Basic Proof-of-Stake consensus mechanisms Y Xiao, W Sun Proof-of-Stake for Blockchain Networks: Fundamentals, Challenges and …, 2024 | | 2024 |
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks X Li, Z Li, N Li, W Sun arXiv preprint arXiv:2403.19510, 2024 | | 2024 |
BFTRAND: Low-latency Random Number Provider for BFT Smart Contracts J Liao, B Gong, W Sun, F Zhang, Z Ning, MH Au, W Shi The 54th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2024 | | 2024 |
Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns SMM Islam, Y Zheng, Y Pan, M Millan, W Chang, M Li, O Borić-Lubecke, ... IEEE Internet of Things Journal 10 (16), 14197-14211, 2023 | 2 | 2023 |
StateMask: Explaining Deep Reinforcement Learning through State Mask Z Cheng, X Wu, J Yu, W Sun, W Guo, X Xing The 37th Conference on Neural Information Processing Systems (NeurIPS 2023)., 2023 | 3 | 2023 |
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation X Li, N Li, W Sun, NZ Gong, H Li USENIX Security Symposium, 2023 | 15 | 2023 |
Towards Overcoming the Undercutting Problem M Minaei, W Sun, A Kate Financial Cryptography and Data Security: 26th International Conference, FC …, 2022 | 1 | 2022 |
MultiEvasion: Evasion Attacks Against Multiple Malware Detectors H Liu, W Sun, N Niu, B Wang 2022 IEEE Conference on Communications and Network Security (CNS), 10-18, 2022 | 1 | 2022 |
Advtraffic: Obfuscating encrypted traffic with adversarial examples H Liu, J Dani, H Yu, W Sun, B Wang 2022 IEEE/ACM 30th International Symposium on Quality of Service (IWQoS), 1-10, 2022 | 2 | 2022 |
SPEEDSTER: An efficient multi-party state channel via enclaves J Liao, F Zhang, W Sun, W Shi Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 5 | 2022 |
Protecting regression models with personalized local differential privacy X Li, H Yan, Z Cheng, W Sun, H Li IEEE Transactions on Dependable and Secure Computing 20 (2), 960-974, 2022 | 13 | 2022 |
Insider-resistant context-based pairing for multimodality sleep apnea test Y Zheng, SMM Islam, Y Pan, M Millan, S Aggelopoulos, B Lu, A Yang, ... 2021 IEEE Global Communications Conference (GLOBECOM), 1-6, 2021 | 1 | 2021 |
PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials J Lei, Q Pei, Y Wang, W Sun, X Liu IEEE Transactions on Dependable and Secure Computing 19 (5), 3101-3112, 2021 | 11 | 2021 |
Technical Report: Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test Y Zheng, SMM Islam, Y Pan, M Millan, S Aggelopoulos, B Lu, A Yang, ... arXiv preprint arXiv:2105.00314, 2021 | 1 | 2021 |
Speedster: A TEE-assisted State Channel System J Liao, F Zhang, W Sun, W Shi arXiv preprint arXiv:2104.01289, 2021 | | 2021 |
Monitoring-based differential privacy mechanism against query flooding-based model extraction attack H Yan, X Li, H Li, J Li, W Sun, F Li IEEE Transactions on Dependable and Secure Computing 19 (4), 2680-2694, 2021 | 40 | 2021 |
Towards Overcoming the Undercutting Problem T Gong, M Minaei, W Sun, A Kate Financial Cryptography and Data Security 2022 (FC'22), 2020 | 12* | 2020 |
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang ACM WiSec 2020, 2020 | 53 | 2020 |
Mitigating query-flooding parameter duplication attack on regression models with high-dimensional Gaussian mechanism X Li, H Li, H Yan, Z Cheng, W Sun, H Zhu arXiv preprint arXiv:2002.02061, 2020 | 1 | 2020 |
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data Y Chen, Q Zheng, D Liu, Z Yan, W Sun, N Zhang, W Lou, YT Hou arXiv preprint arXiv:1912.08454, 2019 | | 2019 |