Shucheng Yu

According to our database1, Shucheng Yu authored at least 55 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Scheduling quay cranes and yard trucks for unloading operations in container ports.
Annals OR, 2019

QoS-Aware Power Management with Deep Learning.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

kFHCO: Optimal VM Consolidation via k -Factor Horizontal Checkpoint Oversubscription.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Indoor Localization Using Commodity Wi-Fi APs: Techniques and Challenges.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Enabling Blockchain Applications Over Named Data Networking.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Flexibly and Securely Shape Your Data Disclosed to Others.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Information Flow Queue Optimization in EC Cloud.
Proceedings of the 2018 International Conference on Computing, 2018

Optimal Code Regeneration with Background Traffic Awareness in Distributed Storage.
Proceedings of the 2018 International Conference on Computing, 2018

2017
Making Wireless Body Area Networks Robust Under Cross-Technology Interference.
IEEE Trans. Wireless Communications, 2017

Investigating and securing communications in the Controller Area Network (CAN).
Proceedings of the 2017 International Conference on Computing, 2017

2016
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud.
IEEE Trans. Parallel Distrib. Syst., 2016

Statistical Design of an Adaptive Synthetic X̄ Control Chart with Run Rule on Service and Management Operation.
Scientific Programming, 2016

Multi-period distribution center location and scale decision in supply chain network.
Computers & Industrial Engineering, 2016

SBPA: Social behavior based cross Social Network phishing attacks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification.
IEEE Trans. Information Forensics and Security, 2015

PCPOR: Public and constant-cost proofs of retrievability in cloud.
Journal of Computer Security, 2015

MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks.
IEEE Internet of Things Journal, 2015

SEISA: Secure and efficient encrypted image search with access control.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles.
Proceedings of the 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2015

2014
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing.
IEEE Trans. Parallel Distrib. Syst., 2014

Efficient public integrity checking for cloud data sharing with multi-user modification.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks.
IEEE Trans. Wireless Communications, 2013

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
IEEE Trans. Parallel Distrib. Syst., 2013

Secure ad hoc trust initialization and key management in wireless body area networks.
TOSN, 2013

Toward privacy-assured and searchable cloud data storage services.
IEEE Network, 2013

ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Surviving the RF smog: Making Body Area Networks robust to cross-technology interference.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

Efficient privacy-preserving biometric identification in cloud computing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

SybilShield: An agent-aided social network-based Sybil defense among multiple communities.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Flexible and publicly verifiable aggregation query for outsourced databases in cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Secure and constant cost public cloud storage auditing with deduplication.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Proofs of retrievability with public verifiability and constant communication cost in cloud.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
BANA: body area network authentication exploiting channel characteristics.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing.
Proceedings of the Security and Privacy in Communication Networks, 2012

Achieving usable and privacy-assured similarity search over outsourced cloud data.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

LT codes-based secure and reliable cloud storage service.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Authenticated secret key extraction using channel characteristics for body area networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Privacy-Preserving Authentication in Wireless Access Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid.
IEEE Trans. Smart Grid, 2011

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
TOSN, 2011

FindU: Privacy-preserving personal profile matching in mobile social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Authorized Private Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
IEEE Trans. Parallel Distrib. Syst., 2010

Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Proceedings of the Security and Privacy in Communication Networks, 2010

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Attribute based data sharing with attribute revocation.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Multi-User Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Vehicular Technology, 2009

Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.
Proceedings of the Security and Privacy in Communication Networks, 2009

FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Attribute-based on-demand multicast group setup with membership anonymity.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Towards Secure Link Quality Measurement in Multihop Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008


  Loading...