Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive J Weng, J Weng, J Zhang, M Li, Y Zhang, W Luo IEEE Transactions on Dependable and Secure Computing 18 (5), 2438-2455, 2019 | 681 | 2019 |
CrowdBC: A blockchain-based decentralized framework for crowdsourcing M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng IEEE transactions on parallel and distributed systems 30 (6), 1251-1266, 2018 | 579 | 2018 |
A survey on large language model (llm) security and privacy: The good, the bad, and the ugly Y Yao, J Duan, K Xu, Y Cai, Z Sun, Y Zhang High-Confidence Computing, 100211, 2024 | 509 | 2024 |
An adaptive resilient load frequency controller for smart grids with DoS attacks KD Lu, GQ Zeng, X Luo, J Weng, Y Zhang, M Li IEEE Transactions on Vehicular Technology 69 (5), 4689-4699, 2020 | 98 | 2020 |
Breaking secure pairing of bluetooth low energy using downgrade attacks Y Zhang, J Weng, R Dey, Y Jin, Z Lin, X Fu 29th USENIX Security Symposium (USENIX Security 20), 37-54, 2020 | 78 | 2020 |
On protecting the data privacy of large language models (llms): A survey B Yan, K Li, M Xu, Y Dong, Y Zhang, Z Ren, X Cheng arXiv preprint arXiv:2403.05156, 2024 | 69 | 2024 |
BENBI: Scalable and dynamic access control on the northbound interface of SDN-based VANET JS Weng, J Weng, Y Zhang, W Luo, W Lan IEEE Transactions on Vehicular Technology 68 (1), 822-831, 2018 | 68 | 2018 |
On manually reverse engineering communication protocols of linux-based iot systems K Liu, M Yang, Z Ling, H Yan, Y Zhang, X Fu, W Zhao IEEE Internet of Things Journal 8 (8), 6815-6827, 2020 | 51 | 2020 |
On misconception of hardware and cost in IoT security and privacy B Pearson, L Luo, Y Zhang, R Dey, Z Ling, M Bassiouni, X Fu ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-7, 2019 | 47 | 2019 |
Microcontroller Based IoT System Firmware Security: Case Studies G Chao, L Lan, Z Yue, P Bryan, F Xinwen IEEE International Conference on Industrial Internet, 2019 | 42 | 2019 |
A measurement study of wechat mini-apps Y Zhang, B Turkistani, AY Yang, C Zuo, Z Lin Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (2 …, 2021 | 40 | 2021 |
On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring L Lan, Y Zhang, B Pearson, Z Ling, H Yu, X Fu. Sensors 18, 2018 | 39 | 2018 |
Taintmini: Detecting flow of sensitive data in mini-programs with static taint analysis C Wang, R Ko, Y Zhang, Y Yang, Z Lin 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023 | 37 | 2023 |
Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection Y Yang, Y Zhang, Z Lin The ACM Conference on Computer and Communications Security (CCS), 2022 | 37 | 2022 |
Bluetooth Low Energy (BLE) Security and Privacy Y Zhang, J Weng, R Dey, X Fu October, 2019 | 31 | 2019 |
On Private Data Collection of Hyperledger Fabric W Shan, Y Ming, Z Yue, L Yan, G Tingjian, F Xinwen, Z Wei in Proceedings of 41st IEEE International Conference on Distributed …, 2021 | 27 | 2021 |
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android D Wenrui, Z Yue, Z Li, L Zhou, X Fenghao, P Xiaorui, L Xiangyu, W Jian, ... The 22nd International Symposium on Research in Attacks, Intrusions and …, 2019 | 27 | 2019 |
Secure Software-Defined Networking Based on Blockchain J Weng, J Weng, JN Liu, Y Zhang arXiv preprint arXiv:1906.04342, 2019 | 27 | 2019 |
When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure Y Zhang, Z Lin The ACM Conference on Computer and Communications Security (CCS), 2022 | 25 | 2022 |
DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks H Huang, W Luo, G Zeng, J Weng, Y Zhang, A Yang IEEE Transactions on Dependable and Secure Computing 19 (5), 3183-3199, 2021 | 25 | 2021 |