78 entries « 1 of 2 »

2024

Jia, Meng; Chen, Jing; He, Kun; Shi, Min; Wang, Yuanzheng; Du, Ruiying

Generic Construction of Threshold Credential Management With User-Autonomy Aggregation Journal Article

In: IEEE Transactions on Information Forensics and Security, vol. 19, pp. 2549-2564, 2024, ISSN: 1556-6021.

Abstract | Links | BibTeX

陈晶,; 杨浩,; 何琨,; 李凯,; 加梦,; 杜瑞颖,

区块链扩展技术现状与展望 Journal Article

In: 软件学报, vol. 35, no. 2, pp. 828, 2024.

Links | BibTeX

Liang, Ruichao; Chen, Jing; He, Kun; Wu, Yueming; Deng, Gelei; Du, Ruiying; Wu, Cong

PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG) Proceedings Article

In: Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, Association for Computing Machinery, <conf-loc>, <city>Lisbon</city>, <country>Portugal</country>, </conf-loc>, 2024, ISBN: 9798400702174.

Abstract | Links | BibTeX

Wang, Mei; Chen, Jing; He, Kun; Yu, Ruozhou; Du, Ruiying; Qian, Zhihao

UFinAKA: Fingerprint-Based Authentication and Key Agreement With Updatable Blind Credentials Journal Article

In: IEEE/ACM Transactions on Networking, vol. 32, iss. 2, pp. 1110-1123, 2024.

Links | BibTeX

Li, Qiao; Chen, Jing; He, Kun; Zhang, Zijun; Du, Ruiying; She, Jisi; Wang, Xinxin

Model-agnostic adversarial example detection via high-frequency amplification Journal Article

In: Computers & Security, vol. 141, pp. 103791, 2024, ISSN: 0167-4048.

Abstract | Links | BibTeX

何琨,; 李瀚星,; 陈晶,

基于分层结构的匹配量隐藏加密多重映射方案 Journal Article

In: 通信学报, vol. 45, no. 1, pp. 94, 2024.

Links | BibTeX

李瞧,; 陈晶,; 张子君,; 何琨,; 杜瑞颖,; 汪欣欣,

基于随机平滑的通用黑盒认证防御 Journal Article

In: 计算机学报, vol. 47, no. 03, pp. 690-702, 2024, ISSN: 0254-4164.

Links | BibTeX

何琨,; 佘计思,; 张子君,; 陈晶,; 汪欣欣,; 杜瑞颖,

基于引导扩散模型的自然对抗补丁生成方法 Journal Article

In: 电子学报, vol. 52, no. 2, pp. 564-573, 2024.

Abstract | Links | BibTeX

Gu, Yangyang; Chen, Jing; He, Kun; Wu, Cong; Zhao, Ziming; Du, Ruiying

WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices Journal Article

In: IEEE Transactions on Mobile Computing, vol. 23, no. 6, pp. 6997-7011, 2024.

Abstract | Links | BibTeX

Zhang, Renli; Zhou, Ruiting; Wang, Yufeng; Tan, Haisheng; He, Kun

Incentive Mechanisms for Online Task Offloading With Privacy-Preserving in UAV-Assisted Mobile Edge Computing Journal Article

In: IEEE/ACM Transactions on Networking, vol. 32, no. 3, pp. 2646-2661, 2024.

Links | BibTeX

2023

Yan, Ran; Du, Ruiying; He, Kun; Chen, Jing

Efficient Adversarial Training with Membership Inference Resistance Proceedings Article

In: Liu, Qingshan; Wang, Hanzi; Ma, Zhanyu; Zheng, Weishi; Zha, Hongbin; Chen, Xilin; Wang, Liang; Ji, Rongrong (Ed.): Pattern Recognition and Computer Vision, pp. 474–486, Springer Nature Singapore, Singapore, 2023, ISBN: 978-981-99-8429-9.

Abstract | Links | BibTeX

Shi, Min; Chen, Jing; He, Kun; Zhao, Haoran; Jia, Meng; Du, Ruiying

Formal Analysis and Patching of BLE-SC Pairing Proceedings Article

In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 37–52, USENIX Association, Anaheim, CA, 2023, ISBN: 978-1-939133-37-3.

Abstract | Links | BibTeX

Yang, Xuanang; Chen, Jing; He, Kun; Bai, Hao; Wu, Cong; Du, Ruiying

Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks Journal Article

In: IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4815-4829, 2023, ISSN: 1556-6021.

Abstract | Links | BibTeX

Gu, Yangyang; Chen, Jing; Wu, Cong; He, Kun; Zhao, Ziming; Du, Ruiying

LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices Journal Article

In: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., vol. 7, no. 4, 2023.

Abstract | Links | BibTeX

汪欣欣,; 陈晶,; 何琨,; 张子君,; 杜瑞颖,; 李瞧,; 佘计思,

面向目标检测的对抗攻击与防御综述 Journal Article

In: 通信学报, vol. 44, no. 11, pp. 260, 2023.

Links | BibTeX

2022

Wang, Mei; He, Kun; Chen, Jing; Du, Ruiying; Zhang, Bingsheng; Li, Zengpeng

PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices Journal Article

In: Future Generation Computer Systems, vol. 131, pp. 28–42, 2022, ISSN: 0167-739X.

Abstract | Links | BibTeX

Jia, Meng; Chen, Jing; He, Kun; Du, Ruiying; Zheng, Li; Lai, Mingxi; Wang, Donghui; Liu, Fei

Redactable Blockchain from Decentralized Chameleon Hash Functions Journal Article

In: IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2771–2783, 2022, ISSN: 1556-6021.

Abstract | Links | BibTeX

Chen, Jing; Chen, Xin; He, Kun; Du, Ruiying; Chen, Weihang; Xiang, Yang

DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel Journal Article

In: IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 5, pp. 3286–3300, 2022, ISSN: 1941-0018.

Abstract | Links | BibTeX

Chen, Jing; Zhan, Zeyi; He, Kun; Du, Ruiying; Wang, Donghui; Liu, Fei

XAuth: Efficient Privacy-Preserving Cross-Domain Authentication Journal Article

In: IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 5, pp. 3301–3311, 2022, ISSN: 1941-0018.

Abstract | Links | BibTeX

Zhou, Ruiting; Zhang, Renli; Wang, Yufeng; Tan, Haisheng; He, Kun

Online incentive mechanism for task offloading with privacy-preserving in UAV-assisted mobile edge computing Proceedings Article

In: Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, pp. 211–220, 2022, ISBN: 9781450391658.

Abstract | Links | BibTeX

Wu, Cong; Chen, Jing; He, Kun; Zhao, Ziming; Du, Ruiying; Zhang, Chen

EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices Proceedings Article

In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2931–2945, 2022, ISBN: 9781450394505.

Abstract | Links | BibTeX

Wu, Cong; He, Kun; Chen, Jing; Zhao, Ziming; Du, Ruiying

Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors Journal Article

In: IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 6, pp. 4002–4018, 2022, ISSN: 1941-0018.

Abstract | Links | BibTeX

Wang, Run; Li, Haoxuan; Mu, Lingzhou; Ren, Jixing; Guo, Shangwei; Liu, Li; Fang, Liming; Chen, Jing; Wang, Lina

Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-Aware Perturbations? Proceedings Article

In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 1808–1818, Association for Computing Machinery, Lisboa, Portugal, 2022, ISBN: 9781450392037.

Abstract | Links | BibTeX

Wang, Run; Huang, Ziheng; Chen, Zhikai; Liu, Li; Chen, Jing; Wang, Lina

Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations Proceedings Article

In: Raedt, Lud De (Ed.): Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22, pp. 761–767, International Joint Conferences on Artificial Intelligence Organization, 2022, ISBN: 978-1-956792-00-3, (Main Track).

Abstract | Links | BibTeX

Yang, Yang; Chen, Yanjiao; Chen, Fei; Chen, Jing

An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage Journal Article

In: IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1359-1371, 2022, ISSN: 1556-6021.

Abstract | Links | BibTeX

Yang, Yang; Chen, Yanjiao; Chen, Fei; Chen, Jing

Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information Journal Article

In: IEEE Internet of Things Journal, vol. 9, no. 13, pp. 10434-10445, 2022.

Links | BibTeX

2021

Chen, Jing; Chen, Jiong; He, Kun; Du, Ruiying

SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures Journal Article

In: Future Generation Computer Systems, vol. 115, pp. 448–458, 2021.

Abstract | Links | BibTeX

Chen, Jing; Wang, Chiheng; He, Kun; Zhao, Ziming; Chen, Min; Du, Ruiying; Ahn, Gail-Joon

Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps Journal Article

In: IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 1, pp. 15–29, 2021.

Abstract | Links | BibTeX

He, Kun; Chen, Jing; Yuan, Quan; Ji, Shouling; He, Debiao; Du, Ruiying

Dynamic Group-Oriented Provable Data Possession in the Cloud Journal Article

In: IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1394–1408, 2021.

Abstract | Links | BibTeX

He, Kun; Chen, Jing; Zhou, Qinxi; Du, Ruiying; Xiang, Yang

Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost Journal Article

In: IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1538–1549, 2021.

Abstract | Links | BibTeX

Jia, Meng; He, Kun; Chen, Jing; Du, Ruiying; Chen, Weihang; Tian, Zhihong; Ji, Shouling

PROCESS: Privacy-Preserving On-Chain Certificate Status Service Proceedings Article

In: IEEE INFOCOM 2021 - IEEE Conference on Computer Communications, pp. 1–10, 2021.

Abstract | Links | BibTeX

Chen, Jing; Jiang, Peidong; He, Kun; Zeng, Cheng; Du, Ruiying

HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors Proceedings Article

In: Information and Communications Security, pp. 136–152, 2021.

Abstract | Links | BibTeX

Shen, Lujia; Ji, Shouling; Zhang, Xuhong; Li, Jinfeng; Chen, Jing; Shi, Jie; Fang, Chengfang; Yin, Jianwei; Wang, Ting

Backdoor Pre-Trained Models Can Transfer to All Proceedings Article

In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 3141–3158, 2021.

Abstract | Links | BibTeX

Wang, Mei; He, Kun; Chen, Jing; Li, Zengpeng; Zhao, Wei; Du, Ruiying

Biometrics-Authenticated Key Exchange for Secure Messaging Proceedings Article

In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 2618–2631, 2021.

Abstract | Links | BibTeX

Qian, Yongfeng; Ma, Yujun; Chen, Jing; Wu, Di; Tian, Daxin; Hwang, Kai

Optimal Location Privacy Preserving and Service Quality Guaranteed Task Allocation in Vehicle-Based Crowdsensing Networks Journal Article

In: IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4367-4375, 2021, ISSN: 1558-0016.

Abstract | Links | BibTeX

Wang, Xiao; Wang, Zheng; Liu, Wu; Xu, Xin; Chen, Jing; Lin, Chia-Wen

Consistency-Constancy Bi-Knowledge Learning for Pedestrian Detection in Night Surveillance Proceedings Article

In: Proceedings of the 29th ACM International Conference on Multimedia, pp. 4463–4471, Association for Computing Machinery, Virtual Event, China, 2021, ISBN: 9781450386517.

Abstract | Links | BibTeX

2020

Chen, Jiong; He, Kun; Chen, Jing; Fang, Yingying; Du, Ruiying

PowerPrint: Identifying Smartphones through Power Consumption of the Battery Journal Article

In: Security and Communication Networks, vol. 2020, pp. e3893106, 2020, ISSN: 1939-0114.

Abstract | Links | BibTeX

Li, Jiping; Zhang, Ning; Ni, Jianbing; Chen, Jing; Du, Ruiying

Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems Journal Article

In: IEEE Internet of Things Journal, pp. 1–1, 2020.

Abstract | Links | BibTeX

Ji, Shouling; Gu, Qinchen; Weng, Haiqin; Liu, Qianjun; Zhou, Pan; Chen, Jing; Li, Zhao; Beyah, Raheem; Wang, Ting

De-Health: All Your Online Health Information Are Belong to Us Proceedings Article

In: 2020 IEEE 36th International Conference on Data Engineering (ICDE), pp. 1609–1620, 2020.

Abstract | Links | BibTeX

Wu, Cong; He, Kun; Chen, Jing; Zhao, Ziming; Du, Ruiying

Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks Proceedings Article

In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2219–2236, USENIX Association, 2020, ISBN: 978-1-939133-17-5.

Abstract | Links | BibTeX

Chen, Jing; He, Kun; Deng, Lan; Yuan, Quan; Du, Ruiying; Xiang, Yang; Wu, Jie

EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data Journal Article

In: IEEE Transactions on Services Computing, vol. 13, no. 6, pp. 1072–1085, 2020.

Abstract | Links | BibTeX

Chen, Min; Qian, Yongfeng; Chen, Jing; Hwang, Kai; Mao, Shiwen; Hu, Long

Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing Journal Article

In: IEEE Transactions on Cloud Computing, vol. 8, no. 4, pp. 1274–1283, 2020.

Abstract | Links | BibTeX

Song, Wenna; Jiang, Ming; Yan, Han; Xiang, Yi; Chen, Yuan; Luo, Yuan; He, Kun; Peng, Guojun

Android Data-Clone Attack via Operating System Customization Journal Article

In: IEEE Access, vol. 8, pp. 199733–199746, 2020.

Abstract | Links | BibTeX

Wu, Cong; He, Kun; Chen, Jing; Du, Ruiying; Xiang, Yang

CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake Journal Article

In: IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11420–11430, 2020.

Abstract | Links | BibTeX

2019

Yao, Shixiong; Chen, Jing; He, Kun; Du, Ruiying; Zhu, Tianqing; Chen, Xin

PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management Journal Article

In: IEEE Access, vol. 7, pp. 6117–6128, 2019.

Abstract | Links | BibTeX

Hu, Long; Qian, Yongfeng; Chen, Jing; Shi, Xiaobo; Zhang, Jing; Mao, Shiwen

Photo Crowdsourcing Based Privacy-Protected Healthcare Journal Article

In: IEEE Transactions on Sustainable Computing, vol. 4, no. 2, pp. 168–177, 2019.

Abstract | Links | BibTeX

Wu, Cong; He, Kun; Chen, Jing; Du, Ruiying

ICAuth: Implicit and Continuous Authentication When the Screen Is Awake Proceedings Article

In: ICC 2019 - 2019 IEEE International Conference on Communications (ICC), pp. 1–6, 2019.

Abstract | Links | BibTeX

Qian, Yongfeng; Hu, Long; Chen, Jing; Guan, Xin; Hassan, Mohammad Mehedi; Alelaiwi, Abdulhameed

Privacy-aware Service Placement for Mobile Edge Computing Via Federated Learning Journal Article

In: Information Sciences, vol. 505, pp. 562–570, 2019.

Abstract | Links | BibTeX

2018

Chen, Jing; He, Kun; Yuan, Quan; Chen, Min; Du, Ruiying; Xiang, Yang

Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services Journal Article

In: IEEE Transactions on Mobile Computing, vol. 17, no. 11, pp. 2524–2535, 2018.

Abstract | Links | BibTeX

Chen, Jing; Wang, Chiheng; Zhao, Ziming; Chen, Kai; Du, Ruiying; Ahn, Gail-Joon

Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection Journal Article

In: IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1286–1300, 2018.

Abstract | Links | BibTeX

78 entries « 1 of 2 »