If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Parallel inclusive communication for connecting heterogeneous IoT devices at the edge

Chi, Z., Li, Y., Liu, X., Yao, Y., Zhang, Y. & Zhu, T., Nov 10 2019, SenSys 2019 - Proceedings of the 17th Conference on Embedded Networked Sensor Systems. Zhang, M. (ed.). Association for Computing Machinery, Inc, p. 205-218 14 p. (SenSys 2019 - Proceedings of the 17th Conference on Embedded Networked Sensor Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Protecting user privacy: An approach for untraceable web browsing history and unambiguous user profiles

Beigi, G., Guo, R., Nou, A., Zhang, Y. & Liu, H., Jan 30 2019, WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, p. 213-221 9 p. (WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Secure indoor positioning against signal strength attacks via optimized multi-voting

Li, Y., Hu, Y., Zhang, R., Zhang, Y. & Hedgpeth, T., Jun 24 2019, Proceedings of the International Symposium on Quality of Service, IWQoS 2019. Association for Computing Machinery, Inc, 33. (Proceedings of the International Symposium on Quality of Service, IWQoS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SocialDistance: How far are you from verified users in online social media?

Li, A., Li, T., Zhang, Y., Zhang, L. & Zhang, Y., Jun 24 2019, Proceedings of the International Symposium on Quality of Service, IWQoS 2019. Association for Computing Machinery, Inc, 40. (Proceedings of the International Symposium on Quality of Service, IWQoS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables

Zhang, L., Han, D., Li, A., Li, T., Zhang, Y. & Zhang, Y., Jun 2019, 2019 IEEE Conference on Communications and Network Security, CNS 2019. Institute of Electrical and Electronics Engineers Inc., p. 28-36 9 p. 8802715. (2019 IEEE Conference on Communications and Network Security, CNS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements

Chen, Y., Li, T., Zhang, R., Zhang, Y. & Hedgpeth, T., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-May. p. 144-160 17 p. 8418601

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Privacy-Preserving Social Media Data Outsourcing

Zhang, J., Sun, J., Zhang, R., Zhang, Y. & Hu, X., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1106-1114 9 p. 8486242

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Secure Crowdsourced Indoor Positioning Systems

Li, T., Chen, Y., Zhang, R., Zhang, Y. & Hedgpeth, T., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1034-1042 9 p. 8486398

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Secure RSS-fingerprint-based indoor positioning: Attacks and countermeasures

Yuan, L., Hu, Y., Li, Y., Zhang, R., Zhang, Y. & Hedgpeth, T., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433131

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Securing social media user data - An adversarial approach

Beigi, G., Shu, K., Zhang, Y. & Liu, H., Jul 3 2018, HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 165-173 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations
2017

POWERFUL: Mobile app fingerprinting via power analysis

Chen, Y., Jin, X., Sun, J., Zhang, R. & Zhang, Y., Oct 2 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8057232

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control

Li, T., Zhang, R. & Zhang, Y., Feb 21 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. Institute of Electrical and Electronics Engineers Inc., p. 333-341 9 p. 7860501

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Verifiable social data outsourcing

Yao, X., Zhang, R., Zhang, Y. & Lin, Y., Oct 2 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8057005

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Your face your heart: Secure mobile face authentication with photoplethysmograms

Chen, Y., Sun, J., Jin, X., Li, T., Zhang, R. & Zhang, Y., Oct 2 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8057220

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations
2016

A secure hierarchical deduplication system in cloud storage

Yao, X., Lin, Y., Liu, Q. & Zhang, Y., Oct 13 2016, 2016 IEEE/ACM 24th International Symposium on Quality of Service, IWQoS 2016. Institute of Electrical and Electronics Engineers Inc., 7590397. (2016 IEEE/ACM 24th International Symposium on Quality of Service, IWQoS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

iLock: Immediate and automatic locking of mobile devices against data theft

Li, T., Chen, Y., Sun, J., Jin, X. & Zhang, Y., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 933-944 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics

Sun, J., Zhang, R., Zhang, J. & Zhang, Y., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 7524461. (Proceedings - IEEE INFOCOM; vol. 2016-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Privacy-preserving crowdsourced spectrum sensing

Jin, X. & Zhang, Y., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 7524588. (Proceedings - IEEE INFOCOM; vol. 2016-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Scopus citations

Secure outsourced skyline query processing via untrusted cloud service providers

Chen, W., Liu, M., Zhang, R., Zhang, Y. & Liu, S., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524509

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Your age is no secret: Inferring microbloggers' ages via content and interaction analysis

Zhang, J., Hu, X., Zhang, Y. & Liu, H., 2016, Proceedings of the 10th International Conference on Web and Social Media, ICWSM 2016. AAAI Press, p. 476-485 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations
2015

A secure and privacy-preserving payment system for Electric vehicles

Zhao, T., Zhang, C., Wei, L. & Zhang, Y., Sep 9 2015, IEEE International Conference on Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-September. p. 7280-7285 6 p. 7249489

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

SafeDSA: Safeguard dynamic spectrum access against fake secondary users

Jin, X., Sun, J., Zhang, R. & Zhang, Y., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 304-315 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

SpecGuard: Spectrum misuse detection in dynamic spectrum access systems

Jin, X., Sun, J., Zhang, R., Zhang, Y. & Zhang, C., Aug 21 2015, 2015 IEEE Conference on Computer Communications, IEEE INFOCOM 2015. Institute of Electrical and Electronics Engineers Inc., p. 172-180 9 p. 7218380. (Proceedings - IEEE INFOCOM; vol. 26).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Your actions tell where you are: Uncovering Twitter users in a metropolitan area

Zhang, J., Sun, J., Zhang, R. & Zhang, Y., Dec 3 2015, 2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015. Institute of Electrical and Electronics Engineers Inc., p. 424-432 9 p. 7346854. (2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices

Chen, Y., Sun, J., Zhang, R. & Zhang, Y., Aug 21 2015, 2015 IEEE Conference on Computer Communications, IEEE INFOCOM 2015. Institute of Electrical and Electronics Engineers Inc., p. 2686-2694 9 p. 7218660. (Proceedings - IEEE INFOCOM; vol. 26).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Scopus citations
2014

SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks

Sun, J., Chen, X., Zhang, J., Zhang, Y. & Zhang, J., Jan 1 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 997-1005 9 p. 6848029. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

TouchIn: Sightless two-factor authentication on multi-touch mobile devices

Sun, J., Zhang, R., Zhang, J. & Zhang, Y., Dec 23 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 436-444 9 p. 6997513. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Scopus citations
2013

On the impact of social botnets for spam distribution and digital-influence manipulation

Zhang, J., Zhang, R., Zhang, Y. & Yan, G., Jan 1 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 46-54 9 p. 6682691. (2013 IEEE Conference on Communications and Network Security, CNS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations

Privacy-preserving spatiotemporal matching

Sun, J., Zhang, R. & Zhang, Y., Sep 2 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 800-808 9 p. 6566867. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Scopus citations

Secure crowdsourcing-based cooperative pectrum sensing

Zhang, R., Zhang, J., Zhang, Y. & Zhang, C., Sep 2 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 2526-2534 9 p. 6567059. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Scopus citations

Social spammer detection in microblogging

Hu, X., Tang, J., Zhang, Y. & Liu, H., Dec 1 2013, IJCAI 2013 - Proceedings of the 23rd International Joint Conference on Artificial Intelligence. p. 2633-2639 7 p. (IJCAI International Joint Conference on Artificial Intelligence).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

107 Scopus citations
2012

Fine-grained private matching for proximity-based mobile social networking

Zhang, R., Zhang, Y., Sun, J. & Yan, G., Jun 4 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1969-1977 9 p. 6195574. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

107 Scopus citations

Secure top-k query processing via untrusted location-based service providers

Zhang, R., Zhang, Y. & Zhang, C., Jun 4 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1170-1178 9 p. 6195476. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations
2011

Fast identification of the missing tags in a large RFID system

Zhang, R., Liu, Y., Zhang, Y. & Sun, J., Sep 20 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 277-286 10 p. 5984908. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

64 Scopus citations

JR-SND: Jamming-resilient secure neighbor discovery in mobile Ad Hoc networks

Zhang, R., Zhang, Y. & Huang, X., Aug 25 2011, Proceedings - 31st International Conference on Distributed Computing Systems, ICDCS 2011. p. 529-538 10 p. 5961707. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks

Zhang, R. & Zhang, Y., Aug 25 2011, Proceedings - 31st International Conference on Distributed Computing Systems, ICDCS 2011. p. 497-506 10 p. 5961704. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

SOI MESFETs for extreme environment buck regulators

Lepkowski, W., Goryll, M., Wilk, S. J., Zhang, Y., Sochacki, J. & Thornton, T., Dec 20 2011, IEEE International SOI Conference, SOI 2011. 6081696. (Proceedings - IEEE International SOI Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems

Shi, J., Zhang, R., Liu, Y. & Zhang, Y., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5462147. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

161 Scopus citations

Traffic inference in anonymous MANETs

Liu, Y., Zhang, R., Shi, J. & Zhang, Y., Aug 5 2010, SECON 2010 - 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 5508207. (SECON 2010 - 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Verifiable fine-grained top-k queries in tiered sensor networks

Zhang, R., Shi, J., Liu, Y. & Zhang, Y., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5461927. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Scopus citations

Wormhole-resilient secure neighbor discovery in underwater acoustic networks

Zhang, R. & Zhang, Y., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5462093. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Scopus citations
2009

An adaptive resource allocation scheme for GPRS/EDGE towards 3G

Zhang, Y. & Gao, Z., Dec 1 2009, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5303117. (Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Dependable and secure sensor data storage with dynamic integrity assurance

Wang, Q., Ren, K., Lou, W. & Zhang, Y., Oct 12 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 954-962 9 p. 5062006. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

67 Scopus citations

DP 2AC: Distributed privacy-preserving access control in sensor networks

Zhang, R., Zhang, Y. & Ren, K., Oct 12 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 1251-1259 9 p. 5062039. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

39 Scopus citations

Secure multidimensional range queries in sensor networks

Zhang, R., Shi, J. & Zhang, Y., Nov 27 2009, MobiHoc'09 - Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 197-206 10 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

43 Scopus citations

Secure range queries in tiered sensor networks

Shi, J., Zhang, R. & Zhang, Y., Oct 12 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 945-953 9 p. 5062005. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

73 Scopus citations
2008

Efficient user revocation for privacy-aware PKI

Ren, W., Ren, K., Lou, W. & Zhang, Y., Jan 1 2008, QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. Cao, J. & Ni, L. (eds.). ICST, (QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Opportunistic cooperation with receiver-based ratio combining strategy

Wang, Q., Ren, K., Zhang, Y. & Zhu, B., Dec 1 2008, Wireless Algorithms, Systems, and Applications - Third International Conference, WASA 2008, Proceedings. p. 361-372 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5258 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Towards address privacy in mobile ad hoc networks

Zhang, Y. & Ren, K., Jan 1 2008, QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. Cao, J. & Ni, L. (eds.). ICST, (QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards secure link quality measurement in multihop wireless networks

Zeng, K., Yu, S., Ren, K., Lou, W. & Zhang, Y., 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 4946-4950 5 p. 4698721. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations