Kun He
Affiliations:- Wuhan University, China
According to our database1,
Kun He
authored at least 39 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation.
IEEE Trans. Inf. Forensics Secur., 2024
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel.
IEEE Trans. Dependable Secur. Comput., 2022
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst., 2022
Online incentive mechanism for task offloading with privacy-preserving in UAV-assisted mobile edge computing.
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps.
IEEE Trans. Dependable Secur. Comput., 2021
Future Gener. Comput. Syst., 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2020
Secur. Commun. Networks, 2020
IEEE Internet Things J., 2020
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020
2019
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management.
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services.
IEEE Trans. Mob. Comput., 2018
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
IEEE Trans. Mob. Comput., 2017
Secure independent-update concise-expression access control for video on demand in cloud.
Inf. Sci., 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
2016
IEEE Trans. Computers, 2016
Secur. Commun. Networks, 2016
A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst., 2016
Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks.
Comput. Networks, 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
2012
Secur. Commun. Networks, 2012