Kui Ren

Orcid: 0000-0003-3441-6277

Affiliations:
  • Zhejiang University, School of Cyber Science and Technology, Hangzhou, China
  • State University of New York af Buffalo, Department of Computer Science and Engineering, NY, USA (former)
  • Illinois Institute of Technology, Chicago, IL, USA (former)
  • Worcester Polytechnic Institute, MA, USA (former, PhD)


According to our database1, Kui Ren authored at least 516 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploring Practical Acoustic Transduction Attacks on Inertial Sensors in MDOF Systems.
IEEE Trans. Mob. Comput., May, 2024

Location Privacy-Aware Task Offloading in Mobile Edge Computing.
IEEE Trans. Mob. Comput., March, 2024

A Resilience Evaluation Framework on Ultrasonic Microphone Jammers.
IEEE Trans. Mob. Comput., February, 2024

AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
IEEE Trans. Inf. Forensics Secur., 2024

MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024

On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers.
IEEE Trans. Dependable Secur. Comput., 2024

Privacy Leakage in Wireless Charging.
IEEE Trans. Dependable Secur. Comput., 2024

Time to Think the Security of WiFi-Based Behavior Recognition Systems.
IEEE Trans. Dependable Secur. Comput., 2024

UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput., 2024

Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal.
IACR Cryptol. ePrint Arch., 2024

Secure Transformer Inference Made Non-interactive.
IACR Cryptol. ePrint Arch., 2024

ECHO: Efficient Off-Chain Payments and Cross-Chain Swaps for Cryptocurrencies.
CoRR, 2024

Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection.
CoRR, 2024

Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
CoRR, 2024

Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege.
CoRR, 2024

LLM-Guided Multi-View Hypergraph Learning for Human-Centric Explainable Recommendation.
CoRR, 2024

LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts.
CoRR, 2024

Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming.
Proceedings of the 29th International Conference on Intelligent User Interfaces, 2024

Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Secure User Verification and Continuous Authentication via Earphone IMU.
IEEE Trans. Mob. Comput., November, 2023

Disguised as Privacy: Data Poisoning Attacks Against Differentially Private Crowdsensing Systems.
IEEE Trans. Mob. Comput., September, 2023

Reliable Multi-Factor User Authentication With One Single Finger Swipe.
IEEE/ACM Trans. Netw., June, 2023

Mobile Communication Among COTS IoT Devices via a Resonant Gyroscope With Ultrasound.
IEEE/ACM Trans. Netw., June, 2023

Guest Editorial Special Issue on Intrusion Detection for the Internet of Things.
IEEE Internet Things J., May, 2023

A Comprehensive Study on ARM Disassembly Tools.
IEEE Trans. Software Eng., April, 2023

VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023

RuleOut Forwarding Anomalies for SDN.
IEEE/ACM Trans. Netw., February, 2023

VocalPrint: A mmWave-Based Unmediated Vocal Sensing System for Secure Authentication.
IEEE Trans. Mob. Comput., 2023

SAGE: Steering the Adversarial Generation of Examples With Accelerations.
IEEE Trans. Inf. Forensics Secur., 2023

AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake.
IEEE Trans. Inf. Forensics Secur., 2023

Low Communication Secure Computation From Semi-Trusted Hardware.
IEEE Trans. Inf. Forensics Secur., 2023

Multi-Party Private Function Evaluation for RAM.
IEEE Trans. Inf. Forensics Secur., 2023

Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling.
IEEE Trans. Inf. Forensics Secur., 2023

Automatic Permission Check Analysis for Linux Kernel.
IEEE Trans. Dependable Secur. Comput., 2023

Poisoning-Assisted Property Inference Attack Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation.
IEEE Trans. Dependable Secur. Comput., 2023

CVTEE: A Compatible Verified TEE Architecture With Enhanced Security.
IEEE Trans. Dependable Secur. Comput., 2023

DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer.
IEEE Trans. Dependable Secur. Comput., 2023

Learn to Forget: Machine Unlearning via Neuron Masking.
IEEE Trans. Dependable Secur. Comput., 2023

Behavior Privacy Preserving in RF Sensing.
IEEE Trans. Dependable Secur. Comput., 2023

EnBinDiff: Identifying Data-Only Patches for Binaries.
IEEE Trans. Dependable Secur. Comput., 2023

MsDroid: Identifying Malicious Snippets for Android Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2023

Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope.
IEEE Trans. Dependable Secur. Comput., 2023

Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Equitable Data Valuation Meets the Right to Be Forgotten in Model Markets.
Proc. VLDB Endow., 2023

Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption.
Proc. VLDB Endow., 2023

Efficient Sampling Approaches to Shapley Value Approximation.
Proc. ACM Manag. Data, 2023

VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023

Practical Constructions for Single Input Functionality against a Dishonest Majority.
IACR Cryptol. ePrint Arch., 2023

A Scalable Coercion-resistant Blockchain Decision-making Scheme.
IACR Cryptol. ePrint Arch., 2023

Load-Balanced Server-Aided MPC in Heterogeneous Computing.
IACR Cryptol. ePrint Arch., 2023

Aegis: A Lightning Fast Privacy-preserving Machine Learning Platform against Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2023

Aurora: Leaderless State-Machine Replication with High Throughput.
IACR Cryptol. ePrint Arch., 2023

BumbleBee: Secure Two-party Inference Framework for Large Transformers.
IACR Cryptol. ePrint Arch., 2023

Arena: Multi-leader Synchronous Byzantine Fault Tolerance.
IACR Cryptol. ePrint Arch., 2023

Fine-grained Policy Constraints for Distributed Point Function.
IACR Cryptol. ePrint Arch., 2023

CipherGPT: Secure Two-Party GPT Inference.
IACR Cryptol. ePrint Arch., 2023

Secure and Practical Functional Dependency Discovery in Outsourced Databases.
IACR Cryptol. ePrint Arch., 2023

Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems.
ACM Comput. Surv., 2023

ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach.
CoRR, 2023

Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory.
CoRR, 2023

FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.
CoRR, 2023

SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution.
CoRR, 2023

Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning (Extended Version).
CoRR, 2023

PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification.
CoRR, 2023

Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
CoRR, 2023

SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores.
CoRR, 2023

Masked Diffusion Models are Fast Learners.
CoRR, 2023

FDINet: Protecting against DNN Model Extraction via Feature Distortion Index.
CoRR, 2023

False Claims against Model Ownership Resolution.
CoRR, 2023

Demystifying Pointer Authentication on Apple M1.
Proceedings of the 32nd USENIX Security Symposium, 2023

WavoID: Robust and Secure Multi-modal User Identification via mmWave-voice Mechanism.
Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology, 2023

When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Boomerang: Metadata-Private Messaging under Hardware Trust.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

CAPP-130: A Corpus of Chinese Application Privacy Policy Summarization and Interpretation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Certified Minimax Unlearning with Generalization Rates and Deletion Capacity.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

SenCom: Integrated Sensing and Communication with Practical WiFi.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

Cancelling Speech Signals for Speech Privacy Protection against Microphone Eavesdropping.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

Locate and Verify: A Two-Stream Network for Improved Deepfake Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Cross-Modal and Multi-Attribute Face Recognition: A Benchmark.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

ShapleyFL: Robust Federated Learning Based on Shapley Value.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Demystifying Template-Based Invariant Generation for Bit-Vector Programs.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Nowhere to Hide: Detecting Live Video Forgery via Vision-WiFi Silhouette Correspondence.
Proceedings of the IEEE INFOCOM 2023, 2023

Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

EulerFD: An Efficient Double-Cycle Approximation of Functional Dependencies.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Dynamic Shapley Value Computation.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Towards Fairness-aware Adversarial Network Pruning.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

A Large-Scale Pretrained Deep Model for Phishing URL Detection.
Proceedings of the IEEE International Conference on Acoustics, 2023

Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing.
Proceedings of the IEEE International Conference on Acoustics, 2023

Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

ANetQA: A Large-scale Benchmark for Fine-grained Compositional Reasoning over Untrimmed Videos.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Towards Transferable Targeted Adversarial Examples.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Privacy-preserving Adversarial Facial Features.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

VDom: Fast and Unlimited Virtual Domains on Multiple Architectures.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

Purifier: Defending Data Inference Attacks via Transforming Confidence Scores.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus.
IEEE Trans. Serv. Comput., 2022

Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum.
ACM Trans. Softw. Eng. Methodol., 2022

Scanning the Voice of Your Fingerprint With Everyday Surfaces.
IEEE Trans. Mob. Comput., 2022

Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection.
IEEE Trans. Inf. Forensics Secur., 2022

Bool Network: An Open, Distributed, Secure Cross-Chain Notary Platform.
IEEE Trans. Inf. Forensics Secur., 2022

snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning.
IEEE Trans. Inf. Forensics Secur., 2022

Privacy-Preserving Object Detection for Medical Images With Faster R-CNN.
IEEE Trans. Inf. Forensics Secur., 2022

CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation.
IEEE Trans. Dependable Secur. Comput., 2022

An Efficient E2E Crowd Verifiable E-Voting System.
IEEE Trans. Dependable Secur. Comput., 2022

RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2022

Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Improving Blockchains With Client-Assistance.
IEEE Trans. Computers, 2022

OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization.
Proc. VLDB Endow., 2022

Scriptable and composable SNARKs in the trusted hardware model.
J. Comput. Secur., 2022

Compound adversarial examples in deep neural networks.
Inf. Sci., 2022

Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Reliable Digital Forensics in the Air: Exploring an RF-based Drone Identification System.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Endemic Oblivious Transfer via Random Oracles, Revisited.
IACR Cryptol. ePrint Arch., 2022

GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility.
IACR Cryptol. ePrint Arch., 2022

Improved Constant-weight PIR with an Extension for Multi-query.
IACR Cryptol. ePrint Arch., 2022

Masked Autoencoders for Egocentric Video Understanding @ Ego4D Challenge 2022.
CoRR, 2022

FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model.
CoRR, 2022

Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples.
CoRR, 2022

Private Data Valuation and Fair Payment in Data Marketplaces.
CoRR, 2022

PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot.
CoRR, 2022

iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps.
CoRR, 2022

Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training.
CoRR, 2022

A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses.
IEEE Commun. Surv. Tutorials, 2022

SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
Proceedings of the 31st USENIX Security Symposium, 2022

"Adversarial Examples" for Proof-of-Learning.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

KITE: Exploring the Practical Threat from Acoustic Transduction Attacks on Inertial Sensors.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Mask does not matter: anti-spoofing face authentication using mmWave without on-site registration.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

A non-intrusive and adaptive speaker de-identification scheme using adversarial examples.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

CTJammer: A Cross-Technology Reactive Jammer towards Unlicensed LTE.
Proceedings of the Seventh IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2022

mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect.
Proceedings of the IEEE INFOCOM 2022, 2022

Physical-World Attack towards WiFi-based Behavior Recognition.
Proceedings of the IEEE INFOCOM 2022, 2022

PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition.
Proceedings of the IEEE INFOCOM 2022, 2022

Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers.
Proceedings of the IEEE INFOCOM 2022, 2022

Fingersound: A Low-cost and Deployable Authentication System with Fingertip Sliding Sound.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

Backdoor Defense via Decoupling the Training Process.
Proceedings of the Tenth International Conference on Learning Representations, 2022

ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

OPEC: operation-based security isolation for bare-metal embedded systems.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV object detection.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

RegVault: hardware assisted selective data randomization for operating system kernels.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

DARPT: defense against remote physical attack based on TDC in multi-tenant scenario.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Device-free Crowd Density Estimation with Off-the-shelf WiFi Traffic.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
e-PoS: Making Proof-of-Stake Decentralized and Fair.
IEEE Trans. Parallel Distributed Syst., 2021

Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging.
IEEE/ACM Trans. Netw., 2021

Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2021

Are You Confident That You Have Successfully Generated Adversarial Examples?
IEEE Trans. Circuits Syst. Video Technol., 2021

Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Demonstration of Dealer: An End-to-End Model Marketplace with Differential Privacy.
Proc. VLDB Endow., 2021

Cryptanalysis of An Encrypted Database in SIGMOD '14.
Proc. VLDB Endow., 2021

Building In-the-Cloud Network Functions: Security and Privacy Challenges.
Proc. IEEE, 2021

ZK Contingent Payments for Trained Neural Networks.
IACR Cryptol. ePrint Arch., 2021

UC Secure Private Branching Program and Decision Tree Evaluation.
IACR Cryptol. ePrint Arch., 2021

Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation.
ACM Comput. Surv., 2021

"Adversarial Examples" for Proof-of-Learning.
CoRR, 2021

Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE.
CoRR, 2021

A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices.
CoRR, 2021

DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications.
CoRR, 2021

Multiple-replica integrity auditing schemes for cloud data storage.
Concurr. Comput. Pract. Exp., 2021

Towards Understanding and Demystifying Bitcoin Mixing Services.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Security Challenges in the Container Cloud.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

OneFi: One-Shot Recognition for Unseen Gesture via COTS WiFi.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

Wavoice: A Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

A Behavior Privacy Preserving Method towards RF Sensing.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

RFace: Anti-Spoofing Facial Authentication Using COTS RFID.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFID.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

MandiPass: Secure and Usable User Authentication via Earphone IMU.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Feature Importance-aware Transferable Adversarial Attacks.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting.
Proceedings of the ICC 2021, 2021

Zero Knowledge Contingent Payments for Trained Neural Networks.
Proceedings of the Computer Security - ESORICS 2021, 2021

Succinct Scriptable NIZK via Trusted Hardware.
Proceedings of the Computer Security - ESORICS 2021, 2021

Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation.
Proceedings of the Computer Security - ESORICS 2021, 2021

Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Encrypted Databases: Progresses and Challenges.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Revisiting challenges for selective data protection of real applications.
Proceedings of the APSys '21: 12th ACM SIGOPS Asia-Pacific Workshop on Systems, 2021

2020
Detection and Mitigation of DoS Attacks in Software Defined Networks.
IEEE/ACM Trans. Netw., 2020

EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid.
IEEE Trans. Ind. Informatics, 2020

LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs.
IEEE Trans. Inf. Forensics Secur., 2020

A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2020

PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing.
IEEE Trans. Inf. Forensics Secur., 2020

Atomos: Constant-Size Path Validation Proof.
IEEE Trans. Inf. Forensics Secur., 2020

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
IEEE Trans. Inf. Forensics Secur., 2020

You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020

Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020

Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation.
IEEE Trans. Dependable Secur. Comput., 2020

Persistent Fault Attack in Practice.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE.
IEEE Trans. Computers, 2020

The Security of Autonomous Driving: Threats, Defenses, and Future Directions.
Proc. IEEE, 2020

Silent Two-party Computation Assisted by Semi-trusted Hardware.
IACR Cryptol. ePrint Arch., 2020

A Framework of Private Set Intersection Protocols.
IACR Cryptol. ePrint Arch., 2020

FederBoost: Private Federated Learning for GBDT.
CoRR, 2020

Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
CoRR, 2020

Towards understanding flash loan and its applications in defi ecosystem.
CoRR, 2020

DUMP: A Dummy-Point-Based Framework for Histogram Estimation in Shuffle Model.
CoRR, 2020

EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum.
CoRR, 2020

Towards Understanding the Adversarial Vulnerability of Skeleton-based Action Recognition.
CoRR, 2020

A Framework for Behavior Privacy Preserving in Radio Frequency Signal.
CoRR, 2020

Adversary Helps: Gradient-based Device-Free Domain-Independent Gesture Recognition.
CoRR, 2020

Atlas: A First Step Toward Multipath Validation.
Comput. Networks, 2020

Theoretical analysis of persistent fault attack.
Sci. China Inf. Sci., 2020

VocalPrint: exploring a resilient and secure voice authentication via mmWave biometric interrogation.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

PhantomCache: Obfuscating Cache Conflicts with Localized Randomization.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SonicPrint: a generally adoptable and secure fingerprint biometrics in smart devices.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Deaf-aid: mobile IoT communication exploiting stealthy speaker-to-gyroscope channel.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

Accelerometer-based smartphone eavesdropping.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

BioDraw: Reliable Multi-Factor User Authentication with One Single Finger Swipe.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

An empirical study on ARM disassembly tools.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Poster Abstract: Secure Remote Key Initialization of Wireless IoT.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020

Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Towards Differentially Private Truth Discovery for Crowd Sensing Systems.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

PESC: A Per System-Call Stack Canary Design for Linux Kernel.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Faster Secure Multiparty Computation of Adaptive Gradient Descent.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

2019
Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars.
IEEE Wirel. Commun., 2019

Toward Hardware-Rooted Smartphone Authentication.
IEEE Wirel. Commun., 2019

Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory.
IEEE Trans. Veh. Technol., 2019

Privacy-Preserving Truth Discovery in Crowd Sensing Systems.
ACM Trans. Sens. Networks, 2019

TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints.
IEEE/ACM Trans. Netw., 2019

Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones.
IEEE Trans. Mob. Comput., 2019

GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2019

CIM: Camera in Motion for Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2019

A Practical Neighbor Discovery Framework for Wireless Sensor Networks.
Sensors, 2019

PriWhisper+: An Enhanced Acoustic Short-Range Communication System for Smartphones.
IEEE Internet Things J., 2019

EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics.
IEEE Internet Things J., 2019

Lightweight Privacy-Preserving Ensemble Classification for Face Recognition.
IEEE Internet Things J., 2019

Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019

One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis.
IACR Cryptol. ePrint Arch., 2019

ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels.
CoRR, 2019

Towards Data Poisoning Attack against Knowledge Graph Embedding.
CoRR, 2019

RFL: Robust fault localization on unreliable communication channels.
Comput. Networks, 2019

Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

PeDSS: Privacy Enhanced and Database-Driven Dynamic spectrum Sharing.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Data Poisoning Attack against Knowledge Graph Embedding.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

CFP: Enabling Camera Fingerprint Concealment for Privacy-Preserving Image Sharing.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

PointCloud Saliency Maps.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

WiPIN: Operation-Free Passive Person Identification Using Wi-Fi Signals.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Persistent Fault Injection in FPGA via BRAM Modification.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Trustworthy Authentication for IoT with Human-and-Environment-in-the-Loop.
Proceedings of the Fourth International Workshop on Social Sensing, 2019

Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

zk-AuthFeed: How to Feed Authenticated Data into Smart Contract with Zero Knowledge.
Proceedings of the IEEE International Conference on Blockchain, 2019

Fluctuating Power Logic: SCA Protection by $V_{DD}$ Randomization at the Cell-level.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

Distributionally Adversarial Attack.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback.
IEEE Trans. Wirel. Commun., 2018

Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters.
IEEE Trans. Smart Grid, 2018

Security and Cloud Outsourcing Framework for Economic Dispatch.
IEEE Trans. Smart Grid, 2018

Editorial.
IEEE Trans. Serv. Comput., 2018

Enabling Generic, Verifiable, and Secure Data Search in Cloud Services.
IEEE Trans. Parallel Distributed Syst., 2018

Secure Integrated Circuit Design via Hybrid Cloud.
IEEE Trans. Parallel Distributed Syst., 2018

Security Policy Violations in SDN Data Plane.
IEEE/ACM Trans. Netw., 2018

Middlebox-Based Packet-Level Redundancy Elimination Over Encrypted Network Traffic.
IEEE/ACM Trans. Netw., 2018

Towards Privacy-Preserving and Practical Image-Centric Social Discovery.
IEEE Trans. Dependable Secur. Comput., 2018

Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2018

Persistent Fault Analysis on Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing.
IEEE Trans. Cloud Comput., 2018

Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond.
IEEE Netw., 2018

A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.
IEEE Netw., 2018

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition.
Frontiers Inf. Technol. Electron. Eng., 2018

My Smartphone Recognizes Genuine QR Codes!: Practical Unclonable QR Code via 3D Printing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Practical Secure Computation Outsourcing: A Survey.
ACM Comput. Surv., 2018

Learning Saliency Maps for Adversarial Point-Cloud Generation.
CoRR, 2018

What's (Not) Validating Network Paths: A Survey.
CoRR, 2018

Privacy-preserving power usage and supply control in smart grid.
Comput. Secur., 2018

Privacy-Preserving Image Processing in the Cloud.
IEEE Cloud Comput., 2018

ABC: Enabling Smartphone Authentication with Built-in Camera.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Building Generic Scalable Middlebox Services Over Encrypted Protocols.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards Privacy-Preserving Malware Detection Systems for Android.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017

Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures.
IEEE/ACM Trans. Netw., 2017

Capability-Based Security Enforcement in Named Data Networking.
IEEE/ACM Trans. Netw., 2017

SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox.
IEEE/ACM Trans. Netw., 2017

Software Defined Cooperative Offloading for Mobile Cloudlets.
IEEE/ACM Trans. Netw., 2017

THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply.
IEEE Trans. Mob. Comput., 2017

DPPro: Differentially Private High-Dimensional Data Release via Random Projection.
IEEE Trans. Inf. Forensics Secur., 2017

Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Netw., 2017

P<sup>2</sup>-SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System.
IEEE J. Sel. Areas Commun., 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2.
IEEE Commun. Mag., 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1.
IEEE Commun. Mag., 2017

User Capacity of Wireless Physical-Layer Identification.
IEEE Access, 2017

Data Independent Identification for Privacy Preservation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Privacy-Preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Understanding the Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Defending against Speaker Fingerprinting Based Device Tracking for Smartphones.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Proceedings of the Financial Cryptography and Data Security, 2017

The Dual Role of Smartphones in IoT Security.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

MINOS: regulating router dataplane actions in dynamic runtime environments.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2016

Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement.
IEEE Trans. Parallel Distributed Syst., 2016

SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multim., 2016

DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud.
IEEE Trans. Multim., 2016

SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones.
IEEE Trans. Mob. Comput., 2016

Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.
IEEE Trans. Image Process., 2016

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.
IEEE Trans. Inf. Forensics Secur., 2016

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016

Wireless Physical-Layer Identification: Modeling and Validation.
IEEE Trans. Inf. Forensics Secur., 2016

Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.
IEEE Trans. Inf. Forensics Secur., 2016

Password Extraction via Reconstructed Wireless Mouse Trajectory.
IEEE Trans. Dependable Secur. Comput., 2016

Guest Editorial: Introduction to the Special Section on Emerging Security Trends for Biomedical Computations, Devices, and Infrastructures.
IEEE ACM Trans. Comput. Biol. Bioinform., 2016

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming.
IEEE Trans. Computers, 2016

Special Issue on Security and Privacy in Mobile Clouds.
Pervasive Mob. Comput., 2016

Securing acoustics-based short-range communication systems: an overview.
J. Commun. Inf. Networks, 2016

Ensuring Security and Privacy Preservation for Cloud Data Services.
ACM Comput. Surv., 2016

Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.
CoRR, 2016

Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2016

<i>P</i><sup>2</sup>-SAS: preserving users' privacy in centralized dynamic spectrum access systems.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Real-time hidden acoustic signal capture with smartphones: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Messages behind the sound: real-time hidden acoustic signal capture with smartphones.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

EyeVeri: A secure and usable approach for smartphone user authentication.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

On the synchronization bottleneck of OpenStack Swift-like cloud storage systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

User capacity of wireless physical-layer identification: An information-theoretic perspective.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016

Increasing User Capacity of Wireless Physical-Layer Identification in Internet of Things.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2015

Enabling Cloud Storage Auditing With Key-Exposure Resistance.
IEEE Trans. Inf. Forensics Secur., 2015

Security and privacy in emerging networks: Part II [Guest Editorial].
IEEE Commun. Mag., 2015

Security and privacy in emerging networks: Part 1 [Guest Editorial].
IEEE Commun. Mag., 2015

GREP: Guaranteeing Reliability with Enhanced Protection in NFV.
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 2015

Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Rise of Mini-Drones: Applications and Issues.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015

Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.
Proceedings of the Computer Security - ESORICS 2015, 2015

Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Enabling IP Protection for Outsourced Integrated Circuit Design.
Proceedings of the 10th ACM Symposium on Information, 2015

Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible.
Proceedings of the 10th ACM Symposium on Information, 2015

Secure Outsourcing Image Feature Extraction: Challenges and Solutions.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Securing emerging short range wireless communications: the state of the art.
IEEE Wirel. Commun., 2014

Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets.
IEEE Trans. Parallel Distributed Syst., 2014

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2014

Proof-Carrying Cloud Computation: The Case of Convex Optimization.
IEEE Trans. Inf. Forensics Secur., 2014

PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications.
IEEE Trans. Dependable Secur. Comput., 2014

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IEEE Internet Things J., 2014

Guest Editorial Special Issue on Security for IoT: The State of the Art.
IEEE Internet Things J., 2014

Editorial: IEEE Communications Surveys & TutorialsSpecial Section on Energy and Smart Grid.
IEEE Commun. Surv. Tutorials, 2014

All your location are belong to us: breaking mobile social networks for automated user location tracking.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Enabling efficient access control with dynamic policy updating for big data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Private image computation: The case of cloud based privacy-preserving SIFT.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Enabling private and non-intrusive smartphone calls with LipTalk.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

The power of indoor crowd: Indoor 3D maps from the crowd.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

AcousAuth: An acoustic-based mobile application for user authentication.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Enabling Privacy-Preserving Image-Centric Social Discovery.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Privacy-preserving outsourcing of image global feature detection.
Proceedings of the IEEE Global Communications Conference, 2014

Blind Recognition of Touched Keys on Mobile Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: LocMask: A Location Privacy Protection Framework in Android System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Opportunistic spectrum access: from stochastic channels to non-stochastic channels.
IEEE Wirel. Commun., 2013

Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations.
IEEE Trans. Parallel Distributed Syst., 2013

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
IEEE Trans. Parallel Distributed Syst., 2013

Secure ad hoc trust initialization and key management in wireless body area networks.
ACM Trans. Sens. Networks, 2013

DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems.
IEEE Trans. Inf. Forensics Secur., 2013

Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud.
IEEE Trans. Emerg. Top. Comput., 2013

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IEEE Trans. Computers, 2013

Security in cognitive radio networks [Guest Editorial].
IEEE Netw., 2013

Toward privacy-assured and searchable cloud data storage services.
IEEE Netw., 2013

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IACR Cryptol. ePrint Arch., 2013

Effective signal region based analog mixed signal design considering variations and applications.
Proceedings of the 2013 IEEE International SOC Conference, Erlangen, Germany, 2013

A new data acquisition design for breast cancer detection system.
Proceedings of the 2013 IEEE International SOC Conference, Erlangen, Germany, 2013

OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

How Privacy Leaks From Bluetooth Mouse?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

DAC-MACS: Effective data access control for multi-authority cloud storage systems.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Proof-carrying cloud computation: The case of convex optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Optimal budget deployment strategy against power grid interdiction.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.
Proceedings of the Financial Cryptography and Data Security, 2013

Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Attribute-based fine-grained access control with efficient revocation in cloud storage systems.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2012

Towards Optimal Electric Demand Management for Internet Data Centers.
IEEE Trans. Smart Grid, 2012

Toward Secure and Dependable Storage Services in Cloud Computing.
IEEE Trans. Serv. Comput., 2012

Distributed Privacy-Preserving Access Control in Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Quantitative Analysis of Load Redistribution Attacks in Power Systems.
IEEE Trans. Parallel Distributed Syst., 2012

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2012

Toward secure and effective data utilization in public cloud.
IEEE Netw., 2012

Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication.
IEEE J. Sel. Areas Commun., 2012

Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels.
IEEE J. Sel. Areas Commun., 2012

Security Challenges for the Public Cloud.
IEEE Internet Comput., 2012

k-Indistinguishable Traffic Padding in Web Applications.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Joint UFH and power control for effective wireless anti-jamming communication.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Locating malicious nodes for data aggregation in wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Achieving usable and privacy-assured similarity search over outsourced cloud data.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

When cloud meets eBay: Towards effective pricing for cloud computing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Privacy-Preserving Authentication in Wireless Access Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Device Pairing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secret key generation exploiting channel characteristics in wireless communications.
IEEE Wirel. Commun., 2011

Modeling Load Redistribution Attacks in Power Systems.
IEEE Trans. Smart Grid, 2011

FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2011

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2011

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
ACM Trans. Sens. Networks, 2011

Enhancing Attribute-Based Encryption with Attribute Hierarchy.
Mob. Networks Appl., 2011

Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Wireless key establishment with asynchronous clocks.
Proceedings of the MILCOM 2011, 2011

Delay-bounded adaptive UFH-based anti-jamming wireless communication.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Fast and scalable secret key generation exploiting channel phase randomness in wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Secure and practical outsourcing of linear programming in cloud computing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Anti-jamming communication in cognitive radio networks with unknown channel statistics.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Towards Secure and Effective Utilization over Encrypted Cloud Data.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Jamming-Resilient Dynamic Spectrum Access for Cognitive Radio Networks.
Proceedings of IEEE International Conference on Communications, 2011

2010
Data security and privacy in wireless body area networks.
IEEE Wirel. Commun., 2010

Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks.
IEEE Trans. Veh. Technol., 2010

PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
IEEE Trans. Parallel Distributed Syst., 2010

PCM: a privacy-preserving detection mechanism in mobile <i>ad hoc</i> networks.
Secur. Commun. Networks, 2010

Toward publicly auditable secure cloud data storage services.
IEEE Netw., 2010

PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search.
IACR Cryptol. ePrint Arch., 2010

Attribute-based on-demand multicast group setup with membership anonymity.
Comput. Networks, 2010

Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Proceedings of the Security and Privacy in Communication Networks, 2010

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Secure Ranked Keyword Search over Encrypted Cloud Data.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

Attribute based data sharing with attribute revocation.
Proceedings of the 5th ACM Symposium on Information, 2010

Attribute-based signature and its applications.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply.
Wirel. Networks, 2009

Security, privacy, and accountability in wireless access networks.
IEEE Wirel. Commun., 2009

Multi-User Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2009

Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation.
IEEE Trans. Veh. Technol., 2009

On Address Privacy in Mobile Ad Hoc Networks.
Mob. Networks Appl., 2009

The ring authenticated encryption scheme - How to provide a clue wisely.
Inf. Sci., 2009

Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.
IACR Cryptol. ePrint Arch., 2009

Ensuring Data Storage Security in Cloud Computing.
IACR Cryptol. ePrint Arch., 2009

Enabling Public Verifiability and Data Dynamics for Storage Security.
IACR Cryptol. ePrint Arch., 2009

Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
IACR Cryptol. ePrint Arch., 2009

Privacy-aware Attribute-based Encryption with User Accountability.
IACR Cryptol. ePrint Arch., 2009

A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control.
IACR Cryptol. ePrint Arch., 2009

A New Approach to Malware Detection.
Proceedings of the Advances in Information Security and Assurance, 2009

DP<sup>2</sup>AC: Distributed Privacy-Preserving Access Control in Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009

2008
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2008

LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2008

A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Anonymous ID-Based Group Key Agreement for Wireless Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy.
Proceedings of the Wireless Algorithms, 2008

Towards address privacy in mobile ad hoc networks.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Efficient user revocation for privacy-aware PKI.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Anonymous Misbehavior Detection in Mobile Ad Hoc Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Optimized User Revocation for Group Signature Based Privacy-Aware PKI.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Time-Slotted Round-Trip Carrier Synchronization in Large-Scale Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2008

Multicast with an Application-Oriented Networking (AON) Approach.
Proceedings of IEEE International Conference on Communications, 2008

Towards Secure Link Quality Measurement in Multihop Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
On Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2007

Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability.
Mob. Networks Appl., 2007

Multi-user Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

2006
A new approach for random key pre-distribution in large-scale wireless sensor networks.
Wirel. Commun. Mob. Comput., 2006

A novel privacy preserving authentication and access control scheme for pervasive computing environments.
IEEE Trans. Veh. Technol., 2006

Routing optimization security in mobile IPv6.
Comput. Networks, 2006

Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Fault-tolerant Event Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Privacy enhanced access control in pervasive computing environments.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

2004
Highly reliable trust establishment scheme in ad hoc networks.
Comput. Networks, 2004

Efficient Authenticated Key Agreement Protocol for Dynamic Groups.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

An enhanced lightweight authentication protocol for access control in wireless LANs.
Proceedings of the 12th IEEE International Conference on Networks, 2004

2003
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
Proceedings of the Applied Cryptography and Network Security, 2003


  Loading...