Towards decentralized IoT security enhancement: A blockchain approach Y Qian, Y Jiang, J Chen, Y Zhang, J Song, M Zhou, M Pustišek Computers & Electrical Engineering 72, 266-273, 2018 | 186 | 2018 |
Uncovering the face of android ransomware: Characterization and real-time detection J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn IEEE Transactions on Information Forensics and Security 13 (5), 1286-1300, 2017 | 183 | 2017 |
Certchain: Public and efficient certificate audit based on blockchain for tls connections J Chen, S Yao, Q Yuan, K He, S Ji, R Du IEEE INFOCOM 2018-IEEE conference on computer communications, 2060-2068, 2018 | 168 | 2018 |
Identification of kidney transplant recipients with coronavirus disease 2019 H Zhang, Y Chen, Q Yuan, QX Xia, XP Zeng, JT Peng, J Liu, XY Xiao, ... European urology 77 (6), 742-747, 2020 | 162 | 2020 |
Privacy protection and intrusion avoidance for cloudlet-based medical data sharing M Chen, Y Qian, J Chen, K Hwang, S Mao, L Hu IEEE transactions on Cloud computing 8 (4), 1274-1283, 2016 | 125 | 2016 |
Privacy-aware service placement for mobile edge computing via federated learning Y Qian, L Hu, J Chen, X Guan, MM Hassan, A Alelaiwi Information Sciences 505, 562-570, 2019 | 116 | 2019 |
Backdoor pre-trained models can transfer to all L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang arXiv preprint arXiv:2111.00197, 2021 | 107 | 2021 |
DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments K He, J Chen, R Du, Q Wu, G Xue, X Zhang IEEE Transactions on Computers 65 (12), 3631-3645, 2016 | 102 | 2016 |
Secure enforcement in cognitive internet of vehicles Y Qian, M Chen, J Chen, MS Hossain, A Alamri IEEE Internet of Things Journal 5 (2), 1242-1250, 2018 | 83 | 2018 |
Blind filtering at third parties: An efficient privacy-preserving framework for location-based services J Chen, K He, Q Yuan, M Chen, R Du, Y Xiang IEEE Transactions on Mobile Computing 17 (11), 2524-2535, 2018 | 78 | 2018 |
Secure dynamic searchable symmetric encryption with constant client storage cost K He, J Chen, Q Zhou, R Du, Y Xiang IEEE Transactions on Information Forensics and Security 16, 1538-1549, 2020 | 75 | 2020 |
Dominating Set and Network Coding-based Routing in Wireless Mesh Networks J Chen, K He, R Du, Y Xiang, M Zheng, Q Yuan IEEE Transactions on Parallel and Distributed System, 2014 | 72 | 2014 |
Dynamic group-oriented provable data possession in the cloud K He, J Chen, Q Yuan, S Ji, D He, R Du IEEE Transactions on Dependable and Secure Computing 18 (3), 1394-1408, 2019 | 61 | 2019 |
Smartseed: Smart seed generation for efficient fuzzing C Lyu, S Ji, Y Li, J Zhou, J Chen, J Chen arXiv preprint arXiv:1807.02606, 2018 | 52 | 2018 |
XAuth: Efficient privacy-preserving cross-domain authentication J Chen, Z Zhan, K He, R Du, D Wang, F Liu IEEE Transactions on Dependable and Secure Computing 19 (5), 3301-3311, 2021 | 51 | 2021 |
Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks C Wu, K He, J Chen, Z Zhao, R Du 29th USENIX Security Symposium (USENIX Security 20), 2219-2236, 2020 | 51 | 2020 |
Batch identification game model for invalid signatures in wireless mobile networks J Chen, K He, Q Yuan, G Xue, R Du, L Wang IEEE Transactions on Mobile Computing 16 (6), 1530-1543, 2016 | 50 | 2016 |
Anti-forgery: Towards a stealthy and robust deepfake disruption attack via adversarial perceptual-aware perturbations R Wang, Z Huang, Z Chen, L Liu, J Chen, L Wang arXiv preprint arXiv:2206.00477, 2022 | 43 | 2022 |
Optimal location privacy preserving and service quality guaranteed task allocation in vehicle-based crowdsensing networks Y Qian, Y Ma, J Chen, D Wu, D Tian, K Hwang IEEE Transactions on Intelligent Transportation Systems 22 (7), 4367-4375, 2021 | 40 | 2021 |
Adaptive energy-efficient scheduling algorithm for parallel tasks on homogeneous clusters W Liu, W Du, J Chen, W Wang, G Zeng Journal of Network and Computer Applications, 2013 | 40 | 2013 |