Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption M Li, S Yu, Y Zheng, K Ren, W Lou IEEE transactions on parallel and distributed systems 24 (1), 131-143, 2012 | 1559 | 2012 |
DDoS attack protection in the era of cloud computing and software-defined networking B Wang, Y Zheng, W Lou, YT Hou Computer Networks 81, 308-319, 2015 | 521 | 2015 |
A feedback control-based crowd dynamics management in IoT system Y Kawamoto, N Yamada, H Nishiyama, N Kato, Y Shimizu, Y Zheng IEEE Internet of Things Journal 4 (5), 1466-1476, 2017 | 79 | 2017 |
Sharp: Private proximity test and secure handshake with cheat-proof location tags Y Zheng, M Li, W Lou, YT Hou Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 76 | 2012 |
Location based handshake and private proximity test with location tags Y Zheng, M Li, W Lou, YT Hou IEEE Transactions on Dependable and Secure Computing 14 (4), 406-419, 2015 | 59 | 2015 |
Privacy-preserving personal health record system using attribute-based encryption Y Zhen Worcester Polytechnic Institute, 2011 | 53 | 2011 |
Radar-based non-contact continuous identity authentication SMM Islam, O Borić-Lubecke, Y Zheng, VM Lubecke Remote Sensing 12 (14), 2279, 2020 | 45 | 2020 |
Peerclean: Unveiling peer-to-peer botnets through dynamic group behavior analysis Q Yan, Y Zheng, T Jiang, W Lou, YT Hou 2015 IEEE Conference on Computer Communications (INFOCOM), 316-324, 2015 | 44 | 2015 |
Fair: Federated incumbent detection in cbrs band M Troglia, J Melcher, Y Zheng, D Anthony, A Yang, T Yang 2019 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2019 | 22 | 2019 |
Characterizing location-based mobile tracking in mobile ad networks B Hu, Q Lin, Y Zheng, Q Yan, M Troglia, Q Wang 2019 IEEE Conference on Communications and Network Security (CNS), 223-231, 2019 | 22 | 2019 |
Highly efficient known-plaintext attacks against orthogonal blinding based physical layer security Y Zheng, M Schulz, W Lou, YT Hou, M Hollick IEEE Wireless Communications Letters 4 (1), 34-37, 2014 | 20 | 2014 |
Privacy-preserving link prediction in decentralized online social networks Y Zheng, B Wang, W Lou, YT Hou Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 12 | 2015 |
Cognitive security: securing the burgeoning landscape of mobile networks Y Zheng, A Moini, W Lou, YT Hou, Y Kawamoto IEEE Network 30 (4), 66-71, 2016 | 11 | 2016 |
Profiling the strength of physical-layer security: A study in orthogonal blinding Y Zheng, M Schulz, W Lou, YT Hou, M Hollick Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 11 | 2016 |
ROBin: Known-plaintext attack resistant orthogonal blinding via channel randomization Y Pan, Y Zheng, M Li IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1927-1936, 2020 | 7 | 2020 |
Tracking location privacy leakage of mobile ad networks at scale B Hu, Q Yan, Y Zheng IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops …, 2018 | 5 | 2018 |
Identification of COVID-19 type respiratory disorders using channel state analysis of wireless communications links LC Lubecke, K Ishmael, Y Zheng, O Borić-Lubecke, VM Lubecke 2021 43rd Annual International Conference of the IEEE Engineering in …, 2021 | 4 | 2021 |
iJam with channel randomization JL Melcher, Y Zheng, D Anthony, M Troglia, T Yang, A Yang, ... Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 3 | 2020 |
Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns SMM Islam, Y Zheng, Y Pan, M Millan, W Chang, M Li, O Borić-Lubecke, ... IEEE Internet of Things Journal 10 (16), 14197-14211, 2023 | 2 | 2023 |
Phase correlation single channel continuous wave doppler radar recognition of multiple sources K Ishmael, Y Zheng, O Borić-Lubecke Sensors 22 (3), 970, 2022 | 2 | 2022 |