ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications R Lu, X Lin, H Zhu, PH Ho, X Shen INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 1229-1237, 2008 | 897 | 2008 |
Security and privacy for storage and computation in cloud computing L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen, AV Vasilakos Information sciences 258, 371-386, 2014 | 682 | 2014 |
Security in vehicular ad hoc networks X Lin, R Lu, C Zhang, H Zhu, PH Ho, X Shen IEEE communications magazine 46 (4), 88-95, 2008 | 448 | 2008 |
Securing smart grid: cyber attacks, countermeasures, and challenges X Li, X Liang, R Lu, X Shen, X Lin, H Zhu IEEE Communications Magazine 50 (8), 38-45, 2012 | 435 | 2012 |
Spark: a new vanet-based smart parking scheme for large parking lots R Lu, X Lin, H Zhu, X Shen INFOCOM 2009, IEEE, 1413-1421, 2009 | 380 | 2009 |
SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks H Zhu, X Lin, R Lu, Y Fan, X Shen Vehicular Technology, IEEE Transactions on 58 (8), 4628-4639, 2009 | 347 | 2009 |
Pi: A practical incentive protocol for delay tolerant networks R Lu, X Lin, H Zhu, X Shen, B Preiss IEEE transactions on wireless communications 9 (4), 1483-1493, 2010 | 272 | 2010 |
A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks H Zhu, S Du, Z Gao, M Dong, Z Cao IEEE Transactions on Parallel and Distributed Systems 25 (1), 22-32, 2013 | 206 | 2013 |
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks R Lu, X Lin, H Zhu, X Liang, XS Shen Parallel and Distributed Systems, IEEE Transactions on, 1-1, 2010 | 196 | 2010 |
Privacy leakage of location sharing in mobile social networks: Attacks and defense H Li, H Zhu, S Du, X Liang, X Shen IEEE Transactions on Dependable and Secure Computing 15 (4), 646-660, 2016 | 186 | 2016 |
Invisible backdoor attacks on deep neural networks via steganography and regularization S Li, M Xue, BZH Zhao, H Zhu, X Zhang IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020 | 182 | 2020 |
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach S Chen, M Xue, L Fan, S Hao, L Xu, H Zhu, B Li computers & security 73, 326-344, 2018 | 180 | 2018 |
Homonit: Monitoring smart home apps from encrypted traffic W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 178 | 2018 |
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 177 | 2016 |
Stormdroid: A streaminglized machine learning-based system for detecting android malware S Chen, M Xue, Z Tang, L Xu, H Zhu Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 174 | 2016 |
All your location are belong to us: Breaking mobile social networks for automated user location tracking M Li, H Zhu, Z Gao, S Chen, L Yu, S Hu, K Ren Proceedings of the 15th ACM international symposium on Mobile ad hoc …, 2014 | 165 | 2014 |
UAV-assisted data gathering in wireless sensor networks M Dong, K Ota, M Lin, Z Tang, S Du, H Zhu The Journal of Supercomputing 70, 1142-1155, 2014 | 161 | 2014 |
Location privacy in database-driven cognitive radio networks: Attacks and countermeasures Z Gao, H Zhu, Y Liu, M Li, Z Cao 2013 Proceedings IEEE INFOCOM, 2751-2759, 2013 | 140 | 2013 |
Human-factor-aware privacy-preserving aggregation in smart grid W Jia, H Zhu, Z Cao, X Dong, C Xiao IEEE Systems Journal 8 (2), 598-607, 2013 | 136 | 2013 |
SDSM: a secure data service mechanism in mobile cloud computing W Jia, H Zhu, Z Cao, L Wei, X Lin 2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2011 | 133 | 2011 |