If you made any changes in Pure, your changes will be visible here soon.

Research Output 2001 2019

  • 3925 Citations
  • 34 h-Index
  • 68 Conference contribution
  • 42 Article
  • 1 Chapter
  • 1 Review article
2019
2 Citations (Scopus)

Protecting user privacy: An approach for untraceable web browsing history and unambiguous user profiles

Beigi, G., Guo, R., Nou, A., Zhang, Y. & Liu, H., Jan 30 2019, WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, p. 213-221 9 p. (WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

History
Internet service providers
Websites
Internet
Communication
2018
2 Citations (Scopus)

Beware of What You Share: Inferring User Locations in Venmo

Yao, X., Chen, Y., Zhang, R., Zhang, Y. & Lin, Y., Jun 5 2018, (Accepted/In press) In : IEEE Internet of Things Journal.

Research output: Contribution to journalArticle

Application programs
2 Citations (Scopus)

EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements

Chen, Y., Li, T., Zhang, R., Zhang, Y. & Hedgpeth, T., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-May. p. 144-160 17 p. 8418601

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Touch screens
Eye movements
Mobile devices
Experiments
3 Citations (Scopus)

Privacy-Preserving Crowdsourced Spectrum Sensing

Jin, X. & Zhang, Y., Jun 1 2018, In : IEEE/ACM Transactions on Networking. 26, 3, p. 1236-1249 14 p.

Research output: Contribution to journalArticle

Costs
2 Citations (Scopus)

Privacy-Preserving Social Media Data Outsourcing

Zhang, J., Sun, J., Zhang, R., Zhang, Y. & Hu, X., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1106-1114 9 p. 8486242

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Experiments
2 Citations (Scopus)

Secure Crowdsourced Indoor Positioning Systems

Li, T., Chen, Y., Zhang, R., Zhang, Y. & Hedgpeth, T., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1034-1042 9 p. 8486398

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Location based services
Global positioning system
Indoor positioning systems

Secure RSS-fingerprint-based indoor positioning: Attacks and countermeasures

Yuan, L., Hu, Y., Li, Y., Zhang, R., Zhang, Y. & Hedgpeth, T., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433131

Research output: Chapter in Book/Report/Conference proceedingConference contribution

RSS
Servers
Power transmission
Tuning
Indoor positioning systems
4 Citations (Scopus)

Securing social media user data - An adversarial approach

Beigi, G., Shu, K., Zhang, Y. & Liu, H., Jul 3 2018, HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 165-173 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

SpecGuard: Spectrum Misuse Detection in Dynamic Spectrum Access Systems

Jin, X., Sun, J., Zhang, R., Zhang, Y. & Zhang, C., Apr 4 2018, (Accepted/In press) In : IEEE Transactions on Mobile Computing.

Research output: Contribution to journalArticle

Power transmission
Transmitters
Data communication systems
Authentication
MATLAB
2 Citations (Scopus)

The rise of social botnets: Attacks and countermeasures

Zhang, J., Zhang, R., Zhang, Y. & Yan, G., Nov 1 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 6, p. 1068-1082 15 p., 7790819.

Research output: Contribution to journalArticle

Botnet
Experiments
2017
3 Citations (Scopus)

POWERFUL: Mobile app fingerprinting via power analysis

Chen, Y., Jin, X., Sun, J., Zhang, R. & Zhang, Y., Oct 2 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8057232

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Electric power utilization
Experiments
4 Citations (Scopus)

PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control

Li, T., Zhang, R. & Zhang, Y., Feb 21 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. Institute of Electrical and Electronics Engineers Inc., p. 333-341 9 p. 7860501

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Logistics
Industry
Cryptography
Servers
4 Citations (Scopus)

Verifiable social data outsourcing

Yao, X., Zhang, R., Zhang, Y. & Lin, Y., Oct 2 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8057005

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Industry
Experiments
1 Citation (Scopus)

Your face your heart: Secure mobile face authentication with photoplethysmograms

Chen, Y., Sun, J., Jin, X., Li, T., Zhang, R. & Zhang, Y., Oct 2 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8057220

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Authentication
Cameras
Galaxies
Experiments
2016
5 Citations (Scopus)

A secure hierarchical deduplication system in cloud storage

Yao, X., Lin, Y., Liu, Q. & Zhang, Y., Oct 13 2016, 2016 IEEE/ACM 24th International Symposium on Quality of Service, IWQoS 2016. Institute of Electrical and Electronics Engineers Inc., 7590397

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hierarchical systems
Servers
Cryptography
Bandwidth
Confidentiality
4 Citations (Scopus)

iLock: Immediate and automatic locking of mobile devices against data theft

Li, T., Chen, Y., Sun, J., Jin, X. & Zhang, Y., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 24-28-October-2016. p. 933-944 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Galaxies
Microphones
Authentication
Acoustics
4 Citations (Scopus)

PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics

Sun, J., Zhang, R., Zhang, J. & Zhang, Y., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524461

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Statistics
Monitoring
Communication
Data privacy
Smart city
22 Citations (Scopus)

Privacy-preserving crowdsourced spectrum sensing

Jin, X. & Zhang, Y., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524588

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
7 Citations (Scopus)

Privacy-Preserving Spatiotemporal Matching for Secure Device-To-Device Communications

Sun, J., Zhang, R. & Zhang, Y., Dec 1 2016, In : IEEE Internet of Things Journal. 3, 6, p. 1048-1060 13 p., 7445133.

Research output: Contribution to journalArticle

Smartphones
Communication
Authentication
Acoustic waves
Secure communication
15 Citations (Scopus)

SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing

Sun, J., Zhang, R., Jin, X. & Zhang, Y., Mar 1 2016, In : IEEE Transactions on Wireless Communications. 15, 3, p. 1716-1728 13 p., 7308083.

Research output: Contribution to journalArticle

Privacy Preserving
Bluetooth
Mobile devices
Object
Costs
9 Citations (Scopus)

Secure outsourced skyline query processing via untrusted cloud service providers

Chen, W., Liu, M., Zhang, R., Zhang, Y. & Liu, S., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524509

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query processing
Location based services
Outsourcing
15 Citations (Scopus)

TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter

Zhang, J., Zhang, R., Sun, J., Zhang, Y. & Zhang, C., Oct 1 2016, In : IEEE/ACM Transactions on Networking. 24, 5, p. 2834-2846 13 p.

Research output: Contribution to journalArticle

Information dissemination
9 Citations (Scopus)

Your age is no secret: Inferring microbloggers' ages via content and interaction analysis

Zhang, J., Hu, X., Zhang, Y. & Liu, H., 2016, Proceedings of the 10th International Conference on Web and Social Media, ICWSM 2016. AAAI Press, p. 476-485 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Marketing
2015
4 Citations (Scopus)

A secure and privacy-preserving payment system for Electric vehicles

Zhao, T., Zhang, C., Wei, L. & Zhang, Y., Sep 9 2015, IEEE International Conference on Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-September. p. 7280-7285 6 p. 7249489

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric vehicles
Energy efficiency
9 Citations (Scopus)

Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks

Zhang, R., Sun, J., Zhang, Y. & Huang, X., Oct 1 2015, In : IEEE Transactions on Wireless Communications. 14, 10, p. 5588-5601 14 p., 7115955.

Research output: Contribution to journalArticle

Jamming
Mobile ad hoc networks
Mobile Ad Hoc Networks
Spread Spectrum
Vertex of a graph
14 Citations (Scopus)

SafeDSA: Safeguard dynamic spectrum access against fake secondary users

Jin, X., Sun, J., Zhang, R. & Zhang, Y., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 304-315 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Data communication systems
MATLAB
Experiments
16 Citations (Scopus)

Secure spatial top-k query processing via untrusted location-based service providers

Zhang, R., Sun, J., Zhang, Y. & Zhang, C., Jan 1 2015, In : IEEE Transactions on Dependable and Secure Computing. 12, 1, p. 111-124 14 p., 6803036.

Research output: Contribution to journalArticle

Location based services
Query processing
Mobile devices
Internet
15 Citations (Scopus)

SpecGuard: Spectrum misuse detection in dynamic spectrum access systems

Jin, X., Sun, J., Zhang, R., Zhang, Y. & Zhang, C., Aug 21 2015, Proceedings - IEEE INFOCOM. Institute of Electrical and Electronics Engineers Inc., Vol. 26. p. 172-180 9 p. 7218380

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MATLAB
Transmitters
Experiments
2 Citations (Scopus)

Your actions tell where you are: Uncovering Twitter users in a metropolitan area

Zhang, J., Sun, J., Zhang, R. & Zhang, Y., Dec 3 2015, 2015 IEEE Conference on Communications and Network Security, CNS 2015. Institute of Electrical and Electronics Engineers Inc., p. 424-432 9 p. 7346854

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scanning
Communication
Experiments
21 Citations (Scopus)

Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices

Chen, Y., Sun, J., Zhang, R. & Zhang, Y., Aug 21 2015, Proceedings - IEEE INFOCOM. Institute of Electrical and Electronics Engineers Inc., Vol. 26. p. 2686-2694 9 p. 7218660

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Authentication
Communication
Industry
Experiments
2014
8 Citations (Scopus)

Secure top-k query processing in unattended tiered sensor networks

Zhang, R., Shi, J., Zhang, Y. & Huang, X., Nov 1 2014, In : IEEE Transactions on Vehicular Technology. 63, 9, p. 4681-4693 13 p., 6767141.

Research output: Contribution to journalArticle

Unattended sensors
Query processing
Query Processing
Sensor nodes
Sensor networks
23 Citations (Scopus)

SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks

Sun, J., Chen, X., Zhang, J., Zhang, Y. & Zhang, J., 2014, Proceedings - IEEE INFOCOM. Institute of Electrical and Electronics Engineers Inc., p. 997-1005 9 p. 6848029

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Network protocols
Communication
29 Citations (Scopus)

TIGHT: A geographic routing protocol for cognitive radio mobile Ad Hoc networks

Jin, X., Zhang, R., Sun, J. & Zhang, Y., 2014, In : IEEE Transactions on Wireless Communications. 13, 8, p. 4670-4681 12 p., 6807739.

Research output: Contribution to journalArticle

Cognitive Radio
Cognitive radio
Mobile ad hoc networks
Mobile Ad Hoc Networks
Routing Protocol
23 Citations (Scopus)

TouchIn: Sightless two-factor authentication on multi-touch mobile devices

Sun, J., Zhang, R., Zhang, J. & Zhang, Y., Dec 23 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 436-444 9 p. 6997513

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Authentication
Touch screens
Experiments
2013
19 Citations (Scopus)

On the impact of social botnets for spam distribution and digital-influence manipulation

Zhang, J., Zhang, R., Zhang, Y. & Yan, G., 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 46-54 9 p. 6682691

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Botnet
Experiments
59 Citations (Scopus)

Privacy-preserving profile matching for proximity-based mobile social networking

Zhang, R., Zhang, J., Zhang, Y., Sun, J. & Yan, G., 2013, In : IEEE Journal on Selected Areas in Communications. 31, 9, p. 656-668 13 p., 6544548.

Research output: Contribution to journalArticle

Smartphones
Experiments
28 Citations (Scopus)

Privacy-preserving spatiotemporal matching

Sun, J., Zhang, R. & Zhang, Y., 2013, Proceedings - IEEE INFOCOM. p. 800-808 9 p. 6566867

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Citations (Scopus)

Secure crowdsourcing-based cooperative pectrum sensing

Zhang, R., Zhang, J., Zhang, Y. & Zhang, C., 2013, Proceedings - IEEE INFOCOM. p. 2526-2534 9 p. 6567059

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data fusion
Mobile devices
Detectors
97 Citations (Scopus)

Social spammer detection in microblogging

Hu, X., Tang, J., Zhang, Y. & Liu, H., 2013, IJCAI International Joint Conference on Artificial Intelligence. p. 2633-2639 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spamming
Information dissemination
Availability
Experiments
27 Citations (Scopus)

Verifiable privacy-preserving aggregation in people-centric urban sensing systems

Zhang, R., Shi, J., Zhang, Y. & Zhang, C., 2013, In : IEEE Journal on Selected Areas in Communications. 31, 9, p. 268-278 11 p., 6559974.

Research output: Contribution to journalArticle

Agglomeration
Data privacy
Smartphones
Mobile devices
Authentication
2012
24 Citations (Scopus)

Distributed privacy-preserving access control in sensor networks

Zhang, R., Zhang, Y. & Ren, K., 2012, In : IEEE Transactions on Parallel and Distributed Systems. 23, 8, p. 1427-1438 12 p., 6095540.

Research output: Contribution to journalArticle

Access control
Sensor networks
Sensor nodes
Base stations
Communication
102 Citations (Scopus)

Fine-grained private matching for proximity-based mobile social networking

Zhang, R., Zhang, Y., Sun, J. & Yan, G., 2012, Proceedings - IEEE INFOCOM. p. 1969-1977 9 p. 6195574

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Smartphones
Bluetooth
Mobile devices
Interfaces (computer)
12 Citations (Scopus)

Secure cooperative data storage and query processing in unattended tiered sensor networks

Zhang, R., Shi, J., Zhang, Y. & Sun, J., Feb 2012, In : IEEE Journal on Selected Areas in Communications. 30, 2, p. 433-441 9 p., 6136828.

Research output: Contribution to journalArticle

Unattended sensors
Query processing
Sensor nodes
Sensor networks
Data storage equipment
26 Citations (Scopus)

Secure top-k query processing via untrusted location-based service providers

Zhang, R., Zhang, Y. & Zhang, C., 2012, Proceedings - IEEE INFOCOM. p. 1170-1178 9 p. 6195476

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Location based services
Query processing
Mobile devices
Internet
2011
12 Citations (Scopus)

AOS: An anonymous overlay system for mobile ad hoc networks

Zhang, R., Zhang, Y. & Fang, Y., May 2011, In : Wireless Networks. 17, 4, p. 843-859 17 p.

Research output: Contribution to journalArticle

Mobile ad hoc networks
Communication
Communication systems
Network protocols
Chemical analysis
30 Citations (Scopus)

A spatiotemporal approach for secure range queries in tiered sensor networks

Shi, J., Zhang, R. & Zhang, Y., Jan 2011, In : IEEE Transactions on Wireless Communications. 10, 1, p. 264-273 10 p., 5610974.

Research output: Contribution to journalArticle

Range Query
Query processing
Sensor nodes
Sensor networks
Sensor Networks
60 Citations (Scopus)

Fast identification of the missing tags in a large RFID system

Zhang, R., Liu, Y., Zhang, Y. & Sun, J., 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 277-286 10 p. 5984908

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio frequency identification (RFID)
radio
Identification (control systems)
Logistics
logistics
7 Citations (Scopus)

JR-SND: Jamming-resilient secure neighbor discovery in mobile Ad Hoc networks

Zhang, R., Zhang, Y. & Huang, X., 2011, Proceedings - International Conference on Distributed Computing Systems. p. 529-538 10 p. 5961707

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Mobile ad hoc networks
Atmospheric spectra
Communication
10 Citations (Scopus)

LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks

Zhang, R. & Zhang, Y., 2011, Proceedings - International Conference on Distributed Computing Systems. p. 497-506 10 p. 5961704

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
Wireless sensor networks
Sensor nodes
Telecommunication links
Acoustic waves
18 Citations (Scopus)

On the price of security in large-scale wireless ad hoc networks

Zhang, C., Song, Y., Fang, Y. & Zhang, Y., Apr 2011, In : IEEE/ACM Transactions on Networking. 19, 2, p. 319-332 14 p., 5710020.

Research output: Contribution to journalArticle

Wireless ad hoc networks
Throughput
Network performance
Degradation
Communication