/corr/abs-2306-11338,
title = {FDINet: Protecting against DNN Model Extraction via Feature Distortion Index.},
year = {2023},
journal = {CoRR},
author = {{Hongwei Yao} and {Zheng Li} and {Haiqin Weng} and {Feng Xue} and {Kui Ren 001} and {Zhan Qin}}
}
@article{journals/corr/abs-2306-11363,
title = {Masked Diffusion Models are Fast Learners.},
year = {2023},
journal = {CoRR},
author = {{Jiachen Lei} and {Peng Cheng 007} and {Zhongjie Ba} and {Kui Ren 001}}
}
@article{journals/corr/abs-2306-16851,
title = {SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores.},
year = {2023},
journal = {CoRR},
author = {{Leqian Zheng} and {Lei Xu 019} and {Cong Wang 001} and {Sheng Wang 011} and {Yuke Hu} and {Zhan Qin} and {Feifei Li} and {Kui Ren 001}}
}
@article{journals/corr/abs-2307-16630,
title = {Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.},
year = {2023},
journal = {CoRR},
author = {{Xinyu Zhang 016} and {Hanbin Hong} and {Yuan Hong} and {Peng Huang} and {Binghui Wang} and {Zhongjie Ba} and {Kui Ren 001}}
}
@article{journals/corr/abs-2308-02816,
title = {PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification.},
year = {2023},
journal = {CoRR},
author = {{Hongwei Yao} and {Jian Lou 001} and {Kui Ren 001} and {Zhan Qin}}
}
@article{journals/corr/abs-2309-05264,
title = {Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning (Extended Version).},
year = {2023},
journal = {CoRR},
author = {{Pingchuan Ma 004} and {Zhenlan Ji} and {Peisen Yao} and {Shuai Wang 011} and {Kui Ren 001}}
}
@article{journals/corr/abs-2309-14122,
title = {SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution.},
year = {2023},
journal = {CoRR},
author = {{Zhongjie Ba} and {Jieming Zhong} and {Jiachen Lei} and {Peng Cheng 007} and {Qinglong Wang} and {Zhan Qin} and {Zhibo Wang 001} and {Kui Ren 001}}
}
@article{journals/corr/abs-2310-13424,
title = {FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.},
year = {2023},
journal = {CoRR},
author = {{Xinyu Zhang} and {Qingyu Liu} and {Zhongjie Ba} and {Yuan Hong} and {Tianhang Zheng} and {Feng Lin 004} and {Li Lu 008} and {Kui Ren 001}}
}
@article{journals/corr/abs-2311-16062,
title = {Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.},
year = {2023},
journal = {CoRR},
author = {{Xiaochen Li} and {Weiran Liu} and {Jian Lou 001} and {Yuan Hong} and {Lei Zhang} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/corr/abs-2311-16136,
title = {ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach.},
year = {2023},
journal = {CoRR},
author = {{Yuke Hu} and {Jian Lou 001} and {Jiaqi Liu 003} and {Feng Lin} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/csur/WangMWHQR23,
title = {Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems.},
year = {2023},
journal = {ACM Comput. Surv.},
author = {{Zhibo Wang 001} and {Jingjing Ma} and {Xue Wang} and {Jiahui Hu} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/iacr/CaoLBLR23,
title = {Secure and Practical Functional Dependency Discovery in Outsourced Databases.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Xinle Cao} and {Yuhan Li} and {Dmytro Bogatov} and {Jian Liu 012} and {Kui Ren 001}}
}
@article{journals/iacr/Hou0LLLH023,
title = {CipherGPT: Secure Two-Party GPT Inference.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Xiaoyang Hou} and {Jian Liu 012} and {Jingyu Li} and {Yuhan Li} and {Wen-jie Lu} and {Cheng Hong} and {Kui Ren 001}}
}
@article{journals/iacr/JiZR23,
title = {Fine-grained Policy Constraints for Distributed Point Function.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Keyu Ji} and {Bingsheng Zhang} and {Kui Ren 001}}
}
@article{journals/iacr/Lu0023,
title = {Arena: Multi-leader Synchronous Byzantine Fault Tolerance.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Hao Lu} and {Jian Liu 012} and {Kui Ren 001}}
}
@article{journals/iacr/LuHGLLRHWC23,
title = {BumbleBee: Secure Two-party Inference Framework for Large Transformers.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Wen-jie Lu} and {Zhicong Huang} and {Zhen Gu} and {Jingyu Li} and {Jian Liu} and {Kui Ren 001} and {Cheng Hong} and {Tao Wei} and {Wenguang Chen}}
}
@article{journals/iacr/LuLR23,
title = {Aurora: Leaderless State-Machine Replication with High Throughput.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Hao Lu} and {Jian Liu 012} and {Kui Ren 001}}
}
@article{journals/iacr/LuZLR23,
title = {Aegis: A Lightning Fast Privacy-preserving Machine Learning Platform against Malicious Adversaries.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Taipei Lu} and {Bingsheng Zhang} and {Lichun Li} and {Kui Ren 001}}
}
@article{journals/iacr/LuZR23,
title = {Load-Balanced Server-Aided MPC in Heterogeneous Computing.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yibiao Lu} and {Bingsheng Zhang} and {Kui Ren 001}}
}
@article{journals/iacr/YinZNOR23,
title = {A Scalable Coercion-resistant Blockchain Decision-making Scheme.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Zeyuan Yin} and {Bingsheng Zhang} and {Andrii Nastenko} and {Roman Oliynykov} and {Kui Ren 001}}
}
@article{journals/iacr/ZhouZZR23,
title = {Practical Constructions for Single Input Functionality against a Dishonest Majority.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Zhelei Zhou} and {Bingsheng Zhang} and {Hong-Sheng Zhou} and {Kui Ren 001}}
}
@article{journals/imwut/Chen0WY00B0023,
title = {VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.},
year = {2023},
journal = {Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.},
author = {{Meng Chen} and {Li Lu 008} and {Junhao Wang} and {Jiadi Yu} and {Yingying Chen 001} and {Zhibo Wang 001} and {Zhongjie Ba} and {Feng Lin 004} and {Kui Ren 001}}
}
@article{journals/pacmmod/0006SL0P023,
title = {Efficient Sampling Approaches to Shapley Value Approximation.},
year = {2023},
journal = {Proc. ACM Manag. Data},
author = {{Jiayao Zhang 006} and {Qiheng Sun} and {Jinfei Liu} and {Li Xiong 001} and {Jian Pei} and {Kui Ren 001}}
}
@article{journals/pvldb/Cao0SY023,
title = {Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption.},
year = {2023},
journal = {Proc. VLDB Endow.},
author = {{Xinle Cao} and {Jian Liu 012} and {Yongsheng Shen} and {Xiaohua Ye} and {Kui Ren 001}}
}
@article{journals/pvldb/XiaL0Q00023,
title = {Equitable Data Valuation Meets the Right to Be Forgotten in Model Markets.},
year = {2023},
journal = {Proc. VLDB Endow.},
author = {{Haocheng Xia} and {Jinfei Liu} and {Jian Lou 001} and {Zhan Qin} and {Kui Ren 001} and {Yang Cao 011} and {Li Xiong 001}}
}
@article{journals/tches/ZhangHFGTRZG23,
title = {Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts.},
year = {2023},
journal = {IACR Trans. Cryptogr. Hardw. Embed. Syst.},
author = {{Fan Zhang 010} and {Run Huang} and {Tianxiang Feng} and {Xue Gong} and {Yulong Tao} and {Kui Ren 001} and {Xinjie Zhao 001} and {Shize Guo}}
}
@article{journals/tdsc/GaoLCLBXHR23,
title = {Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Ming Gao} and {Yajie Liu} and {Yike Chen} and {Yimin Li} and {Zhongjie Ba} and {Xian Xu} and {Jinsong Han} and {Kui Ren 001}}
}
@article{journals/tdsc/HeLWYRQ23,
title = {MsDroid: Identifying Malicious Snippets for Android Malware Detection.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Yiling He} and {Yiping Li} and {Lei Wu 012} and {Ziqi Yang} and {Kui Ren 001} and {Zhan Qin}}
}
@article{journals/tdsc/LinWCWZR23,
title = {EnBinDiff: Identifying Data-Only Patches for Binaries.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Jian Lin 007} and {Dingding Wang 003} and {Rui Chang} and {Lei Wu 012} and {Yajin Zhou} and {Kui Ren 001}}
}
@article{journals/tdsc/LiuXCHXR23,
title = {Behavior Privacy Preserving in RF Sensing.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Jianwei Liu 008} and {Chaowei Xiao} and {Kaiyan Cui} and {Jinsong Han} and {Xian Xu} and {Kui Ren 001}}
}
@article{journals/tdsc/MaLLLMR23,
title = {Learn to Forget: Machine Unlearning via Neuron Masking.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Zhuo Ma} and {Yang Liu 118} and {Ximeng Liu} and {Jian Liu 012} and {Jianfeng Ma 001} and {Kui Ren 001}}
}
@article{journals/tdsc/MaLLLQR23,
title = {DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Zhuo Ma} and {Xinjing Liu} and {Yang Liu 118} and {Ximeng Liu} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/tdsc/MiaoCZZCWJR23,
title = {CVTEE: A Compatible Verified TEE Architecture With Enhanced Security.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Xinliang Miao} and {Rui Chang} and {Jianhong Zhao} and {Yongwang Zhao} and {Shuang Cao} and {Tao Wei} and {Liehui Jiang} and {Kui Ren 001}}
}
@article{journals/tdsc/PangWHSLRR23,
title = {Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Xiaoyi Pang} and {Zhibo Wang 001} and {Zeqing He} and {Peng Sun 003} and {Meng Luo} and {Ju Ren 001} and {Kui Ren 001}}
}
@article{journals/tdsc/WanZR23,
title = {zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Zhiguo Wan} and {Yan Zhou} and {Kui Ren 001}}
}
@article{journals/tdsc/WangHSWXR23,
title = {Poisoning-Assisted Property Inference Attack Against Federated Learning.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Zhibo Wang 001} and {Yuting Huang} and {Mengkai Song} and {Libing Wu} and {Feng Xue} and {Kui Ren 001}}
}
@article{journals/tdsc/ZhouZSLJAWNR23,
title = {Automatic Permission Check Analysis for Linux Kernel.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Jinmeng Zhou} and {Tong Zhang} and {Wenbo Shen} and {Dongyoon Lee} and {Changhee Jung} and {Ahmed M. Azab} and {Ruowen Wang} and {Peng Ning} and {Kui Ren 001}}
}
@article{journals/tifs/HeLFHBMR23,
title = {Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Anxiao He} and {Xiang Li} and {Jiandong Fu} and {Haoyu Hu} and {Kai Bu} and {Chenlu Miao} and {Kui Ren 001}}
}
@article{journals/tifs/JiZLR23,
title = {Multi-Party Private Function Evaluation for RAM.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Keyu Ji} and {Bingsheng Zhang} and {Tianpei Lu} and {Kui Ren 001}}
}
@article{journals/tifs/LuZ023,
title = {Low Communication Secure Computation From Semi-Trusted Hardware.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Yibiao Lu} and {Bingsheng Zhang} and {Kui Ren 001}}
}
@article{journals/tifs/YangZCGBXCR23,
title = {AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Wenyuan Yang} and {Xiaoyu Zhou} and {Zhikai Chen} and {Bofei Guo} and {Zhongjie Ba} and {Zhihua Xia} and {Xiaochun Cao} and {Kui Ren 001}}
}
@article{journals/tifs/ZhaoLZYLLZR23,
title = {SAGE: Steering the Adversarial Generation of Examples With Accelerations.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Ziming Zhao 008} and {Zhaoxuan Li} and {Fan Zhang 010} and {Ziqi Yang} and {Shuang Luo} and {Tingting Li} and {Rui Zhang 016} and {Kui Ren 001}}
}
@article{journals/tmc/LiXRLZSWSLRX23,
title = {VocalPrint: A mmWave-Based Unmediated Vocal Sensing System for Secure Authentication.},
year = {2023},
journal = {IEEE Trans. Mob. Comput.},
author = {{Huining Li} and {Chenhan Xu} and {Aditya Singh Rathore} and {Zhengxiong Li} and {Hanbin Zhang} and {Chen Song 001} and {Kun Wang 005} and {Lu Su} and {Feng Lin 004} and {Kui Ren 001} and {Wenyao Xu}}
}
@article{journals/ton/XiBMZRR23,
title = {RuleOut Forwarding Anomalies for SDN.},
year = {2023},
month = {February},
journal = {IEEE/ACM Trans. Netw.},
author = {{Shaoke Xi} and {Kai Bu} and {Wensen Mao} and {Xiaoyu Zhang} and {Kui Ren 001} and {Xinxin Ren}}
}
@article{journals/imwut/WangCLBLR23,
title = {VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices.},
year = {2023},
month = {March},
journal = {Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.},
author = {{Lei Wang} and {Meng Chen} and {Li Lu 008} and {Zhongjie Ba} and {Feng Lin 004} and {Kui Ren 001}}
}
@article{journals/tse/JiangDZCZLWLR23,
title = {A Comprehensive Study on ARM Disassembly Tools.},
year = {2023},
month = {April},
journal = {IEEE Trans. Software Eng.},
author = {{Muhui Jiang} and {Qinming Dai} and {Wenlong Zhang} and {Rui Chang} and {Yajin Zhou} and {Xiapu Luo} and {Ruoyu Wang 001} and {Yang Liu 003} and {Kui Ren 001}}
}
@article{journals/iotj/RulloBR23,
title = {Guest Editorial Special Issue on Intrusion Detection for the Internet of Things.},
year = {2023},
month = {May},
journal = {IEEE Internet Things J.},
author = {{Antonino Rullo} and {Elisa Bertino} and {Kui Ren 001}}
}
@article{journals/ton/LinGZLXHXXR23,
title = {Mobile Communication Among COTS IoT Devices via a Resonant Gyroscope With Ultrasound.},
year = {2023},
month = {June},
journal = {IEEE/ACM Trans. Netw.},
author = {{Feng Lin 004} and {Ming Gao} and {Lingfeng Zhang} and {Yimin Li} and {Weiye Xu} and {Jinsong Han} and {Xian Xu} and {Wenyao Xu} and {Kui Ren 001}}
}
@article{journals/ton/LiuCZHLR23,
title = {Reliable Multi-Factor User Authentication With One Single Finger Swipe.},
year = {2023},
month = {June},
journal = {IEEE/ACM Trans. Netw.},
author = {{Jianwei Liu 008} and {Kaiyan Cui} and {Xiang Zou} and {Jinsong Han} and {Feng Lin 004} and {Kui Ren 001}}
}
@article{journals/tmc/LiZGGXR23,
title = {Disguised as Privacy: Data Poisoning Attacks Against Differentially Private Crowdsensing Systems.},
year = {2023},
month = {September},
journal = {IEEE Trans. Mob. Comput.},
author = {{Zhetao Li} and {Zhirun Zheng} and {Suiming Guo} and {Bin Guo 001} and {Fu Xiao 001} and {Kui Ren 001}}
}
@article{journals/tmc/LiuSSHR23,
title = {Secure User Verification and Continuous Authentication via Earphone IMU.},
year = {2023},
month = {November},
journal = {IEEE Trans. Mob. Comput.},
author = {{Jianwei Liu 008} and {Wenfan Song} and {Leming Shen} and {Jinsong Han} and {Kui Ren 001}}
}
@inproceedings{conf/aaai/BaLLWLL024,
title = {Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection.},
year = {2024},
booktitle = {AAAI},
author = {{Zhongjie Ba} and {Qingyu Liu} and {Zhenguang Liu} and {Shuang Wu} and {Feng Lin} and {Li Lu} and {Kui Ren 001}},
publisher = {AAAI Press},
booktitle = {Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada}
}
@inproceedings{conf/icse/0004JYW024,
title = {Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning.},
year = {2024},
booktitle = {ICSE},
author = {{Pingchuan Ma 004} and {Zhenlan Ji} and {Peisen Yao} and {Shuai Wang 011} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, ICSE 2024, Lisbon, Portugal, April 14-20, 2024}
}
@inproceedings{conf/icse/LiWSZCLL024,
title = {Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem.},
year = {2024},
booktitle = {ICSE},
author = {{Chenghao Li} and {Yifei Wu} and {Wenbo Shen} and {Zichen Zhao} and {Rui Chang} and {Chengwei Liu} and {Yang Liu 003} and {Kui Ren 001}},
publisher = {ACM},
booktitle = {Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, ICSE 2024, Lisbon, Portugal, April 14-20, 2024}
}
@article{journals/corr/abs-2401-07261,
title = {LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts.},
year = {2024},
journal = {CoRR},
author = {{Shoupeng Ren} and {Tianyu Tu} and {Jian Liu} and {Di Wu} and {Kui Ren 001}}
}
@article{journals/corr/abs-2401-08217,
title = {LLM-Guided Multi-View Hypergraph Learning for Human-Centric Explainable Recommendation.},
year = {2024},
journal = {CoRR},
author = {{Zhixuan Chu} and {Yan Wang} and {Qing Cui} and {Longfei Li} and {Wenqing Chen} and {Sheng Li} and {Zhan Qin} and {Kui Ren 001}}
}
@article{journals/corr/abs-2401-15704,
title = {Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege.},
year = {2024},
journal = {CoRR},
author = {{Peng Huang} and {Yao Wei} and {Peng Cheng 007} and {Zhongjie Ba} and {Li Lu 008} and {Feng Lin} and {Yang Wang} and {Kui Ren 001}}
}
@article{journals/corr/abs-2401-17606,
title = {Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.},
year = {2024},
journal = {CoRR},
author = {{Ziyue Pan} and {Wenbo Shen} and {Xingkai Wang} and {Yutian Yang} and {Rui Chang} and {Yao Liu} and {Chengwei Liu} and {Yang Liu} and {Kui Ren 001}}
}
@article{journals/iacr/ZhangLYWCHRY24,
title = {Secure Transformer Inference Made Non-interactive.},
year = {2024},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jiawen Zhang} and {Jian Liu} and {Xinpeng Yang} and {Yinghao Wang} and {Kejia Chen 007} and {Xiaoyang Hou} and {Kui Ren 001} and {Xiaohu Yang 001}}
}
@article{journals/iacr/ZhouZZR24,
title = {Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal.},
year = {2024},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Zhelei Zhou} and {Bingsheng Zhang} and {Hong-Sheng Zhou} and {Kui Ren 001}}
}
@article{journals/tdsc/ChengWHBLLR24,
title = {UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.},
year = {2024},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Peng Cheng 007} and {Yuexin Wu} and {Yuan Hong} and {Zhongjie Ba} and {Feng Lin 004} and {Li Lu 008} and {Kui Ren 001}}
}
@article{journals/tdsc/LiuHXHR24,
title = {Time to Think the Security of WiFi-Based Behavior Recognition Systems.},
year = {2024},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Jianwei Liu 008} and {Yinghui He} and {Chaowei Xiao} and {Jinsong Han} and {Kui Ren 001}}
}
@article{journals/tdsc/LiuZZTHHR24,
title = {Privacy Leakage in Wireless Charging.},
year = {2024},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Jianwei Liu 008} and {Xiang Zou} and {Leqi Zhao} and {Yusheng Tao} and {Sideng Hu} and {Jinsong Han} and {Kui Ren 001}}
}
@article{journals/tdsc/LuoFLKR24,
title = {On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers.},
year = {2024},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Meng Luo 002} and {Bo Feng 002} and {Long Lu} and {Engin Kirda} and {Kui Ren 001}}
}
@article{journals/tdsc/PanSWYCLLLR24,
title = {Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.},
year = {2024},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Ziyue Pan} and {Wenbo Shen} and {Xingkai Wang} and {Yutian Yang} and {Rui Chang} and {Yao Liu 007} and {Chengwei Liu} and {Yang Liu 003} and {Kui Ren 001}}
}
@article{journals/tdsc/ShenLWLBLXR24,
title = {MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning.},
year = {2024},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Yijie Shen} and {Feng Lin 004} and {Chao Wang 097} and {Tiantian Liu 002} and {Zhongjie Ba} and {Li Lu 008} and {Wenyao Xu} and {Kui Ren 001}}
}
@article{journals/tifs/ChenLYBLR24,
title = {AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.},
year = {2024},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Meng Chen} and {Li Lu 008} and {Jiadi Yu} and {Zhongjie Ba} and {Feng Lin 004} and {Kui Ren 001}}
}
@article{journals/tmc/GaoCLZLLLHR24,
title = {A Resilience Evaluation Framework on Ultrasonic Microphone Jammers.},
year = {2024},
month = {February},
journal = {IEEE Trans. Mob. Comput.},
author = {{Ming Gao} and {Yike Chen} and {Yimin Li} and {Lingfeng Zhang} and {Jianwei Liu 008} and {Li Lu 008} and {Feng Lin 004} and {Jinsong Han} and {Kui Ren 001}}
}
@article{journals/tmc/WangSLHPHR24,
title = {Location Privacy-Aware Task Offloading in Mobile Edge Computing.},
year = {2024},
month = {March},
journal = {IEEE Trans. Mob. Comput.},
author = {{Zhibo Wang 001} and {Yunan Sun} and {Defang Liu} and {Jiahui Hu} and {Xiaoyi Pang} and {Yuke Hu} and {Kui Ren 001}}
}