ToneCheck: Unveiling the Impact of Dialects in Privacy Policy J Barot, A Allami, M Yin, D Lin Proceedings of the 29th ACM Symposium on Access Control Models and …, 2024 | | 2024 |
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments A Yu, J Kang, W Jiang, D Lin IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |
Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware A Yu, J Kang, J Morris, E Bertino, D Lin IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |
Preserving Location Privacy in the Modern Era of Pervasive Environments T Nicewaner, A Yu, W Jiang, D Lin 2023 5th IEEE International Conference on Trust, Privacy and Security in …, 2023 | | 2023 |
Social Community Recommendation based on Large-scale Semantic Trajectory Analysis Using Deep Learning C Cai, W Jiang, D Lin Proceedings of the 18th International Symposium on Spatial and Temporal Data …, 2023 | | 2023 |
Defend data poisoning attacks on voice authentication K Li, C Baird, D Lin IEEE Transactions on Dependable and Secure Computing, 2023 | 6 | 2023 |
FACT: A Flexible Access Control Technique for Very Large Scale Public IoT Services A Yu, J Kang, W Jiang, D Lin 2023 IEEE International Conference on Pervasive Computing and Communications …, 2023 | | 2023 |
Highly efficient traffic planning for autonomous vehicles to cross intersections without a stop J Kang, D Lin ACM Transactions on Intelligent Systems and Technology 14 (2), 1-24, 2023 | 3 | 2023 |
Developing Self-evolving Deepfake Detectors Against AI Attacks I Miller, D Lin 2022 IEEE 4th International Conference on Trust, Privacy and Security in …, 2022 | | 2022 |
Find another me across the world-large-scale semantic trajectory analysis using spark C Cai, D Lin IEEE Transactions on Knowledge and Data Engineering 35 (9), 8905-8918, 2022 | 2 | 2022 |
Efficient parallel processing of high-dimensional spatial kNN queries T Jiang, B Zhang, D Lin, Y Gao, Q Li Soft Computing 26 (22), 12291-12316, 2022 | 1 | 2022 |
Nwade: A neighborhood watch mechanism for attack detection and evacuation in autonomous intersection management J Kang, A Yu, W Jiang, D Lin 2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022 | 1 | 2022 |
Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security A Bowers, J Du, D Lin, W Jiang Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | | 2022 |
RHPTree—risk hierarchical pattern tree for scalable long pattern mining D Liu, Y Li, W Baskett, D Lin, CR Shyu ACM Transactions on Knowledge Discovery from Data (TKDD) 16 (4), 1-33, 2022 | 2 | 2022 |
“Do you know you are tracked by photos that you didn’t take”: large-scale location-aware multi-party image privacy protection J Morris, S Newman, K Palaniappan, J Fan, D Lin IEEE Transactions on Dependable and Secure Computing 20 (1), 301-312, 2021 | 13 | 2021 |
A new facial authentication pitfall and remedy in web services D Cole, S Newman, D Lin IEEE Transactions on Dependable and Secure Computing 19 (4), 2635-2647, 2021 | 6 | 2021 |
" Do You Know You Are Tracked by Photos That You Didn't Take": Location-Aware Multi-Party Image Privacy Protection J Morris, S Newman, K Palaniappan, J Fan, D Lin arXiv preprint arXiv:2103.10851, 2021 | 1 | 2021 |
Single view facial age estimation using deep learning with cascaded random forests IE Toubal, L Lyu, D Lin, K Palaniappan Computer Analysis of Images and Patterns: 19th International Conference …, 2021 | 5 | 2021 |
Dash: A universal intersection traffic management system for autonomous vehicles J Kang, D Lin 2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020 | 5 | 2020 |
Cloud Security Baselines D Oliveira, A Squicciarini, D Lin Cloud Computing Security, 31-44, 2020 | 1 | 2020 |