default search action
Kui Ren 0001
Person information
- affiliation: Zhejiang University, School of Cyber Science and Technology, Hangzhou, China
- affiliation (former): State University of New York af Buffalo, Department of Computer Science and Engineering, NY, USA
- affiliation (former): Illinois Institute of Technology, Chicago, IL, USA
- affiliation (former, PhD): Worcester Polytechnic Institute, MA, USA
Other persons with the same name
- Kui Ren — disambiguation page
- Kui Ren 0002 — Columbia University, Department of Applied Physics and Applied Mathematics, NY, USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j238]Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren:
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory. Proc. ACM Manag. Data 2(1): 30:1-30:27 (2024) - [j237]Haocheng Xia, Xiang Li, Junyuan Pang, Jinfei Liu, Kui Ren, Li Xiong:
P-Shapley: Shapley Values on Probabilistic Classifiers. Proc. VLDB Endow. 17(7): 1737-1750 (2024) - [j236]Leqian Zheng, Lei Xu, Cong Wang, Sheng Wang, Yuke Hu, Zhan Qin, Feifei Li, Kui Ren:
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores. Proc. VLDB Endow. 17(10): 2445-2458 (2024) - [j235]Yiding Zhu, Hongwei Zhang, Jiayao Zhang, Jinfei Liu, Kui Ren:
DataPrice: An Interactive System for Pricing Datasets in Data Marketplaces. Proc. VLDB Endow. 17(12): 4433-4436 (2024) - [j234]Bo Wang, Yeling Tang, Fei Wei, Zhongjie Ba, Kui Ren:
FTDKD: Frequency-Time Domain Knowledge Distillation for Low-Quality Compressed Audio Deepfake Detection. IEEE ACM Trans. Audio Speech Lang. Process. 32: 4905-4918 (2024) - [j233]Peng Cheng, Yuexin Wu, Yuan Hong, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren:
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations. IEEE Trans. Dependable Secur. Comput. 21(1): 31-46 (2024) - [j232]Yijie Shen, Feng Lin, Chao Wang, Tiantian Liu, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning. IEEE Trans. Dependable Secur. Comput. 21(1): 372-387 (2024) - [j231]Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. IEEE Trans. Dependable Secur. Comput. 21(1): 403-418 (2024) - [j230]Meng Luo, Bo Feng, Long Lu, Engin Kirda, Kui Ren:
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. IEEE Trans. Dependable Secur. Comput. 21(1): 419-433 (2024) - [j229]Jianwei Liu, Yinghui He, Chaowei Xiao, Jinsong Han, Kui Ren:
Time to Think the Security of WiFi-Based Behavior Recognition Systems. IEEE Trans. Dependable Secur. Comput. 21(1): 449-462 (2024) - [j228]Jianwei Liu, Xiang Zou, Leqi Zhao, Yusheng Tao, Sideng Hu, Jinsong Han, Kui Ren:
Privacy Leakage in Wireless Charging. IEEE Trans. Dependable Secur. Comput. 21(2): 501-514 (2024) - [j227]Xiaochen Li, Weiran Liu, Hanwen Feng, Kunzhe Huang, Yuke Hu, Jinfei Liu, Kui Ren, Zhan Qin:
Privacy Enhancement Via Dummy Points in the Shuffle Model. IEEE Trans. Dependable Secur. Comput. 21(3): 1001-1016 (2024) - [j226]Zhihua Tian, Rui Zhang, Xiaoyang Hou, Lingjuan Lyu, Tianyi Zhang, Jian Liu, Kui Ren:
${\sf FederBoost}$: Private Federated Learning for GBDT. IEEE Trans. Dependable Secur. Comput. 21(3): 1274-1285 (2024) - [j225]Tianpei Lu, Bingsheng Zhang, Kui Ren:
PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market. IEEE Trans. Dependable Secur. Comput. 21(3): 1424-1436 (2024) - [j224]Zhibo Wang, Wenxin Liu, Jiahui Hu, Hengchang Guo, Zhan Qin, Jian Liu, Kui Ren:
Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation. IEEE Trans. Dependable Secur. Comput. 21(4): 1572-1586 (2024) - [j223]Hongwei Yao, Zheng Li, Kunzhe Huang, Jian Lou, Zhan Qin, Kui Ren:
RemovalNet: DNN Fingerprint Removal Attacks. IEEE Trans. Dependable Secur. Comput. 21(4): 2645-2658 (2024) - [j222]Anxiao He, Kai Bu, Jiongrui Huang, Yifei Pang, Qianping Gu, Kui Ren:
SwiftParade: Anti-Burst Multipath Validation. IEEE Trans. Dependable Secur. Comput. 21(4): 2720-2734 (2024) - [j221]Feng Lin, Chao Wang, Tiantian Liu, Ziwei Liu, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
High-Quality Speech Recovery Through Soundproof Protections via mmWave Sensing. IEEE Trans. Dependable Secur. Comput. 21(4): 3065-3081 (2024) - [j220]Yibiao Lu, Bingsheng Zhang, Kui Ren:
Maliciously Secure MPC From Semi-Honest 2PC in the Server-Aided Model. IEEE Trans. Dependable Secur. Comput. 21(4): 3109-3125 (2024) - [j219]Guodong Cao, Zhibo Wang, Yunhe Feng, Xiaowei Dong, Zhifei Zhang, Zhan Qin, Kui Ren:
Task-Free Fairness-Aware Bias Mitigation for Black-Box Deployed Models. IEEE Trans. Dependable Secur. Comput. 21(4): 3390-3405 (2024) - [j218]Zhuo Chen, Lei Wu, Yubo Hu, Jing Cheng, Yufeng Hu, Yajin Zhou, Zhushou Tang, Yexuan Chen, Jinku Li, Kui Ren:
Lifting the Grey Curtain: Analyzing the Ecosystem of Android Scam Apps. IEEE Trans. Dependable Secur. Comput. 21(4): 3406-3421 (2024) - [j217]Mengming Li, Kai Bu, Chenlu Miao, Kui Ren:
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks. IEEE Trans. Dependable Secur. Comput. 21(5): 4574-4588 (2024) - [j216]Jian Liu, Peilun Li, Fan Zhang, Kui Ren:
$\mathsf {monoCash}$monoCash: A Channel-Free Payment Network via Trusted Monotonic Counters. IEEE Trans. Dependable Secur. Comput. 21(5): 4770-4783 (2024) - [j215]Xinyu Zhang, Huiyu Xu, Zhongjie Ba, Zhibo Wang, Yuan Hong, Jian Liu, Zhan Qin, Kui Ren:
PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents. IEEE Trans. Dependable Secur. Comput. 21(6): 5242-5258 (2024) - [j214]Sifan Wu, Zhenguang Liu, Beibei Zhang, Roger Zimmermann, Zhongjie Ba, Xiaosong Zhang, Kui Ren:
Do as I Do: Pose Guided Human Motion Copy. IEEE Trans. Dependable Secur. Comput. 21(6): 5293-5307 (2024) - [j213]Jilin Hu, Fanlang Zeng, Yongwang Zhao, Zhuoruo Zhang, Leping Zhang, Jianhong Zhao, Rui Chang, Kui Ren:
ProveriT: A Parameterized, Composable, and Verified Model of TEE Protection Profile. IEEE Trans. Dependable Secur. Comput. 21(6): 5341-5358 (2024) - [j212]Meng Chen, Li Lu, Jiadi Yu, Zhongjie Ba, Feng Lin, Kui Ren:
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception. IEEE Trans. Inf. Forensics Secur. 19: 1948-1962 (2024) - [j211]Feng Lin, Hao Yan, Jin Li, Ziwei Liu, Li Lu, Zhongjie Ba, Kui Ren:
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles. IEEE Trans. Inf. Forensics Secur. 19: 4199-4214 (2024) - [j210]Zhongjie Ba, Bin Gong, Yuwei Wang, Yuxuan Liu, Peng Cheng, Feng Lin, Li Lu, Kui Ren:
Indelible "Footprints" of Inaudible Command Injection. IEEE Trans. Inf. Forensics Secur. 19: 8485-8499 (2024) - [j209]Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren:
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 9534-9549 (2024) - [j208]Qiheng Sun, Jiayao Zhang, Jinfei Liu, Li Xiong, Jian Pei, Kui Ren:
Shapley Value Approximation Based on Complementary Contribution. IEEE Trans. Knowl. Data Eng. 36(12): 9263-9281 (2024) - [j207]Ming Gao, Yike Chen, Yimin Li, Lingfeng Zhang, Jianwei Liu, Li Lu, Feng Lin, Jinsong Han, Kui Ren:
A Resilience Evaluation Framework on Ultrasonic Microphone Jammers. IEEE Trans. Mob. Comput. 23(2): 1914-1929 (2024) - [j206]Zhibo Wang, Yunan Sun, Defang Liu, Jiahui Hu, Xiaoyi Pang, Yuke Hu, Kui Ren:
Location Privacy-Aware Task Offloading in Mobile Edge Computing. IEEE Trans. Mob. Comput. 23(3): 2269-2283 (2024) - [j205]Ming Gao, Lingfeng Zhang, Leming Shen, Xiang Zou, Jinsong Han, Feng Lin, Kui Ren:
Exploring Practical Acoustic Transduction Attacks on Inertial Sensors in MDOF Systems. IEEE Trans. Mob. Comput. 23(5): 3539-3557 (2024) - [j204]Jiahui Hu, Jiacheng Du, Zhibo Wang, Xiaoyi Pang, Yajie Zhou, Peng Sun, Kui Ren:
Does Differential Privacy Really Protect Federated Learning From Gradient Leakage Attacks? IEEE Trans. Mob. Comput. 23(12): 12635-12649 (2024) - [j203]Hao Yan, Feng Lin, Jin Li, Meng Zhang, Zhisheng Yan, Jian Xiao, Kui Ren:
Shadow Based Non-Line-of-Sight Pedestrian Rushing Detection for Automated Driving. IEEE Trans. Mob. Comput. 23(12): 14754-14767 (2024) - [j202]Jiahui Hu, Zhibo Wang, Yongsheng Shen, Bohan Lin, Peng Sun, Xiaoyi Pang, Jian Liu, Kui Ren:
Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning. IEEE/ACM Trans. Netw. 32(2): 1407-1422 (2024) - [j201]Li Lu, Meng Chen, Jiadi Yu, Zhongjie Ba, Feng Lin, Jinsong Han, Yanmin Zhu, Kui Ren:
An Imperceptible Eavesdropping Attack on WiFi Sensing Systems. IEEE/ACM Trans. Netw. 32(5): 4009-4024 (2024) - [j200]Shaoke Xi, Fuliang Li, Lingxiang Hu, Xingwei Wang, Kui Ren:
FlowValve+: Multi-Queue Packet Scheduling Framework on SoC-Based SmartNICs. IEEE Trans. Serv. Comput. 17(5): 2444-2458 (2024) - [c287]Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren:
Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection. AAAI 2024: 719-728 - [c286]Wenqing Chen, Weicheng Wang, Zhixuan Chu, Kui Ren, Zibin Zheng, Zhichao Lu:
Self-Para-Consistency: Improving Reasoning Tasks at Low Cost for Large Language Models. ACL (Findings) 2024: 14162-14167 - [c285]Zhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang, Zhan Qin, Kui Ren:
A Causal Explainable Guardrails for Large Language Models. CCS 2024: 1136-1150 - [c284]Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren:
SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution. CCS 2024: 1166-1180 - [c283]Huiyu Xu, Yaopeng Wang, Zhibo Wang, Zhongjie Ba, Wenxin Liu, Lu Jin, Haiqin Weng, Tao Wei, Kui Ren:
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning. CCS 2024: 2207-2221 - [c282]Yihao Zheng, Haocheng Xia, Junyuan Pang, Jinfei Liu, Kui Ren, Lingyang Chu, Yang Cao, Li Xiong:
TabularMark: Watermarking Tabular Datasets for Machine Learning. CCS 2024: 3570-3584 - [c281]Yuke Hu, Jian Lou, Jiaqi Liu, Wangze Ni, Feng Lin, Zhan Qin, Kui Ren:
ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach. CCS 2024: 3883-3897 - [c280]Jun Bao, Buyu Liu, Kui Ren, Jun Yu:
GLOW: Global Layout Aware Attacks on Object Detection. CVPR 2024: 12057-12066 - [c279]Zhiyuan Chen, Kun Yang, Kui Ren:
CDS: An Anti-Aging Calibratable Digital Sensor for Detecting Multiple Types of Fault Injection Attacks. DAC 2024: 249:1-249:6 - [c278]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Practical Constructions for Single Input Functionality Against a Dishonest Majority. EuroS&P 2024: 398-414 - [c277]Xiaoyang Hou, Jian Liu, Tianyu Tu, Rui Zhang, Kui Ren:
PrivRE: Regular Expression Matching for Encrypted Packet Inspection. ICDCS 2024: 1306-1317 - [c276]Xinle Cao, Yuhan Li, Dmytro Bogatov, Jian Liu, Kui Ren:
Secure and Practical Functional Dependency Discovery in Outsourced Databases. ICDE 2024: 1645-1658 - [c275]Yuran Bi, Jinfei Liu, Chen Zhao, Junyi Zhao, Kui Ren, Li Xiong:
Share: Stackelberg-Nash based Data Markets. ICDE 2024: 3573-3586 - [c274]Yuran Bi, Yihang Wu, Jinfei Liu, Kui Ren, Li Xiong:
When Data Pricing Meets Non-Cooperative Game Theory. ICDE 2024: 5548-5559 - [c273]Xiong Xu, Kunzhe Huang, Yiming Li, Zhan Qin, Kui Ren:
Towards Reliable and Efficient Backdoor Trigger Inversion via Decoupling Benign Features. ICLR 2024 - [c272]Chenghao Li, Yifei Wu, Wenbo Shen, Zichen Zhao, Rui Chang, Chengwei Liu, Yang Liu, Kui Ren:
Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem. ICSE 2024: 24:1-24:13 - [c271]Pingchuan Ma, Zhenlan Ji, Peisen Yao, Shuai Wang, Kui Ren:
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning. ICSE 2024: 30:1-30:13 - [c270]Mingxue Zhang, Wei Meng, You Zhou, Kui Ren:
CSChecker: Revisiting GDPR and CCPA Compliance of Cookie Banners on the Web. ICSE 2024: 174:1-174:12 - [c269]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. INFOCOM 2024: 151-160 - [c268]Yajie Zhou, Xiaoyi Pang, Zhibo Wang, Jiahui Hu, Peng Sun, Kui Ren:
Towards Efficient Asynchronous Federated Learning in Heterogeneous Edge Environments. INFOCOM 2024: 2448-2457 - [c267]Qianniu Chen, Zhehan Gu, Li Lu, Xiangyu Xu, Zhongjie Ba, Feng Lin, Zhenguang Liu, Kui Ren:
Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming. IUI 2024: 35-50 - [c266]Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren:
Symphony: Path Validation at Scale. NDSS 2024 - [c265]Ge Ren, Gaolei Li, Shenghong Li, Libo Chen, Kui Ren:
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token. NDSS 2024 - [c264]Ziwei Liu, Feng Lin, Teshi Meng, Benaouda Chouaib Baha-eddine, Li Lu, Qiang Xue, Kui Ren:
EMTrig: Physical Adversarial Examples Triggered by Electromagnetic Injection towards LiDAR Perception. SenSys 2024: 351-364 - [c263]Xiang Chen, Qingjiang Xiao, Hongyan Liu, Qun Huang, Dong Zhang, Xuan Liu, Longbing Hu, Haifeng Zhou, Chunming Wu, Kui Ren:
Eagle: Toward Scalable and Near-Optimal Network-Wide Sketch Deployment in Network Measurement. SIGCOMM 2024: 291-310 - [c262]Hongwei Yao, Jian Lou, Zhan Qin, Kui Ren:
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification. SP 2024: 845-861 - [c261]Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren:
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features. SP 2024: 1628-1645 - [c260]Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren:
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks. SP 2024: 2920-2938 - [c259]Jian Liu, Jingyu Li, Di Wu, Kui Ren:
PIRANA: Faster Multi-query PIR via Constant-weight Codes. SP 2024: 4315-4330 - [c258]Tiantian Liu, Feng Lin, Zhongjie Ba, Li Lu, Zhan Qin, Kui Ren:
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices. USENIX Security Symposium 2024 - [c257]Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren:
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition. USENIX Security Symposium 2024 - [c256]Chao Wang, Feng Lin, Hao Yan, Tong Wu, Wenyao Xu, Kui Ren:
VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel. USENIX Security Symposium 2024 - [c255]Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren:
Devil in the Room: Triggering Audio Backdoors in the Physical World. USENIX Security Symposium 2024 - [c254]Shuaifan Jin, He Wang, Zhibo Wang, Feng Xiao, Jiahui Hu, Yuan He, Wenwen Zhang, Zhongjie Ba, Weijie Fang, Shuhong Yuan, Kui Ren:
FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition. USENIX Security Symposium 2024 - [c253]Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan:
False Claims against Model Ownership Resolution. USENIX Security Symposium 2024 - [i130]Shoupeng Ren, Tianyu Tu, Jian Liu, Di Wu, Kui Ren:
LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts. CoRR abs/2401.07261 (2024) - [i129]Zhixuan Chu, Yan Wang, Qing Cui, Longfei Li, Wenqing Chen, Sheng Li, Zhan Qin, Kui Ren:
LLM-Guided Multi-View Hypergraph Learning for Human-Centric Explainable Recommendation. CoRR abs/2401.08217 (2024) - [i128]Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Yang Wang, Kui Ren:
Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege. CoRR abs/2401.15704 (2024) - [i127]Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. CoRR abs/2401.17606 (2024) - [i126]Qi Zhou, Dongxia Wang, Tianlin Li, Zhihong Xu, Yang Liu, Kui Ren, Wenhai Wang, Qing Guo:
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution. CoRR abs/2402.03705 (2024) - [i125]Zhihao Liu, Jian Lou, Wenjie Bao, Yuke Hu, Bo Li, Zhan Qin, Kui Ren:
Differentially Private Zeroth-Order Methods for Scalable Large Language Model Finetuning. CoRR abs/2402.07818 (2024) - [i124]Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren:
Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection. CoRR abs/2403.01786 (2024) - [i123]Di Wu, Jian Liu, Zhengwei Hou, Wu Wen, Kui Ren:
ECHO: Efficient Off-Chain Payments and Cross-Chain Swaps for Cryptocurrencies. CoRR abs/2403.15191 (2024) - [i122]Jiacheng Du, Jiahui Hu, Zhibo Wang, Peng Sun, Neil Zhenqiang Gong, Kui Ren:
SoK: Gradient Leakage in Federated Learning. CoRR abs/2404.05403 (2024) - [i121]Jianhong Zhao, Yongwang Zhao, Peisen Yao, Fanlang Zeng, Bohua Zhan, Kui Ren:
KBX: Verified Model Synchronization via Formal Bidirectional Transformation. CoRR abs/2404.18771 (2024) - [i120]Yiling He, Junchi Lei, Zhan Qin, Kui Ren:
Going Proactive and Explanatory Against Malware Concept Drift. CoRR abs/2405.04095 (2024) - [i119]Zhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang, Zhan Qin, Kui Ren:
A Causal Explainable Guardrails for Large Language Models. CoRR abs/2405.04160 (2024) - [i118]Zhixuan Chu, Lei Zhang, Yichen Sun, Siqiao Xue, Zhibo Wang, Zhan Qin, Kui Ren:
Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models. CoRR abs/2405.04180 (2024) - [i117]Shuo Shao, Yiming Li, Hongwei Yao, Yiling He, Zhan Qin, Kui Ren:
Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution. CoRR abs/2405.04825 (2024) - [i116]Xiaohan Yuan, Jinfeng Li, Dongxia Wang, Yuefeng Chen, Xiaofeng Mao, Longtao Huang, Hui Xue, Wenhai Wang, Kui Ren, Jingyi Wang:
S-Eval: Automatic and Adaptive Test Generation for Benchmarking Safety Evaluation of Large Language Models. CoRR abs/2405.14191 (2024) - [i115]Zhibo Wang, Peng Kuang, Zhixuan Chu, Jingyi Wang, Kui Ren:
Towards Real World Debiasing: A Fine-grained Analysis On Spurious Correlation. CoRR abs/2405.15240 (2024) - [i114]Lei Liu, Xiaoyan Yang, Junchi Lei, Xiaoyang Liu, Yue Shen, Zhiqiang Zhang, Peng Wei, Jinjie Gu, Zhixuan Chu, Zhan Qin, Kui Ren:
A Survey on Medical Large Language Models: Technology, Application, Trustworthiness, and Future Directions. CoRR abs/2406.03712 (2024) - [i113]Jiacheng Du, Zhibo Wang, Kui Ren:
Textual Unlearning Gives a False Sense of Unlearning. CoRR abs/2406.13348 (2024) - [i112]Yihao Zheng, Haocheng Xia, Junyuan Pang, Jinfei Liu, Kui Ren, Lingyang Chu, Yang Cao, Li Xiong:
TabularMark: Watermarking Tabular Datasets for Machine Learning. CoRR abs/2406.14841 (2024) - [i111]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. CoRR abs/2406.15731 (2024) - [i110]Yichen Sun, Zhixuan Chu, Zhan Qin, Kui Ren:
Prompt-Consistency Image Generation (PCIG): A Unified Framework Integrating LLMs, Knowledge Graphs, and Controllable Diffusion Models. CoRR abs/2406.16333 (2024) - [i109]Sifan Wu, Zhenguang Liu, Beibei Zhang, Roger Zimmermann, Zhongjie Ba, Xiaosong Zhang, Kui Ren:
Do As I Do: Pose Guided Human Motion Copy. CoRR abs/2406.16601 (2024) - [i108]Binhao Ma, Tianhang Zheng, Hongsheng Hu, Di Wang, Shuo Wang, Zhongjie Ba, Zhan Qin, Kui Ren:
Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning. CoRR abs/2407.05112 (2024) - [i107]Yuchen Yang, Hongwei Yao, Bingrun Yang, Yiling He, Yiming Li, Tianwei Zhang, Zhan Qin, Kui Ren:
TAPI: Towards Target-Specific and Adversarial Prompt Injection against Code LLMs. CoRR abs/2407.09164 (2024) - [i106]Huiyu Xu, Wenhui Zhang, Zhibo Wang, Feng Xiao, Rui Zheng, Yunhe Feng, Zhongjie Ba, Kui Ren:
RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent. CoRR abs/2407.16667 (2024) - [i105]Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren:
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features. CoRR abs/2408.01808 (2024) - [i104]Shaoke Xi, Jiaqi Gao, Mengqi Liu, Jiamin Cao, Fuliang Li, Kai Bu, Kui Ren, Minlan Yu, Dennis Cai, Ennan Zhai:
Cora: Accelerating Stateful Network Applications with SmartNICs. CoRR abs/2410.22229 (2024) - [i103]Jiawen Zhang, Jian Liu, Xinpeng Yang, Yinghao Wang, Kejia Chen, Xiaoyang Hou, Kui Ren, Xiaohu Yang:
Secure Transformer Inference Made Non-interactive. IACR Cryptol. ePrint Arch. 2024: 136 (2024) - [i102]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal. IACR Cryptol. ePrint Arch. 2024: 305 (2024) - [i101]Keyu Ji, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Distributed Point Function with Constraints, Revisited. IACR Cryptol. ePrint Arch. 2024: 937 (2024) - [i100]Tianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma, Xiaoyuan Zhang, Yang Liu, Kui Ren:
Efficient 2PC for Constant Round Secure Equality Testing and Comparison. IACR Cryptol. ePrint Arch. 2024: 949 (2024) - [i99]Xiaoyang Hou, Jian Liu, Jingyu Li, Jiawen Zhang, Kui Ren:
Faster Lookup Table Evaluation with Application to Secure LLM Inference. IACR Cryptol. ePrint Arch. 2024: 1093 (2024) - [i98]Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, Kui Ren:
A New PPML Paradigm for Quantized Models. IACR Cryptol. ePrint Arch. 2024: 1132 (2024) - [i97]Shuang Hu, Bingsheng Zhang, Cong Zhang, Kui Ren:
On the Relationship between Public Key Primitives via Indifferentiability. IACR Cryptol. ePrint Arch. 2024: 1419 (2024) - [i96]Cong Zhang, Keyu Ji, Taiyu Wang, Bingsheng Zhang, Hong-Sheng Zhou, Xin Wang, Kui Ren:
On the Complexity of Cryptographic Groups and Generic Group Models. IACR Cryptol. ePrint Arch. 2024: 1452 (2024) - [i95]Xinle Cao, Weiqi Feng, Jian Liu, Jinjin Zhou, Wenjing Fang, Lei Wang, Quanqing Xu, Chuanhui Yang, Kui Ren:
Towards Practical Oblivious Map. IACR Cryptol. ePrint Arch. 2024: 1650 (2024) - 2023
- [j199]Zhibo Wang, Jingjing Ma, Xue Wang, Jiahui Hu, Zhan Qin, Kui Ren:
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems. ACM Comput. Surv. 55(7): 134:1-134:36 (2023) - [j198]Lei Wang, Meng Chen, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren:
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(1): 32:1-32:22 (2023) - [j197]Meng Chen, Li Lu, Junhao Wang, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren:
VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(2): 48:1-48:21 (2023) - [j196]Antonino Rullo, Elisa Bertino, Kui Ren:
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things. IEEE Internet Things J. 10(10): 8327-8330 (2023) - [j195]Jiayao Zhang, Qiheng Sun, Jinfei Liu, Li Xiong, Jian Pei, Kui Ren:
Efficient Sampling Approaches to Shapley Value Approximation. Proc. ACM Manag. Data 1(1): 48:1-48:24 (2023) - [j194]Xinle Cao, Jian Liu, Yongsheng Shen, Xiaohua Ye, Kui Ren:
Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption. Proc. VLDB Endow. 16(11): 3124-3136 (2023) - [j193]Haocheng Xia, Jinfei Liu, Jian Lou, Zhan Qin, Kui Ren, Yang Cao, Li Xiong:
Equitable Data Valuation Meets the Right to Be Forgotten in Model Markets. Proc. VLDB Endow. 16(11): 3349-3362 (2023) - [j192]Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo:
Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 519-542 (2023) - [j191]Jian Lin, Dingding Wang, Rui Chang, Lei Wu, Yajin Zhou, Kui Ren:
EnBinDiff: Identifying Data-Only Patches for Binaries. IEEE Trans. Dependable Secur. Comput. 20(1): 343-359 (2023) - [j190]Xinliang Miao, Rui Chang, Jianhong Zhao, Yongwang Zhao, Shuang Cao, Tao Wei, Liehui Jiang, Kui Ren:
CVTEE: A Compatible Verified TEE Architecture With Enhanced Security. IEEE Trans. Dependable Secur. Comput. 20(1): 377-391 (2023) - [j189]Jianwei Liu, Chaowei Xiao, Kaiyan Cui, Jinsong Han, Xian Xu, Kui Ren:
Behavior Privacy Preserving in RF Sensing. IEEE Trans. Dependable Secur. Comput. 20(1): 784-796 (2023) - [j188]Zhiguo Wan, Yan Zhou, Kui Ren:
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof. IEEE Trans. Dependable Secur. Comput. 20(2): 1335-1347 (2023) - [j187]Jinmeng Zhou, Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang, Peng Ning, Kui Ren:
Automatic Permission Check Analysis for Linux Kernel. IEEE Trans. Dependable Secur. Comput. 20(3): 1849-1866 (2023) - [j186]Yiling He, Yiping Li, Lei Wu, Ziqi Yang, Kui Ren, Zhan Qin:
MsDroid: Identifying Malicious Snippets for Android Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(3): 2025-2039 (2023) - [j185]Xiaoyi Pang, Zhibo Wang, Zeqing He, Peng Sun, Meng Luo, Ju Ren, Kui Ren:
Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation. IEEE Trans. Dependable Secur. Comput. 20(3): 2421-2432 (2023) - [j184]Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, Kui Ren:
UC Secure Private Branching Program and Decision Tree Evaluation. IEEE Trans. Dependable Secur. Comput. 20(4): 2836-2848 (2023) - [j183]Ming Gao, Yajie Liu, Yike Chen, Yimin Li, Zhongjie Ba, Xian Xu, Jinsong Han, Kui Ren:
Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope. IEEE Trans. Dependable Secur. Comput. 20(4): 3144-3157 (2023) - [j182]Zhuo Ma, Yang Liu, Ximeng Liu, Jian Liu, Jianfeng Ma, Kui Ren:
Learn to Forget: Machine Unlearning via Neuron Masking. IEEE Trans. Dependable Secur. Comput. 20(4): 3194-3207 (2023) - [j181]Zhibo Wang, Yuting Huang, Mengkai Song, Libing Wu, Feng Xue, Kui Ren:
Poisoning-Assisted Property Inference Attack Against Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(4): 3328-3340 (2023) - [j180]Zhuo Ma, Xinjing Liu, Yang Liu, Ximeng Liu, Zhan Qin, Kui Ren:
DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer. IEEE Trans. Dependable Secur. Comput. 20(6): 4810-4822 (2023) - [j179]Ziming Zhao, Zhaoxuan Li, Fan Zhang, Ziqi Yang, Shuang Luo, Tingting Li, Rui Zhang, Kui Ren:
SAGE: Steering the Adversarial Generation of Examples With Accelerations. IEEE Trans. Inf. Forensics Secur. 18: 789-803 (2023) - [j178]Keyu Ji, Bingsheng Zhang, Tianpei Lu, Kui Ren:
Multi-Party Private Function Evaluation for RAM. IEEE Trans. Inf. Forensics Secur. 18: 1252-1267 (2023) - [j177]Anxiao He, Xiang Li, Jiandong Fu, Haoyu Hu, Kai Bu, Chenlu Miao, Kui Ren:
Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling. IEEE Trans. Inf. Forensics Secur. 18: 1268-1282 (2023) - [j176]Wenyuan Yang, Xiaoyu Zhou, Zhikai Chen, Bofei Guo, Zhongjie Ba, Zhihua Xia, Xiaochun Cao, Kui Ren:
AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake. IEEE Trans. Inf. Forensics Secur. 18: 2015-2029 (2023) - [j175]Yibiao Lu, Bingsheng Zhang, Kui Ren:
Low Communication Secure Computation From Semi-Trusted Hardware. IEEE Trans. Inf. Forensics Secur. 18: 3962-3976 (2023) - [j174]Huining Li, Chenhan Xu, Aditya Singh Rathore, Zhengxiong Li, Hanbin Zhang, Chen Song, Kun Wang, Lu Su, Feng Lin, Kui Ren, Wenyao Xu:
VocalPrint: A mmWave-Based Unmediated Vocal Sensing System for Secure Authentication. IEEE Trans. Mob. Comput. 22(1): 589-606 (2023) - [j173]Zhetao Li, Zhirun Zheng, Suiming Guo, Bin Guo, Fu Xiao, Kui Ren:
Disguised as Privacy: Data Poisoning Attacks Against Differentially Private Crowdsensing Systems. IEEE Trans. Mob. Comput. 22(9): 5155-5169 (2023) - [j172]Jianwei Liu, Wenfan Song, Leming Shen, Jinsong Han, Kui Ren:
Secure User Verification and Continuous Authentication via Earphone IMU. IEEE Trans. Mob. Comput. 22(11): 6755-6769 (2023) - [j171]Shaoke Xi, Kai Bu, Wensen Mao, Xiaoyu Zhang, Kui Ren, Xinxin Ren:
RuleOut Forwarding Anomalies for SDN. IEEE/ACM Trans. Netw. 31(1): 395-407 (2023) - [j170]Feng Lin, Ming Gao, Lingfeng Zhang, Yimin Li, Weiye Xu, Jinsong Han, Xian Xu, Wenyao Xu, Kui Ren:
Mobile Communication Among COTS IoT Devices via a Resonant Gyroscope With Ultrasound. IEEE/ACM Trans. Netw. 31(3): 1026-1041 (2023) - [j169]Jianwei Liu, Kaiyan Cui, Xiang Zou, Jinsong Han, Feng Lin, Kui Ren:
Reliable Multi-Factor User Authentication With One Single Finger Swipe. IEEE/ACM Trans. Netw. 31(3): 1117-1131 (2023) - [j168]Muhui Jiang, Qinming Dai, Wenlong Zhang, Rui Chang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
A Comprehensive Study on ARM Disassembly Tools. IEEE Trans. Software Eng. 49(4): 1683-1703 (2023) - [c252]Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren:
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. AAAI 2023: 10871-10879 - [c251]Ziqi Yuan, Siyu Hong, Rui Chang, Yajin Zhou, Wenbo Shen, Kui Ren:
VDom: Fast and Unlimited Virtual Domains on Multiple Architectures. ASPLOS (2) 2023: 905-919 - [c250]Yiling He, Jian Lou, Zhan Qin, Kui Ren:
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis. CCS 2023: 416-430 - [c249]Liu Liu, Xinwen Fu, Xiaodong Chen, Jianpeng Wang, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren:
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution. CCS 2023: 1660-1674 - [c248]Zhibo Wang, He Wang, Shuaifan Jin, Wenwen Zhang, Jiahui Hu, Yan Wang, Peng Sun, Wei Yuan, Kaixin Liu, Kui Ren:
Privacy-preserving Adversarial Facial Features. CVPR 2023: 8212-8221 - [c247]Zhibo Wang, Hongshan Yang, Yunhe Feng, Peng Sun, Hengchang Guo, Zhifei Zhang, Kui Ren:
Towards Transferable Targeted Adversarial Examples. CVPR 2023: 20534-20543 - [c246]Zhou Yu, Lixiang Zheng, Zhou Zhao, Fei Wu, Jianping Fan, Kui Ren, Jun Yu:
ANetQA: A Large-scale Benchmark for Fine-grained Compositional Reasoning over Untrimmed Videos. CVPR 2023: 23191-23200 - [c245]Guorui Xu, Fan Zhang, Xinjie Zhao, Yuan Chen, Shize Guo, Kui Ren:
Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models. DAC 2023: 1-6 - [c244]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Endemic Oblivious Transfer via Random Oracles, Revisited. EUROCRYPT (1) 2023: 303-329 - [c243]Junhao Wang, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren:
Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing. ICASSP 2023: 1-5 - [c242]Yanbin Wang, Weifan Zhu, Haitao Xu, Zhan Qin, Kui Ren, Wenrui Ma:
A Large-Scale Pretrained Deep Model for Phishing URL Detection. ICASSP 2023: 1-5 - [c241]Xue Wang, Zhibo Wang, Haiqin Weng, Hengchang Guo, Zhifei Zhang, Lu Jin, Tao Wei, Kui Ren:
Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks. ICCV 2023: 2042-2051 - [c240]Lei Zhang, Zhibo Wang, Xiaowei Dong, Yunhe Feng, Xiaoyi Pang, Zhifei Zhang, Kui Ren:
Towards Fairness-aware Adversarial Network Pruning. ICCV 2023: 5145-5154 - [c239]Jiayao Zhang, Haocheng Xia, Qiheng Sun, Jinfei Liu, Li Xiong, Jian Pei, Kui Ren:
Dynamic Shapley Value Computation. ICDE 2023: 639-652 - [c238]Qiongqiong Lin, Yunfan Gu, Jingyan Sai, Jinfei Liu, Kui Ren, Li Xiong, Tianzhen Wang, Yanbei Pang, Sheng Wang, Feifei Li:
EulerFD: An Efficient Double-Cycle Approximation of Functional Dependencies. ICDE 2023: 2878-2891 - [c237]Yuheng Yang, Haipeng Chen, Zhenguang Liu, Yingda Lyu, Beibei Zhang, Shuang Wu, Zhibo Wang, Kui Ren:
Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization. IJCAI 2023: 1658-1666 - [c236]Xinyue Fang, Jianwei Liu, Yike Chen, Jinsong Han, Kui Ren, Gang Chen:
Nowhere to Hide: Detecting Live Video Forgery via Vision-WiFi Silhouette Correspondence. INFOCOM 2023: 1-10 - [c235]Peisen Yao, Jingyu Ke, Jiahui Sun, Hongfei Fu, Rongxin Wu, Kui Ren:
Demystifying Template-Based Invariant Generation for Bit-Vector Programs. ASE 2023: 673-685 - [c234]Qiheng Sun, Xiang Li, Jiayao Zhang, Li Xiong, Weiran Liu, Jinfei Liu, Zhan Qin, Kui Ren:
ShapleyFL: Robust Federated Learning Based on Shapley Value. KDD 2023: 2096-2108 - [c233]Feng Lin, Kaiqiang Fu, Hao Luo, Ziyue Zhan, Zhibo Wang, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren:
Cross-Modal and Multi-Attribute Face Recognition: A Benchmark. ACM Multimedia 2023: 271-279 - [c232]Chao Shuai, Jieming Zhong, Shuang Wu, Feng Lin, Zhibo Wang, Zhongjie Ba, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren:
Locate and Verify: A Two-Stream Network for Improved Deepfake Detection. ACM Multimedia 2023: 7131-7142 - [c231]Kun Pan, Yifang Yin, Yao Wei, Feng Lin, Zhongjie Ba, Zhenguang Liu, Zhibo Wang, Lorenzo Cavallaro, Kui Ren:
DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues. ACM Multimedia 2023: 8035-8046 - [c230]Ming Gao, Yike Chen, Yajie Liu, Jie Xiong, Jinsong Han, Kui Ren:
Cancelling Speech Signals for Speech Privacy Protection against Microphone Eavesdropping. MobiCom 2023: 36:1-36:16 - [c229]Yinghui He, Jianwei Liu, Mo Li, Guanding Yu, Jinsong Han, Kui Ren:
SenCom: Integrated Sensing and Communication with Practical WiFi. MobiCom 2023: 60:1-60:16 - [c228]Qianniu Chen, Kang Fu, Li Lu, Meng Chen, Zhongjie Ba, Feng Lin, Kui Ren:
BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition. MSN 2023: 496-503 - [c227]Xingyu Chen, Zhengxiong Li, Baicheng Chen, Yi Zhu, Chris Xiaoxuan Lu, Zhengyu Peng, Feng Lin, Wenyao Xu, Kui Ren, Chunming Qiao:
MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags. NDSS 2023 - [c226]Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Fan Zhang, Kui Ren:
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise. NDSS 2023 - [c225]Jiaqi Liu, Jian Lou, Zhan Qin, Kui Ren:
Certified Minimax Unlearning with Generalization Rates and Deletion Capacity. NeurIPS 2023 - [c224]Pengyun Zhu, Long Wen, Jinfei Liu, Feng Xue, Jian Lou, Zhibo Wang, Kui Ren:
CAPP-130: A Corpus of Chinese Application Privacy Policy Summarization and Interpretation. NeurIPS 2023 - [c223]Peipei Jiang, Qian Wang, Jianhao Cheng, Cong Wang, Lei Xu, Xinyu Wang, Yihao Wu, Xiaoyuan Li, Kui Ren:
Boomerang: Metadata-Private Messaging under Hardware Trust. NSDI 2023: 877-899 - [c222]Yijie Shen, Zhe Ma, Feng Lin, Hao Yan, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge. SenSys 2023: 167-180 - [c221]Hao Yan, Feng Lin, Jin Li, Meng Zhang, Zhisheng Yan, Jian Xiao, Kui Ren:
Ghost-Probe: NLOS Pedestrian Rushing Detection with Monocular Camera for Automated Driving. SenSys 2023: 390-402 - [c220]Lin Ma, Duoming Zhou, Hanjie Wu, Yajin Zhou, Rui Chang, Hao Xiong, Lei Wu, Kui Ren:
When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel. SP 2023: 2138-2154 - [c219]Tiantian Liu, Feng Lin, Zhangsen Wang, Chao Wang, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks. SP 2023: 3416-3431 - [c218]Tiantian Liu, Feng Lin, Chao Wang, Chenhan Xu, Xiaoyu Zhang, Zhengxiong Li, Wenyao Xu, Ming-Chun Huang, Kui Ren:
WavoID: Robust and Secure Multi-modal User Identification via mmWave-voice Mechanism. UIST 2023: 64:1-64:15 - [c217]Zechao Cai, Jiaxun Zhu, Wenbo Shen, Yutian Yang, Rui Chang, Yu Wang, Jinku Li, Kui Ren:
Demystifying Pointer Authentication on Apple M1. USENIX Security Symposium 2023: 2833-2848 - [i94]Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan:
False Claims against Model Ownership Resolution. CoRR abs/2304.06607 (2023) - [i93]Zhou Yu, Lixiang Zheng, Zhou Zhao, Fei Wu, Jianping Fan, Kui Ren, Jun Yu:
ANetQA: A Large-scale Benchmark for Fine-grained Compositional Reasoning over Untrimmed Videos. CoRR abs/2305.02519 (2023) - [i92]Zhibo Wang, He Wang, Shuaifan Jin, Wenwen Zhang, Jiahui Hu, Yan Wang, Peng Sun, Wei Yuan, Kaixin Liu, Kui Ren:
Privacy-preserving Adversarial Facial Features. CoRR abs/2305.05391 (2023) - [i91]Yuheng Yang, Haipeng Chen, Zhenguang Liu, Yingda Lyu, Beibei Zhang, Shuang Wu, Zhibo Wang, Kui Ren:
Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization. CoRR abs/2306.07576 (2023) - [i90]Hongwei Yao, Zheng Li, Haiqin Weng, Feng Xue, Kui Ren, Zhan Qin:
FDINet: Protecting against DNN Model Extraction via Feature Distortion Index. CoRR abs/2306.11338 (2023) - [i89]Jiachen Lei, Peng Cheng, Zhongjie Ba, Kui Ren:
Masked Diffusion Models are Fast Learners. CoRR abs/2306.11363 (2023) - [i88]Leqian Zheng, Lei Xu, Cong Wang, Sheng Wang, Yuke Hu, Zhan Qin, Feifei Li, Kui Ren:
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores. CoRR abs/2306.16851 (2023) - [i87]Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren:
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks. CoRR abs/2307.16630 (2023) - [i86]Hongwei Yao, Jian Lou, Kui Ren, Zhan Qin:
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification. CoRR abs/2308.02816 (2023) - [i85]Yiling He, Jian Lou, Zhan Qin, Kui Ren:
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis. CoRR abs/2308.05362 (2023) - [i84]Pingchuan Ma, Zhenlan Ji, Peisen Yao, Shuai Wang, Kui Ren:
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning (Extended Version). CoRR abs/2309.05264 (2023) - [i83]Kun Pan, Yifang Yin, Yao Wei, Feng Lin, Zhongjie Ba, Zhenguang Liu, Zhibo Wang, Lorenzo Cavallaro, Kui Ren:
DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues. CoRR abs/2309.09526 (2023) - [i82]Chao Shuai, Jieming Zhong, Shuang Wu, Feng Lin, Zhibo Wang, Zhongjie Ba, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren:
Locate and Verify: A Two-Stream Network for Improved Deepfake Detection. CoRR abs/2309.11131 (2023) - [i81]Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren:
SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution. CoRR abs/2309.14122 (2023) - [i80]Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren:
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. CoRR abs/2310.13424 (2023) - [i79]Chenghao Li, Yifei Wu, Wenbo Shen, Zichen Zhao, Rui Chang, Chengwei Liu, Yang Liu, Kui Ren:
Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem. CoRR abs/2310.17186 (2023) - [i78]Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren:
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory. CoRR abs/2311.16062 (2023) - [i77]Yuke Hu, Jian Lou, Jiaqi Liu, Feng Lin, Zhan Qin, Kui Ren:
ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach. CoRR abs/2311.16136 (2023) - [i76]Jiaqi Liu, Jian Lou, Zhan Qin, Kui Ren:
Certified Minimax Unlearning with Generalization Rates and Deletion Capacity. CoRR abs/2312.10336 (2023) - [i75]Xinle Cao, Jian Liu, Yongsheng Shen, Xiaohua Ye, Kui Ren:
Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption. IACR Cryptol. ePrint Arch. 2023: 1122 (2023) - [i74]Xiaoyang Hou, Jian Liu, Jingyu Li, Yuhan Li, Wen-jie Lu, Cheng Hong, Kui Ren:
CipherGPT: Secure Two-Party GPT Inference. IACR Cryptol. ePrint Arch. 2023: 1147 (2023) - [i73]Hao Lu, Jian Liu, Kui Ren:
Arena: Multi-leader Synchronous Byzantine Fault Tolerance. IACR Cryptol. ePrint Arch. 2023: 1171 (2023) - [i72]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Practical Constructions for Single Input Functionality against a Dishonest Majority. IACR Cryptol. ePrint Arch. 2023: 1367 (2023) - [i71]Hao Lu, Jian Liu, Kui Ren:
Aurora: Leaderless State-Machine Replication with High Throughput. IACR Cryptol. ePrint Arch. 2023: 1463 (2023) - [i70]Zeyuan Yin, Bingsheng Zhang, Andrii Nastenko, Roman Oliynykov, Kui Ren:
A Scalable Coercion-resistant Blockchain Decision-making Scheme. IACR Cryptol. ePrint Arch. 2023: 1578 (2023) - [i69]Keyu Ji, Bingsheng Zhang, Kui Ren:
Fine-grained Policy Constraints for Distributed Point Function. IACR Cryptol. ePrint Arch. 2023: 1672 (2023) - [i68]Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Kui Ren, Cheng Hong, Tao Wei, Wenguang Chen:
BumbleBee: Secure Two-party Inference Framework for Large Transformers. IACR Cryptol. ePrint Arch. 2023: 1678 (2023) - [i67]Yibiao Lu, Bingsheng Zhang, Kui Ren:
Load-Balanced Server-Aided MPC in Heterogeneous Computing. IACR Cryptol. ePrint Arch. 2023: 1826 (2023) - [i66]Taipei Lu, Bingsheng Zhang, Lichun Li, Kui Ren:
Aegis: A Lightning Fast Privacy-preserving Machine Learning Platform against Malicious Adversaries. IACR Cryptol. ePrint Arch. 2023: 1890 (2023) - [i65]Xinle Cao, Yuhan Li, Dmytro Bogatov, Jian Liu, Kui Ren:
Secure and Practical Functional Dependency Discovery in Outsourced Databases. IACR Cryptol. ePrint Arch. 2023: 1969 (2023) - 2022
- [j167]Zhibo Wang, Defang Liu, Yunan Sun, Xiaoyi Pang, Peng Sun, Feng Lin, John C. S. Lui, Kui Ren:
A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses. IEEE Commun. Surv. Tutorials 24(4): 2292-2328 (2022) - [j166]Zhengxiong Li, Baicheng Chen, Xingyu Chen, Chenhan Xu, Yuyang Chen, Feng Lin, Changzhi Li, Karthik Dantu, Kui Ren, Wenyao Xu:
Reliable Digital Forensics in the Air: Exploring an RF-based Drone Identification System. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 63:1-63:25 (2022) - [j165]Chao Wang, Feng Lin, Zhongjie Ba, Fan Zhang, Wenyao Xu, Kui Ren:
Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 77:1-77:26 (2022) - [j164]Ziwei Liu, Feng Lin, Chao Wang, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(4): 173:1-173:25 (2022) - [j163]Yanchun Li, Zhetao Li, Li Zeng, Saiqin Long, Feiran Huang, Kui Ren:
Compound adversarial examples in deep neural networks. Inf. Sci. 613: 50-68 (2022) - [j162]Zhelei Zhou, Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Yibiao Lu, Kui Ren, Phuc Thai, Hong-Sheng Zhou:
Scriptable and composable SNARKs in the trusted hardware model. J. Comput. Secur. 30(6): 757-793 (2022) - [j161]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. Proc. VLDB Endow. 16(2): 202-215 (2022) - [j160]Jian Liu, Kui Ren:
Improving Blockchains With Client-Assistance. IEEE Trans. Computers 71(5): 1230-1236 (2022) - [j159]Fan Zhang, Tianxiang Feng, Zhiqi Li, Kui Ren, Xinjie Zhao:
Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 289-311 (2022) - [j158]Xiaogang Zhu, Xiaotao Feng, Xiaozhu Meng, Sheng Wen, Seyit Camtepe, Yang Xiang, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. IEEE Trans. Dependable Secur. Comput. 19(2): 912-923 (2022) - [j157]Xinyu Zhang, Bingsheng Zhang, Aggelos Kiayias, Thomas Zacharias, Kui Ren:
An Efficient E2E Crowd Verifiable E-Voting System. IEEE Trans. Dependable Secur. Comput. 19(6): 3607-3620 (2022) - [j156]Yang Liu, Zhuo Ma, Yilong Yang, Ximeng Liu, Jianfeng Ma, Kui Ren:
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning. IEEE Trans. Dependable Secur. Comput. 19(6): 3671-3685 (2022) - [j155]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Kui Ren:
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN. IEEE Trans. Inf. Forensics Secur. 17: 69-84 (2022) - [j154]Yanbin Wang, Haitao Xu, Zhenhao Guo, Zhan Qin, Kui Ren:
snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning. IEEE Trans. Inf. Forensics Secur. 17: 1214-1226 (2022) - [j153]Mengnan Zhao, Bo Wang, Wei Wang, Yuqiu Kong, Tianhang Zheng, Kui Ren:
Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection. IEEE Trans. Inf. Forensics Secur. 17: 2468-2482 (2022) - [j152]Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, Kui Ren:
Bool Network: An Open, Distributed, Secure Cross-Chain Notary Platform. IEEE Trans. Inf. Forensics Secur. 17: 3465-3478 (2022) - [j151]Aditya Singh Rathore, Chenhan Xu, Weijin Zhu, Afee Daiyan, Kun Wang, Feng Lin, Kui Ren, Wenyao Xu:
Scanning the Voice of Your Fingerprint With Everyday Surfaces. IEEE Trans. Mob. Comput. 21(8): 3024-3040 (2022) - [j150]Siwei Wu, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum. ACM Trans. Softw. Eng. Methodol. 31(3): 54:1-54:33 (2022) - [j149]Chengliang Tian, Jia Yu, Hanlin Zhang, Haiyang Xue, Cong Wang, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. IEEE Trans. Serv. Comput. 15(1): 241-253 (2022) - [c216]Yutian Yang, Wenbo Shen, Xun Xie, Kangjie Lu, Mingsen Wang, Tianyu Zhou, Chenggang Qin, Wang Yu, Kui Ren:
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms. ACSAC 2022: 869-880 - [c215]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility. ASIACRYPT (4) 2022: 129-158 - [c214]Muhui Jiang, Tianyi Xu, Yajin Zhou, Yufeng Hu, Ming Zhong, Lei Wu, Xiapu Luo, Kui Ren:
EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM. ASPLOS 2022: 846-858 - [c213]Jianwei Liu, Guozheng Yang, Cheng Zang, Jiajun Chen, Xianming Hu, Jingzhi Zhang, Yinghui He, Jinsong Han, Kui Ren:
Device-free Crowd Density Estimation with Off-the-shelf WiFi Traffic. CBD 2022: 306-311 - [c212]Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, Kui Ren:
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. CVPR 2022: 10369-10378 - [c211]Fan Zhang, Zhiyong Wang, Haoting Shen, Bolin Yang, Qianmei Wu, Kui Ren:
DARPT: defense against remote physical attack based on TDC in multi-tenant scenario. DAC 2022: 559-564 - [c210]Junge Xu, Bohan Xuan, Anlin Liu, Mo Sun, Fan Zhang, Zeke Wang, Kui Ren:
Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV object detection. DAC 2022: 685-690 - [c209]Jinyan Xu, Haoran Lin, Ziqi Yuan, Wenbo Shen, Yajin Zhou, Rui Chang, Lei Wu, Kui Ren:
RegVault: hardware assisted selective data randomization for operating system kernels. DAC 2022: 715-720 - [c208]Xia Zhou, Jiaqi Li, Wenlong Zhang, Yajin Zhou, Wenbo Shen, Kui Ren:
OPEC: operation-based security isolation for bare-metal embedded systems. EuroSys 2022: 317-333 - [c207]Li Lu, Zhongjie Ba, Feng Lin, Jinsong Han, Kui Ren:
ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures. ICDCS 2022: 776-786 - [c206]Kunzhe Huang, Yiming Li, Baoyuan Wu, Zhan Qin, Kui Ren:
Backdoor Defense via Decoupling the Training Process. ICLR 2022 - [c205]Zhanglei Shu, Zhangsen Wang, Guozheng Yang, Cheng Zang, Zhe Ma, Feng Lin, Kui Ren:
Fingersound: A Low-cost and Deployable Authentication System with Fingertip Sliding Sound. ICPADS 2022: 33-40 - [c204]Jianwei Liu, Yinghui He, Chaowei Xiao, Jinsong Han, Le Cheng, Kui Ren:
Physical-World Attack towards WiFi-based Behavior Recognition. INFOCOM 2022: 400-409 - [c203]Chao Wang, Feng Lin, Tiantian Liu, Ziwei Liu, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect. INFOCOM 2022: 820-829 - [c202]Yike Chen, Ming Gao, Yimin Li, Lingfeng Zhang, Li Lu, Feng Lin, Jinsong Han, Kui Ren:
Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers. INFOCOM 2022: 1119-1128 - [c201]Meng Chen, Li Lu, Zhongjie Ba, Kui Ren:
PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition. INFOCOM 2022: 1419-1428 - [c200]Ziwei Liu, Linzhong Xu, Feng Lin, Zhangsen Wang, Kui Ren:
CTJammer: A Cross-Technology Reactive Jammer towards Unlicensed LTE. IoTDI 2022: 95-106 - [c199]Weiye Xu, Wenfan Song, Jianwei Liu, Yajie Liu, Xin Cui, Yuanqing Zheng, Jinsong Han, Xinhuai Wang, Kui Ren:
Mask does not matter: anti-spoofing face authentication using mmWave without on-site registration. MobiCom 2022: 310-323 - [c198]Chao Wang, Feng Lin, Tiantian Liu, Kaidi Zheng, Zhibo Wang, Zhengxiong Li, Ming-Chun Huang, Wenyao Xu, Kui Ren:
mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device. MobiCom 2022: 338-351 - [c197]Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren:
A non-intrusive and adaptive speaker de-identification scheme using adversarial examples. MobiCom 2022: 853-855 - [c196]Zhengxiong Li, Baicheng Chen, Xingyu Chen, Huining Li, Chenhan Xu, Feng Lin, Chris Xiaoxuan Lu, Kui Ren, Wenyao Xu:
SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing. NDSS 2022 - [c195]Aditya Singh Rathore, Yijie Shen, Chenhan Xu, Jacob Snyderman, Jinsong Han, Fan Zhang, Zhengxiong Li, Feng Lin, Wenyao Xu, Kui Ren:
FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing. NDSS 2022 - [c194]Ming Gao, Lingfeng Zhang, Leming Shen, Xiang Zou, Jinsong Han, Feng Lin, Kui Ren:
KITE: Exploring the Practical Threat from Acoustic Transduction Attacks on Inertial Sensors. SenSys 2022: 696-709 - [c193]Qianniu Chen, Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren:
Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain. SenSys 2022: 710-724 - [c192]Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wang, Qingbiao Wu, Kui Ren:
"Adversarial Examples" for Proof-of-Learning. SP 2022: 1408-1422 - [c191]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. USENIX Security Symposium 2022: 4129-4146 - [i64]Kunzhe Huang, Yiming Li, Baoyuan Wu, Zhan Qin, Kui Ren:
Backdoor Defense via Decoupling the Training Process. CoRR abs/2202.03423 (2022) - [i63]Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, Kui Ren:
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. CoRR abs/2203.01584 (2022) - [i62]Guodong Cao, Zhibo Wang, Xiaowei Dong, Zhifei Zhang, Hengchang Guo, Zhan Qin, Kui Ren:
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training. CoRR abs/2206.02158 (2022) - [i61]Jingyi Guo, Min Zheng, Yajin Zhou, Haoyu Wang, Lei Wu, Xiapu Luo, Kui Ren:
iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps. CoRR abs/2207.01837 (2022) - [i60]Zhuoruo Zhang, Chenyang Yu, He Huang, Rui Chang, Mingshuai Chen, Qinming Dai, Wenbo Shen, Yongwang Zhao, Kui Ren:
PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot. CoRR abs/2209.07936 (2022) - [i59]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. CoRR abs/2210.01318 (2022) - [i58]Zhihua Tian, Jian Liu, Jingyu Li, Xinle Cao, Ruoxi Jia, Kui Ren:
Private Data Valuation and Fair Payment in Data Marketplaces. CoRR abs/2210.08723 (2022) - [i57]Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren:
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples. CoRR abs/2211.05446 (2022) - [i56]Shuo Shao, Wenyuan Yang, Hanlin Gu, Jian Lou, Zhan Qin, Lixin Fan, Qiang Yang, Kui Ren:
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model. CoRR abs/2211.07160 (2022) - [i55]Jiachen Lei, Shuang Ma, Zhongjie Ba, Sai Vemprala, Ashish Kapoor, Kui Ren:
Masked Autoencoders for Egocentric Video Understanding @ Ego4D Challenge 2022. CoRR abs/2211.15286 (2022) - [i54]Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren:
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. CoRR abs/2212.00612 (2022) - [i53]Keyu Ji, Bingsheng Zhang, Tianpei Lu, Kui Ren:
Multi-party Private Function Evaluation for RAM. IACR Cryptol. ePrint Arch. 2022: 939 (2022) - [i52]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility. IACR Cryptol. ePrint Arch. 2022: 1127 (2022) - [i51]Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, Kui Ren:
Bool Network: An Open, Distributed, Secure Cross-chain Notary Platform. IACR Cryptol. ePrint Arch. 2022: 1290 (2022) - [i50]Jian Liu, Jingyu Li, Di Wu, Kui Ren:
Improved Constant-weight PIR with an Extension for Multi-query. IACR Cryptol. ePrint Arch. 2022: 1401 (2022) - [i49]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Endemic Oblivious Transfer via Random Oracles, Revisited. IACR Cryptol. ePrint Arch. 2022: 1525 (2022) - 2021
- [j148]Yangfei Lin, Jie Li, Xiaohua Jia, Kui Ren:
Multiple-replica integrity auditing schemes for cloud data storage. Concurr. Comput. Pract. Exp. 33(7): 1 (2021) - [j147]Kai Bu, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, Kui Ren:
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation. ACM Comput. Surv. 53(5): 104:1-104:34 (2021) - [j146]Peipei Jiang, Qian Wang, Muqi Huang, Cong Wang, Qi Li, Chao Shen, Kui Ren:
Building In-the-Cloud Network Functions: Security and Privacy Challenges. Proc. IEEE 109(12): 1888-1919 (2021) - [j145]Xinle Cao, Jian Liu, Hao Lu, Kui Ren:
Cryptanalysis of An Encrypted Database in SIGMOD '14. Proc. VLDB Endow. 14(10): 1743-1755 (2021) - [j144]Jinfei Liu, Qiongqiong Lin, Jiayao Zhang, Kui Ren, Jian Lou, Junxu Liu, Li Xiong, Jian Pei, Jimeng Sun:
Demonstration of Dealer: An End-to-End Model Marketplace with Differential Privacy. Proc. VLDB Endow. 14(12): 2747-2750 (2021) - [j143]Fan Zhang, Bolin Yang, Bojie Yang, Yiran Zhang, Xuanle Ren, Shivam Bhasin, Kui Ren:
Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1063-1076 (2021) - [j142]Guorui Xu, Fan Zhang, Bolin Yang, Xinjie Zhao, Wei He, Kui Ren:
Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1102-1116 (2021) - [j141]Bo Wang, Mengnan Zhao, Wei Wang, Fei Wei, Zhan Qin, Kui Ren:
Are You Confident That You Have Successfully Generated Adversarial Examples? IEEE Trans. Circuits Syst. Video Technol. 31(6): 2089-2099 (2021) - [j140]Sekhar Rajendran, Zhi Sun, Feng Lin, Kui Ren:
Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things. IEEE Trans. Inf. Forensics Secur. 16: 1896-1911 (2021) - [j139]Jianghong Wei, Xiaofeng Chen, Jianfeng Ma, Xuexian Hu, Kui Ren:
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging. IEEE/ACM Trans. Netw. 29(5): 2242-2253 (2021) - [j138]Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen:
e-PoS: Making Proof-of-Stake Decentralized and Fair. IEEE Trans. Parallel Distributed Syst. 32(8): 1961-1973 (2021) - [c190]Lin Ma, Jinyan Xu, Jiadong Sun, Yajin Zhou, Xun Xie, Wenbo Shen, Rui Chang, Kui Ren:
Revisiting challenges for selective data protection of real applications. APSys 2021: 138-145 - [c189]Kui Ren:
Encrypted Databases: Progresses and Challenges. AsiaCCS 2021: 628 - [c188]Hao Lu, Jian Liu, Peilun Li, Guozheng Yang, Cheng Zang, Jiajun Chen, Kui Ren:
Dagger: Optimistic Byzantine Fault-Tolerance without Rollback. SBC@AsiaCCS 2021: 11-16 - [c187]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem. SBC@AsiaCCS 2021: 23-28 - [c186]Chenhe Zhang, Xinle Cao, Jian Liu, Kui Ren:
Proof of Comprehensive Performance. SBC@AsiaCCS 2021: 29-34 - [c185]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CCS 2021: 734-748 - [c184]Nanzi Yang, Wenbo Shen, Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, Kui Ren:
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization. CCS 2021: 764-778 - [c183]Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Phuc Thai, Hong-Sheng Zhou, Kui Ren:
Succinct Scriptable NIZK via Trusted Hardware. ESORICS (1) 2021: 430-451 - [c182]Zhelei Zhou, Xinle Cao, Jian Liu, Bingsheng Zhang, Kui Ren:
Zero Knowledge Contingent Payments for Trained Neural Networks. ESORICS (2) 2021: 628-648 - [c181]Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu, Lei Zhang, Kui Ren:
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation. ESORICS (2) 2021: 699-720 - [c180]Liu Liu, Hanlin Yu, Zhongjie Ba, Li Lu, Feng Lin, Kui Ren:
PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting. ICC 2021: 1-6 - [c179]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Wenxin Liu, Zhan Qin, Kui Ren:
Feature Importance-aware Transferable Adversarial Attacks. ICCV 2021: 7619-7628 - [c178]Jianwei Liu, Wenfan Song, Leming Shen, Jinsong Han, Xian Xu, Kui Ren:
MandiPass: Secure and Usable User Authentication via Earphone IMU. ICDCS 2021: 674-684 - [c177]Jianwei Liu, Xiang Zou, Feng Lin, Jinsong Han, Xian Xu, Kui Ren:
Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFID. ICDCS 2021: 1042-1052 - [c176]Weiye Xu, Jianwei Liu, Shimin Zhang, Yuanqing Zheng, Feng Lin, Jinsong Han, Fu Xiao, Kui Ren:
RFace: Anti-Spoofing Facial Authentication Using COTS RFID. INFOCOM 2021: 1-10 - [c175]Jianwei Liu, Chaowei Xiao, Kaiyan Cui, Jinsong Han, Xian Xu, Kui Ren, XuFei Mao:
A Behavior Privacy Preserving Method towards RF Sensing. IWQoS 2021: 1-10 - [c174]Qiang Liu, Cen Zhang, Lin Ma, Muhui Jiang, Yajin Zhou, Lei Wu, Wenbo Shen, Xiapu Luo, Yang Liu, Kui Ren:
FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution. ASE 2021: 792-804 - [c173]Tiantian Liu, Ming Gao, Feng Lin, Chao Wang, Zhongjie Ba, Jinsong Han, Wenyao Xu, Kui Ren:
Wavoice: A Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals. SenSys 2021: 97-110 - [c172]Rui Xiao, Jianwei Liu, Jinsong Han, Kui Ren:
OneFi: One-Shot Recognition for Unseen Gesture via COTS WiFi. SenSys 2021: 206-219 - [c171]Yutian Yang, Wenbo Shen, Bonan Ruan, Wenmao Liu, Kui Ren:
Security Challenges in the Container Cloud. TPS-ISA 2021: 137-145 - [c170]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. WWW 2021: 33-44 - [i48]Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen:
e-PoS: Making Proof-of-Stake Decentralized and Fair. CoRR abs/2101.00330 (2021) - [i47]Siwei Wu, Dabao Wang, Jianting He, Yajin Zhou, Lei Wu, Xingliang Yuan, Qinming He, Kui Ren:
DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications. CoRR abs/2104.15068 (2021) - [i46]Lin Ma, Jinyan Xu, Jiadong Sun, Yajin Zhou, Xun Xie, Wenbo Shen, Rui Chang, Kui Ren:
Revisiting Challenges for Selective Data Protection of Real Applications. CoRR abs/2105.14251 (2021) - [i45]Muhui Jiang, Tianyi Xu, Yajin Zhou, Yufeng Hu, Ming Zhong, Lei Wu, Xiapu Luo, Kui Ren:
Examiner: Automatically Locating Inconsistent Instructions Between Real Devices and CPU Emulators for ARM. CoRR abs/2105.14273 (2021) - [i44]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CoRR abs/2105.14295 (2021) - [i43]Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Baolei Hou, Xiapu Luo, Lei Wu, Kui Ren:
A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices. CoRR abs/2105.14298 (2021) - [i42]Zhuo Chen, Lei Wu, Jing Cheng, Yubo Hu, Yajin Zhou, Zhushou Tang, Yexuan Chen, Jinku Li, Kui Ren:
Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE. CoRR abs/2106.05756 (2021) - [i41]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Wenxin Liu, Zhan Qin, Kui Ren:
Feature Importance-aware Transferable Adversarial Attacks. CoRR abs/2107.14185 (2021) - [i40]Rui Zhang, Jian Liu, Yuan Ding, Qingbiao Wu, Kui Ren:
"Adversarial Examples" for Proof-of-Learning. CoRR abs/2108.09454 (2021) - [i39]Zhelei Zhou, Xinle Cao, Jian Liu, Bingsheng Zhang, Kui Ren:
ZK Contingent Payments for Trained Neural Networks. IACR Cryptol. ePrint Arch. 2021: 594 (2021) - [i38]Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, Kui Ren:
UC Secure Private Branching Program and Decision Tree Evaluation. IACR Cryptol. ePrint Arch. 2021: 1390 (2021) - 2020
- [j137]Fan Zhang, Guorui Xu, Bolin Yang, Ziyuan Liang, Kui Ren:
Theoretical analysis of persistent fault attack. Sci. China Inf. Sci. 63(3) (2020) - [j136]Lin Ma, Kai Bu, Ningchao Wu, Tianxiang Luo, Kui Ren:
Atlas: A First Step Toward Multipath Validation. Comput. Networks 173: 107224 (2020) - [j135]Kui Ren, Qian Wang, Cong Wang, Zhan Qin, Xiaodong Lin:
The Security of Autonomous Driving: Threats, Defenses, and Future Directions. Proc. IEEE 108(2): 357-372 (2020) - [j134]Fan Zhang, Bolin Yang, Xiaofei Dong, Sylvain Guilley, Zhe Liu, Wei He, Fangguo Zhang, Kui Ren:
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE. IEEE Trans. Computers 69(11): 1681-1693 (2020) - [j133]Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu, Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren:
Persistent Fault Attack in Practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 172-195 (2020) - [j132]Yue Zhang, Jia Yu, Rong Hao, Cong Wang, Kui Ren:
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data. IEEE Trans. Dependable Secur. Comput. 17(3): 608-619 (2020) - [j131]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Zhenhua Li, Charles A. Kamhoua, Laurent L. Njilla, DaeHun Nyang:
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation. IEEE Trans. Dependable Secur. Comput. 17(4): 745-759 (2020) - [j130]Leo Yu Zhang, Yifeng Zheng, Jian Weng, Cong Wang, Zihao Shan, Kui Ren:
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Trans. Dependable Secur. Comput. 17(6): 1218-1231 (2020) - [j129]Dong Yuan, Qi Li, Guoliang Li, Qian Wang, Kui Ren:
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing. IEEE Trans. Inf. Forensics Secur. 15: 299-314 (2020) - [j128]Jun Zhou, Zhenfu Cao, Zhan Qin, Xiaolei Dong, Kui Ren:
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. IEEE Trans. Inf. Forensics Secur. 15: 420-434 (2020) - [j127]Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. IEEE Trans. Inf. Forensics Secur. 15: 987-1001 (2020) - [j126]Fan Zhang, Xiaofei Dong, Bolin Yang, Yajin Zhou, Kui Ren:
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures. IEEE Trans. Inf. Forensics Secur. 15: 1407-1422 (2020) - [j125]Anxiao He, Kai Bu, Yucong Li, Eikoh Chida, Qianping Gu, Kui Ren:
Atomos: Constant-Size Path Validation Proof. IEEE Trans. Inf. Forensics Secur. 15: 3832-3847 (2020) - [j124]Zhuo Ma, Yilong Yang, Ximeng Liu, Yang Liu, Siqi Ma, Kui Ren, Chang Yao:
EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid. IEEE Trans. Ind. Informatics 16(10): 6597-6606 (2020) - [j123]Shang Gao, Zhe Peng, Bin Xiao, Aiqun Hu, Yubo Song, Kui Ren:
Detection and Mitigation of DoS Attacks in Software Defined Networks. IEEE/ACM Trans. Netw. 28(3): 1419-1433 (2020) - [c169]Wen-jie Lu, Yixuan Fang, Zhicong Huang, Cheng Hong, Chaochao Chen, Hunter Qu, Yajin Zhou, Kui Ren:
Faster Secure Multiparty Computation of Adaptive Gradient Descent. PPMLP@CCS 2020: 47-49 - [c168]Jiadong Sun, Xia Zhou, Wenbo Shen, Yajin Zhou, Kui Ren:
PESC: A Per System-Call Stack Canary Design for Linux Kernel. CODASPY 2020: 365-375 - [c167]Fan Zhang, Bin Shao, Guorui Xu, Bolin Yang, Ziqi Yang, Zhan Qin, Kui Ren:
From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices. DAC 2020: 1-6 - [c166]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng, Kui Ren:
Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing. ICDCS 2020: 1-11 - [c165]Kui Ren, Yu Guo, Jiaqi Li, Xiaohua Jia, Cong Wang, Yajin Zhou, Sheng Wang, Ning Cao, Feifei Li:
HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services. ICDCS 2020: 23-33 - [c164]Yaliang Li, Houping Xiao, Zhan Qin, Chenglin Miao, Lu Su, Jing Gao, Kui Ren, Bolin Ding:
Towards Differentially Private Truth Discovery for Crowd Sensing Systems. ICDCS 2020: 1156-1166 - [c163]Chao Wang, Linzhu Fang, Yongdong Wu, Feng Lin, Kui Ren:
Poster Abstract: Secure Remote Key Initialization of Wireless IoT. IoTDI 2020: 252-253 - [c162]Muhui Jiang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
An empirical study on ARM disassembly tools. ISSTA 2020: 401-414 - [c161]Jianwei Liu, Xiang Zou, Jinsong Han, Feng Lin, Kui Ren:
BioDraw: Reliable Multi-Factor User Authentication with One Single Finger Swipe. IWQoS 2020: 1-10 - [c160]Ming Gao, Feng Lin, Weiye Xu, Muertikepu Nuermaimaiti, Jinsong Han, Wenyao Xu, Kui Ren:
Deaf-aid: mobile IoT communication exploiting stealthy speaker-to-gyroscope channel. MobiCom 2020: 53:1-53:13 - [c159]Zhongjie Ba, Tianhang Zheng, Zhan Qin, Hanlin Yu, Liu Liu, Baochun Li, Xue Liu, Kui Ren:
Accelerometer-based smartphone eavesdropping. MobiCom 2020: 73:1-73:2 - [c158]Aditya Singh Rathore, Weijin Zhu, Afee Daiyan, Chenhan Xu, Kun Wang, Feng Lin, Kui Ren, Wenyao Xu:
SonicPrint: a generally adoptable and secure fingerprint biometrics in smart devices. MobiSys 2020: 121-134 - [c157]Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, Kui Ren:
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. NDSS 2020 - [c156]Qinhan Tan, Zhihua Zeng, Kai Bu, Kui Ren:
PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. NDSS 2020 - [c155]Huining Li, Chenhan Xu, Aditya Singh Rathore, Zhengxiong Li, Hanbin Zhang, Chen Song, Kun Wang, Lu Su, Feng Lin, Kui Ren, Wenyao Xu:
VocalPrint: exploring a resilient and secure voice authentication via mmWave biometric interrogation. SenSys 2020: 312-325 - [i37]Jianwei Liu, Jinsong Han, Feng Lin, Kui Ren:
Adversary Helps: Gradient-based Device-Free Domain-Independent Gesture Recognition. CoRR abs/2004.03961 (2020) - [i36]Jianwei Liu, Jinsong Han, Lei Yang, Fei Wang, Feng Lin, Kui Ren:
A Framework for Behavior Privacy Preserving in Radio Frequency Signal. CoRR abs/2004.04909 (2020) - [i35]Tianhang Zheng, Sheng Liu, Changyou Chen, Junsong Yuan, Baochun Li, Kui Ren:
Towards Understanding the Adversarial Vulnerability of Skeleton-based Action Recognition. CoRR abs/2005.07151 (2020) - [i34]Lei Wu, Siwei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum. CoRR abs/2005.08278 (2020) - [i33]Sekhar Rajendran, Zhi Sun, Feng Lin, Kui Ren:
Injecting Reliable Radio Frequency Fingerprints Using Metasurface for The Internet of Things. CoRR abs/2006.06895 (2020) - [i32]Xiaochen Li, Weiran Liu, Ziyi Chen, Kunzhe Huang, Zhan Qin, Lei Zhang, Kui Ren:
DUMP: A Dummy-Point-Based Framework for Histogram Estimation in Shuffle Model. CoRR abs/2009.13738 (2020) - [i31]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards understanding flash loan and its applications in defi ecosystem. CoRR abs/2010.12252 (2020) - [i30]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. CoRR abs/2010.12400 (2020) - [i29]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. CoRR abs/2010.16274 (2020) - [i28]Zhihua Tian, Rui Zhang, Xiaoyang Hou, Jian Liu, Kui Ren:
FederBoost: Private Federated Learning for GBDT. CoRR abs/2011.02796 (2020) - [i27]Yibiao Lu, Bingsheng Zhang, Weiran Liu, Lei Zhang, Kui Ren:
Silent Two-party Computation Assisted by Semi-trusted Hardware. IACR Cryptol. ePrint Arch. 2020: 1259 (2020) - [i26]Ziyuan Liang, Weiran Liu, Fan Zhang, Bingsheng Zhang, Jian Liu, Lei Zhang, Kui Ren:
A Framework of Private Set Intersection Protocols. IACR Cryptol. ePrint Arch. 2020: 1541 (2020)
2010 – 2019
- 2019
- [j122]Bo Wu, Ke Xu, Qi Li, Bingyang Liu, Shoushou Ren, Fan Yang, Meng Shen, Kui Ren:
RFL: Robust fault localization on unreliable communication channels. Comput. Networks 158: 158-174 (2019) - [j121]Xiao Zhang, Jiqiang Liu, Si Chen, Yongjun Kong, Kui Ren:
PriWhisper+: An Enhanced Acoustic Short-Range Communication System for Smartphones. IEEE Internet Things J. 6(1): 614-627 (2019) - [j120]Fenghua Li, Hui Li, Cong Wang, Kui Ren, Elisa Bertino:
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT. IEEE Internet Things J. 6(2): 1446-1449 (2019) - [j119]Chugui Xu, Ju Ren, Liang She, Yaoxue Zhang, Zhan Qin, Kui Ren:
EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics. IEEE Internet Things J. 6(3): 5140-5151 (2019) - [j118]Zhuo Ma, Yang Liu, Ximeng Liu, Jianfeng Ma, Kui Ren:
Lightweight Privacy-Preserving Ensemble Classification for Face Recognition. IEEE Internet Things J. 6(3): 5778-5790 (2019) - [j117]Zhaoquan Gu, Yuexuan Wang, Wei Shi, Zhihong Tian, Kui Ren, Francis C. M. Lau:
A Practical Neighbor Discovery Framework for Wireless Sensor Networks. Sensors 19(8): 1887 (2019) - [j116]Chugui Xu, Ju Ren, Deyu Zhang, Yaoxue Zhang, Zhan Qin, Kui Ren:
GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy. IEEE Trans. Inf. Forensics Secur. 14(9): 2358-2371 (2019) - [j115]Zhongjie Ba, Zhan Qin, Xinwen Fu, Kui Ren:
CIM: Camera in Motion for Smartphone Authentication. IEEE Trans. Inf. Forensics Secur. 14(11): 2987-3002 (2019) - [j114]Man Zhou, Qian Wang, Kui Ren, Dimitrios Koutsonikolas, Lu Su, Yanjiao Chen:
Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones. IEEE Trans. Mob. Comput. 18(3): 560-573 (2019) - [j113]Yong Cui, Ningwei Dai, Zeqi Lai, Minming Li, Zhenhua Li, Yuming Hu, Kui Ren, Yuchi Chen:
TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints. IEEE/ACM Trans. Netw. 27(4): 1612-1628 (2019) - [j112]Chenglin Miao, Wenjun Jiang, Lu Su, Yaliang Li, Suxin Guo, Zhan Qin, Houping Xiao, Jing Gao, Kui Ren:
Privacy-Preserving Truth Discovery in Crowd Sensing Systems. ACM Trans. Sens. Networks 15(1): 9:1-9:32 (2019) - [j111]Zhuo Ma, Tian Zhang, Ximeng Liu, Xinghua Li, Kui Ren:
Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory. IEEE Trans. Veh. Technol. 68(8): 8091-8102 (2019) - [j110]Kui Ren, Zhan Qin, Zhongjie Ba:
Toward Hardware-Rooted Smartphone Authentication. IEEE Wirel. Commun. 26(1): 114-119 (2019) - [j109]Man Zhou, Zhan Qin, Xiu Lin, Shengshan Hu, Qian Wang, Kui Ren:
Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars. IEEE Wirel. Commun. 26(5): 128-133 (2019) - [c154]Tianhang Zheng, Changyou Chen, Kui Ren:
Distributionally Adversarial Attack. AAAI 2019: 2253-2260 - [c153]Fan Zhang, Bolin Yang, Bojie Yang, Yiran Zhang, Shivam Bhasin, Kui Ren:
Fluctuating Power Logic: SCA Protection by $V_{DD}$ Randomization at the Cell-level. AsianHOST 2019: 1-6 - [c152]Zhiguo Wan, Zhangshuang Guan, Yan Zhou, Kui Ren:
zk-AuthFeed: How to Feed Authenticated Data into Smart Contract with Zero Knowledge. Blockchain 2019: 83-90 - [c151]Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang, Kui Ren:
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed. CCS 2019: 2351-2367 - [c150]Xiaoxuan Lou, Fan Zhang, Guorui Xu, Ziyuan Liang, Xinjie Zhao, Shize Guo, Kui Ren:
Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance. Inscrypt 2019: 480-496 - [c149]Jinsong Han, Feng Lin, Wenbo Shen, Kui Ren:
Trustworthy Authentication for IoT with Human-and-Environment-in-the-Loop. SocialSens@CPSIoTWeek 2019: 3-4 - [c148]Jingyu Pan, Fan Zhang, Kui Ren, Shivam Bhasin:
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis. DATE 2019: 1-6 - [c147]Yiran Zhang, Fan Zhang, Bolin Yang, Guorui Xu, Bin Shao, Xinjie Zhao, Kui Ren:
Persistent Fault Injection in FPGA via BRAM Modification. DSC 2019: 1-6 - [c146]Fei Wang, Jinsong Han, Feng Lin, Kui Ren:
WiPIN: Operation-Free Passive Person Identification Using Wi-Fi Signals. GLOBECOM 2019: 1-6 - [c145]Tianhang Zheng, Changyou Chen, Junsong Yuan, Bo Li, Kui Ren:
PointCloud Saliency Maps. ICCV 2019: 1598-1606 - [c144]Zhongjie Ba, Xinyu Zhang, Zhan Qin, Kui Ren:
CFP: Enabling Camera Fingerprint Concealment for Privacy-Preserving Image Sharing. ICDCS 2019: 1094-1105 - [c143]Qi Wei, Kai Fan, Wenlin Wang, Tianhang Zheng, Amit Chakraborty, Katherine A. Heller, Changyou Chen, Kui Ren:
InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks. ICME 2019: 1324-1329 - [c142]Hengtong Zhang, Tianhang Zheng, Jing Gao, Chenglin Miao, Lu Su, Yaliang Li, Kui Ren:
Data Poisoning Attack against Knowledge Graph Embedding. IJCAI 2019: 4853-4859 - [c141]Tianhang Zheng, Zhi Sun, Kui Ren:
FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification. INFOCOM 2019: 199-207 - [c140]He Li, Yaling Yang, Yanzhi Dou, Jung-Min "Jerry" Park, Kui Ren:
PeDSS: Privacy Enhanced and Database-Driven Dynamic spectrum Sharing. INFOCOM 2019: 1477-1485 - [c139]Sixu Piao, Zhongjie Ba, Lu Su, Dimitrios Koutsonikolas, Shi Li, Kui Ren:
Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution. INFOCOM 2019: 2404-2412 - [c138]Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren:
Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. RAID 2019: 47-60 - [p1]Zijian Zhang, Jialing He, Liehuang Zhu, Kui Ren:
Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid. Advances in Cyber Security 2019: 23-48 - [i25]Tianhang Zheng, Zhi Sun, Kui Ren:
FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification. CoRR abs/1901.05914 (2019) - [i24]Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren:
Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. CoRR abs/1904.01981 (2019) - [i23]Hengtong Zhang, Tianhang Zheng, Jing Gao, Chenglin Miao, Lu Su, Yaliang Li, Kui Ren:
Towards Data Poisoning Attack against Knowledge Graph Embedding. CoRR abs/1904.12052 (2019) - [i22]Yutian Yang, Songbo Zhu, Wenbo Shen, Yajin Zhou, Jiadong Sun, Kui Ren:
ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels. CoRR abs/1912.10666 (2019) - [i21]Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren:
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis. IACR Cryptol. ePrint Arch. 2019: 8 (2019) - 2018
- [j108]Zhan Qin, Jian Weng, Yong Cui, Kui Ren:
Privacy-Preserving Image Processing in the Cloud. IEEE Cloud Comput. 5(2): 48-57 (2018) - [j107]Hu Chun, Kui Ren, Wei Jiang:
Privacy-preserving power usage and supply control in smart grid. Comput. Secur. 77: 709-719 (2018) - [j106]Zihao Shan, Kui Ren, Marina Blanton, Cong Wang:
Practical Secure Computation Outsourcing: A Survey. ACM Comput. Surv. 51(2): 31:1-31:40 (2018) - [j105]Chen Song, Zhengxiong Li, Wenyao Xu, Chi Zhou, Zhanpeng Jin, Kui Ren:
My Smartphone Recognizes Genuine QR Codes!: Practical Unclonable QR Code via 3D Printing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(2): 83:1-83:20 (2018) - [j104]Jinsong Han, Chen Qian, Yuqin Yang, Ge Wang, Han Ding, Xin Li, Kui Ren:
Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(4): 166:1-166:21 (2018) - [j103]Fan Zhang, Ziyuan Liang, Bolin Yang, Xinjie Zhao, Shize Guo, Kui Ren:
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition. Frontiers Inf. Technol. Electron. Eng. 19(12): 1475-1499 (2018) - [j102]Cong Wang, Xingliang Yuan, Yong Cui, Kui Ren:
Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond. IEEE Netw. 32(1): 166-171 (2018) - [j101]Feng Gao, Liehuang Zhu, Meng Shen, Kashif Sharif, Zhiguo Wan, Kui Ren:
A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks. IEEE Netw. 32(6): 184-192 (2018) - [j100]Zhihua Xia, Yi Zhu, Xingming Sun, Zhan Qin, Kui Ren:
Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing. IEEE Trans. Cloud Comput. 6(1): 276-286 (2018) - [j99]Fan Zhang, Xiaoxuan Lou, Xinjie Zhao, Shivam Bhasin, Wei He, Ruyi Ding, Samiya Qureshi, Kui Ren:
Persistent Fault Analysis on Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 150-172 (2018) - [j98]Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren:
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy. IEEE Trans. Dependable Secur. Comput. 15(4): 591-606 (2018) - [j97]Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Cinzia Squicciarini, Kui Ren:
Towards Privacy-Preserving and Practical Image-Centric Social Discovery. IEEE Trans. Dependable Secur. Comput. 15(5): 868-882 (2018) - [j96]Qi Li, Yanyu Chen, Patrick P. C. Lee, Mingwei Xu, Kui Ren:
Security Policy Violations in SDN Data Plane. IEEE/ACM Trans. Netw. 26(4): 1715-1727 (2018) - [j95]Jingyuan Fan, Chaowen Guan, Kui Ren, Chunming Qiao:
Middlebox-Based Packet-Level Redundancy Elimination Over Encrypted Network Traffic. IEEE/ACM Trans. Netw. 26(4): 1742-1753 (2018) - [j94]Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, Kui Ren:
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Trans. Parallel Distributed Syst. 29(8): 1721-1735 (2018) - [j93]Xingliang Yuan, Jian Weng, Cong Wang, Kui Ren:
Secure Integrated Circuit Design via Hybrid Cloud. IEEE Trans. Parallel Distributed Syst. 29(8): 1851-1864 (2018) - [j92]Victor Bahl, Barbara Carminati, James Caverlee, Ing-Ray Chen, Wynne Hsu, Toru Ishida, Valérie Issarny, Surya Nepal, Indrakshi Ray, Kui Ren, Shamik Sural, Mei-Ling Shyu:
Editorial. IEEE Trans. Serv. Comput. 11(1): 1-4 (2018) - [j91]Jia Zhao, Jiqiang Liu, Zhan Qin, Kui Ren:
Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters. IEEE Trans. Smart Grid 9(4): 3313-3320 (2018) - [j90]Mushfiqur R. Sarker, Jianhui Wang, Zuyi Li, Kui Ren:
Security and Cloud Outsourcing Framework for Economic Dispatch. IEEE Trans. Smart Grid 9(6): 5810-5819 (2018) - [j89]Man Zhou, Qian Wang, Tao Lei, Zhibo Wang, Kui Ren:
Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback. IEEE Trans. Wirel. Commun. 17(12): 8063-8076 (2018) - [c137]Zihao Shan, Zhan Qin, Leslie Ying, Kui Ren:
SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction. AsiaCCS 2018: 537-550 - [c136]Helei Cui, Yajin Zhou, Cong Wang, Qi Li, Kui Ren:
Towards Privacy-Preserving Malware Detection Systems for Android. ICPADS 2018: 545-552 - [c135]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, Kui Ren:
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization. INFOCOM 2018: 792-800 - [c134]Cong Liu, Yong Cui, Kun Tan, Quan Fan, Kui Ren, Jianping Wu:
Building Generic Scalable Middlebox Services Over Encrypted Protocols. INFOCOM 2018: 2195-2203 - [c133]Yaliang Li, Chenglin Miao, Lu Su, Jing Gao, Qi Li, Bolin Ding, Zhan Qin, Kui Ren:
An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery. KDD 2018: 1705-1714 - [c132]Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, Kui Ren:
ABC: Enabling Smartphone Authentication with Built-in Camera. NDSS 2018 - [e9]Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang:
Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 238, Springer 2018, ISBN 978-3-319-78812-8 [contents] - [e8]Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang:
Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 239, Springer 2018, ISBN 978-3-319-78815-9 [contents] - [i20]Kai Bu, Yutian Yang, Avery Laird, Jiaqing Luo, Yingjiu Li, Kui Ren:
What's (Not) Validating Network Paths: A Survey. CoRR abs/1804.03385 (2018) - [i19]Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. CoRR abs/1808.04218 (2018) - [i18]Tianhang Zheng, Changyou Chen, Kui Ren:
Distributionally Adversarial Attack. CoRR abs/1808.05537 (2018) - [i17]Yaliang Li, Houping Xiao, Zhan Qin, Chenglin Miao, Lu Su, Jing Gao, Kui Ren, Bolin Ding:
Towards Differentially Private Truth Discovery for Crowd Sensing Systems. CoRR abs/1810.04760 (2018) - [i16]Tianhang Zheng, Changyou Chen, Junsong Yuan, Kui Ren:
Learning Saliency Maps for Adversarial Point-Cloud Generation. CoRR abs/1812.01687 (2018) - 2017
- [j88]Wenhao Wang, Zhi Sun, Kui Ren, Bocheng Zhu:
User Capacity of Wireless Physical-Layer Identification. IEEE Access 5: 3353-3368 (2017) - [j87]Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura:
Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1. IEEE Commun. Mag. 55(3): 60-61 (2017) - [j86]Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura:
Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2. IEEE Commun. Mag. 55(6): 118-119 (2017) - [j85]Yanzhi Dou, Kexiong Curtis Zeng, He Li, Yaling Yang, Bo Gao, Kui Ren, Shaoqian Li:
P2-SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System. IEEE J. Sel. Areas Commun. 35(1): 173-187 (2017) - [j84]Liehuang Zhu, Zijian Zhang, Zhan Qin, Jian Weng, Kui Ren:
Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids. IEEE Netw. 31(1): 59-63 (2017) - [j83]Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng, Cong Wang:
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. IEEE Trans. Inf. Forensics Secur. 12(8): 1874-1884 (2017) - [j82]Zhangjie Fu, Xinle Wu, Qian Wang, Kui Ren:
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data. IEEE Trans. Inf. Forensics Secur. 12(12): 2986-2997 (2017) - [j81]Chugui Xu, Ju Ren, Yaoxue Zhang, Zhan Qin, Kui Ren:
DPPro: Differentially Private High-Dimensional Data Release via Random Projection. IEEE Trans. Inf. Forensics Secur. 12(12): 3081-3093 (2017) - [j80]Qian Wang, Qihang Sun, Kui Ren, Xiaohua Jia:
THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply. IEEE Trans. Mob. Comput. 16(7): 2051-2064 (2017) - [j79]Yong Cui, Jian Song, Kui Ren, Minming Li, Zongpeng Li, Qingmei Ren, Yangjun Zhang:
Software Defined Cooperative Offloading for Mobile Cloudlets. IEEE/ACM Trans. Netw. 25(3): 1746-1760 (2017) - [j78]Qi Li, Patrick P. C. Lee, Peng Zhang, Purui Su, Liang He, Kui Ren:
Capability-Based Security Enforcement in Named Data Networking. IEEE/ACM Trans. Netw. 25(5): 2719-2730 (2017) - [j77]Aziz Mohaisen, Kui Ren:
Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures. IEEE/ACM Trans. Netw. 25(5): 3059-3072 (2017) - [j76]Jingyuan Fan, Chaowen Guan, Kui Ren, Yong Cui, Chunming Qiao:
SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox. IEEE/ACM Trans. Netw. 25(6): 3753-3766 (2017) - [j75]Zijian Zhang, Zhan Qin, Liehuang Zhu, Jian Weng, Kui Ren:
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise. IEEE Trans. Smart Grid 8(2): 619-626 (2017) - [c131]Lei Xu, Ke Xu, Meng Shen, Kui Ren, Jingyuan Fan, Chaowen Guan, Wenlong Chen:
MINOS: regulating router dataplane actions in dynamic runtime environments. ACM TUR-C 2017: 40:1-40:10 - [c130]Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao, Kui Ren:
Generating Synthetic Decentralized Social Graphs with Local Differential Privacy. CCS 2017: 425-438 - [c129]Kui Ren:
The Dual Role of Smartphones in IoT Security. Inscrypt 2017: 21-24 - [c128]Qian Wang, Kui Ren, Minxin Du, Qi Li, Aziz Mohaisen:
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates. Financial Cryptography 2017: 79-97 - [c127]Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen:
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones. ICDCS 2017: 183-195 - [c126]Chaowen Guan, Aziz Mohaisen, Zhi Sun, Lu Su, Kui Ren, Yaling Yang:
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access. ICDCS 2017: 1105-1115 - [c125]Zhongjie Ba, Kui Ren:
Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies. ICDCS 2017: 1910-1914 - [c124]Aziz Mohaisen, Zhongshu Gu, Kui Ren:
Privacy Implications of DNSSEC Look-Aside Validation. ICDCS 2017: 2438-2443 - [c123]Yanzhi Dou, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, Kui Ren:
Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access Systems. ICDCS 2017: 2486-2493 - [c122]Shang Gao, Zhe Peng, Bin Xiao, Aiqun Hu, Kui Ren:
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks. INFOCOM 2017: 1-9 - [c121]Qian Wang, Shengshan Hu, Minxin Du, Jingjun Wang, Kui Ren:
Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval. INFOCOM 2017: 1-9 - [c120]Zijian Zhang, Wenqiang Cao, Zhan Qin, Liehuang Zhu, Zhengtao Yu, Kui Ren:
When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid. IWQoS 2017: 1-9 - [c119]Feng Lin, Chen Song, Yan Zhuang, Wenyao Xu, Changzhi Li, Kui Ren:
Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System. MobiCom 2017: 315-328 - [c118]Tianhang Zheng, Zhi Sun, Kui Ren:
Data Independent Identification for Privacy Preservation. PAC 2017: 186-187 - [c117]Zhongjie Ba, Sixu Piao, Kui Ren:
Defending against Speaker Fingerprinting Based Device Tracking for Smartphones. PAC 2017: 188-189 - [c116]Zihao Shan, Kui Ren, Zhan Qin:
Privacy-Preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction. PAC 2017: 204-205 - [c115]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang:
Understanding the Privacy Implications of DNSSEC Look-Aside Validation. PAC 2017: 208-209 - [e7]Robert H. Deng, Jian Weng, Kui Ren, Vinod Yegneswaran:
Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 198, Springer 2017, ISBN 978-3-319-59607-5 [contents] - 2016
- [j74]Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya:
Ensuring Security and Privacy Preservation for Cloud Data Services. ACM Comput. Surv. 49(1): 13:1-13:39 (2016) - [j73]Si Chen, Zhan Qin, Guoliang Xing, Kui Ren:
Securing acoustics-based short-range communication systems: an overview. J. Commun. Inf. Networks 1(4): 44-51 (2016) - [j72]Sherman S. M. Chow, Urs Hengartner, Joseph K. Liu, Kui Ren:
Special Issue on Security and Privacy in Mobile Clouds. Pervasive Mob. Comput. 28: 100-101 (2016) - [j71]Cong Wang, Kui Ren, Jia Wang:
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming. IEEE Trans. Computers 65(1): 216-229 (2016) - [j70]Mehran Mozaffari Kermani, Reza Azarderakhsh, Kui Ren, Jean-Luc Beuchat:
Guest Editorial: Introduction to the Special Section on Emerging Security Trends for Biomedical Computations, Devices, and Infrastructures. IEEE ACM Trans. Comput. Biol. Bioinform. 13(3): 399-400 (2016) - [j69]Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Kui Ren, Xinwen Fu:
Password Extraction via Reconstructed Wireless Mouse Trajectory. IEEE Trans. Dependable Secur. Comput. 13(4): 461-473 (2016) - [j68]Jia Yu, Kui Ren, Cong Wang:
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates. IEEE Trans. Inf. Forensics Secur. 11(6): 1362-1375 (2016) - [j67]Wenhao Wang, Zhi Sun, Sixu Piao, Bocheng Zhu, Kui Ren:
Wireless Physical-Layer Identification: Modeling and Validation. IEEE Trans. Inf. Forensics Secur. 11(9): 2091-2106 (2016) - [j66]Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, Kui Ren:
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 11(11): 2594-2608 (2016) - [j65]Zhangjie Fu, Xinle Wu, Chaowen Guan, Xingming Sun, Kui Ren:
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement. IEEE Trans. Inf. Forensics Secur. 11(12): 2706-2716 (2016) - [j64]Shengshan Hu, Qian Wang, Jingjun Wang, Zhan Qin, Kui Ren:
Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data. IEEE Trans. Image Process. 25(7): 3411-3425 (2016) - [j63]Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang:
SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones. IEEE Trans. Mob. Comput. 15(2): 432-446 (2016) - [j62]Zhan Qin, Kui Ren, Ting Yu, Jian Weng:
DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud. IEEE Trans. Multim. 18(5): 929-939 (2016) - [j61]Xingliang Yuan, Xinyu Wang, Cong Wang, Jian Weng, Kui Ren:
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing. IEEE Trans. Multim. 18(10): 2002-2014 (2016) - [j60]Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang:
SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing. ACM Trans. Multim. Comput. Commun. Appl. 12(4s): 65:1-65:24 (2016) - [j59]Zhangjie Fu, Kui Ren, Jiangang Shu, Xingming Sun, Fengxiao Huang:
Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement. IEEE Trans. Parallel Distributed Syst. 27(9): 2546-2559 (2016) - [j58]Qian Wang, Kui Ren, Peng Ning, Shengshan Hu:
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks. IEEE Trans. Veh. Technol. 65(10): 8331-8344 (2016) - [c114]Heyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, Jian Weng, Kui Ren:
Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control. AsiaCCS 2016: 59-70 - [c113]Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, Kui Ren:
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy. CCS 2016: 192-203 - [c112]Qian Wang, Jingjun Wang, Shengshan Hu, Qin Zou, Kui Ren:
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud. AsiaCCS 2016: 257-268 - [c111]Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, Wenyao Xu:
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers. CCS 2016: 895-907 - [c110]Wenhao Wang, Zhi Sun, Kui Ren, Bocheng Zhu:
Increasing User Capacity of Wireless Physical-Layer Identification in Internet of Things. GLOBECOM 2016: 1-6 - [c109]Ah Reum Kang, Seong Hoon Jeong, Steven Y. Ko, Kui Ren, Aziz Mohaisen:
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service. HotWeb 2016: 54-59 - [c108]Wenhao Wang, Zhi Sun, Kui Ren, Bocheng Zhu:
User capacity of wireless physical-layer identification: An information-theoretic perspective. ICC 2016: 1-6 - [c107]Qian Wang, Shengshan Hu, Jingjun Wang, Kui Ren:
Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor. ICDCS 2016: 700-710 - [c106]Yanzhi Dou, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, Kui Ren:
Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems. ICDCS 2016: 729-730 - [c105]Thierry Titcheu Chekam, Ennan Zhai, Zhenhua Li, Yong Cui, Kui Ren:
On the synchronization bottleneck of OpenStack Swift-like cloud storage systems. INFOCOM 2016: 1-9 - [c104]Chen Song, Aosen Wang, Kui Ren, Wenyao Xu:
EyeVeri: A secure and usable approach for smartphone user authentication. INFOCOM 2016: 1-9 - [c103]Qian Wang, Shengshan Hu, Kui Ren, Jingjun Wang, Zhibo Wang, Minxin Du:
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data. INFOCOM 2016: 1-9 - [c102]Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren:
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy. INFOCOM 2016: 1-9 - [c101]Qian Wang, Kui Ren, Man Zhou, Tao Lei, Dimitrios Koutsonikolas, Lu Su:
Messages behind the sound: real-time hidden acoustic signal capture with smartphones. MobiCom 2016: 29-41 - [c100]Yanzhi Dou, Kexiong Curtis Zeng, Yaling Yang, Kui Ren:
Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems: poster. MobiCom 2016: 473-474 - [c99]Qian Wang, Kui Ren, Man Zhou, Tao Lei, Dimitrios Koutsonikolas, Lu Su:
Real-time hidden acoustic signal capture with smartphones: demo. MobiCom 2016: 493-494 - [c98]Yanzhi Dou, Kexiong Curtis Zeng, He Li, Yaling Yang, Bo Gao, Chaowen Guan, Kui Ren, Shaoqian Li:
P2-SAS: preserving users' privacy in centralized dynamic spectrum access systems. MobiHoc 2016: 321-330 - [c97]Qian Wang, Xiao Lu, Yan Zhang, Zhibo Wang, Zhan Qin, Kui Ren:
SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy. SecureComm 2016: 454-474 - [c96]Aziz Mohaisen, Ah Reum Kang, Kui Ren:
Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment. WISA 2016: 1-14 - [i15]Jun-bin Fang, Zhen Che, Xiaolong Yu, Zhe Chen, Zoe Lin Jiang, Siu-Ming Yiu, Kui Ren, Xiaoqing Tan:
Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes. CoRR abs/1608.07202 (2016) - 2015
- [j57]Mohsen Guizani, Daojing He, Kui Ren, Joel J. P. C. Rodrigues, Sammy Chan, Yan Zhang:
Security and privacy in emerging networks: Part 1 [Guest Editorial]. IEEE Commun. Mag. 53(4): 18-19 (2015) - [j56]Mohsen Guizani, Daojing He, Kui Ren, Joel J. P. C. Rodrigues, Sammy Chan, Yan Zhang:
Security and privacy in emerging networks: Part II [Guest Editorial]. IEEE Commun. Mag. 53(8): 40-41 (2015) - [j55]Jia Yu, Kui Ren, Cong Wang, Vijay Varadharajan:
Enabling Cloud Storage Auditing With Key-Exposure Resistance. IEEE Trans. Inf. Forensics Secur. 10(6): 1167-1179 (2015) - [j54]Kan Yang, Xiaohua Jia, Kui Ren:
Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud. IEEE Trans. Parallel Distributed Syst. 26(12): 3461-3470 (2015) - [c95]Kui Ren:
Secure Outsourcing Image Feature Extraction: Challenges and Solutions. SCC@ASIACCS 2015: 1 - [c94]Xingliang Yuan, Cong Wang, Kui Ren:
Enabling IP Protection for Outsourced Integrated Circuit Design. AsiaCCS 2015: 237-247 - [c93]Qian Wang, Kui Ren, Guancheng Li, Chenbo Xia, Xiaobing Chen, Zhibo Wang, Qin Zou:
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice. CCS 2015: 376-387 - [c92]Haibo Tian, Fangguo Zhang, Kui Ren:
Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible. AsiaCCS 2015: 417-426 - [c91]Rong Cheng, Jingbo Yan, Chaowen Guan, Fangguo Zhang, Kui Ren:
Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation. AsiaCCS 2015: 621-626 - [c90]Hu Chun, Kui Ren, Wei Jiang:
Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid. DBSec 2015: 119-134 - [c89]Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, Zhibo Wang:
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. ESORICS (2) 2015: 186-205 - [c88]Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu:
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification. ESORICS (1) 2015: 203-223 - [c87]Si Chen, Muyuan Li, Kui Ren, Chunming Qiao:
Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos. ICDCS 2015: 1-10 - [c86]Qian Wang, Man Zhou, Kui Ren, Tao Lei, Jikun Li, Zhibo Wang:
Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes. ICDCS 2015: 537-546 - [c85]Zhongli Liu, Zupei Li, Benyuan Liu, Xinwen Fu, Ioannis A. Raptis, Kui Ren:
Rise of Mini-Drones: Applications and Issues. PAMCO@MobiHoc 2015: 7-12 - [c84]Si Chen, Muyuan Li, Kui Ren, Xinwen Fu, Chunming Qiao:
Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing. SenSys 2015: 59-71 - [c83]Chenglin Miao, Wenjun Jiang, Lu Su, Yaliang Li, Suxin Guo, Zhan Qin, Houping Xiao, Jing Gao, Kui Ren:
Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems. SenSys 2015: 183-196 - [c82]Jingyuan Fan, Zilong Ye, Chaowen Guan, Xiujiao Gao, Kui Ren, Chunming Qiao:
GREP: Guaranteeing Reliability with Enhanced Protection in NFV. HotMiddlebox@SIGCOMM 2015: 13-18 - [e6]Indrajit Ray, Xiaofeng Wang, Kui Ren, Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha:
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3826-4 [contents] - [e5]Indrajit Ray, Xiaofeng Wang, Kui Ren, Florian Kerschbaum, Cristina Nita-Rotaru:
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3825-7 [contents] - [e4]Indrajit Ray, Xiaofeng Wang, Kui Ren:
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3828-8 [contents] - [i14]Wenhao Wang, Zhi Sun, Kui Ren, Bocheng Zhu, Sixu Piao:
Wireless Physical-Layer Identification: Modeling and Validation. CoRR abs/1510.08485 (2015) - [i13]Wenhao Wang, Zhi Sun, Kui Ren, Bocheng Zhu:
User Capacity of Wireless Physical-layer Identification: An Information-theoretic Perspective. CoRR abs/1511.00150 (2015) - 2014
- [j53]Hamed Mohsenian Rad, Fabrizio Granelli, Kui Ren, Chris Develder, Lijun Chen, Tao Jiang, Xue Liu:
Editorial: IEEE Communications Surveys & TutorialsSpecial Section on Energy and Smart Grid. IEEE Commun. Surv. Tutorials 16(3): 1687-1688 (2014) - [j52]Bingsheng Zhang, Zhan Qin, Si Chen, Muyuan Li, Kui Ren, Cong Wang, Di Ma:
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. IEEE Internet Things J. 1(1): 33-45 (2014) - [j51]Kui Ren, Pierangela Samarati, Marco Gruteser, Peng Ning, Yunhao Liu:
Guest Editorial Special Issue on Security for IoT: The State of the Art. IEEE Internet Things J. 1(5): 369-371 (2014) - [j50]Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Kui Ren, Shunzhi Zhu, Mourad Debbabi:
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications. IEEE Trans. Dependable Secur. Comput. 11(6): 538-552 (2014) - [j49]Zhen Xu, Cong Wang, Kui Ren, Lingyu Wang, Bingsheng Zhang:
Proof-Carrying Cloud Computation: The Case of Convex Optimization. IEEE Trans. Inf. Forensics Secur. 9(11): 1790-1803 (2014) - [j48]Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou:
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Trans. Parallel Distributed Syst. 25(1): 222-233 (2014) - [j47]Hua-Jie Shao, Lei Rao, Zhi Wang, Xue Liu, Zhibo Wang, Kui Ren:
Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets. IEEE Trans. Parallel Distributed Syst. 25(10): 2659-2669 (2014) - [j46]Kui Ren, Qian Wang, Di Ma, Xiaohua Jia:
Securing emerging short range wireless communications: the state of the art. IEEE Wirel. Commun. 21(6): 153-159 (2014) - [c81]Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao:
Blind Recognition of Touched Keys on Mobile Devices. CCS 2014: 1403-1414 - [c80]Qiuyu Xiao, Jiayi Chen, Le Yu, Huaxin Li, Haojin Zhu, Muyuan Li, Kui Ren:
POSTER: LocMask: A Location Privacy Protection Framework in Android System. CCS 2014: 1526-1528 - [c79]Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang, Xinwen Fu:
Privacy-preserving outsourcing of image global feature detection. GLOBECOM 2014: 710-715 - [c78]Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Cinzia Squicciarini, Kui Ren:
Enabling Privacy-Preserving Image-Centric Social Discovery. ICDCS 2014: 198-207 - [c77]Qihang Sun, Qian Wang, Kui Ren, Xiaohua Jia:
Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply. ICNP 2014: 245-256 - [c76]Zhan Qin, Jingbo Yan, Kui Ren:
Private image computation: The case of cloud based privacy-preserving SIFT. INFOCOM Workshops 2014: 179-180 - [c75]Muyuan Li, Si Chen, Kui Ren:
Enabling private and non-intrusive smartphone calls with LipTalk. INFOCOM Workshops 2014: 191-192 - [c74]Si Chen, Muyuan Li, Zhan Qin, Bingsheng Zhang, Kui Ren:
AcousAuth: An acoustic-based mobile application for user authentication. INFOCOM Workshops 2014: 215-216 - [c73]Si Chen, Muyuan Li, Kui Ren:
The power of indoor crowd: Indoor 3D maps from the crowd. INFOCOM Workshops 2014: 217-218 - [c72]Kan Yang, Xiaohua Jia, Kui Ren, Ruitao Xie, Liusheng Huang:
Enabling efficient access control with dynamic policy updating for big data in the cloud. INFOCOM 2014: 2013-2021 - [c71]Cong Wang, Bingsheng Zhang, Kui Ren, Janet Meiling Wang Roveda, Chang Wen Chen, Zhen Xu:
A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing. INFOCOM 2014: 2130-2138 - [c70]Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang:
SBVLC: Secure barcode-based visible light communication for smartphones. INFOCOM 2014: 2661-2669 - [c69]Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang:
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing. ACM Multimedia 2014: 497-506 - [c68]Muyuan Li, Haojin Zhu, Zhaoyu Gao, Si Chen, Le Yu, Shangqian Hu, Kui Ren:
All your location are belong to us: breaking mobile social networks for automated user location tracking. MobiHoc 2014: 43-52 - [e3]Robert H. Deng, Elaine Shi, Kui Ren:
Proceedings of the Second International Workshop on Security in Cloud Computing, SCC@ASIACCS '14, Kyoto, Japan, June 3, 2014. ACM 2014, ISBN 978-1-4503-2805-0 [contents] - 2013
- [j45]Kui Ren, Haojin Zhu, Zhu Han, Radha Poovendran:
Security in cognitive radio networks [Guest Editorial]. IEEE Netw. 27(3): 2 (2013) - [j44]Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, Y. Thomas Hou:
Toward privacy-assured and searchable cloud data storage services. IEEE Netw. 27(4): 1-0 (2013) - [j43]Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans. Computers 62(2): 362-375 (2013) - [j42]Cong Wang, Bingsheng Zhang, Kui Ren, Janet Roveda:
Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud. IEEE Trans. Emerg. Top. Comput. 1(1): 166-177 (2013) - [j41]Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, Ruitao Xie:
DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems. IEEE Trans. Inf. Forensics Secur. 8(11): 1790-1801 (2013) - [j40]Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou, Kui Ren:
Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Networks 9(2): 18:1-18:35 (2013) - [j39]Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, Wenjing Lou:
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Trans. Parallel Distributed Syst. 24(1): 131-143 (2013) - [j38]Cong Wang, Kui Ren, Jia Wang, Qian Wang:
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations. IEEE Trans. Parallel Distributed Syst. 24(6): 1172-1181 (2013) - [j37]Kui Ren, Qian Wang:
Opportunistic spectrum access: from stochastic channels to non-stochastic channels. IEEE Wirel. Commun. 20(3): 1-0 (2013) - [c67]Kan Yang, Xiaohua Jia, Kui Ren:
Attribute-based fine-grained access control with efficient revocation in cloud storage systems. AsiaCCS 2013: 523-528 - [c66]Wen Ming Liu, Lingyu Wang, Kui Ren, Mourad Debbabi:
Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications. CloudCom (1) 2013: 679-686 - [c65]Bingsheng Zhang, Helger Lipmaa, Cong Wang, Kui Ren:
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication. Financial Cryptography 2013: 78-95 - [c64]Zhen Xu, Cong Wang, Qian Wang, Kui Ren, Lingyu Wang:
Proof-carrying cloud computation: The case of convex optimization. INFOCOM 2013: 610-614 - [c63]Xuan Liu, Kui Ren, Yanling Yuan, Zuyi Li, Qian Wang:
Optimal budget deployment strategy against power grid interdiction. INFOCOM 2013: 1160-1168 - [c62]Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang:
DAC-MACS: Effective data access control for multi-authority cloud storage systems. INFOCOM 2013: 2895-2903 - [c61]Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu:
How Privacy Leaks From Bluetooth Mouse? NDSS 2013 - [c60]Cong Wang, Zhen Xu, Kui Ren, Janet Meiling Wang:
OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance. NDSS 2013 - [c59]Dung Nguyen, Kui Ren, Janet Roveda:
A new data acquisition design for breast cancer detection system. SoCC 2013: 61-66 - [c58]Janet Roveda, Dung Nguyen, Linda S. Powers, Kui Ren, Jerrie Fairbanks:
Effective signal region based analog mixed signal design considering variations and applications. SoCC 2013: 233-238 - [e2]Xingming Sun, Elaine Shi, Kui Ren:
Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013. ACM 2013, ISBN 978-1-4503-2067-2 [contents] - [e1]Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, Kai Xing:
Wireless Algorithms, Systems, and Applications - 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings. Lecture Notes in Computer Science 7992, Springer 2013, ISBN 978-3-642-39700-4 [contents] - [i12]Muyuan Li, Haojin Zhu, Zhaoyu Gao, Si Chen, Kui Ren, Le Yu, Shangqian Hu:
All Your Location are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking. CoRR abs/1310.2547 (2013) - [i11]Bingsheng Zhang, Zhan Qin, Junfei Wang, Kui Ren, Cong Wang, Di Ma:
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. IACR Cryptol. ePrint Arch. 2013: 581 (2013) - 2012
- [j36]Kui Ren, Cong Wang, Qian Wang:
Security Challenges for the Public Cloud. IEEE Internet Comput. 16(1): 69-73 (2012) - [j35]Qian Wang, Ping Xu, Kui Ren, Xiang-Yang Li:
Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication. IEEE J. Sel. Areas Commun. 30(1): 16-30 (2012) - [j34]Qian Wang, Kaihe Xu, Kui Ren:
Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels. IEEE J. Sel. Areas Commun. 30(9): 1666-1674 (2012) - [j33]Kui Ren, Cong Wang, Qian Wang:
Toward secure and effective data utilization in public cloud. IEEE Netw. 26(6): 69-74 (2012) - [j32]Rui Zhang, Yanchao Zhang, Kui Ren:
Distributed Privacy-Preserving Access Control in Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(8): 1427-1438 (2012) - [j31]Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. IEEE Trans. Parallel Distributed Syst. 23(8): 1467-1479 (2012) - [j30]Yanling Yuan, Zuyi Li, Kui Ren:
Quantitative Analysis of Load Redistribution Attacks in Power Systems. IEEE Trans. Parallel Distributed Syst. 23(9): 1731-1738 (2012) - [j29]Cong Wang, Qian Wang, Kui Ren, Ning Cao, Wenjing Lou:
Toward Secure and Dependable Storage Services in Cloud Computing. IEEE Trans. Serv. Comput. 5(2): 220-232 (2012) - [j28]Jie Li, Zuyi Li, Kui Ren, Xue Liu:
Towards Optimal Electric Demand Management for Internet Data Centers. IEEE Trans. Smart Grid 3(1): 183-192 (2012) - [j27]Zhiguo Wan, Kui Ren, Ming Gu:
USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks. IEEE Trans. Wirel. Commun. 11(5): 1922-1932 (2012) - [c57]Cong Wang, Kui Ren, Shucheng Yu, Karthik Mahendra Raje Urs:
Achieving usable and privacy-assured similarity search over outsourced cloud data. INFOCOM 2012: 451-459 - [c56]Kaihe Xu, Qian Wang, Kui Ren:
Joint UFH and power control for effective wireless anti-jamming communication. INFOCOM 2012: 738-746 - [c55]Qian Wang, Kui Ren, Xiaoqiao Meng:
When cloud meets eBay: Towards effective pricing for cloud computing. INFOCOM 2012: 936-944 - [c54]XiaoHua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan, Kui Ren, Yuanfang Chen:
Locating malicious nodes for data aggregation in wireless networks. INFOCOM 2012: 3056-3060 - [c53]Wen Ming Liu, Lingyu Wang, Kui Ren, Pengsu Cheng, Mourad Debbabi:
k-Indistinguishable Traffic Padding in Web Applications. Privacy Enhancing Technologies 2012: 79-99 - 2011
- [j26]Jin Li, Qian Wang, Cong Wang, Kui Ren:
Enhancing Attribute-Based Encryption with Attribute Hierarchy. Mob. Networks Appl. 16(5): 553-561 (2011) - [j25]Qian Wang, Kui Ren, Shucheng Yu, Wenjing Lou:
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. ACM Trans. Sens. Networks 8(1): 9:1-9:24 (2011) - [j24]Shucheng Yu, Kui Ren, Wenjing Lou:
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 22(4): 673-686 (2011) - [j23]Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li:
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distributed Syst. 22(5): 847-859 (2011) - [j22]Yanling Yuan, Zuyi Li, Kui Ren:
Modeling Load Redistribution Attacks in Power Systems. IEEE Trans. Smart Grid 2(2): 382-390 (2011) - [j21]Kui Ren, Hai Su, Qian Wang:
Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel. Commun. 18(4): 6-12 (2011) - [c52]Hai Su, Qian Wang, Kui Ren, Kai Xing:
Jamming-Resilient Dynamic Spectrum Access for Cognitive Radio Networks. ICC 2011: 1-5 - [c51]Benwen Zhu, Bo Zhu, Kui Ren:
PEKSrand: Providing Predicate Privacy in Public-Key Encryption with Keyword Search. ICC 2011: 1-6 - [c50]Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing. ICDCS 2011: 393-402 - [c49]Cong Wang, Kui Ren, Jia Wang, Karthik Mahendra Raje Urs:
Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations. ICDCS 2011: 549-558 - [c48]Cong Wang, Qian Wang, Kui Ren:
Towards Secure and Effective Utilization over Encrypted Cloud Data. ICDCS Workshops 2011: 282-286 - [c47]Qian Wang, Kui Ren, Peng Ning:
Anti-jamming communication in cognitive radio networks with unknown channel statistics. ICNP 2011: 393-402 - [c46]Cong Wang, Kui Ren, Jia Wang:
Secure and practical outsourcing of linear programming in cloud computing. INFOCOM 2011: 820-828 - [c45]Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou:
Privacy-preserving multi-keyword ranked search over encrypted cloud data. INFOCOM 2011: 829-837 - [c44]Qian Wang, Ping Xu, Kui Ren, Xiang-Yang Li:
Delay-bounded adaptive UFH-based anti-jamming wireless communication. INFOCOM 2011: 1413-1421 - [c43]Qian Wang, Hai Su, Kui Ren, Kwangjo Kim:
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. INFOCOM 2011: 1422-1430 - [c42]Kaihe Xu, Qian Wang, Kui Ren:
Wireless key establishment with asynchronous clocks. MILCOM 2011: 1410-1415 - [c41]Hai Su, Qian Wang, Kui Ren:
Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks. WASA 2011: 280-291 - [r2]Shucheng Yu, Wenjing Lou, Kui Ren:
Privacy-Preserving Authentication in Wireless Access Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 972-974 - [r1]Ming Li, Wenjing Lou, Kui Ren:
Secure Device Pairing. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1111-1115 - [i10]Qian Wang, Kaihe Xu, Kui Ren:
Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels. CoRR abs/1109.0766 (2011) - 2010
- [j20]Shucheng Yu, Kui Ren, Wenjing Lou:
Attribute-based on-demand multicast group setup with membership anonymity. Comput. Networks 54(3): 377-386 (2010) - [j19]Cong Wang, Kui Ren, Wenjing Lou, Jin Li:
Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4): 19-24 (2010) - [j18]Bo Zhu, Kui Ren, Lingyu Wang, Mourad Debbabi:
PCM: a privacy-preserving detection mechanism in mobile ad hoc networks. Secur. Commun. Networks 3(2-3): 167-184 (2010) - [j17]Kui Ren, Shucheng Yu, Wenjing Lou, Yanchao Zhang:
PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. IEEE Trans. Parallel Distributed Syst. 21(2): 203-215 (2010) - [j16]Zhiguo Wan, Kui Ren, Bo Zhu, Bart Preneel, Ming Gu:
Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks. IEEE Trans. Veh. Technol. 59(2): 519-532 (2010) - [j15]Ming Li, Wenjing Lou, Kui Ren:
Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1): 51-58 (2010) - [c40]Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren:
Attribute-based signature and its applications. AsiaCCS 2010: 60-69 - [c39]Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou:
Attribute based data sharing with attribute revocation. AsiaCCS 2010: 261-270 - [c38]Ning Cao, Qian Wang, Kui Ren, Wenjing Lou:
Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks. ICC 2010: 1-5 - [c37]Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou:
Secure Ranked Keyword Search over Encrypted Cloud Data. ICDCS 2010: 253-262 - [c36]Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Fuzzy Keyword Search over Encrypted Data in Cloud Computing. INFOCOM 2010: 441-445 - [c35]Cong Wang, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. INFOCOM 2010: 525-533 - [c34]Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou:
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. INFOCOM 2010: 534-542 - [c33]Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren:
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks. INFOCOM 2010: 2651-2659 - [c32]Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou:
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. SecureComm 2010: 89-106 - [i9]Benwen Zhu, Bo Zhu, Kui Ren:
PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search. IACR Cryptol. ePrint Arch. 2010: 466 (2010)
2000 – 2009
- 2009
- [j14]Jiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim:
The ring authenticated encryption scheme - How to provide a clue wisely. Inf. Sci. 179(1-2): 161-168 (2009) - [j13]Yanchao Zhang, Kui Ren:
On Address Privacy in Mobile Ad Hoc Networks. Mob. Networks Appl. 14(2): 188-197 (2009) - [j12]Kui Ren, Wenjing Lou, Bo Zhu, Sushil Jajodia:
Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation. IEEE Trans. Veh. Technol. 58(4): 2018-2029 (2009) - [j11]Kui Ren, Shucheng Yu, Wenjing Lou, Yanchao Zhang:
Multi-User Broadcast Authentication in Wireless Sensor Networks. IEEE Trans. Veh. Technol. 58(8): 4554-4564 (2009) - [j10]Wenjing Lou, Kui Ren:
Security, privacy, and accountability in wireless access networks. IEEE Wirel. Commun. 16(4): 80-87 (2009) - [j9]Kai Zeng, Kui Ren, Wenjing Lou, Patrick J. Moran:
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply. Wirel. Networks 15(1): 39-51 (2009) - [c31]Zhiguo Wan, Kui Ren, Bo Zhu, Bart Preneel, Ming Gu:
Anonymous user communication for privacy protection in wireless metropolitan mesh networks. AsiaCCS 2009: 368-371 - [c30]Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. ESORICS 2009: 355-370 - [c29]Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang:
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. INFOCOM 2009: 954-962 - [c28]Shucheng Yu, Kui Ren, Wenjing Lou:
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks. INFOCOM 2009: 963-971 - [c27]Rui Zhang, Yanchao Zhang, Kui Ren:
DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks. INFOCOM 2009: 1251-1259 - [c26]Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan:
Privacy-Aware Attribute-Based Encryption with User Accountability. ISC 2009: 347-362 - [c25]Cong Wang, Qian Wang, Kui Ren, Wenjing Lou:
Ensuring data storage security in Cloud Computing. IWQoS 2009: 1-9 - [c24]Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li:
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. SecureComm 2009: 311-329 - [c23]Hongying Tang, Bo Zhu, Kui Ren:
A New Approach to Malware Detection. ISA 2009: 229-238 - [i8]Cong Wang, Qian Wang, Kui Ren, Wenjing Lou:
Ensuring Data Storage Security in Cloud Computing. IACR Cryptol. ePrint Arch. 2009: 81 (2009) - [i7]Jin Li, Kui Ren, Kwangjo Kim:
A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control. IACR Cryptol. ePrint Arch. 2009: 118 (2009) - [i6]Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security. IACR Cryptol. ePrint Arch. 2009: 281 (2009) - [i5]Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan:
Privacy-aware Attribute-based Encryption with User Accountability. IACR Cryptol. ePrint Arch. 2009: 284 (2009) - [i4]Jin Li, Qian Wang, Cong Wang, Kui Ren:
Enhancing Attribute-based Encryption with Attribute Hierarchy. IACR Cryptol. ePrint Arch. 2009: 293 (2009) - [i3]Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li:
Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. IACR Cryptol. ePrint Arch. 2009: 295 (2009) - [i2]Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IACR Cryptol. ePrint Arch. 2009: 579 (2009) - [i1]Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing. IACR Cryptol. ePrint Arch. 2009: 593 (2009) - 2008
- [j8]Kui Ren, Wenjing Lou, Yanchao Zhang:
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 7(5): 585-598 (2008) - [j7]Kui Ren, Kai Zeng, Wenjing Lou:
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 7(1): 354-363 (2008) - [c22]Kai Zeng, Shucheng Yu, Kui Ren, Wenjing Lou, Yanchao Zhang:
Towards Secure Link Quality Measurement in Multihop Wireless Networks. GLOBECOM 2008: 4946-4950 - [c21]Yong Hao, Yu Cheng, Kui Ren:
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs. GLOBECOM 2008: 4951-4955 - [c20]Qian Wang, Kui Ren:
Time-Slotted Round-Trip Carrier Synchronization in Large-Scale Wireless Networks. ICC 2008: 5087-5091 - [c19]Xiaohua Tian, Yu Cheng, Kui Ren, Bin Liu:
Multicast with an Application-Oriented Networking (AON) Approach. ICC 2008: 5646-5651 - [c18]Kui Ren, Wenjing Lou:
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. ICDCS 2008: 286-294 - [c17]Bo Zhu, Kui Ren, Lingyu Wang:
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363 - [c16]Wei Ren, Kui Ren, Wenjing Lou:
Optimized User Revocation for Group Signature Based Privacy-Aware PKI. ICDCS Workshops 2008: 388-393 - [c15]Yanchao Zhang, Kui Ren:
Towards address privacy in mobile ad hoc networks. QSHINE 2008: 10 - [c14]Wei Ren, Kui Ren, Wenjing Lou, Yanchao Zhang:
Efficient user revocation for privacy-aware PKI. QSHINE 2008: 11 - [c13]Shucheng Yu, Kui Ren, Wenjing Lou:
Attribute-based on-demand multicast group setup with membership anonymity. SecureComm 2008: 18 - [c12]Qian Wang, Kui Ren, Yanchao Zhang, Bo Zhu:
Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy. WASA 2008: 361-372 - [c11]Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel:
Anonymous ID-Based Group Key Agreement for Wireless Networks. WCNC 2008: 2615-2620 - [c10]Zhiguo Wan, Kui Ren, Bart Preneel:
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. WISEC 2008: 62-67 - 2007
- [j6]Kui Ren, Wenjing Lou:
Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. Mob. Networks Appl. 12(1): 79-92 (2007) - [j5]Kui Ren, Wenjing Lou, Kai Zeng, Patrick J. Moran:
On Broadcast Authentication in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 6(11): 4136-4144 (2007) - [c9]Kui Ren, Wenjing Lou, Yanchao Zhang:
Multi-user Broadcast Authentication in Wireless Sensor Networks. SECON 2007: 223-232 - 2006
- [j4]Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng:
Routing optimization security in mobile IPv6. Comput. Networks 50(13): 2401-2419 (2006) - [j3]Kui Ren, Wenjing Lou, Kwangjo Kim, Robert H. Deng:
A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Trans. Veh. Technol. 55(4): 1373-1384 (2006) - [j2]Kui Ren, Kai Zeng, Wenjing Lou:
A new approach for random key pre-distribution in large-scale wireless sensor networks. Wirel. Commun. Mob. Comput. 6: 307-318 (2006) - [c8]Kui Ren, Kai Zeng, Wenjing Lou:
Fault-tolerant Event Boundary Detection in Wireless Sensor Networks. GLOBECOM 2006 - [c7]Kui Ren, Wenjing Lou, Yanchao Zhang:
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. INFOCOM 2006 - [c6]Kai Zeng, Kui Ren, Wenjing Lou, Patrick J. Moran:
Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply. QSHINE 2006: 8 - [c5]Kui Ren, Kai Zeng, Wenjing Lou, Patrick J. Moran:
On Broadcast Authentication in Wireless Sensor Networks. WASA 2006: 502-514 - 2005
- [c4]Kui Ren, Wenjing Lou:
Privacy enhanced access control in pervasive computing environments. BROADNETS 2005: 384-396 - 2004
- [j1]Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim:
Highly reliable trust establishment scheme in ad hoc networks. Comput. Networks 45(6): 687-699 (2004) - [c3]Kui Ren, Hyunrok Lee, Kyusuk Han, Jaemin Park, Kwangjo Kim:
An enhanced lightweight authentication protocol for access control in wireless LANs. ICON 2004: 444-450 - [c2]Kui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo:
Efficient Authenticated Key Agreement Protocol for Dynamic Groups. WISA 2004: 144-159 - 2003
- [c1]Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng:
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356
Coauthor Index
aka: Aziz Mohaisen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint