Wenhai Sun

Orcid: 0000-0003-0458-0092

According to our database1, Wenhai Sun authored at least 38 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks.
CoRR, 2024

2023
Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns.
IEEE Internet Things J., August, 2023

Protecting Regression Models With Personalized Local Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks.
CoRR, 2023

Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation.
Proceedings of the 32nd USENIX Security Symposium, 2023

RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

StateMask: Explaining Deep Reinforcement Learning through State Mask.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack.
IEEE Trans. Dependable Secur. Comput., 2022

PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials.
IEEE Trans. Dependable Secur. Comput., 2022

Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation.
CoRR, 2022

AdvTraffic: Obfuscating Encrypted Traffic with Adversarial Examples.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

Towards Overcoming the Undercutting Problem.
Proceedings of the Financial Cryptography and Data Security, 2022

MultiEvasion: Evasion Attacks Against Multiple Malware Detectors.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Speedster: An Efficient Multi-party State Channel via Enclaves.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Technical Report: Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test.
CoRR, 2021

Speedster: A TEE-assisted State Channel System.
CoRR, 2021

Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack.
CoRR, 2020

Undercutting Bitcoin Is Not Profitable.
CoRR, 2020

Fingerprinting encrypted voice traffic on smart speakers with deep learning.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

2019
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT.
IEEE Trans. Inf. Forensics Secur., 2019

Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data.
CoRR, 2019

I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT.
Proceedings of the Security and Privacy in Communication Networks, 2018

REARGUARD: Secure Keyword Search Using Trusted Hardware.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

A Service Strategy Selection in Collaboration Model for the Business Growth of Content Providers.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

ROSTER: Radio Context Attestation in Cognitive Radio Network.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Serv. Comput., 2017

When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2016

2015
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distributed Syst., 2014

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014

2013
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013


  Loading...