Wenjing Lou

Orcid: 0000-0002-2421-4623

Affiliations:
  • Virginia Tech, Falls Church, VA, USA


According to our database1, Wenjing Lou authored at least 296 papers between 2001 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2023, "For contributions to information and network security".

IEEE Fellow

IEEE Fellow 2015, "For contributions to information and network security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Modeling and Optimization of Channel Allocation for PAL and GAA Users in the CBRS Band.
IEEE Trans. Cogn. Commun. Netw., February, 2024

O-M<sup>3</sup>: Real-Time Multi-Cell MIMO Scheduling in 5G O-RAN.
IEEE J. Sel. Areas Commun., February, 2024

Aion: A Bandwidth Conserving Scheduler With Data Freshness Guarantee.
IEEE Trans. Mob. Comput., January, 2024

2023
mCore+: A Real-Time Design Achieving ∼ 500 μs Scheduling for 5G MU-MIMO Systems.
IEEE Trans. Mob. Comput., December, 2023

BD-SAS: Enabling Dynamic Spectrum Sharing in Low-Trust Environment.
IEEE Trans. Cogn. Commun. Netw., August, 2023

Turbo-HB: A Sub-Millisecond Hybrid Beamforming Design for 5G mmWave Systems.
IEEE Trans. Mob. Comput., July, 2023

On DoF Conservation in MIMO Interference Cancellation Based on Signal Strength in the Eigenspace.
IEEE Trans. Mob. Comput., May, 2023

Achieving Real-Time Spectrum Sharing in 5G Underlay Coexistence With Channel Uncertainty.
IEEE Trans. Mob. Comput., April, 2023

Wireless Scheduling to Optimize Age of Information Based on Earliest Update Time.
IEEE Internet Things J., April, 2023

Enhancing Resilience in Mobile Edge Computing Under Processing Uncertainty.
IEEE J. Sel. Areas Commun., March, 2023

MANDA: On Adversarial Example Detection for Network Intrusion Detection System.
IEEE Trans. Dependable Secur. Comput., 2023

Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

CANShield: Deep-Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal Level.
IEEE Internet Things J., 2023

Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction.
CoRR, 2023

MS-PTP: Protecting Network Timing from Byzantine Attacks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Fortifying Your Defenses: Techniques to Thwart Adversarial Attacks and Boost Performance of Machine Learning-Based Intrusion Detection Systems.
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, 2023

ARI: Attestation of Real-time Mission Execution Integrity.
Proceedings of the 32nd USENIX Security Symposium, 2023

UCBlocker: Unwanted Call Blocking Using Anonymous Authentication.
Proceedings of the 32nd USENIX Security Symposium, 2023

MINDFL: Mitigating the Impact of Imbalanced and Noisy-labeled Data in Federated Learning with Quality and Fairness-Aware Client Selection.
Proceedings of the IEEE Military Communications Conference, 2023

Age of Critical Information: Optimizing Data Freshness Based on Content Criticality.
Proceedings of the IEEE Military Communications Conference, 2023

A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem.
Proceedings of the IEEE INFOCOM 2023, 2023

Eywa: A General Approach for Scheduler Design in AoI Optimization.
Proceedings of the IEEE INFOCOM 2023, 2023

Bijack: Breaking Bitcoin Network with TCP Vulnerabilities.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution.
IEEE Wirel. Commun., 2022

Maximizing Energy Efficiency With Channel Uncertainty Under Mutual Interference.
IEEE Trans. Wirel. Commun., 2022

Scheduling With Age of Information Guarantee.
IEEE/ACM Trans. Netw., 2022

GPF+: A Novel Ultrafast GPU-Based Proportional Fair Scheduler for 5G NR.
IEEE/ACM Trans. Netw., 2022

MAS-Encryption and its Applications in Privacy-Preserving Classifiers.
IEEE Trans. Knowl. Data Eng., 2022

Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput., 2022

A Dynamic Deep-Learning-Based Virtual Edge Node Placement Scheme for Edge Cloud Systems in Mobile Environment.
IEEE Trans. Cloud Comput., 2022

DELUXE: A DL-Based Link Adaptation for URLLC/eMBB Multiplexing in 5G NR.
IEEE J. Sel. Areas Commun., 2022

CANShield: Signal-based Intrusion Detection for Controller Area Networks.
CoRR, 2022

Hector: A Reinforcement Learning-based Scheduler for Minimizing Casualties of a Military Drone Swarm.
Proceedings of the IEEE Military Communications Conference, 2022

FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning.
Proceedings of the IEEE INFOCOM 2022, 2022

Ao<sup>2</sup>I: Minimizing Age of Outdated Information to Improve Freshness in Data Collection.
Proceedings of the IEEE INFOCOM 2022, 2022

D<sup>2</sup>BF - Data-Driven Beamforming in MU-MIMO with Channel Estimation Uncertainty.
Proceedings of the IEEE INFOCOM 2022, 2022

M<sup>3</sup>: A Sub-Millisecond Scheduler for Multi-Cell MIMO Networks under C-RAN Architecture.
Proceedings of the IEEE INFOCOM 2022, 2022

Transferability of Adversarial Examples in Machine Learning-based Malware Detection.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Maximize Spectrum Efficiency in Underlay Coexistence With Channel Uncertainty.
IEEE/ACM Trans. Netw., 2021

NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2021

Searchable Symmetric Encryption with Forward Search Privacy.
IEEE Trans. Dependable Secur. Comput., 2021

Challenges and New Directions in Securing Spectrum Access Systems.
IEEE Internet Things J., 2021

Minimizing AoI in a 5G-Based IoT Network Under Varying Channel Conditions.
IEEE Internet Things J., 2021

Task Offloading with Uncertain Processing Cycles.
Proceedings of the MobiHoc '21: The Twenty-second International Symposium on Theory, 2021

MANDA: On Adversarial Example Detection for Network Intrusion Detection System.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Aion: A Bandwidth Optimized Scheduler with AoI Guarantee.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

On Scheduling with AoI Violation Tolerance.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO Systems.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

A Deep-Learning-based Link Adaptation Design for eMBB/URLLC Multiplexing in 5G NR.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Optimal Channel Allocation in the CBRS Band with Shipborne Radar Incumbents.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021

2020
Offloading Decision in Edge Computing for Continuous Applications Under Uncertainty.
IEEE Trans. Wirel. Commun., 2020

On DoF-Based Interference Cancellation Under General Channel Rank Conditions.
IEEE/ACM Trans. Netw., 2020

Minimizing Age of Information Under General Models for IoT Data Collection.
IEEE Trans. Netw. Sci. Eng., 2020

A Practical Downlink NOMA Scheme for Wireless LANs.
IEEE Trans. Commun., 2020

Achieving Fair LTE/Wi-Fi Coexistence with Real-Time Scheduling.
IEEE Trans. Cogn. Commun. Netw., 2020

GPU: A New Enabling Platform for Real-Time Optimization in Wireless Networks.
IEEE Netw., 2020

A Deep-Reinforcement-Learning-Based Approach to Dynamic eMBB/URLLC Multiplexing in 5G NR.
IEEE Internet Things J., 2020

A Survey of Distributed Consensus Protocols for Blockchain Networks.
IEEE Commun. Surv. Tutorials, 2020

Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

AoI Scheduling with Maximum Thresholds.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Turbo-HB: A Novel Design and Implementation to Achieve Ultra-Fast Hybrid Beamforming.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
Proceedings of the Computer Security - ESORICS 2020, 2020

Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Joint User-AP Association and Resource Allocation in Multi-AP 60-GHz WLAN.
IEEE Trans. Veh. Technol., 2019

A General Method to Determine Asymptotic Capacity Upper Bounds for Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2019

Game Theoretical Analysis on Encrypted Cloud Data Deduplication.
IEEE Trans. Ind. Informatics, 2019

Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT.
IEEE Trans. Inf. Forensics Secur., 2019

Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data.
CoRR, 2019

Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution.
CoRR, 2019

Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

Optimal Power Control with Channel Uncertainty in Ad Hoc Networks.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Kronos: A 5G Scheduler for AoI Minimization Under Dynamic Channel Conditions.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

A Real-Time Solution for Underlay Coexistence with Channel Uncertainty.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Networks.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

2018
On the integration of SIC and MIMO DoF for interference cancellation in wireless networks.
Wirel. Networks, 2018

On Multicast Throughput in Multihop MIMO Networks With Interference Alignment.
IEEE Trans. Veh. Technol., 2018

Cost Minimization for Cooperative Traffic Relaying Between Primary and Secondary Networks.
IEEE Trans. Mob. Comput., 2018

Memory Forensic Challenges Under Misused Architectural Features.
IEEE Trans. Inf. Forensics Secur., 2018

Cooperative Interference Neutralization in Multi-Hop Wireless Networks.
IEEE Trans. Commun., 2018

Recent Advances of LTE/WiFi Coexistence in Unlicensed Spectrum.
IEEE Netw., 2018

A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT.
Proceedings of the Security and Privacy in Communication Networks, 2018

Context-Free Fine-Grained Motion Sensing Using WiFi.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

GPF: A GPU-based Design to Achieve ~100 μs Scheduling for 5G NR.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

REARGUARD: Secure Keyword Search Using Trusted Hardware.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A General Model for DoF-based Interference Cancellation in MIMO Networks With Rank-Deficient Channels.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

TruSense: Information Leakage from TrustZone.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Service Strategy Selection in Collaboration Model for the Business Growth of Content Providers.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Efficient and Secure Outsourcing of Differentially Private Data Publication.
Proceedings of the Computer Security, 2018

CURT: A Real-Time Scheduling Algorithm for Coexistence of LTE and Wi-Fi in Unlicensed Spectrum.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

ROSTER: Radio Context Attestation in Cognitive Radio Network.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Serv. Comput., 2017

Beyond Overlay: Reaping Mutual Benefits for Primary and Secondary Networks Through Node-Level Cooperation.
IEEE Trans. Mob. Comput., 2017

Impact of Full Duplex Scheduling on End-to-End Throughput in Multi-Hop Wireless Networks.
IEEE Trans. Mob. Comput., 2017

From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality.
ACM Trans. Intell. Syst. Technol., 2017

Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources.
IEEE Trans. Inf. Forensics Secur., 2017

Secure and Efficient Cloud Data Deduplication With Randomized Tag.
IEEE Trans. Inf. Forensics Secur., 2017

Location Based Handshake and Private Proximity Test with Location Tags.
IEEE Trans. Dependable Secur. Comput., 2017

OFDM-Based Interference Alignment in Single-Antenna Cellular Wireless Networks.
IEEE Trans. Commun., 2017

A Distributed Scheduling Algorithm for Underwater Acoustic Networks With Large Propagation Delays.
IEEE Trans. Commun., 2017

Coexistence Between Wi-Fi and LTE on Unlicensed Spectrum: A Human-Centric Approach.
IEEE J. Sel. Areas Commun., 2017

A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications.
J. Parallel Distributed Comput., 2017

Tell me the truth: Practically public authentication for outsourced databases with multi-user modification.
Inf. Sci., 2017

On AP Assignment and Transmission Scheduling for Multi-AP 60 GHz WLAN.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Privacy-preserving pattern matching over encrypted genetic data in cloud computing.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

AugAuth: Shoulder-surfing resistant authentication for augmented reality.
Proceedings of the IEEE International Conference on Communications, 2017

Spectrum attacks aimed at minimizing spectrum opportunities.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Black penguin: On the feasibility of detecting intrusion with homogeneous memory.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
A Distributed Algorithm to Achieve Transparent Coexistence for a Secondary Multi-Hop MIMO Network.
IEEE Trans. Wirel. Commun., 2016

Joint Flow Routing and DoF Allocation in Multihop MIMO Networks.
IEEE Trans. Wirel. Commun., 2016

Cross-Layer Optimization for Multi-Hop Wireless Networks With Successive Interference Cancellation.
IEEE Trans. Wirel. Commun., 2016

Cooperative Interference Mitigation for Heterogeneous Multi-Hop Wireless Networks Coexistence.
IEEE Trans. Wirel. Commun., 2016

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2016

A Scheduling Algorithm for MIMO DoF Allocation in Multi-Hop Networks.
IEEE Trans. Mob. Comput., 2016

An Analytical Model for Interference Alignment in Multi-Hop MIMO Networks.
IEEE Trans. Mob. Comput., 2016

Jamming Resilient Communication Using MIMO Interference Cancellation.
IEEE Trans. Inf. Forensics Secur., 2016

An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm.
IEEE Trans. Cogn. Commun. Netw., 2016

Verifiable Computation over Large Database with Incremental Updates.
IEEE Trans. Computers, 2016

Cognitive security: securing the burgeoning landscape of mobile networks.
IEEE Netw., 2016

Interference alignment for multihop wireless networks: challenges and research directions.
IEEE Netw., 2016

On Throughput Region for Primary and Secondary Networks With Node-Level Cooperation.
IEEE J. Sel. Areas Commun., 2016

Secure three-party computational protocols for triangle area.
Int. J. Inf. Sec., 2016

TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices.
IACR Cryptol. ePrint Arch., 2016

Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

CaSE: Cache-Assisted Secure Execution on ARM Processors.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Nullification in the air: Interference neutralization in multi-hop wireless networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

MobTrack: Locating indoor interfering radios with a single device.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

CacheKit: Evading Memory Introspection Using Cache Incoherence.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Looks Good To Me: Authentication for Augmented Reality.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

Towards Efficient Fully Randomized Message-Locked Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security.
IEEE Wirel. Commun. Lett., 2015

A Hybrid Cloud Approach for Secure Authorized Deduplication.
IEEE Trans. Parallel Distributed Syst., 2015

Multi-Node Wireless Energy Charging in Sensor Networks.
IEEE/ACM Trans. Netw., 2015

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
IEEE Trans. Inf. Forensics Secur., 2015

New Publicly Verifiable Databases with Efficient Updates.
IEEE Trans. Dependable Secur. Comput., 2015

Identity-Based Encryption with Outsourced Revocation in Cloud Computing.
IEEE Trans. Computers, 2015

Recent advances in interference management for wireless networks.
IEEE Netw., 2015

Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks.
IEEE J. Sel. Areas Commun., 2015

A Mobile Platform for Wireless Charging and Data Collection in Sensor Networks.
IEEE J. Sel. Areas Commun., 2015

New access control systems based on outsourced attribute-based encryption.
J. Comput. Secur., 2015

A delegation based cross trusted domain direct anonymous attestation scheme.
Comput. Networks, 2015

DDoS attack protection in the era of cloud computing and Software-Defined Networking.
Comput. Networks, 2015

Harmonizing SIC and MIMO DoF Interference Cancellation for Efficient Network-Wide Resource Allocation.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

On cyclostationary analysis of WiFi signals for direction estimation.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Privacy-Preserving Link Prediction in Decentralized Online Social Networks.
Proceedings of the Computer Security - ESORICS 2015, 2015

Optimal throughput curve for primary and secondary users with node-level cooperation.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2015

Modeling the side-channel attacks in data deduplication with game theory.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Now You See Me: Hide and Seek in Physical Address Space.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2014

Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distributed Syst., 2014

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2014

Secure Deduplication with Efficient and Reliable Convergent Key Management.
IEEE Trans. Parallel Distributed Syst., 2014

New Algorithms for Secure Outsourcing of Modular Exponentiations.
IEEE Trans. Parallel Distributed Syst., 2014

A novel MIMO DoF model for multi-hop networks.
IEEE Netw., 2014

New and efficient conditional e-payment systems with transferability.
Future Gener. Comput. Syst., 2014

Shark-IA: An Interference Alignment Algorithm for Multi-hop Underwater Acoustic Networks with Large Propagation Delays.
Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, November 12, 2014

Increasing user throughput in cellular networks with interference alignment.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Achieving transparent coexistence in a multi-hop secondary network through distributed computation.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

MIMO-based jamming resilient communication in wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Enabling Trusted Data-intensive execution in cloud computing.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

A Secure Three-Party Computational Protocol for Triangle Area.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014

2013
Wireless power transfer and applications to sensor networks.
IEEE Wirel. Commun., 2013

Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks.
IEEE Trans. Wirel. Commun., 2013

Throughput Maximization for Multi-Hop Wireless Networks with Network-Wide Energy Constraint.
IEEE Trans. Wirel. Commun., 2013

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
IEEE Trans. Parallel Distributed Syst., 2013

Secure ad hoc trust initialization and key management in wireless body area networks.
ACM Trans. Sens. Networks, 2013

Proximity-Based Security Techniques for Mobile Users in Wireless Networks.
IEEE Trans. Inf. Forensics Secur., 2013

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IEEE Trans. Computers, 2013

Toward privacy-assured and searchable cloud data storage services.
IEEE Netw., 2013

Beyond interference avoidance: On transparent coexistence for multi-hop secondary CR networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

On traveling path and related problems for a mobile station in a rechargeable sensor network.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

UPS: A United Cooperative Paradigm for Primary and Secondary Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

On Throughput Maximization for a Multi-hop MIMO Network.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

On interference alignment for multi-hop MIMO networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An efficient DoF scheduling algorithm for multi-hop MIMO networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Non-parametric passive traffic monitoring in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Bundling mobile base station and wireless energy transfer: Modeling and optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

SybilShield: An agent-aided social network-based Sybil defense among multiple communities.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Proximity-based security using ambient radio signals.
Proceedings of IEEE International Conference on Communications, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

Welcome message.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
On energy efficiency of geographic opportunistic routing in lossy multihop wireless networks.
Wirel. Networks, 2012

On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication.
IEEE Wirel. Commun. Lett., 2012

CodePlay: Live Multimedia Streaming in VANETs Using Symbol-Level Network Coding.
IEEE Trans. Wirel. Commun., 2012

Toward Secure and Dependable Storage Services in Cloud Computing.
IEEE Trans. Serv. Comput., 2012

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2012

Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2012

On renewable sensor networks with wireless energy transfer: The multi-node case.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

MUSHI: Toward Multiple Level Security cloud with strong Hardware level Isolation.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Toward simple criteria to establish capacity scaling laws for wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Cherish every joule: Maximizing throughput with an eye on network-wide energy consumption.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

LT codes-based secure and reliable cloud storage service.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Privacy-Preserving Authentication in Wireless Access Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Device Pairing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

P<sup>2</sup>: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid.
IEEE Trans. Smart Grid, 2011

FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2011

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2011

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
ACM Trans. Sens. Networks, 2011

CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2011

Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links.
Comput. Networks, 2011

R-Code: Network coding-based reliable broadcast in wireless mesh networks.
Ad Hoc Networks, 2011

FindU: Privacy-preserving personal profile matching in mobile social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Authorized Private Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Distributed Data Mining with Differential Privacy.
Proceedings of IEEE International Conference on Communications, 2011

2010
Data security and privacy in wireless body area networks.
IEEE Wirel. Commun., 2010

Opportunistic Routing in Multi-Radio Multi-Channel Multi-Hop Wireless Networks.
IEEE Trans. Wirel. Commun., 2010

PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
IEEE Trans. Parallel Distributed Syst., 2010

Toward publicly auditable secure cloud data storage services.
IEEE Netw., 2010

Attribute-based on-demand multicast group setup with membership anonymity.
Comput. Networks, 2010

Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Proceedings of the Security and Privacy in Communication Networks, 2010

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Secure Ranked Keyword Search over Encrypted Cloud Data.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

Attribute based data sharing with attribute revocation.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply.
Wirel. Networks, 2009

SPREAD: Improving network security by multipath routing in mobile ad hoc networks.
Wirel. Networks, 2009

Security, privacy, and accountability in wireless access networks.
IEEE Wirel. Commun., 2009

Location-Aided Opportunistic Forwarding in Multirate and Multihop Wireless Networks.
IEEE Trans. Veh. Technol., 2009

Multi-User Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2009

Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation.
IEEE Trans. Veh. Technol., 2009

Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.
IACR Cryptol. ePrint Arch., 2009

Ensuring Data Storage Security in Cloud Computing.
IACR Cryptol. ePrint Arch., 2009

Enabling Public Verifiability and Data Dynamics for Storage Security.
IACR Cryptol. ePrint Arch., 2009

Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
IACR Cryptol. ePrint Arch., 2009

A Network Coding Approach to Reliable Broadcast in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, 2009

OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

FSA: A Fast Coordination Scheme for Opportunistic Routing.
Proceedings of IEEE International Conference on Communications, 2009

R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009

2008
Capacity of opportunistic routing in multi-rate and multi-hop wireless networks.
IEEE Trans. Wirel. Commun., 2008

Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2008

LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2008

On Relay Node Placement and Assignment for Two-tiered Wireless Networks.
Mob. Networks Appl., 2008

Anonymous ID-Based Group Key Agreement for Wireless Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Efficient user revocation for privacy-aware PKI.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Optimized User Revocation for Group Signature Based Privacy-Aware PKI.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Towards Secure Link Quality Measurement in Multihop Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
A secure incentive protocol for mobile ad hoc networks.
Wirel. Networks, 2007

On Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2007

On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks.
Mob. Networks Appl., 2007

Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability.
Mob. Networks Appl., 2007

Multi-user Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

2006
A robust and energy-efficient data dissemination framework for wireless sensor networks.
Wirel. Networks, 2006

A new approach for random key pre-distribution in large-scale wireless sensor networks.
Wirel. Commun. Mob. Comput., 2006

MASK: anonymous on-demand routing in mobile ad hoc networks.
IEEE Trans. Wirel. Commun., 2006

A novel privacy preserving authentication and access control scheme for pervasive computing environments.
IEEE Trans. Veh. Technol., 2006

H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks.
IEEE Trans. Veh. Technol., 2006

Securing Mobile Ad Hoc Networks with Certificateless Public Keys.
IEEE Trans. Dependable Secur. Comput., 2006

Location-based compromise-tolerant security mechanisms for wireless sensor networks.
IEEE J. Sel. Areas Commun., 2006

Mobile Ad Hoc and Sensor Systems.
Int. J. Wirel. Inf. Networks, 2006

Routing optimization security in mobile IPv6.
Comput. Networks, 2006

Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Fault-tolerant Event Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
An efficient quality of service routing algorithm for delay-sensitive applications.
Comput. Networks, 2005

Securing sensor networks with location-based keys.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

An efficient N-to-1 multipath routing protocol in wireless sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Anonymous communications in mobile ad hoc networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2005

Privacy enhanced access control in pervasive computing environments.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

2004
SIP: a secure incentive protocol against selfishness in mobile ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Managing Wireless Sensor Networks with Supply Chain Strategy.
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004

SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Scalable and robust data dissemination in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
DEAR: A Device and Energy Aware Routing protocol for heterogeneous ad hoc networks.
J. Parallel Distributed Comput., 2003

A selection function based distributed algorithm for delay-constraint least-cost unicast routing.
Proceedings of IEEE International Conference on Communications, 2003

A QoS-enabled MAC architecture for prioritized service in IEEE 802.11 WLANs.
Proceedings of the Global Telecommunications Conference, 2003

2002
Predictive Caching Strategy for On-Demand Routing Protocols in Wireless Ad Hoc Networks.
Wirel. Networks, 2002

2001
The transmission of MPEG-2 VBR video under usage parameter control.
Int. J. Commun. Syst., 2001


  Loading...