Privacy preserving cloud data access with multi-authorities T Jung, XY Li, Z Wan, M Wan 2013 Proceedings IEEE INFOCOM, 2625-2633, 2013 | 222 | 2013 |
Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption T Jung, XY Li, Z Wan, M Wan IEEE transactions on information forensics and security 10 (1), 190-199, 2014 | 221 | 2014 |
Real-time charging station recommendation system for electric-vehicle taxis Z Tian, T Jung, Y Wang, F Zhang, L Tu, C Xu, C Tian, XY Li IEEE Transactions on Intelligent Transportation Systems 17 (11), 3098-3109, 2016 | 217 | 2016 |
Achieving differential privacy of data disclosure in the smart grid J Zhao, T Jung, Y Wang, X Li IEEE INFOCOM 2014-IEEE conference on computer communications, 504-512, 2014 | 172 | 2014 |
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation T Jung, XF Mao, XY Li, SJ Tang, W Gong, L Zhang 2013 Proceedings IEEE INFOCOM, 2634-2642, 2013 | 171 | 2013 |
Search me if you can: Privacy-preserving location query service XY Li, T Jung 2013 Proceedings ieee infocom, 2760-2768, 2013 | 153 | 2013 |
PIC: Enable large-scale privacy preserving content-based image search on cloud L Zhang, T Jung, K Liu, XY Li, X Ding, J Gu, Y Liu IEEE Transactions on Parallel and Distributed Systems 28 (11), 3258-3271, 2017 | 122 | 2017 |
Continuous user identification via touch and movement behavioral biometrics C Bo, L Zhang, T Jung, J Han, XY Li, Y Wang 2014 IEEE 33rd International Performance Computing and Communications …, 2014 | 115 | 2014 |
Social network de-anonymization and privacy inference with knowledge graph model J Qian, XY Li, C Zhang, L Chen, T Jung, J Han IEEE Transactions on Dependable and Secure Computing 16 (4), 679-692, 2017 | 110 | 2017 |
Collusion-tolerable privacy-preserving sum and product calculation without secure channel T Jung, XY Li, M Wan IEEE Transactions on Dependable and secure computing 12 (1), 45-57, 2014 | 110 | 2014 |
Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices L Zhang, T Jung, C Liu, X Ding, XY Li, Y Liu 2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015 | 93 | 2015 |
Accounttrade: Accountable protocols for big data trading against dishonest consumers T Jung, XY Li, W Huang, J Qian, L Chen, J Han, J Hou, C Su IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 88 | 2017 |
FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. Z Li, W Wang, C Wilson, J Chen, C Qian, T Jung, L Zhang, K Liu, X Li, ... NDSS, 2017 | 88 | 2017 |
Graph-based privacy-preserving data publication XY Li, C Zhang, T Jung, J Qian, L Chen IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 86 | 2016 |
Smartloc: Push the limit of the inertial sensor based metropolitan localization using smartphone C Bo, XY Li, T Jung, X Mao, Y Tao, L Yao Proceedings of the 19th annual international conference on Mobile computing …, 2013 | 80 | 2013 |
It starts with igaze: Visual attention driven networking with smart glasses L Zhang, XY Li, W Huang, K Liu, S Zong, X Jian, P Feng, T Jung, Y Liu Proceedings of the 20th annual international conference on Mobile computing …, 2014 | 72 | 2014 |
Hidebehind: Enjoy voice input with voiceprint unclonability and anonymity J Qian, H Du, J Hou, L Chen, T Jung, XY Li Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems …, 2018 | 70 | 2018 |
Message in a sealed bottle: Privacy preserving friending in mobile social networks L Zhang, XY Li, K Liu, T Jung, Y Liu IEEE Transactions on Mobile Computing 14 (9), 1888-1902, 2014 | 70 | 2014 |
Energy-recycling blockchain with proof-of-deep-learning C Chenli, B Li, Y Shi, T Jung 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019 | 63 | 2019 |
Verifiable private multi-party computation: ranging and ranking L Zhang, XY Li, Y Liu, T Jung 2013 Proceedings IEEE INFOCOM, 605-609, 2013 | 60 | 2013 |