Cyber-physical systems security—A survey A Humayed, J Lin, F Li, B Luo IEEE Internet of Things Journal 4 (6), 1802-1831, 2017 | 1092 | 2017 |
Secure information aggregation for smart grids using homomorphic encryption F Li, B Luo, P Liu 2010 First IEEE International Conference on Smart Grid Communications, 327-332, 2010 | 716 | 2010 |
Poster: A reliable and accountable privacy-preserving federated learning framework using the blockchain S Awan, F Li, B Luo, M Liu Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 135 | 2019 |
QFilter: fine-grained run-time XML access control via NFA-based query rewriting B Luo, D Lee, WC Lee, P Liu Proceedings of the thirteenth ACM international conference on Information …, 2004 | 133 | 2004 |
Mining Adverse Drug Reactions from Online Healthcare Forums using Hidden Markov Model H Sampathkumar, X Chen, B Luo BMC Medical Informatics and Decision Making 14 (1), 91, 2014 | 132 | 2014 |
Protecting private keys against memory disclosure attacks using hardware transactional memory L Guan, J Lin, B Luo, J Jing, J Wang 2015 IEEE Symposium on Security and Privacy, 3-19, 2015 | 129 | 2015 |
CONTRA: Defending Against Poisoning Attacks in Federated Learning S Awan, B Luo, F Li European Symposium on Research in Computer Security, 455-475, 2021 | 108 | 2021 |
Preserving data integrity for smart grid data aggregation F Li, B Luo 2012 IEEE Third International Conference on Smart Grid Communications …, 2012 | 106 | 2012 |
Secure and privacy-preserving information aggregation for smart grids F Li, B Luo, P Liu International Journal of Security and Networks 6 (1), 28-39, 2011 | 105 | 2011 |
World Wide Web based image search engine using text and image content features B Luo, X Wang, X Tang Proceedings of SPIE 5018, 123-130, 2003 | 96 | 2003 |
Copker: Computing with private keys without RAM L Guan, J Lin, B Luo, J Jing 21st ISOC Network and Distributed System Security Symposium (NDSS), 2014 | 72 | 2014 |
Stalking online: on user privacy in social networks Y Yang, J Lutes, F Li, B Luo, P Liu Proceedings of the second ACM conference on Data and Application Security …, 2012 | 69 | 2012 |
System and methods of integrating visual features with textual features for image searching X Chen, B Luo US Patent 9,075,825, 2015 | 68 | 2015 |
You are what you broadcast: Identification of mobile and {IoT} devices from (public){WiFi} L Yu, B Luo, J Ma, Z Zhou, Q Liu 29th USENIX security symposium (USENIX security 20), 55-72, 2020 | 61 | 2020 |
Secure outsourcing SIFT: Efficient and privacy-preserving image feature extraction in the encrypted domain L Jiang, C Xu, X Wang, B Luo, H Wang IEEE Transactions on Dependable and Secure Computing 17 (1), 179-193, 2017 | 58 | 2017 |
Towards Practical Privacy-Preserving Processing over Encrypted Data in IoT: An Assistive Healthcare Use Case L Jiang, L Chen, T Giannetsos, B Luo, K Liang, J Han IEEE Internet of Things Journal, 2019 | 56 | 2019 |
Access control for big data using data content W Zeng, Y Yang, B Luo 2013 IEEE International Conference on Big Data, 45-47, 2013 | 56 | 2013 |
Using ID-Hopping to Defend Against Targeted DoS on CAN A Humayed, B Luo Proceedings of the 1st International Workshop on Safe Control of Connected …, 2017 | 44 | 2017 |
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing F Li, B Luo, P Liu, D Lee, CH Chu Information Forensics and Security, IEEE Transactions on 8 (6), 888-900, 2013 | 43 | 2013 |
In-broker access control: Towards efficient end-to-end performance of information brokerage systems F Li, B Luo, P Liu, D Lee, P Mitra, WC Lee, CH Chu IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006 | 43 | 2006 |