If you made any changes in Pure, your changes will be visible here soon.

Research Output 2001 2019

  • 4046 Citations
  • 34 h-Index
  • 68 Conference contribution
  • 42 Article
  • 1 Chapter
  • 1 Review article
Filter
Conference contribution
2019
4 Citations (Scopus)

Protecting user privacy: An approach for untraceable web browsing history and unambiguous user profiles

Beigi, G., Guo, R., Nou, A., Zhang, Y. & Liu, H., Jan 30 2019, WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, p. 213-221 9 p. (WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

History
Internet service providers
Websites
Internet
Communication
2018
3 Citations (Scopus)

EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements

Chen, Y., Li, T., Zhang, R., Zhang, Y. & Hedgpeth, T., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-May. p. 144-160 17 p. 8418601

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Touch screens
Eye movements
Mobile devices
Experiments
5 Citations (Scopus)

Privacy-Preserving Social Media Data Outsourcing

Zhang, J., Sun, J., Zhang, R., Zhang, Y. & Hu, X., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1106-1114 9 p. 8486242

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Experiments
4 Citations (Scopus)

Secure Crowdsourced Indoor Positioning Systems

Li, T., Chen, Y., Zhang, R., Zhang, Y. & Hedgpeth, T., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1034-1042 9 p. 8486398

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Location based services
Global positioning system
Indoor positioning systems
1 Citation (Scopus)

Secure RSS-fingerprint-based indoor positioning: Attacks and countermeasures

Yuan, L., Hu, Y., Li, Y., Zhang, R., Zhang, Y. & Hedgpeth, T., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433131

Research output: Chapter in Book/Report/Conference proceedingConference contribution

RSS
Servers
Power transmission
Tuning
Indoor positioning systems
7 Citations (Scopus)

Securing social media user data - An adversarial approach

Beigi, G., Shu, K., Zhang, Y. & Liu, H., Jul 3 2018, HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 165-173 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017
4 Citations (Scopus)

POWERFUL: Mobile app fingerprinting via power analysis

Chen, Y., Jin, X., Sun, J., Zhang, R. & Zhang, Y., Oct 2 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8057232

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Electric power utilization
Experiments
5 Citations (Scopus)

PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control

Li, T., Zhang, R. & Zhang, Y., Feb 21 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. Institute of Electrical and Electronics Engineers Inc., p. 333-341 9 p. 7860501

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Logistics
Industry
Cryptography
Servers
4 Citations (Scopus)

Verifiable social data outsourcing

Yao, X., Zhang, R., Zhang, Y. & Lin, Y., Oct 2 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8057005

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Industry
Experiments
3 Citations (Scopus)

Your face your heart: Secure mobile face authentication with photoplethysmograms

Chen, Y., Sun, J., Jin, X., Li, T., Zhang, R. & Zhang, Y., Oct 2 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8057220

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Authentication
Cameras
Galaxies
Experiments
2016
5 Citations (Scopus)

A secure hierarchical deduplication system in cloud storage

Yao, X., Lin, Y., Liu, Q. & Zhang, Y., Oct 13 2016, 2016 IEEE/ACM 24th International Symposium on Quality of Service, IWQoS 2016. Institute of Electrical and Electronics Engineers Inc., 7590397

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hierarchical systems
Servers
Cryptography
Bandwidth
Confidentiality
6 Citations (Scopus)

iLock: Immediate and automatic locking of mobile devices against data theft

Li, T., Chen, Y., Sun, J., Jin, X. & Zhang, Y., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 24-28-October-2016. p. 933-944 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Galaxies
Microphones
Authentication
Acoustics
5 Citations (Scopus)

PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics

Sun, J., Zhang, R., Zhang, J. & Zhang, Y., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524461

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Statistics
Monitoring
Communication
Data privacy
Smart city
25 Citations (Scopus)

Privacy-preserving crowdsourced spectrum sensing

Jin, X. & Zhang, Y., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524588

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
9 Citations (Scopus)

Secure outsourced skyline query processing via untrusted cloud service providers

Chen, W., Liu, M., Zhang, R., Zhang, Y. & Liu, S., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524509

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query processing
Location based services
Outsourcing
11 Citations (Scopus)

Your age is no secret: Inferring microbloggers' ages via content and interaction analysis

Zhang, J., Hu, X., Zhang, Y. & Liu, H., 2016, Proceedings of the 10th International Conference on Web and Social Media, ICWSM 2016. AAAI Press, p. 476-485 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Marketing
2015
4 Citations (Scopus)

A secure and privacy-preserving payment system for Electric vehicles

Zhao, T., Zhang, C., Wei, L. & Zhang, Y., Sep 9 2015, IEEE International Conference on Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-September. p. 7280-7285 6 p. 7249489

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric vehicles
Energy efficiency
14 Citations (Scopus)

SafeDSA: Safeguard dynamic spectrum access against fake secondary users

Jin, X., Sun, J., Zhang, R. & Zhang, Y., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 304-315 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Data communication systems
MATLAB
Experiments
15 Citations (Scopus)

SpecGuard: Spectrum misuse detection in dynamic spectrum access systems

Jin, X., Sun, J., Zhang, R., Zhang, Y. & Zhang, C., Aug 21 2015, Proceedings - IEEE INFOCOM. Institute of Electrical and Electronics Engineers Inc., Vol. 26. p. 172-180 9 p. 7218380

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MATLAB
Transmitters
Experiments
2 Citations (Scopus)

Your actions tell where you are: Uncovering Twitter users in a metropolitan area

Zhang, J., Sun, J., Zhang, R. & Zhang, Y., Dec 3 2015, 2015 IEEE Conference on Communications and Network Security, CNS 2015. Institute of Electrical and Electronics Engineers Inc., p. 424-432 9 p. 7346854

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scanning
Communication
Experiments
24 Citations (Scopus)

Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices

Chen, Y., Sun, J., Zhang, R. & Zhang, Y., Aug 21 2015, Proceedings - IEEE INFOCOM. Institute of Electrical and Electronics Engineers Inc., Vol. 26. p. 2686-2694 9 p. 7218660

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Authentication
Communication
Industry
Experiments
2014
24 Citations (Scopus)

SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks

Sun, J., Chen, X., Zhang, J., Zhang, Y. & Zhang, J., 2014, Proceedings - IEEE INFOCOM. Institute of Electrical and Electronics Engineers Inc., p. 997-1005 9 p. 6848029

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Network protocols
Communication
26 Citations (Scopus)

TouchIn: Sightless two-factor authentication on multi-touch mobile devices

Sun, J., Zhang, R., Zhang, J. & Zhang, Y., Dec 23 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 436-444 9 p. 6997513

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Authentication
Touch screens
Experiments
2013
20 Citations (Scopus)

On the impact of social botnets for spam distribution and digital-influence manipulation

Zhang, J., Zhang, R., Zhang, Y. & Yan, G., 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 46-54 9 p. 6682691

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Botnet
Experiments
28 Citations (Scopus)

Privacy-preserving spatiotemporal matching

Sun, J., Zhang, R. & Zhang, Y., 2013, Proceedings - IEEE INFOCOM. p. 800-808 9 p. 6566867

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)

Secure crowdsourcing-based cooperative pectrum sensing

Zhang, R., Zhang, J., Zhang, Y. & Zhang, C., 2013, Proceedings - IEEE INFOCOM. p. 2526-2534 9 p. 6567059

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data fusion
Mobile devices
Detectors
102 Citations (Scopus)

Social spammer detection in microblogging

Hu, X., Tang, J., Zhang, Y. & Liu, H., 2013, IJCAI International Joint Conference on Artificial Intelligence. p. 2633-2639 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spamming
Information dissemination
Availability
Experiments
2012
102 Citations (Scopus)

Fine-grained private matching for proximity-based mobile social networking

Zhang, R., Zhang, Y., Sun, J. & Yan, G., 2012, Proceedings - IEEE INFOCOM. p. 1969-1977 9 p. 6195574

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Smartphones
Bluetooth
Mobile devices
Interfaces (computer)
26 Citations (Scopus)

Secure top-k query processing via untrusted location-based service providers

Zhang, R., Zhang, Y. & Zhang, C., 2012, Proceedings - IEEE INFOCOM. p. 1170-1178 9 p. 6195476

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Location based services
Query processing
Mobile devices
Internet
2011
60 Citations (Scopus)

Fast identification of the missing tags in a large RFID system

Zhang, R., Liu, Y., Zhang, Y. & Sun, J., 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 277-286 10 p. 5984908

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio frequency identification (RFID)
radio
Identification (control systems)
Logistics
logistics
7 Citations (Scopus)

JR-SND: Jamming-resilient secure neighbor discovery in mobile Ad Hoc networks

Zhang, R., Zhang, Y. & Huang, X., 2011, Proceedings - International Conference on Distributed Computing Systems. p. 529-538 10 p. 5961707

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Mobile ad hoc networks
Atmospheric spectra
Communication
10 Citations (Scopus)

LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks

Zhang, R. & Zhang, Y., 2011, Proceedings - International Conference on Distributed Computing Systems. p. 497-506 10 p. 5961704

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
Wireless sensor networks
Sensor nodes
Telecommunication links
Acoustic waves

SOI MESFETs for extreme environment buck regulators

Lepkowski, W., Goryll, M., Wilk, S. J., Zhang, Y., Sochacki, J. & Thornton, T., 2011, Proceedings - IEEE International SOI Conference. 6081696

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Radiation
Testing
2010
150 Citations (Scopus)

PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems

Shi, J., Zhang, R., Liu, Y. & Zhang, Y., 2010, Proceedings - IEEE INFOCOM. 5462147

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Agglomeration
Servers
9 Citations (Scopus)

Traffic inference in anonymous MANETs

Liu, Y., Zhang, R., Shi, J. & Zhang, Y., 2010, SECON 2010 - 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 5508207

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Telecommunication traffic
Routing protocols
Network routing
57 Citations (Scopus)

Verifiable fine-grained top-k queries in tiered sensor networks

Zhang, R., Shi, J., Liu, Y. & Zhang, Y., 2010, Proceedings - IEEE INFOCOM. 5461927

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor nodes
Sensor networks
Telecommunication networks
Denial-of-service attack
33 Citations (Scopus)

Wormhole-resilient secure neighbor discovery in underwater acoustic networks

Zhang, R. & Zhang, Y., 2010, Proceedings - IEEE INFOCOM. 5462093

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Underwater acoustics
Network protocols
Direction of arrival
Wireless networks
Synchronization
2009
1 Citation (Scopus)

An adaptive resource allocation scheme for GPRS/EDGE towards 3G

Zhang, Y. & Gao, Z., 2009, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5303117

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Resource allocation
utilization
resources
traffic
Throughput
66 Citations (Scopus)

Dependable and secure sensor data storage with dynamic integrity assurance

Wang, Q., Ren, K., Lou, W. & Zhang, Y., 2009, Proceedings - IEEE INFOCOM. p. 954-962 9 p. 5062006

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Wireless sensor networks
Sensors
Information management
Redundancy
39 Citations (Scopus)

DP 2AC: Distributed privacy-preserving access control in sensor networks

Zhang, R., Zhang, Y. & Ren, K., 2009, Proceedings - IEEE INFOCOM. p. 1251-1259 9 p. 5062039

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Sensor networks
Sensor nodes
Communication
41 Citations (Scopus)

Secure multidimensional range queries in sensor networks

Zhang, R., Shi, J. & Zhang, Y., 2009, Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). p. 197-206 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor nodes
Sensor networks
Query processing
Data storage equipment
71 Citations (Scopus)

Secure range queries in tiered sensor networks

Shi, J., Zhang, R. & Zhang, Y., 2009, Proceedings - IEEE INFOCOM. p. 945-953 9 p. 5062005

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query processing
Sensor nodes
Sensor networks
Data storage equipment
2008
13 Citations (Scopus)

Efficient user revocation for privacy-aware PKI

Ren, W., Ren, K., Lou, W. & Zhang, Y., 2008, QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. ICST

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Communication
Costs
1 Citation (Scopus)

Opportunistic cooperation with receiver-based ratio combining strategy

Wang, Q., Ren, K., Zhang, Y. & Zhu, B., 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5258 LNCS. p. 361-372 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5258 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Convex optimization
Maximal Ratio Combining
Communication systems
Receiver
Energy

Towards address privacy in mobile ad hoc networks

Zhang, Y. & Ren, K., 2008, QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. ICST

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Entropy
Monitoring
2 Citations (Scopus)

Towards secure link quality measurement in multihop wireless networks

Zeng, K., Yu, S., Ren, K., Lou, W. & Zhang, Y., 2008, GLOBECOM - IEEE Global Telecommunications Conference. p. 4946-4950 5 p. 4698721

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Throughput
Costs
2007
2 Citations (Scopus)

Defending against physical destruction attacks on wireless sensor networks

Zhang, C., Zhang, Y. & Fang, Y., 2007, Proceedings - IEEE Military Communications Conference MILCOM. 4086486

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Base stations
Wireless sensor networks
Network protocols
Time measurement
23 Citations (Scopus)

Multi-rate geographic opportunistic routing in wireless ad hoc networks

Zeng, K., Lou, W. & Zhang, Y., 2007, Proceedings - IEEE Military Communications Conference MILCOM. 4454897

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Throughput
Telecommunication links
Costs
48 Citations (Scopus)

Multi-user broadcast authentication in wireless sensor networks

Ren, K., Lou, W. & Zhang, Y., 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 223-232 10 p. 4292834

Research output: Chapter in Book/Report/Conference proceedingConference contribution

broadcast
Authentication
Wireless sensor networks
energy consumption
Sensor nodes
1 Citation (Scopus)

Securing resource-constrained wireless ad hoc networks

Fang, Y. & Zhang, Y., 2007, 2007 IEEE Sarnoff Symposium, SARNOFF. 4567365

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Internet
Wireless networks
resources
Network security