Towards decentralized IoT security enhancement: A blockchain approach Y Qian, Y Jiang, J Chen, Y Zhang, J Song, M Zhou, M Pustišek Computers & Electrical Engineering 72, 266-273, 2018 | 197 | 2018 |
Uncovering the face of android ransomware: Characterization and real-time detection J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn IEEE Transactions on Information Forensics and Security 13 (5), 1286-1300, 2017 | 190 | 2017 |
Certchain: Public and efficient certificate audit based on blockchain for tls connections J Chen, S Yao, Q Yuan, K He, S Ji, R Du IEEE INFOCOM 2018-IEEE conference on computer communications, 2060-2068, 2018 | 177 | 2018 |
Identification of kidney transplant recipients with coronavirus disease 2019 H Zhang, Y Chen, Q Yuan, QX Xia, XP Zeng, JT Peng, J Liu, XY Xiao, ... European urology 77 (6), 742-747, 2020 | 164 | 2020 |
Privacy protection and intrusion avoidance for cloudlet-based medical data sharing M Chen, Y Qian, J Chen, K Hwang, S Mao, L Hu IEEE transactions on Cloud computing 8 (4), 1274-1283, 2016 | 134 | 2016 |
Backdoor pre-trained models can transfer to all L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang arXiv preprint arXiv:2111.00197, 2021 | 131 | 2021 |
Privacy-aware service placement for mobile edge computing via federated learning Y Qian, L Hu, J Chen, X Guan, MM Hassan, A Alelaiwi Information Sciences 505, 562-570, 2019 | 128 | 2019 |
DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments K He, J Chen, R Du, Q Wu, G Xue, X Zhang IEEE Transactions on Computers 65 (12), 3631-3645, 2016 | 105 | 2016 |
Secure dynamic searchable symmetric encryption with constant client storage cost K He, J Chen, Q Zhou, R Du, Y Xiang IEEE Transactions on Information Forensics and Security 16, 1538-1549, 2020 | 87 | 2020 |
Secure enforcement in cognitive internet of vehicles Y Qian, M Chen, J Chen, MS Hossain, A Alamri IEEE Internet of Things Journal 5 (2), 1242-1250, 2018 | 87 | 2018 |
Blind filtering at third parties: An efficient privacy-preserving framework for location-based services J Chen, K He, Q Yuan, M Chen, R Du, Y Xiang IEEE Transactions on Mobile Computing 17 (11), 2524-2535, 2018 | 79 | 2018 |
Dominating Set and Network Coding-based Routing in Wireless Mesh Networks J Chen, K He, R Du, Y Xiang, M Zheng, Q Yuan IEEE Transactions on Parallel and Distributed System, 2014 | 73 | 2014 |
Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks C Wu, K He, J Chen, Z Zhao, R Du 29th USENIX Security Symposium (USENIX Security 20), 2219-2236, 2020 | 68 | 2020 |
XAuth: Efficient privacy-preserving cross-domain authentication J Chen, Z Zhan, K He, R Du, D Wang, F Liu IEEE Transactions on Dependable and Secure Computing 19 (5), 3301-3311, 2021 | 66 | 2021 |
Dynamic group-oriented provable data possession in the cloud K He, J Chen, Q Yuan, S Ji, D He, R Du IEEE Transactions on Dependable and Secure Computing 18 (3), 1394-1408, 2019 | 66 | 2019 |
Anti-forgery: Towards a stealthy and robust deepfake disruption attack via adversarial perceptual-aware perturbations R Wang, Z Huang, Z Chen, L Liu, J Chen, L Wang arXiv preprint arXiv:2206.00477, 2022 | 60 | 2022 |
Smartseed: Smart seed generation for efficient fuzzing C Lyu, S Ji, Y Li, J Zhou, J Chen, J Chen arXiv preprint arXiv:1807.02606, 2018 | 58 | 2018 |
Batch identification game model for invalid signatures in wireless mobile networks J Chen, K He, Q Yuan, G Xue, R Du, L Wang IEEE Transactions on Mobile Computing 16 (6), 1530-1543, 2016 | 52 | 2016 |
Redactable blockchain from decentralized chameleon hash functions M Jia, J Chen, K He, R Du, L Zheng, M Lai, D Wang, F Liu IEEE Transactions on Information Forensics and Security 17, 2771-2783, 2022 | 47 | 2022 |
EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data J Chen, K He, L Deng, Q Yuan, R Du, Y Xiang, J Wu IEEE Transactions on Services Computing 13 (6), 1072-1085, 2017 | 47 | 2017 |