关注
Haojin Zhu
Haojin Zhu
在 cs.sjtu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
R Lu, X Lin, H Zhu, PH Ho, X Shen
INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 1229-1237, 2008
8972008
Security and privacy for storage and computation in cloud computing
L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen, AV Vasilakos
Information sciences 258, 371-386, 2014
6822014
Security in vehicular ad hoc networks
X Lin, R Lu, C Zhang, H Zhu, PH Ho, X Shen
IEEE communications magazine 46 (4), 88-95, 2008
4482008
Securing smart grid: cyber attacks, countermeasures, and challenges
X Li, X Liang, R Lu, X Shen, X Lin, H Zhu
IEEE Communications Magazine 50 (8), 38-45, 2012
4352012
Spark: a new vanet-based smart parking scheme for large parking lots
R Lu, X Lin, H Zhu, X Shen
INFOCOM 2009, IEEE, 1413-1421, 2009
3802009
SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks
H Zhu, X Lin, R Lu, Y Fan, X Shen
Vehicular Technology, IEEE Transactions on 58 (8), 4628-4639, 2009
3472009
Pi: A practical incentive protocol for delay tolerant networks
R Lu, X Lin, H Zhu, X Shen, B Preiss
IEEE transactions on wireless communications 9 (4), 1483-1493, 2010
2722010
A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks
H Zhu, S Du, Z Gao, M Dong, Z Cao
IEEE Transactions on Parallel and Distributed Systems 25 (1), 22-32, 2013
2062013
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
R Lu, X Lin, H Zhu, X Liang, XS Shen
Parallel and Distributed Systems, IEEE Transactions on, 1-1, 2010
1962010
Privacy leakage of location sharing in mobile social networks: Attacks and defense
H Li, H Zhu, S Du, X Liang, X Shen
IEEE Transactions on Dependable and Secure Computing 15 (4), 646-660, 2016
1862016
Invisible backdoor attacks on deep neural networks via steganography and regularization
S Li, M Xue, BZH Zhao, H Zhu, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020
1822020
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
S Chen, M Xue, L Fan, S Hao, L Xu, H Zhu, B Li
computers & security 73, 326-344, 2018
1802018
Homonit: Monitoring smart home apps from encrypted traffic
W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1782018
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1772016
Stormdroid: A streaminglized machine learning-based system for detecting android malware
S Chen, M Xue, Z Tang, L Xu, H Zhu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
1742016
All your location are belong to us: Breaking mobile social networks for automated user location tracking
M Li, H Zhu, Z Gao, S Chen, L Yu, S Hu, K Ren
Proceedings of the 15th ACM international symposium on Mobile ad hoc …, 2014
1652014
UAV-assisted data gathering in wireless sensor networks
M Dong, K Ota, M Lin, Z Tang, S Du, H Zhu
The Journal of Supercomputing 70, 1142-1155, 2014
1612014
Location privacy in database-driven cognitive radio networks: Attacks and countermeasures
Z Gao, H Zhu, Y Liu, M Li, Z Cao
2013 Proceedings IEEE INFOCOM, 2751-2759, 2013
1402013
Human-factor-aware privacy-preserving aggregation in smart grid
W Jia, H Zhu, Z Cao, X Dong, C Xiao
IEEE Systems Journal 8 (2), 598-607, 2013
1362013
SDSM: a secure data service mechanism in mobile cloud computing
W Jia, H Zhu, Z Cao, L Wei, X Lin
2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2011
1332011
系统目前无法执行此操作,请稍后再试。
文章 1–20