default search action
Haojin Zhu
Person information
- affiliation: Shanghai Jiao Tong University, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b3]Shaofeng Li, Haojin Zhu, Wen Wu, Xuemin (Sherman) Shen:
Backdoor Attacks against Learning-Based Algorithms. Wireless Networks, Springer 2024, ISBN 978-3-031-57388-0, pp. 1-153 - [j83]Jiangzhou Wang, Yue Gao, Cheng Huang, Haojin Zhu:
Preface: Security and privacy for space-air-ground integrated networks. Secur. Saf. 3: 2024008 (2024) - [j82]Yan Meng, Jiachun Li, Haojin Zhu, Yuan Tian, Jiming Chen:
Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces. IEEE Trans. Dependable Secur. Comput. 21(4): 2900-2916 (2024) - [j81]Jiachun Li, Yan Meng, Yuxia Zhan, Le Zhang, Haojin Zhu:
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables. IEEE Trans. Inf. Forensics Secur. 19: 8892-8907 (2024) - [j80]Le Yu, Shufan Zhang, Yan Meng, Suguo Du, Yuling Chen, Yanli Ren, Haojin Zhu:
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability. IEEE Trans. Mob. Comput. 23(8): 8256-8273 (2024) - [j79]Yan Meng, Yuxia Zhan, Jiachun Li, Suguo Du, Haojin Zhu, Xuemin Shen:
De-Anonymizing Avatars in Virtual Reality: Attacks and Countermeasures. IEEE Trans. Mob. Comput. 23(12): 13342-13357 (2024) - [j78]Haoyang Wang, Kai Fan, Chong Yu, Kuan Zhang, Fenghua Li, Hui Li, Yintang Yang, Haojin Zhu:
LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing. IEEE Trans. Serv. Comput. 17(5): 2583-2596 (2024) - [c118]Yuxia Zhan, Yan Meng, Lu Zhou, Yichang Xiong, Xiaokuan Zhang, Lichuan Ma, Guoxing Chen, Qingqi Pei, Haojin Zhu:
VPVet: Vetting Privacy Policies of Virtual Reality Apps. CCS 2024: 1746-1760 - [c117]Tong Zhu, Chaofan Shou, Zhen Huang, Guoxing Chen, Xiaokuan Zhang, Yan Meng, Shuang Hao, Haojin Zhu:
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications. CCS 2024: 2963-2977 - [c116]Fazhong Liu, Yan Meng, Tian Dong, Guoxing Chen, Haojin Zhu:
Detection and Attribution of Diffusion Model of Character Animation Based on Spatio-Temporal Attention. LAMPS@CCS 2024: 105-108 - [c115]Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. NDSS 2024 - [c114]Shaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen:
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection. USENIX Security Symposium 2024 - [c113]Hongliang Yong, Le Yu, Tian Dong, Yan Meng, Guoxing Chen, Haojin Zhu:
DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification. WASA (2) 2024: 439-451 - [i15]Yuxia Zhan, Yan Meng, Lu Zhou, Yichang Xiong, Xiaokuan Zhang, Lichuan Ma, Guoxing Chen, Qingqi Pei, Haojin Zhu:
VPVet: Vetting Privacy Policies of Virtual Reality Apps. CoRR abs/2409.00740 (2024) - 2023
- [b2]Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen:
Security in Smart Home Networks. Wireless Networks, Springer 2023, ISBN 978-3-031-24184-0, pp. 1-166 - [j77]Jiachun Li, Weijiong Zhang, Yan Meng, Shaofeng Li, Lichuan Ma, Zhen Liu, Haojin Zhu:
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network. IEEE Trans. Veh. Technol. 72(8): 10682-10695 (2023) - [c112]Yan Meng, Haojin Zhu:
Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home. ACM TUR-C 2023: 150-151 - [c111]Hui Liu, Hongzhi Luo, Shaofeng Li, Tian Dong, Guoxing Chen, Yan Meng, Haojin Zhu:
Privacy Computing with Right to Be Forgotten in Trusted Execution Environment. GLOBECOM 2023: 2566-2571 - [c110]Yichi Zhang, Guoxing Chen, Yan Meng, Haojin Zhu:
Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps. GLOBECOM 2023: 6705-6710 - [c109]Shaofeng Li, Wen Wu, Yan Meng, Jiachun Li, Haojin Zhu, Xuemin Sherman Shen:
Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks. ICC 2023: 13-18 - [c108]Jiachun Li, Yan Meng, Le Zhang, Fazhong Liu, Haojin Zhu:
EM-Whisperer: A Voice Injection Attack via Powerline for Virtual Meeting Scenarios. ICCC 2023: 1-6 - [c107]Yan Meng, Jiachun Li, Fazhong Liu, Shaofeng Li, Haotian Hu, Haojin Zhu:
GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis. ICCC 2023: 1-6 - [c106]Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, Haojin Zhu, Xuemin Sherman Shen:
MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging. INFOCOM 2023: 1-10 - [c105]Yan Meng, Yuxia Zhan, Jiachun Li, Suguo Du, Haojin Zhu, Xuemin Sherman Shen:
De-anonymization Attacks on Metaverse. INFOCOM 2023: 1-10 - [c104]Yuxia Zhan, Yan Meng, Lu Zhou, Haojin Zhu:
Vetting Privacy Policies in VR: A Data Minimization Principle Perspective. INFOCOM Workshops 2023: 1-2 - [c103]Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu:
RAI2: Responsible Identity Audit Governing the Artificial Intelligence. NDSS 2023 - [c102]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors. ESEC/SIGSOFT FSE 2023: 1573-1585 - [c101]Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu:
POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices. USENIX Security Symposium 2023: 1073-1090 - [d2]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 1. Zenodo, 2023 [all versions] - [d1]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 2. Zenodo, 2023 [all versions] - [i14]Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. CoRR abs/2309.08230 (2023) - [i13]Tian Dong, Guoxing Chen, Shaofeng Li, Minhui Xue, Rayne Holland, Yan Meng, Zhen Liu, Haojin Zhu:
Unleashing Cheapfakes through Trojan Plugins of Large Language Models. CoRR abs/2312.00374 (2023) - 2022
- [j76]Shaofeng Li, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Suguo Du, Haojin Zhu:
Backdoors Against Natural Language Processing: A Review. IEEE Secur. Priv. 20(5): 50-59 (2022) - [j75]Zhuo Chang, Yan Meng, Wenyuan Liu, Haojin Zhu, Lin Wang:
WiCapose: Multi-modal fusion based transparent authentication in mobile environments. J. Inf. Secur. Appl. 66: 103130 (2022) - [j74]Jiachun Li, Yan Meng, Lichuan Ma, Suguo Du, Haojin Zhu, Qingqi Pei, Xuemin Shen:
A Federated Learning Based Privacy-Preserving Smart Healthcare System. IEEE Trans. Ind. Informatics 18(3): 2021-2031 (2022) - [j73]Edwin Yang, Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
Wireless Training-Free Keystroke Inference Attack and Defense. IEEE/ACM Trans. Netw. 30(4): 1733-1748 (2022) - [c100]Zirui Peng, Shaofeng Li, Guoxing Chen, Cheng Zhang, Haojin Zhu, Minhui Xue:
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations. CVPR 2022: 13420-13429 - [c99]Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. ESORICS (1) 2022: 89-109 - [c98]Zhaoyu Gao, Ahmad Sepahi, Shahrooz Pouryousef, Lu Zhou, Haojin Zhu:
Tradeoff between Privacy and Utility for Location-based Recommendation Services. ICC 2022: 4396-4401 - [c97]Le Yu, Shufan Zhang, Lu Zhou, Yan Meng, Suguo Du, Haojin Zhu:
Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing. ICDCS 2022: 470-480 - [c96]Wenbin Huang, Wenjuan Tang, Kuan Zhang, Haojin Zhu, Yaoxue Zhang:
Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems. INFOCOM 2022: 31-40 - [c95]Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian:
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers. USENIX Security Symposium 2022: 1077-1094 - [i12]Zirui Peng, Shaofeng Li, Guoxing Chen, Cheng Zhang, Haojin Zhu, Minhui Xue:
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations. CoRR abs/2202.08602 (2022) - [i11]Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. IACR Cryptol. ePrint Arch. 2022: 627 (2022) - 2021
- [j72]Jing Xu, Kai Xing, Chi Zhang, Shuo Zhang, Zhonghu Xu, Chunlin Zhong, Haojin Zhu, Zheng Yang, Yunhao Liu:
Collective Memory for Detecting Nonconcurrent Clones: A Localized Approach for Global Topology and Identity Tracing in IoT Networks. IEEE Internet Things J. 8(7): 5762-5777 (2021) - [j71]Lichuan Ma, Qingqi Pei, Lu Zhou, Haojin Zhu, Licheng Wang, Yusheng Ji:
Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence. IEEE Internet Things J. 8(8): 6757-6770 (2021) - [j70]Yiting Qu, Suguo Du, Shaofeng Li, Yan Meng, Le Zhang, Haojin Zhu:
Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications. IEEE Internet Things J. 8(9): 7394-7406 (2021) - [j69]Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan, David S. L. Wei:
Advances in privacy-preserving computing. Peer-to-Peer Netw. Appl. 14(3): 1348-1352 (2021) - [j68]Pengyu Wang, Jing Wang, Chao Li, Jianzong Wang, Haojin Zhu, Minyi Guo:
Grus: Toward Unified-memory-efficient High-performance Graph Processing on GPU. ACM Trans. Archit. Code Optim. 18(2): 22:1-22:25 (2021) - [j67]Shaofeng Li, Minhui Xue, Benjamin Zi Hao Zhao, Haojin Zhu, Xinpeng Zhang:
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization. IEEE Trans. Dependable Secur. Comput. 18(5): 2088-2105 (2021) - [j66]Yan Meng, Haojin Zhu, Jinlei Li, Jin Li, Yao Liu:
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment. IEEE Trans. Dependable Secur. Comput. 18(6): 2996-3011 (2021) - [c94]Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. CCS 2021: 271-286 - [c93]Suibin Sun, Le Yu, Xiaokuan Zhang, Minhui Xue, Ren Zhou, Haojin Zhu, Shuang Hao, Xiaodong Lin:
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic. CCS 2021: 287-303 - [c92]Brandon Falk, Yan Meng, Yuxia Zhan, Haojin Zhu:
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures. CCS 2021: 2405-2407 - [c91]Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu:
Hidden Backdoors in Human-Centric Language Models. CCS 2021: 3123-3140 - [c90]Youqun Li, Yichi Zhang, Haojin Zhu, Suguo Du:
Toward Automatically Generating Privacy Policy for Smart Home Apps. INFOCOM Workshops 2021: 1-7 - [c89]Binhan Xi, Shaofeng Li, Jiachun Li, Hui Liu, Hong Liu, Haojin Zhu:
BatFL: Backdoor Detection on Federated Learning in e-Health. IWQoS 2021: 1-10 - [i10]Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu:
Hidden Backdoors in Human-Centric Language Models. CoRR abs/2105.00164 (2021) - [i9]Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. CoRR abs/2105.11103 (2021) - [i8]Wei Wang, Ruoxi Sun, Tian Dong, Shaofeng Li, Minhui Xue, Gareth Tyson, Haojin Zhu:
Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks. CoRR abs/2111.10085 (2021) - 2020
- [j65]Lin Wang, Haonan An, Haojin Zhu, Wenyuan Liu:
MobiKey: Mobility-Based Secret Key Generation in Smart Home. IEEE Internet Things J. 7(8): 7590-7600 (2020) - [j64]Yaping Liu, Shuo Zhang, Haojin Zhu, Peng-Jun Wan, Lixin Gao, Yaoxue Zhang, Zhihong Tian:
A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks. J. Parallel Distributed Comput. 142: 77-89 (2020) - [j63]Huaxin Li, Qingrong Chen, Haojin Zhu, Di Ma, Hong Wen, Xuemin Sherman Shen:
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks. IEEE Trans. Dependable Secur. Comput. 17(2): 350-362 (2020) - [j62]Yan Meng, Jinlei Li, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan:
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures. IEEE Trans. Mob. Comput. 19(2): 432-449 (2020) - [c88]Jinlei Li, Yan Meng, Lu Zhou, Haojin Zhu:
Securing App Behaviors in Smart Home: A Human-App Interaction Perspective. ICPADS 2020: 308-315 - [c87]Lei Zhang, Yan Meng, Jiahao Yu, Chong Xiang, Brandon Falk, Haojin Zhu:
Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home. INFOCOM 2020: 377-386 - [c86]Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu:
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications. USENIX Security Symposium 2020: 2415-2432
2010 – 2019
- 2019
- [j61]Sijia Yang, Jiang Bian, Licheng Wang, Haojin Zhu, Yanjie Fu, Haoyi Xiong:
EdgeSense: Edge-Mediated Spatial- Temporal Crowdsensing. IEEE Access 7: 1495122-95131 (2019) - [j60]Zhushou Tang, Minhui Xue, Guozhu Meng, Chengguo Ying, Yugeng Liu, Jianan He, Haojin Zhu, Yang Liu:
Securing android applications via edge assistant third-party library detection. Comput. Secur. 80: 257-272 (2019) - [j59]Lu Zhou, Le Yu, Suguo Du, Haojin Zhu, Cailian Chen:
Achieving Differentially Private Location Privacy in Edge-Assistant Connected Vehicles. IEEE Internet Things J. 6(3): 4472-4481 (2019) - [j58]Licheng Wang, Yan Meng, Haojin Zhu, Minxing Tang, Kaoru Ota:
Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT. IEEE Internet Things J. 6(4): 7282-7292 (2019) - [j57]Erdong Deng, Huajun Zhang, Peilin Wu, Fei Guo, Zhen Liu, Haojin Zhu, Zhenfu Cao:
Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing. Inf. Sci. 504: 354-371 (2019) - [j56]Huajun Zhang, Erdong Deng, Haojin Zhu, Zhenfu Cao:
Smart contract for secure billing in ride-hailing service via blockchain. Peer-to-Peer Netw. Appl. 12(5): 1346-1357 (2019) - [j55]Lu Zhou, Suguo Du, Haojin Zhu, Cailian Chen, Kaoru Ota, Mianxiong Dong:
Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures. IEEE Trans. Inf. Forensics Secur. 14(1): 196-211 (2019) - [j54]Mohammad Hadian, Thamer Altuwaiyan, Xiaohui Liang, Haojin Zhu:
Privacy-Preserving Task Scheduling for Time-Sharing Services of Autonomous Vehicles. IEEE Trans. Veh. Technol. 68(6): 5260-5270 (2019) - [j53]Fei Guo, Zichang Wang, Suguo Du, Huaxin Li, Haojin Zhu, Qingqi Pei, Zhenfu Cao, Jianhong Zhao:
Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic. IEEE Trans. Veh. Technol. 68(6): 5618-5628 (2019) - [c85]Peilin Wu, Jinlei Li, Yan Meng, Haojin Zhu:
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts. IEEE BigData 2019: 5937-5944 - [c84]Jie Li, Lu Zhou, Huaxin Li, Lu Yan, Haojin Zhu:
Dynamic Traffic Feature Camouflaging via Generative Adversarial Networks. CNS 2019: 268-276 - [c83]Chong Xiang, Xinyu Wang, Qingrong Chen, Minhui Xue, Zhaoyu Gao, Haojin Zhu, Cailian Chen, Qiuhua Fan:
No-jump-into-latency in China's internet!: toward last-mile hop count based IP geo-localization. IWQoS 2019: 42:1-42:10 - [c82]Yaping Liu, Shuo Zhang, Haojin Zhu, Peng-Jun Wan, Lixin Gao, Yaoxue Zhang:
An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain. SecureComm (1) 2019: 63-82 - [c81]Matthew Joslin, Neng Li, Shuang Hao, Minhui Xue, Haojin Zhu:
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions. IEEE Symposium on Security and Privacy 2019: 1311-1325 - [c80]Cheng Chang, Huaxin Li, Yichi Zhang, Suguo Du, Hui Cao, Haojin Zhu:
Automated and Personalized Privacy Policy Extraction Under GDPR Consideration. WASA 2019: 43-54 - [c79]Qiwei Jia, Lu Zhou, Huaxin Li, Ruoxu Yang, Suguo Du, Haojin Zhu:
Who Leaks My Privacy: Towards Automatic and Association Detection with GDPR Compliance. WASA 2019: 137-148 - [i7]Shaofeng Li, Benjamin Zi Hao Zhao, Jiahao Yu, Minhui Xue, Dali Kaafar, Haojin Zhu:
Invisible Backdoor Attacks Against Deep Neural Networks. CoRR abs/1909.02742 (2019) - 2018
- [j52]Suguo Du, Xiaolong Li, Jinli Zhong, Lu Zhou, Minhui Xue, Haojin Zhu, Limin Sun:
Modeling Privacy Leakage Risks in Large-Scale Social Networks. IEEE Access 6: 17653-17665 (2018) - [j51]Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li:
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. Comput. Secur. 73: 326-344 (2018) - [j50]Huaxin Li, Haojin Zhu, Suguo Du, Xiaohui Liang, Xuemin Sherman Shen:
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense. IEEE Trans. Dependable Secur. Comput. 15(4): 646-660 (2018) - [j49]Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu:
Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices. IEEE Trans. Inf. Forensics Secur. 13(3): 802-817 (2018) - [j48]Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu:
Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817]. IEEE Trans. Inf. Forensics Secur. 13(6): 1595 (2018) - [j47]Huaxin Li, Haojin Zhu, Di Ma:
Demographic Information Inference through Meta-Data Analysis of Wi-Fi Traffic. IEEE Trans. Mob. Comput. 17(5): 1033-1047 (2018) - [j46]Lichuan Ma, Yong Xiang, Qingqi Pei, Yang Xiang, Haojin Zhu:
Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel. IEEE Trans. Veh. Technol. 67(5): 3950-3963 (2018) - [j45]Yan Meng, Wei Zhang, Haojin Zhu, Xuemin Sherman Shen:
Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures. IEEE Wirel. Commun. 25(6): 53-59 (2018) - [c78]Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu:
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. CCS 2018: 1074-1088 - [c77]Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing. CCS 2018: 1747-1760 - [c76]Zichang Wang, Fei Guo, Yan Meng, Huaxin Li, Haojin Zhu, Zhenfu Cao:
Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism. GLOBECOM 2018: 1-7 - [c75]Chong Xiang, Qingrong Chen, Minhui Xue, Haojin Zhu:
APPCLASSIFIER: Automated App Inference on Encrypted Traffic via Meta Data Analysis. GLOBECOM 2018: 1-7 - [c74]Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, Yao Liu:
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment. MobiHoc 2018: 81-90 - [c73]Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross:
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. NDSS 2018 - [i6]Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaafar, Haojin Zhu:
Differentially Private Data Generative Models. CoRR abs/1812.02274 (2018) - 2017
- [j44]Na Ruan, Mingli Wu, Shiheng Ma, Haojin Zhu, Weijia Jia, Songyang Wu:
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design. IEICE Trans. Inf. Syst. 100-D(10): 2287-2294 (2017) - [j43]Mengyuan Li, Na Ruan, Qiyang Qian, Haojin Zhu, Xiaohui Liang, Le Yu:
SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud. IEEE Internet Things J. 4(2): 583-591 (2017) - [j42]Haojin Zhu, Kuai Xu, Xiang Lu:
Guest editorial: Special issue on algorithms, systems and applications in mobile social networks. Peer-to-Peer Netw. Appl. 10(2): 293-295 (2017) - [j41]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme with CS E-Ticket. Secur. Commun. Networks 2017: 4796373:1-4796373:9 (2017) - [j40]Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu, Tao Wang:
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks. IEEE Trans. Mob. Comput. 16(2): 566-580 (2017) - [c72]Huaxin Li, Qingrong Chen, Haojin Zhu, Di Ma:
Hybrid de-anonymization across real-world heterogeneous social networks. ACM TUR-C 2017: 33:1-33:7 - [c71]Jiafa Liu, Di Ma, André Weimerskirch, Haojin Zhu:
A Functional Co-Design towards Safe and Secure Vehicle Platooning. CPSS@AsiaCCS 2017: 81-90 - [c70]Haizhong Zheng, Neng Li, Minhui Xue, Suguo Du, Haojin Zhu:
Fake reviews tell no tales? Dissecting click farming in content-generated social networks. ICCC 2017: 1-6 - [c69]Lu Zhou, Qingrong Chen, Zutian Luo, Haojin Zhu, Cailian Chen:
Speed-Based Location Tracking in Usage-Based Automotive Insurance. ICDCS 2017: 2252-2257 - [c68]Wenyan Yao, Na Ruan, Feifan Yu, Weijia Jia, Haojin Zhu:
Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy. SECON 2017: 1-9 - [c67]Jinli Zhong, Suguo Du, Lu Zhou, Haojin Zhu, Fan Cheng, Cailian Chen, Qingshui Xue:
Security Modeling and Analysis on Intra Vehicular Network. VTC Fall 2017: 1-5 - [c66]Mingli Wu, Na Ruan, Shiheng Ma, Haojin Zhu, Weijia Jia, Qingshui Xue, Songyang Wu:
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter. WASA 2017: 124-135 - [i5]Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu:
Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach. CoRR abs/1706.04146 (2017) - [i4]Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross:
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. CoRR abs/1709.06916 (2017) - 2016
- [j39]Yi Li, Lu Zhou, Haojin Zhu, Limin Sun:
Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks. IEEE Internet Things J. 3(4): 563-571 (2016) - [j38]Haojin Zhu, Chenliaohui Fang, Yao Liu, Cailian Chen, Mengyuan Li, Xuemin Sherman Shen:
You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing. IEEE J. Sel. Areas Commun. 34(10): 2723-2737 (2016) - [j37]Weiwei Jia, Haojin Zhu, Suguo Du, Xiaolei Dong, Zhenfu Cao:
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks. Secur. Commun. Networks 9(13): 1905-1915 (2016) - [j36]Xiuzhen Cheng, Miroslaw Kutylowski, Kuai Xu, Haojin Zhu:
Cyber security, crime, and forensics of wireless networks and applications. Secur. Commun. Networks 9(16): 3763-3764 (2016) - [c65]Sen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, Haojin Zhu:
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware. AsiaCCS 2016: 377-388 - [c64]Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan:
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. CCS 2016: 1068-1079 - [c63]Lingling Fan, Minhui Xue, Sen Chen, Lihua Xu, Haojin Zhu:
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning. CCS 2016: 1748-1750 - [c62]Jiafa Liu, Junyi Liu, Huaxin Li, Haojin Zhu, Na Ruan, Di Ma:
Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network. GLOBECOM 2016: 1-6 - [c61]Na Ruan, Qi Hu, Lei Gao, Haojin Zhu, Qingshui Xue, Weijia Jia, Jingyu Cui:
A Traffic Based Lightweight Attack Detection Scheme for VoLTE. GLOBECOM 2016: 1-6 - [c60]Lei Gao, Na Ruan, Haojin Zhu:
Efficient and secure message authentication in cooperative driving: A game-theoretic approach. ICC 2016: 1-6 - [c59]Na Ruan, Lei Gao, Haojin Zhu, Weijia Jia, Xiang Li, Qi Hu:
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game. ICDCS 2016: 364-373 - [c58]Huaxin Li, Zheyu Xu, Haojin Zhu, Di Ma, Shuai Li, Kai Xing:
Demographics inference through Wi-Fi network traffic analysis. INFOCOM 2016: 1-9 - [c57]Shen Zhang, Lu Zhou, Mingli Wu, Zhushou Tang, Na Ruan, Haojin Zhu:
Automatic Detection of SIP-Aware Attacks on VoLTE Device. VTC Fall 2016: 1-5 - [c56]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme for Mobile Payment. WASA 2016: 116-125 - 2015
- [j35]Zhou Su, Qichao Xu, Haojin Zhu, Ying Wang:
A novel design for content delivery over software defined mobile social networks. IEEE Netw. 29(4): 62-67 (2015) - [j34]Hongwei Li, Haojin Zhu, Bong Jun Choi:
Guest editorial: Security and privacy of P2P networks in emerging smart city. Peer-to-Peer Netw. Appl. 8(6): 1023-1024 (2015) - [j33]Haojin Zhu, Kuand-Hao Liu, Wenbo He, Kaoru Ota:
Quality of experience and quality of protection provisions in emerging mobile networks [Guest Editorial]. IEEE Wirel. Commun. 22(4): 8-9 (2015) - [c55]Long Zhang, Chenliaohui Fang, Yi Li, Haojin Zhu, Mianxiong Dong:
Optimal strategies for defending location inference attack in database-driven CRNs. ICC 2015: 7640-7645 - [c54]Bett Ben Chirchir, Xiaokuan Zhang, Mengyuan Li, Qiyang Qian, Na Ruan, Haojin Zhu:
SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices. ICCC 2015: 1-6 - [c53]Shuying Lai, Huaxin Li, Haojin Zhu, Na Ruan:
De-anonymizing social networks: Using user interest as a side-channel. ICCC 2015: 1-5 - [c52]Yi Li, Lu Zhou, Haojin Zhu, Limin Sun:
Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks. WASA 2015: 345-355 - [e1]Kuai Xu, Haojin Zhu:
Wireless Algorithms, Systems, and Applications - 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings. Lecture Notes in Computer Science 9204, Springer 2015, ISBN 978-3-319-21836-6 [contents] - 2014
- [j32]Mianxiong Dong, He Li, Kaoru Ota, Laurence T. Yang, Haojin Zhu:
Multicloud-Based Evacuation Services for Emergency Management. IEEE Cloud Comput. 1(4): 50-59 (2014) - [j31]Mianxiong Dong, Kaoru Ota, He Li, Suguo Du, Haojin Zhu, Song Guo:
RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks. Computing 96(10): 995-1010 (2014) - [j30]Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, Athanasios V. Vasilakos:
Security and privacy for storage and computation in cloud computing. Inf. Sci. 258: 371-386 (2014) - [j29]Zongyang Zhang, Zhenfu Cao, Haojin Zhu:
Constant-round adaptive zero-knowledge proofs for NP. Inf. Sci. 261: 219-236 (2014) - [j28]Suguo Du, Xiaolong Li, Junbo Du, Haojin Zhu:
An attack-and-defence game for security assessment in vehicular ad hoc networks. Peer-to-Peer Netw. Appl. 7(3): 215-228 (2014) - [j27]Weiwei Jia, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Chengxin Xiao:
Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid. IEEE Syst. J. 8(2): 598-607 (2014) - [j26]Mianxiong Dong, Kaoru Ota, Man Lin, Zunyi Tang, Suguo Du, Haojin Zhu:
UAV-assisted data gathering in wireless sensor networks. J. Supercomput. 70(3): 1142-1155 (2014) - [j25]Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong Dong, Zhenfu Cao:
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks. IEEE Trans. Parallel Distributed Syst. 25(1): 22-32 (2014) - [c51]Qiuyu Xiao, Jiayi Chen, Le Yu, Huaxin Li, Haojin Zhu, Muyuan Li, Kui Ren:
POSTER: LocMask: A Location Privacy Protection Framework in Android System. CCS 2014: 1526-1528 - [c50]Yabin Ping, Zhenfu Cao, Haojin Zhu:
Sybil-aware least cost rumor blocking in social networks. GLOBECOM 2014: 692-697 - [c49]Xiaokuan Zhang, Haizhong Zheng, Xiaolong Li, Suguo Du, Haojin Zhu:
You are where you have been: Sybil detection via geo-location analysis in OSNs. GLOBECOM 2014: 698-703 - [c48]Mianxiong Dong, He Li, Kaoru Ota, Haojin Zhu:
HVSTO: Efficient privacy preserving hybrid storage in cloud data center. INFOCOM Workshops 2014: 529-534 - [c47]Pengfei Hu, Kai Xing, Xiuzhen Cheng, Hao Wei, Haojin Zhu:
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks. INFOCOM 2014: 1258-1266 - [c46]Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng:
Achieving privacy preservation in WiFi fingerprint-based localization. INFOCOM 2014: 2337-2345 - [c45]Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu:
Where are you from?: confusing location distinction using virtual multipath camouflage. MobiCom 2014: 225-236 - [c44]Muyuan Li, Haojin Zhu, Zhaoyu Gao, Si Chen, Le Yu, Shangqian Hu, Kui Ren:
All your location are belong to us: breaking mobile social networks for automated user location tracking. MobiHoc 2014: 43-52 - [c43]Mengyuan Li, Na Ruan, Haojin Zhu, Jie Li, Xiang Li:
A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles. MSN 2014: 58-65 - [i3]Mianxiong Dong, He Li, Kaoru Ota, Haojin Zhu:
HVSTO: Efficient Privacy Preserving Hybrid Storage in Cloud Data Center. CoRR abs/1405.6200 (2014) - 2013
- [b1]Suguo Du, Haojin Zhu:
Security Assessment in Vehicular Networks. Springer Briefs in Computer Science, Springer 2013, ISBN 978-1-4614-9356-3, pp. i-xi, 1-49 - [j24]Lifei Wei, Haojin Zhu, Zhenfu Cao, Xuemin (Sherman) Shen:
SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs. Ad Hoc Sens. Wirel. Networks 19(1-2): 95-118 (2013) - [j23]Suguo Du, Peng Tian, Kaoru Ota, Haojin Zhu:
A Secure and Efficient Data Aggregation Framework in Vehicular Sensing Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j22]Kui Ren, Haojin Zhu, Zhu Han, Radha Poovendran:
Security in cognitive radio networks [Guest Editorial]. IEEE Netw. 27(3): 2 (2013) - [j21]Haojin Zhu, Suguo Du, Muyuan Li, Zhaoyu Gao:
Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks. IEEE Trans. Emerg. Top. Comput. 1(1): 192-200 (2013) - [j20]Suguo Du, Haojin Zhu, Xiaolong Li, Kaoru Ota, Mianxiong Dong:
MixZone in Motion: Achieving Dynamically Cooperative Location Privacy Protection in Delay-Tolerant Networks. IEEE Trans. Veh. Technol. 62(9): 4565-4575 (2013) - [c42]Siyuan Ma, Zhushou Tang, Qiuyu Xiao, Jiafa Liu, Tran Triet Duong, Xiaodong Lin, Haojin Zhu:
Detecting GPS information leakage in Android applications. GLOBECOM 2013: 826-831 - [c41]Mianxiong Dong, Kaoru Ota, Suguo Du, Haojin Zhu, Song Guo:
ANTS: Pushing the rapid event notification in wireless sensor and actor networks. iCAST/UMEDIA 2013: 753-758 - [c40]Sheng Liu, Haojin Zhu, Rong Du, Cailian Chen, Xinping Guan:
Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio Network. ICDCS 2013: 256-265 - [c39]Emmanuel Alphonce Massawe, Suguo Du, Haojin Zhu:
A Scalable and Privacy-Preserving Named Data Networking Architecture Based on Bloom Filters. ICDCS Workshops 2013: 22-26 - [c38]Kai Xing, Shuo Zhang, Lei Shi, Haojin Zhu, Yuepeng Wang:
A localized backbone renovating algorithm for wireless ad hoc and sensor networks. INFOCOM 2013: 2184-2192 - [c37]Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Kai Xing:
YouSense: Mitigating entropy selfishness in distributed collaborative spectrum sensing. INFOCOM 2013: 2535-2543 - [c36]Zhaoyu Gao, Haojin Zhu, Yao Liu, Muyuan Li, Zhenfu Cao:
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures. INFOCOM 2013: 2751-2759 - [c35]Kai Xing, Zhiguo Wan, Pengfei Hu, Haojin Zhu, Yuepeng Wang, Xi Chen, Yang Wang, Liusheng Huang:
Mutual privacy-preserving regression modeling in participatory sensing. INFOCOM 2013: 3039-3047 - [i2]Muyuan Li, Haojin Zhu, Zhaoyu Gao, Si Chen, Kui Ren, Le Yu, Shangqian Hu:
All Your Location are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking. CoRR abs/1310.2547 (2013) - 2012
- [j19]Xu Li, Xiaohui Liang, Rongxing Lu, Xuemin Shen, Xiaodong Lin, Haojin Zhu:
Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun. Mag. 50(8): 38-45 (2012) - [j18]Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xiaohui Liang, Xuemin (Sherman) Shen:
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(1): 32-43 (2012) - [j17]Zhaoyu Gao, Haojin Zhu, Shuai Li, Suguo Du, Xu Li:
Security and privacy of collaborative spectrum sensing in cognitive radio networks. IEEE Wirel. Commun. 19(6): 106-112 (2012) - [c34]Zhaoyu Gao, Haojin Zhu, Yao Liu, Muyuan Li, Zhenfu Cao:
Location privacy leaking from spectrum utilization information in database-driven cognitive radio network. CCS 2012: 1025-1027 - [c33]Sheng Liu, Haojin Zhu, Shuai Li, Xu Li, Cailian Chen, Xinping Guan:
An Adaptive Deviation-tolerant Secure Scheme for distributed cooperative spectrum sensing. GLOBECOM 2012: 603-608 - [c32]Muyuan Li, Zhaoyu Gao, Suguo Du, Haojin Zhu, Mianxiong Dong, Kaoru Ota:
PriMatch: Fairness-aware secure friend discovery protocol in mobile social network. GLOBECOM 2012: 738-743 - [c31]Yiyong Sun, Zhaoyu Gao, Suguo Du, Shuai Li, Haojin Zhu, Xiaodong Lin:
Towards addressing group selfishness of cluster-based collaborative spectrum sensing in cognitive radio networks. GLOBECOM 2012: 4933-4938 - [c30]Shuai Li, Haojin Zhu, Bo Yang, Cailian Chen, Xinping Guan, Xiaodong Lin:
Towards a game theoretical modeling of rational collaborative spectrum sensing in Cognitive Radio networks. ICC 2012: 88-92 - [c29]Zhaoyu Gao, Haojin Zhu, Suguo Du, Chengxin Xiao, Rongxing Lu:
PMDS: A probabilistic misbehavior detection scheme in DTN. ICC 2012: 4970-4974 - [c28]Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Kai Xing, Xuemin Shen:
Location privacy preservation in collaborative spectrum sensing. INFOCOM 2012: 729-737 - [c27]Chengxin Xiao, Weiwei Jia, Haojin Zhu, Suguo Du, Zhenfu Cao:
Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks. WASA 2012: 733-744 - 2011
- [j16]Xiaolei Dong, Lifei Wei, Haojin Zhu, Zhenfu Cao, Licheng Wang:
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 60(2): 580-591 (2011) - [j15]Yanfei Fan, Yixin Jiang, Haojin Zhu, Jiming Chen, Xuemin (Sherman) Shen:
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks. IEEE Trans. Wirel. Commun. 10(3): 834-843 (2011) - [c26]Lifei Wei, Haojin Zhu, Zhenfu Cao, Xuemin (Sherman) Shen:
MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks. ADHOC-NOW 2011: 177-190 - [c25]Huang Lin, Zhenfu Cao, Yuguang Fang, Muxin Zhou, Haojin Zhu:
How to design space efficient revocable IBE from non-monotonic ABE. AsiaCCS 2011: 381-385 - [c24]Lifei Wei, Zhenfu Cao, Haojin Zhu:
MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks. GLOBECOM 2011: 1-5 - [c23]Shuai Li, Haojin Zhu, Bo Yang, Cailian Chen, Xinping Guan:
Believe Yourself: A User-Centric Misbehavior Detection Scheme for Secure Collaborative Spectrum Sensing. ICC 2011: 1-5 - [c22]Dandan Ren, Suguo Du, Haojin Zhu:
A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs. ICC 2011: 1-5 - [c21]Pengcheng Wang, Zhaoyu Gao, Xinhui Xu, Yujiao Zhou, Haojin Zhu, Kenny Qili Zhu:
Automatic inference of movements from contact histories. SIGCOMM 2011: 386-387 - [p1]Haojin Zhu, Xiaodong Lin, Rongxing Lu, Yanfei Fan, Xuemin Shen:
A Routing-Compatible Credit-Based Incentive Scheme for DTNs. Delay Tolerant Networks 2011: 101-126 - [i1]Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan:
Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing. CoRR abs/1111.5080 (2011) - 2010
- [j14]Yixin Jiang, Haojin Zhu, Minghui Shi, Xuemin (Sherman) Shen, Chuang Lin:
An efficient dynamic-identity based signature scheme for secure network coding. Comput. Networks 54(1): 28-40 (2010) - [j13]Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin Shen:
An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications. IEEE Trans. Veh. Technol. 59(6): 2772-2785 (2010) - [j12]Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen:
PIE: cooperative peer-to-peer information exchange in network coding enabled wireless networks. IEEE Trans. Wirel. Commun. 9(3): 945-950 (2010) - [j11]Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin Shen, Bruno R. Preiss:
Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. Wirel. Commun. 9(4): 1483-1493 (2010) - [c20]Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing:
How to Construct Interval Encryption from Binary Tree Encryption. ACNS 2010: 19-34 - [c19]Qi Han, Suguo Du, Dandan Ren, Haojin Zhu:
SAS: A Secure Data Aggregation Scheme in Vehicular Sensing Networks. ICC 2010: 1-5 - [c18]Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin Shen:
TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks. ICC 2010: 1-6 - [c17]Lifei Wei, Haojin Zhu, Zhenfu Cao, Weiwei Jia, Athanasios V. Vasilakos:
SecCloud: Bridging Secure Storage and Computation in Cloud. ICDCS Workshops 2010: 52-61 - [c16]Haojin Zhu, Xiaodong Lin, Rongxing Lu, Xuemin Shen, Dongsheng Xing, Zhenfu Cao:
An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. INFOCOM 2010: 605-613
2000 – 2009
- 2009
- [j10]Rongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen:
A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy. IEEE Trans. Veh. Technol. 58(3): 1454-1466 (2009) - [j9]Haojin Zhu, Xiaodong Lin, Minghui Shi, Pin-Han Ho, Xuemin Shen:
PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks. IEEE Trans. Veh. Technol. 58(5): 2529-2543 (2009) - [j8]Haojin Zhu, Xiaodong Lin, Rongxing Lu, Yanfei Fan, Xuemin Shen:
SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks. IEEE Trans. Veh. Technol. 58(8): 4628-4639 (2009) - [j7]Haojin Zhu, Rongxing Lu, Xuemin Shen, Xiaodong Lin:
Security in service-oriented vehicular networks. IEEE Wirel. Commun. 16(4): 16-22 (2009) - [c15]Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen:
Cooperative Peer-to-Peer Information Exchange via Wireless Network Coding. GLOBECOM 2009: 1-7 - [c14]Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin Shen:
SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots. INFOCOM 2009: 1413-1421 - [c13]Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen:
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding. INFOCOM 2009: 2213-2221 - 2008
- [j6]Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han Ho, Xuemin Shen:
Security in vehicular ad hoc networks. IEEE Commun. Mag. 46(4): 88-95 (2008) - [j5]Xiaodong Lin, Xinhua Ling, Haojin Zhu, Pin-Han Ho, Xuemin Shen:
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks. Int. J. Secur. Networks 3(2): 122-132 (2008) - [j4]Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen:
SLAB: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans. Wirel. Commun. 7(10): 3858-3868 (2008) - [c12]Haojin Zhu, Xiaodong Lin, Rongxing Lu, Xuemin Shen, Pin-Han Ho:
BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks. GLOBECOM 2008: 1882-1886 - [c11]Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen:
AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. ICC 2008: 1436-1440 - [c10]Rongxing Lu, Xiaodong Lin, Chenxi Zhang, Haojin Zhu, Pin-Han Ho, Xuemin Shen:
AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network. ICC 2008: 1499-1504 - [c9]Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen:
Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. ICC 2008: 1530-1535 - [c8]Rongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen:
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. INFOCOM 2008: 1229-1237 - [c7]Rongxing Lu, Xiaodong Lin, Haojin Zhu, Chenxi Zhang, Pin-Han Ho, Xuemin Shen:
A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks. WCNC 2008: 3237-3242 - [c6]Rongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao:
A New Dynamic Group Key Management Scheme with Low Rekeying Cost. WCNC 2008: 3243-3248 - 2007
- [j3]Rongxing Lu, Zhenfu Cao, Haojin Zhu:
An enhanced authenticated key agreement protocol for wireless mobile communication. Comput. Stand. Interfaces 29(6): 647-652 (2007) - [c5]Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen:
Secure Localized Authentication and Billing for Wireless Mesh Networks. GLOBECOM 2007: 486-491 - [c4]Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen:
Two-Factor Localized Authentication Scheme for WLAN Roaming. ICC 2007: 1172-1178 - [c3]Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao:
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. ICC 2007: 1247-1253 - [c2]Haojin Zhu, Xiaodong Lin, Pin-Han Ho, Xuemin Shen, Minghui Shi:
TTP Based Privacy Preserving Inter-WISP Roaming Architecture for Wireless Metropolitan Area Networks. WCNC 2007: 2957-2962 - 2006
- [j2]Zhenfu Cao, Haojin Zhu, Rongxing Lu:
Provably secure robust threshold partial blind signature. Sci. China Ser. F Inf. Sci. 49(5): 604-615 (2006) - [c1]Xiaodong Lin, Haojin Zhu, Bin Lin, Pin-Han Ho, Xuemin Shen:
A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks. GLOBECOM 2006 - 2005
- [j1]Rongxing Lu, Zhenfu Cao, Haojin Zhu:
A robust (k, n) + 1 threshold proxy signature scheme based on factoring. Appl. Math. Comput. 166(1): 35-45 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint