Shucheng Yu

According to our database1, Shucheng Yu authored at least 62 papers between 2008 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference.
IACR Cryptol. ePrint Arch., 2020

2019
LEP-CNN: A Lightweight Edge Device Assisted Privacy-preserving CNN Inference Solution for IoT.
CoRR, 2019

Scheduling quay cranes and yard trucks for unloading operations in container ports.
Annals OR, 2019

Edge-Assisted CNN Inference over Encrypted Data for Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2019

QoS-Aware Power Management with Deep Learning.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

VWAN: Virtual WiFi ANtennas for Increased Indoor Localization Accuracy.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

kFHCO: Optimal VM Consolidation via k -Factor Horizontal Checkpoint Oversubscription.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Indoor Localization Using Commodity Wi-Fi APs: Techniques and Challenges.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Enabling Blockchain Applications Over Named Data Networking.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Exploiting CSI-MIMO for Accurate and Efficient Device Identification.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Edge-Assisted Learning for Real-Time UAV Imagery via Predictive Offloading.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Poster: Using Commodity WiFi Devices For Object Sensing And Imaging.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

Flexibly and Securely Shape Your Data Disclosed to Others.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Information Flow Queue Optimization in EC Cloud.
Proceedings of the 2018 International Conference on Computing, 2018

Optimal Code Regeneration with Background Traffic Awareness in Distributed Storage.
Proceedings of the 2018 International Conference on Computing, 2018

2017
Making Wireless Body Area Networks Robust Under Cross-Technology Interference.
IEEE Trans. Wireless Communications, 2017

Investigating and securing communications in the Controller Area Network (CAN).
Proceedings of the 2017 International Conference on Computing, 2017

2016
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud.
IEEE Trans. Parallel Distrib. Syst., 2016

Statistical Design of an Adaptive Synthetic X̄ Control Chart with Run Rule on Service and Management Operation.
Sci. Program., 2016

Multi-period distribution center location and scale decision in supply chain network.
Comput. Ind. Eng., 2016

SBPA: Social behavior based cross Social Network phishing attacks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification.
IEEE Trans. Information Forensics and Security, 2015

PCPOR: Public and constant-cost proofs of retrievability in cloud.
J. Comput. Secur., 2015

MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks.
IEEE Internet Things J., 2015

SEISA: Secure and efficient encrypted image search with access control.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles.
Proceedings of the 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2015

2014
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing.
IEEE Trans. Parallel Distrib. Syst., 2014

Efficient public integrity checking for cloud data sharing with multi-user modification.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks.
IEEE Trans. Wireless Communications, 2013

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
IEEE Trans. Parallel Distrib. Syst., 2013

Secure ad hoc trust initialization and key management in wireless body area networks.
ACM Trans. Sens. Networks, 2013

Toward privacy-assured and searchable cloud data storage services.
IEEE Network, 2013

BANA: Body Area Network Authentication Exploiting Channel Characteristics.
IEEE J. Sel. Areas Commun., 2013

Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud.
IACR Cryptol. ePrint Arch., 2013

Secure and Constant Cost Public Cloud Storage Auditing with Deduplication.
IACR Cryptol. ePrint Arch., 2013

ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Surviving the RF smog: Making Body Area Networks robust to cross-technology interference.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

Efficient privacy-preserving biometric identification in cloud computing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

SybilShield: An agent-aided social network-based Sybil defense among multiple communities.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud.
IACR Cryptol. ePrint Arch., 2012

Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing.
Proceedings of the Security and Privacy in Communication Networks, 2012

Achieving usable and privacy-assured similarity search over outsourced cloud data.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

LT codes-based secure and reliable cloud storage service.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Authenticated secret key extraction using channel characteristics for body area networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Privacy-Preserving Authentication in Wireless Access Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

P<sup>2</sup>: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid.
IEEE Trans. Smart Grid, 2011

FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2011

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
ACM Trans. Sens. Networks, 2011

FindU: Privacy-preserving personal profile matching in mobile social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Authorized Private Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
IEEE Trans. Parallel Distrib. Syst., 2010

Attribute-based on-demand multicast group setup with membership anonymity.
Comput. Networks, 2010

Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Proceedings of the Security and Privacy in Communication Networks, 2010

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Attribute based data sharing with attribute revocation.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Multi-User Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2009

Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.
IACR Cryptol. ePrint Arch., 2009

2008
Towards Secure Link Quality Measurement in Multihop Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008


  Loading...