Search filters

List of works by Kui Ren

${\ssr{PriWhisper}}$ : Enabling Keyless Secure Acoustic Communication for Smartphones

A New Approach to Malware Detection

A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

scholarly article by Zhihua Xia et al published November 2016 in IEEE Transactions on Information Forensics and Security

A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags

A Proactive Data Security Framework for Mission-Critical Sensor Networks

A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks

A new approach for random key pre-distribution in large-scale wireless sensor networks

A new data acquisition design for breast cancer detection system

A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing

article

A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

scholarly article published March 2010

Achieving usable and privacy-assured similarity search over outsourced cloud data

AcousAuth: An acoustic-based mobile application for user authentication

All your location are belong to us

An enhanced lightweight authentication protocol for access control in wireless LANs

Anonymous Misbehavior Detection in Mobile Ad Hoc Networks

Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks

Anonymous user communication for privacy protection in wireless metropolitan mesh networks

Anti-jamming communication in cognitive radio networks with unknown channel statistics

Attribute based data sharing with attribute revocation

Attribute-based content distribution with hidden policy

Attribute-based fine-grained access control with efficient revocation in cloud storage systems

Attribute-based on-demand multicast group setup with membership anonymity

Attribute-based on-demand multicast group setup with membership anonymity

Attribute-based signature and its applications

Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications

Blind Recognition of Touched Keys on Mobile Devices

CSChecker: Revisiting GDPR and CCPA Compliance of Cookie Banners on the Web

scientific article published on 12 April 2024

Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data

Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems

CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud

article published in 2015

Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels

Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos

scholarly article published June 2015

DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems

DAC-MACS: Effective data access control for multi-authority cloud storage systems

DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud

article

DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks

Data Security in Cloud Computing

scholarly article published 2012

Data security and privacy in wireless body area networks

Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems

Delay-bounded adaptive UFH-based anti-jamming wireless communication

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance

Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs

Distributed Privacy-Preserving Access Control in Sensor Networks

Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks

EMTrig: Physical Adversarial Examples Triggered by Electromagnetic Injection towards LiDAR Perception

scientific article published on 04 November 2024

Editorial: IEEE Communications Surveys & Tutorials - Special Section on Energy and Smart Grid

Effective signal region based analog mixed signal design considering variations and applications

Efficient User Revocation for Privacy-aware PKI

Efficient fine-grained data access control in wireless sensor networks

Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control

Enabling Cloud Storage Auditing With Key-Exposure Resistance

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Enabling IP Protection for Outsourced Integrated Circuit Design

Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement

Enabling Privacy-Preserving Image-Centric Social Discovery

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

scholarly article by Qian Wang et al published May 2011 in IEEE Transactions on Parallel and Distributed Systems

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing

scholarly article by Qian Wang et al published 2009 in Lecture Notes in Computer Science

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing

article

Enabling efficient access control with dynamic policy updating for big data in the cloud

Enabling private and non-intrusive smartphone calls with LipTalk

Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply

Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply

Enhancing Attribute-Based Encryption with Attribute Hierarchy

Enhancing attribute-based encryption with attribute hierarchy

Ensuring Security and Privacy Preservation for Cloud Data Services

Ensuring data storage security in Cloud Computing

scholarly article published July 2009

EyeVeri: A secure and usable approach for smartphone user authentication

FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks

FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks

FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis

scientific article published on 21 November 2023

FITS: Matching Camera Fingerprints Subject to Software Noise Pollution

scientific article published on 21 November 2023

Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply

scholarly article published October 2014

Fast and scalable secret key generation exploiting channel phase randomness in wireless networks

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

scholarly article published March 2010

GREP

Geographic On-Demand Disjoint Multipath Routing in Wireless Ad Hoc Networks

Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks

Guest Editorial Cyber, Physical, and System Security for Smart Grid

Guest Editorial Special Issue on Security for IoT: The State of the Art

Guest Editorial: Introduction to the Special Section on Emerging Security Trends for Biomedical Computations, Devices, and Infrastructures

Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations

Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy

Highly reliable trust establishment scheme in ad hoc networks

article by Kui Ren et al published August 2004 in Computer Networks

Jamming-Resilient Dynamic Spectrum Access for Cognitive Radio Networks

Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks

Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks

Joint UFH and power control for effective wireless anti-jamming communication

KBX: Verified Model Synchronization via Formal Bidirectional Transformation

scientific article published on 13 September 2024

LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks

LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks

Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory

scientific article published on 26 March 2024

Locating malicious nodes for data aggregation in wireless networks

Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms

scientific article published on 03 December 2022

Messages behind the sound

Modeling Load Redistribution Attacks in Power Systems

Multi-User Broadcast Authentication in Wireless Sensor Networks

Multi-user Broadcast Authentication in Wireless Sensor Networks

Multicast with an Application-Oriented Networking (AON) Approach

My Smartphone Knows What You Print

On Address Privacy in Mobile Ad Hoc Networks

On Broadcast Authentication in Wireless Sensor Networks

On Efficient Key Pre-Distribution in Large Scale Wireless Sensor Networks

On the synchronization bottleneck of OpenStack Swift-like cloud storage systems

Opportunistic spectrum access: from stochastic channels to non-stochastic channels

Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets

Optimal budget deployment strategy against power grid interdiction

article published in 2013

Optimized User Revocation for Group Signature Based Privacy-Aware PKI

Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid

P2-SAS

PCM: a privacy-preserving detection mechanism in mobilead hocnetworks

PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks

PEKSrand: Providing Predicate Privacy in Public-Key Encryption with Keyword Search

PERVASIVE COMPUTING IN HOSPITALS

POSTER

PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications

Password Extraction via Reconstructed Wireless Mouse Trajectory

Practical Fully Simulatable Oblivious Transfer with Sublinear Communication

article by Bingsheng Zhang et al published 2013 in Lecture Notes in Computer Science

Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems

Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems

Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud

Privacy-Aware Attribute-Based Encryption with User Accountability

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

scholarly article published March 2010

Privacy-Preserving Public Auditing for Secure Cloud Storage

Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing

scholarly article published June 2011

Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability

article published in 2006

Privacy-preserving multi-keyword ranked search over encrypted cloud data

Privacy-preserving outsourcing of image global feature detection

Private image computation: The case of cloud based privacy-preserving SIFT

Proof-Carrying Cloud Computation: The Case of Convex Optimization

Proof-carrying cloud computation: The case of convex optimization

Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers

scientific article published in 2021

Quantitative Analysis of Load Redistribution Attacks in Power Systems

Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes

scholarly article published June 2015

Real-time hidden acoustic signal capture with smartphones

RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy

Rise of the Indoor Crowd

Routing optimization security in mobile IPv6

SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones

scholarly article by Bingsheng Zhang et al published 1 February 2016 in IEEE Transactions on Mobile Computing

SBVLC: Secure barcode-based visible light communication for smartphones

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

article

SecHOG

SecSIFT

SecSIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data

scientific article

Secret key generation exploiting channel characteristics in wireless communications

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

scholarly article by Cong Wang et al published 1 January 2016 in IEEE Transactions on Computers

Secure Ranked Keyword Search over Encrypted Cloud Data

Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor

Secure ad hoc trust initialization and key management in wireless body area networks

article by Ming Li et al published 1 March 2013 in ACM Transactions on Sensor Networks

Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation

Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud

Secure and practical outsourcing of linear programming in cloud computing

scholarly article published April 2011

Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings

article

Securing emerging short range wireless communications: the state of the art

Security Challenges for the Public Cloud

Security and privacy in emerging networks: Part 1 [Guest Editorial]

Security and privacy in emerging networks: Part II [Guest Editorial]

Security in cognitive radio networks [Guest Editorial]

Security, privacy, and accountability in wireless access networks

Special Issue on Security and Privacy in Mobile Clouds

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification

THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply

The power of indoor crowd: Indoor 3D maps from the crowd

The ring authenticated encryption scheme – How to provide a clue wisely

Time-Slotted Round-Trip Carrier Synchronization in Large-Scale Wireless Networks

Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement

article published in 2016

Toward Secure and Dependable Storage Services in Cloud Computing

scholarly article by Cong Wang et al published April 2012 in IEEE transactions on services computing

Toward privacy-assured and searchable cloud data storage services

Toward publicly auditable secure cloud data storage services

Toward secure and effective data utilization in public cloud

Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing

scholarly article published 2014

Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication

Towards Optimal Electric Demand Management for Internet Data Centers

article published in 2012

Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing

scholarly article published 1 January 2018

Towards Secure Link Quality Measurement in Multihop Wireless Networks

Towards Secure and Effective Utilization over Encrypted Cloud Data

Towards address privacy in mobile ad hoc networks

User capacity of wireless physical-layer identification: An information-theoretic perspective

Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation

VoiceListener

scientific article published on 28 March 2023

WSN09-3: Fault-tolerant Event Boundary Detection in Wireless Sensor Networks

Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel

When cloud meets eBay: Towards effective pricing for cloud computing

scholarly article published March 2012

Wireless Physical-Layer Identification: Modeling and Validation

article published in 2016

Wireless key establishment with asynchronous clocks

k-Indistinguishable Traffic Padding in Web Applications