Kun He

Affiliations:
  • Wuhan University, China


According to our database1, Kun He authored at least 39 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation.
IEEE Trans. Inf. Forensics Secur., 2024

PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023

Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Formal Analysis and Patching of BLE-SC Pairing.
Proceedings of the 32nd USENIX Security Symposium, 2023

Efficient Adversarial Training with Membership Inference Resistance.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

2022
Redactable Blockchain From Decentralized Chameleon Hash Functions.
IEEE Trans. Inf. Forensics Secur., 2022

Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput., 2022

XAuth: Efficient Privacy-Preserving Cross-Domain Authentication.
IEEE Trans. Dependable Secur. Comput., 2022

DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel.
IEEE Trans. Dependable Secur. Comput., 2022

PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst., 2022

Online incentive mechanism for task offloading with privacy-preserving in UAV-assisted mobile edge computing.
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022

EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost.
IEEE Trans. Inf. Forensics Secur., 2021

Dynamic Group-Oriented Provable Data Possession in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps.
IEEE Trans. Dependable Secur. Comput., 2021

SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures.
Future Gener. Comput. Syst., 2021

PROCESS: Privacy-Preserving On-Chain Certificate Status Service.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Biometrics-Authenticated Key Exchange for Secure Messaging.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2020

PowerPrint: Identifying Smartphones through Power Consumption of the Battery.
Secur. Commun. Networks, 2020

CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake.
IEEE Internet Things J., 2020

Android Data-Clone Attack via Operating System Customization.
IEEE Access, 2020

Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management.
IEEE Access, 2019

ICAuth: Implicit and Continuous Authentication When the Screen Is Awake.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services.
IEEE Trans. Mob. Comput., 2018

CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks.
IEEE Trans. Mob. Comput., 2017

Secure independent-update concise-expression access control for video on demand in cloud.
Inf. Sci., 2017

Charge-Depleting of the Batteries Makes Smartphones Recognizable.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

2016
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments.
IEEE Trans. Computers, 2016

Message-locked proof of ownership and retrievability with remote repairing in cloud.
Secur. Commun. Networks, 2016

A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst., 2016

Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks.
Comput. Networks, 2016

2015
Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks.
IEEE Trans. Parallel Distributed Syst., 2015

2014
Proofs of Ownership and Retrievability in Cloud Storage.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2012
A key distribution scheme using network coding for mobile ad hoc network.
Secur. Commun. Networks, 2012


  Loading...