AugAuth: Shoulder-surfing resistant authentication for augmented reality R Zhang, N Zhang, C Du, W Lou, YT Hou, Y Kawamoto 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 22 | 2017 |
An improved fast search and find of density peaks-based fog node location of fog computing system X Yuan, Y He, Q Fang, X Tong, C Du, Y Ding 2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017 | 21 | 2017 |
On cyclostationary analysis of WiFi signals for direction estimation C Du, H Zeng, W Lou, YT Hou 2015 IEEE International Conference on Communications (ICC), 3557-3561, 2015 | 21 | 2015 |
Context-free fine-grained motion sensing using WiFi C Du, X Yuan, W Lou, YT Hou 2018 15th Annual IEEE International Conference on Sensing, Communication …, 2018 | 17 | 2018 |
From electromyogram to password: exploring the privacy impact of wearables in augmented reality R Zhang, N Zhang, C Du, W Lou, YT Hou, Y Kawamoto ACM Transactions on Intelligent Systems and Technology (TIST) 9 (1), 1-20, 2017 | 11 | 2017 |
Efficient user authentication and key management for peer-to-peer live streaming systems X Liu, H Yin, C Lin, C Du Tsinghua Science & Technology 14 (2), 234-241, 2009 | 10 | 2009 |
Mobtrack: Locating indoor interfering radios with a single device C Du, R Zhang, W Lou, YT Hou IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 9 | 2016 |
VCNF: A secure video conferencing system based on P2P technology C Du, H Yin, C Lin, Y Hu 2008 10th IEEE International Conference on High Performance Computing and …, 2008 | 9 | 2008 |
A dynamic virtual datacenter selection strategy for integrated cloud service platform construction with multiclouds B Huang, C Du, M Sun, X Yuan IEEE Access 7, 172879-172891, 2019 | 6 | 2019 |
Ms-ptp: Protecting network timing from byzantine attacks S Shi, Y Xiao, C Du, MH Shahriar, A Li, N Zhang, YT Hou, W Lou Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023 | 5 | 2023 |
{UCBlocker}: Unwanted call blocking using anonymous authentication C Du, H Yu, Y Xiao, YT Hou, AD Keromytis, W Lou 32nd USENIX Security Symposium (USENIX Security 23), 445-462, 2023 | 5 | 2023 |
Mindfl: Mitigating the impact of imbalanced and noisy-labeled data in federated learning with quality and fairness-aware client selection C Zhang, N Wang, S Shi, C Du, W Lou, YT Hou MILCOM 2023-2023 IEEE Military Communications Conference (MILCOM), 331-338, 2023 | 3 | 2023 |
Echosensor: Fine-grained ultrasonic sensing for smart home intrusion detection J Lian, C Du, J Lou, L Chen, X Yuan ACM Transactions on Sensor Networks 20 (1), 1-24, 2023 | 3 | 2023 |
Mobile tracking in 5g and beyond networks: Problems, challenges, and new directions C Du, H Yu, Y Xiao, W Lou, C Wang, R Gazda, YT Hou 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems …, 2022 | 3 | 2022 |
DLECP: a dynamic learning-based edge cloud placement framework for mobile cloud computing X Yuan, M Sun, Q Fang, C Du IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019 | 3 | 2019 |
A strategy for improving NetClust server placement for multicloud environments Y Zhao, J Liu, Q Fang, L Xu, C Du, Y Xiaoqun Turkish Journal of Electrical Engineering and Computer Sciences 26 (1), 115-124, 2018 | 2 | 2018 |
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials H Yu, C Du, Y Xiao, A Keromytis, C Wang, R Gazda, YT Hou, W Lou Network and Distributed System Security Symposium (NDSS), 2023 | 1 | 2023 |
Exploring the Sensing Capability of Wireless Signals C Du Virginia Tech, 2018 | 1 | 2018 |
A secure and scalable video conference system based on peer-assisted content delivery networks H Yin, CL Du, C Ren, Z Chen, G Min, C Lin Computer Systems Science and Engineering 24 (5), 361-371, 2009 | 1 | 2009 |
TriSAS: Toward Dependable Inter-SAS Coordination with Auditability S Shi, Y Xiao, C Du, Y Shi, C Wang, R Gazda, YT Hou, E Burger, ... Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | | 2024 |