PassBio: Privacy-preserving user-centric biometric authentication K Zhou, J Ren IEEE Transactions on Information Forensics and Security 13 (12), 3050-3063, 2018 | 106 | 2018 |
Attacking similarity-based link prediction in social networks K Zhou, TP Michalak, M Waniek, T Rahwan, Y Vorobeychik Proceedings of the 18th International Conference on Autonomous Agents and …, 2019 | 92 | 2019 |
ExpSOS: Secure and verifiable outsourcing of exponentiation operations for mobile cloud computing K Zhou, MH Afifi, J Ren IEEE Transactions on Information Forensics and Security 12 (11), 2518-2531, 2017 | 60 | 2017 |
Structural attack against graph based android malware detection K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li, L Yu, W Yuan, X Luo Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 58 | 2021 |
P-MOD: Secure privilege-based multilevel organizational data-sharing in cloud computing E Zaghloul, K Zhou, J Ren IEEE Transactions on Big Data 6 (4), 804-815, 2019 | 50 | 2019 |
How to hide one’s relationships from link prediction algorithms M Waniek, K Zhou, Y Vorobeychik, E Moro, TP Michalak, T Rahwan Scientific reports 9 (1), 12208, 2019 | 48* | 2019 |
Computing equilibria in binary networked public goods games S Yu, K Zhou, J Brantingham, Y Vorobeychik Proceedings of the AAAI Conference on Artificial Intelligence 34 (02), 2310-2317, 2020 | 36 | 2020 |
Adversarial Robustness of Similarity-Based Link Prediction K Zhou, TP Michalak, Y Vorobeychik ICDM, 2019 | 35 | 2019 |
CDMA system design and capacity analysis under disguised jamming T Song, K Zhou, T Li IEEE Transactions on Information Forensics and Security 11 (11), 2487-2498, 2016 | 35 | 2016 |
Binarizedattack: Structural poisoning attacks to graph-based anomaly detection Y Zhu, Y Lai, K Zhao, X Luo, M Yuan, J Ren, K Zhou 2022 IEEE 38th International Conference on Data Engineering (ICDE), 14-26, 2022 | 31 | 2022 |
Privacy characterization and quantification in data publishing MH Afifi, K Zhou, J Ren IEEE Transactions on Knowledge and Data Engineering 30 (9), 1756-1769, 2018 | 29 | 2018 |
Blocking adversarial influence in social networks F Jia, K Zhou, C Kamhoua, Y Vorobeychik Decision and Game Theory for Security: 11th International Conference …, 2020 | 14 | 2020 |
Attacking similarity-based sign prediction MT Godziszewski, TP Michalak, M Waniek, T Rahwan, K Zhou, Y Zhu 2021 IEEE International Conference on Data Mining (ICDM), 1072-1077, 2021 | 11 | 2021 |
Strategic evasion of centrality measures M Waniek, J Woźnica, K Zhou, Y Vorobeychik, T Rahwan, T Michalak AAMAS '21: Proceedings of the 20th International Conference on Autonomous …, 2021 | 11 | 2021 |
Secure outsourcing of scalar multiplication on elliptic curves K Zhou, J Ren 2016 IEEE International Conference on Communications (ICC), 1-5, 2016 | 11 | 2016 |
Robust collective classification against structural attacks K Zhou, Y Vorobeychik Conference on Uncertainty in Artificial Intelligence, 250-259, 2020 | 10 | 2020 |
CASO: Cost-aware secure outsourcing of general computational problems K Zhou, J Ren IEEE Transactions on Services Computing 14 (2), 386-399, 2018 | 10 | 2018 |
Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks Y Zhu, T Michalak, X Luo, X Zhang, K Zhou IEEE Transactions on Information Forensics and Security, 2024 | 7* | 2024 |
Secure fine-grained access control of mobile user data through untrusted cloud K Zhou, J Ren 2016 25th International Conference on Computer Communication and Networks …, 2016 | 7 | 2016 |
LinSOS: Secure outsourcing of linear computations based on affine mapping K Zhou, J Ren 2016 IEEE International Conference on Communications (ICC), 1-5, 2016 | 7 | 2016 |