ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications R Lu, X Lin, H Zhu, PH Ho, X Shen INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 1229-1237, 2008 | 974 | 2008 |
Security and privacy for storage and computation in cloud computing L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen, AV Vasilakos Information sciences 258, 371-386, 2014 | 733 | 2014 |
Securing smart grid: cyber attacks, countermeasures, and challenges X Li, X Liang, R Lu, X Shen, X Lin, H Zhu IEEE Communications Magazine 50 (8), 38-45, 2012 | 471 | 2012 |
Security in vehicular ad hoc networks X Lin, R Lu, C Zhang, H Zhu, PH Ho, X Shen IEEE communications magazine 46 (4), 88-95, 2008 | 460 | 2008 |
Spark: a new vanet-based smart parking scheme for large parking lots R Lu, X Lin, H Zhu, X Shen INFOCOM 2009, IEEE, 1413-1421, 2009 | 407 | 2009 |
SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks H Zhu, X Lin, R Lu, Y Fan, X Shen Vehicular Technology, IEEE Transactions on 58 (8), 4628-4639, 2009 | 367 | 2009 |
Invisible backdoor attacks on deep neural networks via steganography and regularization S Li, M Xue, BZH Zhao, H Zhu, X Zhang IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020 | 331 | 2020 |
Pi: A practical incentive protocol for delay tolerant networks R Lu, X Lin, H Zhu, X Shen, B Preiss IEEE transactions on wireless communications 9 (4), 1483-1493, 2010 | 284 | 2010 |
Homonit: Monitoring smart home apps from encrypted traffic W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 241 | 2018 |
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach S Chen, M Xue, L Fan, S Hao, L Xu, H Zhu, B Li computers & security 73, 326-344, 2018 | 234 | 2018 |
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 222 | 2016 |
Privacy leakage of location sharing in mobile social networks: Attacks and defense H Li, H Zhu, S Du, X Liang, X Shen IEEE Transactions on Dependable and Secure Computing 15 (4), 646-660, 2016 | 220 | 2016 |
A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks H Zhu, S Du, Z Gao, M Dong, Z Cao IEEE Transactions on Parallel and Distributed Systems 25 (1), 22-32, 2013 | 217 | 2013 |
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks R Lu, X Lin, H Zhu, X Liang, XS Shen Parallel and Distributed Systems, IEEE Transactions on, 1-1, 2010 | 207 | 2010 |
Stormdroid: A streaminglized machine learning-based system for detecting android malware S Chen, M Xue, Z Tang, L Xu, H Zhu Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 201 | 2016 |
UAV-assisted data gathering in wireless sensor networks M Dong, K Ota, M Lin, Z Tang, S Du, H Zhu The Journal of Supercomputing 70, 1142-1155, 2014 | 183 | 2014 |
All your location are belong to us: Breaking mobile social networks for automated user location tracking M Li, H Zhu, Z Gao, S Chen, L Yu, S Hu, K Ren Proceedings of the 15th ACM international symposium on Mobile ad hoc …, 2014 | 173 | 2014 |
Achieving privacy preservation in WiFi fingerprint-based localization H Li, L Sun, H Zhu, X Lu, X Cheng Ieee Infocom 2014-IEEE Conference on Computer Communications, 2337-2345, 2014 | 155 | 2014 |
Securing Consumer IoT in Smart Home: Architecture, Challenges and Countermeasures Y Meng, W Zhang, H Zhu, XS Shen December 2018 25 (6), 53 - 59, 2018 | 154 | 2018 |
Human-factor-aware privacy-preserving aggregation in smart grid W Jia, H Zhu, Z Cao, X Dong, C Xiao IEEE Systems Journal 8 (2), 598-607, 2013 | 152 | 2013 |