Kui Ren
#94,269
Most Influential Person Now
Engineer
Kui Ren's AcademicInfluence.com Rankings
Kui Renengineering Degrees
Engineering
#2308
World Rank
#3196
Historical Rank
Applied Physics
#277
World Rank
#287
Historical Rank
Electrical Engineering
#398
World Rank
#446
Historical Rank
Download Badge
Engineering
Kui Ren's Degrees
- Bachelors Electrical Engineering Tsinghua University
Why Is Kui Ren Influential?
(Suggest an Edit or Addition)According to Wikipedia, Kui Ren is an engineer at the State University of New York, Buffalo. He was named a Fellow of the Institute of Electrical and Electronics Engineers in 2016 for his contributions to security and privacy in cloud computing and wireless networks.
Kui Ren's Published Works
Published Works
- Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing (2010) (2134)
- Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing (2010) (1432)
- Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing (2011) (1358)
- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing (2009) (1311)
- Fuzzy Keyword Search over Encrypted Data in Cloud Computing (2010) (1105)
- Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption (2013) (1026)
- Secure Ranked Keyword Search over Encrypted Cloud Data (2010) (959)
- Security Challenges for the Public Cloud (2012) (947)
- Attribute based data sharing with attribute revocation (2010) (928)
- Toward Secure and Dependable Storage Services in Cloud Computing (2012) (796)
- Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement (2016) (774)
- Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data (2012) (653)
- Data security and privacy in wireless body area networks (2010) (624)
- Privacy-preserving multi-keyword ranked search over encrypted cloud data (2011) (597)
- A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing (2016) (586)
- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings (2010) (585)
- Ensuring data storage security in Cloud Computing (2009) (568)
- Toward publicly auditable secure cloud data storage services (2010) (566)
- Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage (2013) (509)
- Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement (2016) (506)
- DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems (2013) (489)
- Modeling Load Redistribution Attacks in Power Systems (2011) (395)
- Secure and practical outsourcing of linear programming in cloud computing (2011) (353)
- Achieving usable and privacy-assured similarity search over outsourced cloud data (2012) (336)
- Adversarial Attacks and Defenses in Deep Learning (2020) (302)
- Attribute-based signature and its applications (2010) (275)
- LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks (2006) (272)
- Fast and scalable secret key generation exploiting channel phase randomness in wireless networks (2011) (247)
- Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy (2016) (242)
- Secret key generation exploiting channel characteristics in wireless communications (2011) (225)
- Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance (2009) (215)
- Multi-user Broadcast Authentication in Wireless Sensor Networks (2007) (208)
- Privacy-Aware Attribute-Based Encryption with User Accountability (2009) (204)
- On Broadcast Authentication in Wireless Sensor Networks (2006) (197)
- FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks (2009) (191)
- A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks (2018) (185)
- Quantitative Analysis of Load Redistribution Attacks in Power Systems (2012) (178)
- Enabling Cloud Storage Auditing With Key-Exposure Resistance (2015) (162)
- Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection (2018) (161)
- When cloud meets eBay: Towards effective pricing for cloud computing (2012) (159)
- Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing (2011) (150)
- Attribute-based fine-grained access control with efficient revocation in cloud storage systems (2013) (150)
- A novel privacy preserving authentication and access control scheme for pervasive computing environments (2006) (147)
- All your location are belong to us: breaking mobile social networks for automated user location tracking (2013) (146)
- Ensuring Security and Privacy Preservation for Cloud Data Services (2016) (145)
- Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data (2017) (142)
- Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System (2017) (141)
- Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization (2018) (139)
- Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations (2013) (139)
- Towards Optimal Electric Demand Management for Internet Data Centers (2012) (139)
- Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy (2018) (138)
- Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing (2018) (138)
- Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply (2009) (133)
- Generating Synthetic Decentralized Social Graphs with Local Differential Privacy (2017) (131)
- Secure ad hoc trust initialization and key management in wireless body area networks (2013) (126)
- Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates (2016) (126)
- Highly reliable trust establishment scheme in ad hoc networks (2004) (124)
- Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems (2015) (124)
- GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy (2019) (123)
- Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud (2013) (119)
- Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud (2015) (117)
- Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise (2017) (110)
- Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data (2020) (108)
- Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels (2011) (108)
- Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing (2014) (107)
- PointCloud Saliency Maps (2018) (106)
- SBVLC: Secure barcode-based visible light communication for smartphones (2016) (106)
- Enhancing Attribute-Based Encryption with Attribute Hierarchy (2009) (103)
- Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks (2010) (102)
- A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control (2009) (97)
- USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks (2012) (96)
- My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers (2016) (95)
- The Security of Autonomous Driving: Threats, Defenses, and Future Directions (2020) (94)
- Attribute-based content distribution with hidden policy (2008) (92)
- Distributionally Adversarial Attack (2018) (92)
- Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems (2009) (90)
- GREP: Guaranteeing Reliability with Enhanced Protection in NFV (2015) (89)
- DPPro: Differentially Private High-Dimensional Data Release via Random Projection (2017) (85)
- Symmetric-Key Based Proofs of Retrievability Supporting Public Verification (2015) (83)
- Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming (2016) (83)
- Distributed Privacy-Preserving Access Control in Sensor Networks (2012) (83)
- You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones (2017) (82)
- Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos (2015) (80)
- Toward privacy-assured and searchable cloud data storage services (2013) (79)
- Blind Recognition of Touched Keys on Mobile Devices (2014) (76)
- Wireless Physical-Layer Identification: Modeling and Validation (2015) (75)
- Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs (2008) (74)
- Enabling efficient access control with dynamic policy updating for big data in the cloud (2014) (71)
- Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation (2015) (70)
- Messages behind the sound: real-time hidden acoustic signal capture with smartphones (2016) (70)
- Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication (2012) (69)
- CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud (2015) (69)
- Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data (2016) (68)
- Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data (2017) (68)
- Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations (2011) (67)
- RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy (2016) (65)
- PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks (2010) (65)
- ${\ssr{PriWhisper}}$ : Enabling Keyless Secure Acoustic Communication for Smartphones (2014) (64)
- Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply (2006) (63)
- Persistent Fault Analysis on Block Ciphers (2018) (62)
- Software Defined Cooperative Offloading for Mobile Cloudlets (2017) (61)
- Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks (2008) (58)
- A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing (2014) (58)
- Routing optimization security in mobile IPv6 (2006) (57)
- Feature Importance-aware Transferable Adversarial Attacks (2021) (57)
- Attribute-based on-demand multicast group setup with membership anonymity (2008) (57)
- A new approach for random key pre-distribution in large-scale wireless sensor networks (2006) (57)
- Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing (2009) (55)
- Anti-jamming communication in cognitive radio networks with unknown channel statistics (2011) (54)
- Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing (2015) (54)
- Toward Privacy-Preserving Personalized Recommendation Services (2018) (54)
- Lightweight Privacy-Preserving Ensemble Classification for Face Recognition (2019) (53)
- Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer (2020) (53)
- EyeVeri: A secure and usable approach for smartphone user authentication (2016) (52)
- DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks (2009) (50)
- LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed (2017) (49)
- PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing (2020) (49)
- Enabling Privacy-Preserving Image-Centric Social Discovery (2014) (48)
- Security and Privacy on Authentication Protocol for Low-cost RFID (2005) (47)
- Toward secure and effective data utilization in public cloud (2012) (47)
- Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability (2007) (47)
- Data Poisoning Attack against Knowledge Graph Embedding (2019) (46)
- Enabling Generic, Verifiable, and Secure Data Search in Cloud Services (2018) (46)
- SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates (2017) (46)
- Security, privacy, and accountability in wireless access networks (2009) (45)
- Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes (2015) (43)
- Privacy-Preserving Image Processing in the Cloud (2018) (42)
- Privacy-Preserving Object Detection for Medical Images With Faster R-CNN (2019) (41)
- Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars (2019) (40)
- Delay-bounded adaptive UFH-based anti-jamming wireless communication (2011) (39)
- Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets (2014) (39)
- Rise of Mini-Drones: Applications and Issues (2015) (37)
- Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing (2016) (36)
- Practical Secure Computation Outsourcing (2018) (35)
- Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters (2018) (35)
- LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs (2020) (35)
- Towards Secure and Effective Utilization over Encrypted Cloud Data (2011) (35)
- A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks (2008) (35)
- ABC: Enabling Smartphone Authentication with Built-in Camera (2018) (34)
- SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud (2016) (34)
- Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks (2009) (33)
- Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory (2019) (33)
- Efficient user revocation for privacy-aware PKI (2008) (33)
- Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data (2016) (32)
- Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible (2015) (32)
- SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox (2017) (32)
- VocalPrint: exploring a resilient and secure voice authentication via mmWave biometric interrogation (2020) (31)
- An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery (2018) (31)
- When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid (2017) (30)
- Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks (2016) (30)
- PEKSrand: Providing Predicate Privacy in Public-Key Encryption with Keyword Search (2011) (30)
- Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones (2019) (29)
- FederBoost: Private Federated Learning for GBDT (2020) (29)
- On the synchronization bottleneck of OpenStack Swift-like cloud storage systems (2016) (29)
- Geographic On-Demand Disjoint Multipath Routing in Wireless Ad Hoc Networks (2005) (27)
- A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks (2008) (27)
- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient (2003) (26)
- Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond (2018) (26)
- Security Policy Violations in SDN Data Plane (2018) (26)
- Proof-Carrying Cloud Computation: The Case of Convex Optimization (2013) (26)
- A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags (2007) (25)
- Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem (2020) (25)
- Capability-Based Security Enforcement in Named Data Networking (2017) (25)
- Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing (2020) (25)
- TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems (2012) (24)
- FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification (2019) (24)
- PhantomCache: Obfuscating Cache Conflicts with Localized Randomization (2020) (24)
- Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation (2009) (24)
- Jamming-Resilient Dynamic Spectrum Access for Cognitive Radio Networks (2011) (23)
- SonicPrint: a generally adoptable and secure fingerprint biometrics in smart devices (2020) (23)
- P2-SAS: preserving users' privacy in centralized dynamic spectrum access systems (2016) (23)
- EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid (2020) (23)
- An empirical study on ARM disassembly tools (2020) (22)
- Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control (2016) (22)
- Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor (2016) (22)
- EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics (2019) (22)
- Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum (2019) (22)
- Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution (2019) (22)
- Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things (2020) (21)
- SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing (2016) (21)
- Anonymous ID-Based Group Key Agreement for Wireless Networks (2008) (21)
- You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center (2020) (21)
- e-PoS: Making Proof-of-Stake Decentralized and Fair (2021) (21)
- Towards understanding flash loan and its applications in defi ecosystem (2020) (20)
- Detection and Mitigation of DoS Attacks in Software Defined Networks (2020) (20)
- Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval (2017) (20)
- WiPIN: Operation-Free Passive Person Identification Using Wi-Fi Signals (2018) (19)
- Joint UFH and power control for effective wireless anti-jamming communication (2012) (19)
- k-Indistinguishable Traffic Padding in Web Applications (2012) (19)
- Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback (2018) (19)
- Energy-Efficient Geographic Routing in Environmentally Powered Wireless Sensor Networks (2006) (18)
- $P^{2}$ -SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System (2017) (18)
- One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis (2019) (18)
- Wavoice: A Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals (2021) (18)
- FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks (2017) (18)
- Persistent Fault Attack in Practice (2020) (17)
- Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID (2018) (17)
- How privacy leaks from bluetooth mouse? (2012) (17)
- DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications (2021) (17)
- POSTER: LocMask: A Location Privacy Protection Framework in Android System (2014) (17)
- Optimal budget deployment strategy against power grid interdiction (2013) (17)
- Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids (2017) (16)
- Guest Editorial Cyber, Physical, and System Security for Smart Grid (2011) (16)
- Privacy-preserving outsourcing of image global feature detection (2014) (15)
- THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply (2017) (15)
- OneFi: One-Shot Recognition for Unseen Gesture via COTS WiFi (2021) (15)
- Password Extraction via Reconstructed Wireless Mouse Trajectory (2016) (15)
- Fault-tolerant Event Boundary Detection in Wireless Sensor Networks (2006) (14)
- Towards Privacy-Preserving and Practical Image-Centric Social Discovery (2018) (14)
- When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access (2017) (14)
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE (2020) (14)
- Towards Differentially Private Truth Discovery for Crowd Sensing Systems (2018) (14)
- Opportunistic spectrum access: from stochastic channels to non-stochastic channels (2013) (13)
- TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints (2019) (13)
- Communication Security in Wireless Sensor Networks (2008) (13)
- Unveiling the Mystery of Internet Packet Forwarding (2020) (13)
- WSN09-3: Fault-tolerant Event Boundary Detection in Wireless Sensor Networks (2006) (12)
- Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus (2019) (12)
- Towards Understanding and Demystifying Bitcoin Mixing Services (2020) (12)
- Deaf-aid: mobile IoT communication exploiting stealthy speaker-to-gyroscope channel (2020) (12)
- Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models (2022) (12)
- Towards Privacy-Preserving Malware Detection Systems for Android (2018) (12)
- Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures (2017) (12)
- Time-Slotted Round-Trip Carrier Synchronization in Large-Scale Wireless Networks (2008) (11)
- EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum (2020) (11)
- User capacity of wireless physical-layer identification: An information-theoretic perspective (2015) (11)
- An enhanced lightweight authentication protocol for access control in wireless LANs (2004) (11)
- Towards Understanding the Adversarial Vulnerability of Skeleton-based Action Recognition (2020) (11)
- Preserving Incumbent Users’ Privacy in Exclusion-Zone-Based Spectrum Access Systems (2016) (11)
- “Adversarial Examples” for Proof-of-Learning (2021) (11)
- Ring Authenticated Encryption: A New Type of Authenticated Encryption (2004) (11)
- HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services (2020) (11)
- Efficient Authenticated Key Agreement Protocol for Dynamic Groups (2004) (11)
- Multicast with an Application-Oriented Networking (AON) Approach (2008) (11)
- Privacy enhanced access control in pervasive computing environments (2005) (10)
- Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition (2018) (10)
- Locating malicious nodes for data aggregation in wireless networks (2012) (10)
- Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply (2014) (10)
- RFace: Anti-Spoofing Facial Authentication Using COTS RFID (2021) (10)
- On efficient key pre-distribution in large scale wireless sensor networks (2005) (10)
- Towards Data Poisoning Attack against Knowledge Graph Embedding (2019) (9)
- User Capacity of Wireless Physical-Layer Identification (2017) (9)
- Multiple‐replica integrity auditing schemes for cloud data storage (2019) (9)
- What's (Not) Validating Network Paths: A Survey (2018) (9)
- My Smartphone Recognizes Genuine QR Codes! (2018) (9)
- zk-AuthFeed: How to Feed Authenticated Data into Smart Contract with Zero Knowledge (2019) (9)
- Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks (2010) (8)
- Guaranteeing Availability for Network Function Virtualization with Geographic Redundancy Deployment (2015) (8)
- Practical Fully Simulatable Oblivious Transfer with Sublinear Communication (2013) (8)
- From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices (2020) (8)
- RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning (2021) (8)
- Toward Hardware-Rooted Smartphone Authentication (2019) (8)
- Guest Editorial Special Issue on Security for IoT: The State of the Art (2014) (8)
- Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems (2016) (8)
- Learn to Forget: Machine Unlearning Via Neuron Masking (2020) (8)
- Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice (2015) (8)
- False Data Injection Attacks in Smart Grid (2012) (7)
- Secure Device Pairing (2011) (7)
- Securing emerging short range wireless communications: the state of the art (2014) (7)
- On Address Privacy in Mobile Ad Hoc Networks (2009) (7)
- A New Approach to Malware Detection (2009) (7)
- Butterfly (2018) (7)
- PeDSS: Privacy Enhanced and Database-Driven Dynamic spectrum Sharing (2019) (7)
- Privacy-preserving power usage and supply control in smart grid (2018) (7)
- Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization (2021) (6)
- Security and privacy in emerging networks: Part 1 [Guest Editorial] (2015) (6)
- SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones (2014) (6)
- Is PGD-Adversarial Training Necessary? Alternative Training via a Soft-Quantization Network with Noisy-Natural Samples Only (2018) (6)
- zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof (2023) (6)
- Persistent Fault Injection in FPGA via BRAM Modification (2019) (6)
- A Practical Neighbor Discovery Framework for Wireless Sensor Networks (2019) (6)
- Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1 (2017) (6)
- CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation (2022) (6)
- Building In-the-Cloud Network Functions: Security and Privacy Challenges (2021) (6)
- A Proactive Data Security Framework for Mission-Critical Sensor Networks (2006) (6)
- PriWhisper+: An Enhanced Acoustic Short-Range Communication System for Smartphones (2019) (6)
- AcousAuth: An acoustic-based mobile application for user authentication (2014) (6)
- BioDraw: Reliable Multi-Factor User Authentication with One Single Finger Swipe (2020) (5)
- Learning Saliency Maps for Adversarial Point-Cloud Generation (2018) (5)
- Atomos: Constant-Size Path Validation Proof (2020) (5)
- Security and Cloud Outsourcing Framework for Economic Dispatch (2018) (5)
- The power of indoor crowd: Indoor 3D maps from the crowd (2014) (5)
- VocalPrint: A mmWave-Based Unmediated Vocal Sensing System for Secure Authentication (2021) (5)
- Privacy Implications of DNSSEC Look-Aside Validation (2017) (5)
- Anonymous Misbehavior Detection in Mobile Ad Hoc Networks (2008) (5)
- Building Generic Scalable Middlebox Services Over Encrypted Protocols (2018) (5)
- DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud (2016) (5)
- The ring authenticated encryption scheme - How to provide a clue wisely (2009) (5)
- SecSIFT (2016) (5)
- Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging (2021) (5)
- Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies (2017) (5)
- Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum (2020) (5)
- Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX (2020) (5)
- Are You Confident That You Have Successfully Generated Adversarial Examples? (2020) (5)
- Poisoning-Assisted Property Inference Attack Against Federated Learning (2022) (5)
- RFL: Robust fault localization on unreliable communication channels (2019) (4)
- Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT (2019) (4)
- Secure Integrated Circuit Design via Hybrid Cloud (2018) (4)
- Behavior Privacy Preserving in RF Sensing (2023) (4)
- A new approach for random key pre-distribution in large-scale wireless sensor networks: Research Articles (2006) (4)
- Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level (2021) (4)
- Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFID (2021) (4)
- Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications (2013) (4)
- Faster Secure Multiparty Computation of Adaptive Gradient Descent (2020) (4)
- Theoretical analysis of persistent fault attack (2020) (4)
- Adversary Helps: Gradient-based Device-Free Domain-Independent Gesture Recognition (2020) (4)
- Zero Knowledge Contingent Payments for Trained Neural Networks (2021) (4)
- PESC: A Per System-Call Stack Canary Design for Linux Kernel (2020) (4)
- MandiPass: Secure and Usable User Authentication via Earphone IMU (2021) (4)
- CIM: Camera in Motion for Smartphone Authentication (2019) (4)
- Private image computation: The case of cloud based privacy-preserving SIFT (2014) (3)
- Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers (2020) (3)
- Towards Secure Link Quality Measurement in Multihop Wireless Networks (2008) (3)
- Guest Editorial: Introduction to the Special Section on Emerging Security Trends for Biomedical Computations, Devices, and Infrastructures (2016) (3)
- The New Frontiers of Cybersecurity (2018) (3)
- Atlas: A First Step Toward Multipath Validation (2020) (3)
- Middlebox-Based Packet-Level Redundancy Elimination Over Encrypted Network Traffic (2018) (3)
- Defending against Speaker Fingerprinting Based Device Tracking for Smartphones (2017) (3)
- Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service (2016) (3)
- A Behavior Privacy Preserving Method towards RF Sensing (2021) (3)
- PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition (2022) (3)
- SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction (2018) (3)
- SECURITY AND PRIVACY IN EMERGING NETWORKS: PART II (2015) (3)
- A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures (2020) (3)
- ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels (2019) (3)
- Accelerometer-based smartphone eavesdropping (2020) (3)
- Real-time hidden acoustic signal capture with smartphones: demo (2016) (3)
- Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance (2019) (3)
- Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment (2016) (3)
- Fluctuating Power Logic: SCA Protection by $V_{DD}$ Randomization at the Cell-level (2019) (3)
- Editorial: IEEE Communications Surveys & TutorialsSpecial Section on Energy and Smart Grid (2014) (2)
- A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses (2022) (2)
- Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security (2015) (2)
- Secure Outsourcing Image Feature Extraction: Challenges and Solutions (2015) (2)
- Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid (2018) (2)
- An Efficient E2E Crowd Verifiable E-Voting System (2021) (2)
- Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE (2021) (2)
- Introduction to the special section on emerging security trends for biomedical computations, devices, and infrastructures: guest editorial (2016) (2)
- SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy (2016) (2)
- Chapter 15 – Data Security in Cloud Computing (2012) (2)
- Security in cognitive radio networks [Guest Editorial] (2013) (2)
- A Proactive Data Security Framework for Mission-Critical Wireless Sensor Networks (2006) (2)
- Special Issue on Security and Privacy in Mobile Clouds (2016) (2)
- Security and privacy in emerging networks: Part II [Guest Editorial] (2015) (2)
- DUMP: A Dummy-Point-Based Framework for Histogram Estimation in Shuffle Model (2020) (2)
- Efficient fine-grained data access control in wireless sensor networks (2009) (2)
- Enabling IP Protection for Outsourced Integrated Circuit Design (2015) (2)
- mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect (2022) (2)
- Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks (2010) (2)
- Mask does not matter: anti-spoofing face authentication using mmWave without on-site registration (2022) (2)
- Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation (2021) (2)
- VocalPrint (2020) (2)
- CVTEE: A Compatible Verified TEE Architecture With Enhanced Security (2023) (2)
- UC Secure Private Branching Program and Decision Tree Evaluation (2021) (2)
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution (2021) (2)
- RegVault: hardware assisted selective data randomization for operating system kernels (2022) (2)
- CTJammer: A Cross-Technology Reactive Jammer towards Unlicensed LTE (2022) (2)
- Increasing User Capacity of Wireless Physical-Layer Identification in Internet of Things (2016) (2)
- Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation (2020) (1)
- PCM: a privacy-preserving detection mechanism in mobile ad hoc networks (2010) (1)
- MINOS: regulating router dataplane actions in dynamic runtime environments (2017) (1)
- PESC (2020) (1)
- Privacy Enhancement Via Dummy Points in the Shuffle Model (2020) (1)
- Securing acoustics-based short-range communication systems: an overview (2016) (1)
- Public-Key Authenticated Encryption (2011) (1)
- Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy (2008) (1)
- EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM (2022) (1)
- Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers (2022) (1)
- Scanning the Voice of Your Fingerprint With Everyday Surfaces (2021) (1)
- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid (2015) (1)
- InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks (2019) (1)
- Secure data service outsourcing in cloud computing (2012) (1)
- Security and Privacy in Communication Networks (2017) (1)
- Improving Blockchains With Client-Assistance (2022) (1)
- Supplementary Material — Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption (2012) (1)
- Exploiting Pairing-Based Zero Knowledge Proof (ZKP) for Tactical Network Authentication (2012) (1)
- Succinct Scriptable NIZK via Trusted Hardware (2021) (1)
- Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications (2013) (1)
- Wireless key establishment with asynchronous clocks (2011) (1)
- Disguised as Privacy: Data Poisoning Attacks against Differentially Private Crowdsensing Systems (2022) (1)
- EnBinDiff: Identifying Data-Only Patches for Binaries (2023) (1)
- Pervasive Computing in Hospitals (2016) (1)
- Automatic Permission Check Analysis for Linux Kernel (2022) (1)
- OPEC: operation-based security isolation for bare-metal embedded systems (2022) (1)
- Security Challenges in the Container Cloud (2021) (1)
- Software-Based Attestation (2011) (1)
- VDom: Fast and Unlimited Virtual Domains on Multiple Architectures (2023) (1)
- Physical-World Attack towards WiFi-based Behavior Recognition (2022) (1)
- Reliable Digital Forensics in the Air (2022) (1)
- Device-independent Smartphone Eavesdropping Jointly using Accelerometer and Gyroscope (2022) (1)
- Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices (2022) (1)
- RuleOut Forwarding Anomalies for SDN (2023) (1)
- UniAP: Protecting Speech Privacy with Non-targeted Universal Adversarial Perturbations (2023) (1)
- mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device (2022) (1)
- Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling (2023) (1)
- AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake (2023) (1)
- Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers (2022) (1)
- Wavesdropper (2022) (1)
- Secure User Verification and Continuous Authentication Via Earphone IMU (2022) (1)
- ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels (2021) (1)
- Enabling private and non-intrusive smartphone calls with LipTalk (2014) (0)
- 2.2 Physical Attacks (2019) (0)
- AUTOMATICALLY LOCATING ARM INSTRUCTIONS DEVIATION (2021) (0)
- AIR FORCE RESEARCH LABORATORY INFORMATION DIRECTORATE EXPLOITING PAIRING-BASED ZERO KNOWLEDGE PROOF (ZKP) FOR TACTICAL NETWORK AUTHENTICATION ILLINOIS INSTITUTE OF TECHNOLOGY MARCH 2012 FINALTECHNICAL REPORT (2012) (0)
- A Framework for Behavior Privacy Preserving in Radio Frequency Signal (2020) (0)
- Trustworthy Authentication for IoT with Human-and-Environment-in-the-Loop (2019) (0)
- Chapter 5 . 3 : Data Security in Cloud Computing (2011) (0)
- Improvements and recent updates of persistent fault analysis on block ciphers (2020) (0)
- Towards address privacy in mobile ad hoc networks (2008) (0)
- A Dynamic K-means Algorithm for Searching Conserved Encrypted Data in a Cloud (2016) (0)
- The Dual Role of Smartphones in IoT Security (2017) (0)
- An Efficient and Secure Nonlinear Programming Outsourcing in Cloud Computing (2019) (0)
- Searchable Encryption: From Concepts to Systems (2023) (0)
- A non-intrusive and adaptive speaker de-identification scheme using adversarial examples (2022) (0)
- A new data acquisition design for breast cancer detection system (2013) (0)
- SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing (2022) (0)
- Privacy-Preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction (2017) (0)
- Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks (2011) (0)
- PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting (2021) (0)
- Subgroup Cryptosystems (2011) (0)
- Towards Optimal UFH-based Anti-jamming Wireless Communication (2010) (0)
- DARPT: defense against remote physical attack based on TDC in multi-tenant scenario (2022) (0)
- KITE: Exploring the Practical Threat from Acoustic Transduction Attacks on Inertial Sensors (2022) (0)
- International Journal of Advance Research in Computer Science and Management Studies (2015) (0)
- Silent Two-party Computation Assisted by Semi-trusted Hardware (2020) (0)
- ZK Contingent Payments for Trained Neural Networks (2021) (0)
- Attack to multisignature schemes based on discrete logarithm (2004) (0)
- Encrypted Databases: Progresses and Challenges (2021) (0)
- Multi-Party Private Function Evaluation for RAM (2023) (0)
- Revisiting challenges for selective data protection of real applications (2021) (0)
- SPABox: Safeguarding Privacy and against Attacks at a MiddleBox (2016) (0)
- Towards Class-balanced Privacy Preserving Heterogeneous Model Aggregation (2022) (0)
- Effective Multi-user Broadcast Authentication in Wireless Sensor Networks (2009) (0)
- Security for Encrypted Data in Cloud Server Search (2018) (0)
- Location Privacy-Aware Task Offloading in Mobile Edge Computing (2023) (0)
- ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures (2022) (0)
- Ranked Search on Encrypted Data (2021) (0)
- WIRELESS DEVICE IDENTIFICATION FROM A PHASE NOISE PROSPECTIVE BY RICCARDO RUBINO (2010) (0)
- PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot (2022) (0)
- Privacy-Preserving Public Authentication for Shared Data in Cloud (2018) (0)
- Message from the IEEE TrustCom 2016 Program Chairs (2016) (0)
- A Comprehensive Study on ARM Disassembly Tools (2023) (0)
- Capacity Management for Virtualized Data Centers using ECIES and Scheduling (2018) (0)
- Fingersound: A Low-cost and Deployable Authentication System with Fingertip Sliding Sound (2023) (0)
- Guest Editorial Special Issue on Intrusion Detection for the Internet of Things (2023) (0)
- GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility (2022) (0)
- SAGE: Steering the Adversarial Generation of Examples With Accelerations (2023) (0)
- On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers (2023) (0)
- Privacy-Preserving Industrial Control System Anomaly Detection Platform (2023) (0)
- RegVault (2022) (0)
- InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise (2023) (0)
- Poster: PA-Boot: A formally Verified Processor Authentication Protocol for SMP Secure Boot (2022) (0)
- Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain (2022) (0)
- Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing (2023) (0)
- Automatically Locating ARM Instructions Deviation between Real Devices and CPU Emulators (2021) (0)
- Scriptable and composable SNARKs in the trusted hardware model (2022) (0)
- iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps (2022) (0)
- Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms (2022) (0)
- Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines (2023) (0)
- Mobile Communication Among COTS IoT Devices via a Resonant Gyroscope With Ultrasound (2022) (0)
- Wavoice (2021) (0)
- VoiceListener (2022) (0)
- Proof of Comprehensive Performance (2021) (0)
- CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations (2022) (0)
- OneFi (2021) (0)
- Security and Privacy in Communication Networks (2016) (0)
- mmEve (2022) (0)
- Cryptanalysis of An Encrypted Database in SIGMOD '14 (2021) (0)
- Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV object detection (2022) (0)
- Device-free Crowd Density Estimation with Off-the-shelf WiFi Traffic (2022) (0)
- IoT Sensors and Devices Area Editor (2014) (0)
- MotoPrint: Reconfigurable Vibration Motor Fingerprint Via Homologous Signals Learning (2023) (0)
- E-LEARNING SYSTEM WITH HIERARCHICAL ATTRIBUTE SET BASED ENCRYPTION ACCESS CONTROL IN CLOUD (2016) (0)
- Session details: Session 7C -- Wireless Security (2014) (0)
- Privacy Leakage in Wireless Charging (2022) (0)
- CFP: Enabling Camera Fingerprint Concealment for Privacy-Preserving Image Sharing (2019) (0)
- Editorial (2018) (0)
- MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags (2023) (0)
- Paper list (2009) (0)
- A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices (2021) (0)
- FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing (2022) (0)
- CamRadar (2022) (0)
- A Cloud Approach for Secure Multi Data sharing between the Users (2014) (0)
- VoiceListener : A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices (2023) (0)
- SecSAKE (2018) (0)
- DUMP: A Dummy-point-based Local Differential Privacy Enhancement Approach under the Shuffle Model (2021) (0)
- Privacy-Preserving Authentication in Wireless Access Networks (2011) (0)
- Demo: Accelerometer-based Smartphone Eavesdropping (2020) (0)
- Session details: SM2: applications (2014) (0)
- Poster Abstract: Secure Remote Key Initialization of Wireless IoT (2020) (0)
- Review : Survey of design and security evaluation of authenticated encryption algorithms in theCAESARcompetition (2019) (0)
- Private Key Cryptosystem (2006) (0)
- SAS Server Spectrum Allocation Computation SU Radio Propagation Model IU Update : IU Data Request : SU Data Response : (2016) (0)
- Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015 (2015) (0)
- Data Independent Identification for Privacy Preservation (2017) (0)
- A Resilience Evaluation Framework on Ultrasonic Microphone Jammers (2023) (0)
- OPEC (2022) (0)
- Precise methods for distinguishing S‐box faults in laser injection attacks (2019) (0)
- A Framework of Private Set Intersection Protocols (2020) (0)
- Understanding the Privacy Implications of DNSSEC Look-Aside Validation (2017) (0)
- Dagger: Optimistic Byzantine Fault-Tolerance without Rollback (2021) (0)
- Optimized User Revocation for Group Signature Based Privacy-Aware PKI (2008) (0)
- Time to Think the Security of WiFi-Based Behavior Recognition Systems (2023) (0)
- Proceedings of the 5th International Workshop on Trustworthy Embedded Devices (2015) (0)
- Editor of the WTS 2008 Proceedings (2008) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- DARPT (2022) (0)
- Centralized Authorization Service (CAuthS) or Authorization as a Service (AuthaaS)—A Conceptual Architecture (2018) (0)
- Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples (2022) (0)
- Accountable Attribute-Based Broadcast (2009) (0)
- Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems (2014) (0)
- Effective signal region based analog mixed signal design considering variations and applications (2013) (0)
This paper list is powered by the following services:
Other Resources About Kui Ren
What Schools Are Affiliated With Kui Ren?
Kui Ren is affiliated with the following schools: