Остановите войну!
for scientists:
default search action
Rui Zhang 0007
- > Home > Persons > Rui Zhang 0007
Publications
- 2023
- [j26]Xixun Yu, Hui Bai, Zheng Yan, Rui Zhang:
VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof. IEEE Trans. Dependable Secur. Comput. 20(1): 680-694 (2023) - [j25]Yidan Hu, Xin Yao, Rui Zhang, Yanchao Zhang:
Freshness Authentication for Outsourced Multi-Version Key-Value Stores. IEEE Trans. Dependable Secur. Comput. 20(3): 2071-2084 (2023) - [j24]Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, Yanchao Zhang:
Rhythmic RFID Authentication. IEEE/ACM Trans. Netw. 31(2): 877-890 (2023) - [c53]Yidan Hu, Yukun Dong, Wenxin Chen, Yingfei Dong, Rui Zhang:
Authenticating Outsourced Location-Based Skyline Queries under Shortest Path Distance. CNS 2023: 1-9 - [c52]Yukun Dong, Yidan Hu, Aisha Aseeri, Depeng Li, Rui Zhang:
Location Inference under Temporal Correlation. ICCCN 2023: 1-10 - [c51]Tianye Ma, Yidan Hu, Aishah Aseeri, Mark M. Nejad, Rui Zhang:
Sybil Detection in Connected Vehicle Systems via Angle-of-Arrival Estimation. MOST 2023: 202-212 - [c50]Yukun Dong, Zhengwu Lu, Rui Zhang:
Locally Differentially Private and Fair Key-Value Aggregation. SoICT 2023: 16-23 - 2022
- [j23]Dianqi Han, Ang Li, Tao Li, Lili Zhang, Yan Zhang, Jiawei Li, Rui Zhang, Yanchao Zhang:
(In)secure Acoustic Mobile Authentication. IEEE Trans. Mob. Comput. 21(9): 3193-3207 (2022) - [j22]Yan Zhang, Ang Li, Jiawei Li, Dianqi Han, Tao Li, Rui Zhang, Yanchao Zhang:
SpecKriging: GNN-Based Secure Cooperative Spectrum Sensing. IEEE Trans. Wirel. Commun. 21(11): 9936-9946 (2022) - [c49]Aishah Aseeri, Rui Zhang:
Locally Differentially Private Quantile Summary Aggregation in Wireless Sensor Networks. ACIIDS (1) 2022: 364-376 - [c48]Yunzhi Li, Rajeswari Hita Kambhamettu, Yidan Hu, Rui Zhang:
ImPos: An Image-Based Indoor Positioning System. CCNC 2022: 144-150 - [c47]Zhihua Hu, Yunzhi Li, Guosong Jiang, Rui Zhang, Mande Xie:
PriHorus: Privacy-Preserving RSS-Based Indoor Positioning. ICC 2022: 5627-5632 - 2021
- [j21]Xin Yao, Rui Zhang, Dingquan Huang, Yanchao Zhang:
Verifiable Query Processing Over Outsourced Social Graph. IEEE/ACM Trans. Netw. 29(5): 2313-2326 (2021) - [c46]Tao Li, Dianqi Han, Jiawei Li, Ang Li, Yan Zhang, Rui Zhang, Yanchao Zhang:
Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems. INFOCOM 2021: 1-10 - [c45]Xin Yao, Rui Zhang, Yanchao Zhang:
Differential Privacy-Preserving User Linkage across Online Social Networks. IWQoS 2021: 1-10 - [c44]Xixun Yu, Yidan Hu, Rui Zhang, Zheng Yan, Yanchao Zhang:
Secure Outsourced Top-k Selection Queries against Untrusted Cloud Service Providers. IWQoS 2021: 1-10 - [c43]Aishah Aseeri, Rui Zhang:
SecQSA: Secure Sampling-Based Quantile Summary Aggregation in Wireless Sensor Networks. MSN 2021: 454-461 - [c42]Tianye Ma, Rui Zhang, Mark M. Nejad:
Secure Connected Vehicle-based Traffic Signal Systems Against Data Spoofing Attacks. WCNC 2021: 1-7 - 2020
- [j20]Yidan Hu, Rui Zhang:
A Spatiotemporal Approach for Secure Crowdsourced Radio Environment Map Construction. IEEE/ACM Trans. Netw. 28(4): 1790-1803 (2020) - [j19]Tao Li, Dianqi Han, Yimin Chen, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
IndoorWaze: A Crowdsourcing-Based Context-Aware Indoor Navigation System. IEEE Trans. Wirel. Commun. 19(8): 5461-5472 (2020) - [c41]Yidan Hu, Rui Zhang, Yanchao Zhang:
KV-Fresh: Freshness Authentication for Outsourced Multi-Version Key-Value Stores. INFOCOM 2020: 1638-1647 - [c40]Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, Yanchao Zhang:
RF-Rhythm: Secure and Usable Two-Factor RFID Authentication. INFOCOM 2020: 2194-2203 - 2019
- [j18]Xixun Yu, Zheng Yan, Rui Zhang:
Verifiable outsourced computation over encrypted data. Inf. Sci. 479: 372-385 (2019) - [c39]Aishah Aseeri, Rui Zhang:
Secure Data Aggregation in Wireless Sensor Networks: Enumeration Attack and Countermeasure. ICC 2019: 1-7 - [c38]Wanxin Li, Mark M. Nejad, Rui Zhang:
A Blockchain-Based Architecture for Traffic Signal Control Systems. ICIOT 2019: 33-40 - [c37]Yidan Hu, Rui Zhang:
Differentially-Private Incentive Mechanism for Crowdsourced Radio Environment Map Construction. INFOCOM 2019: 1594-1602 - [c36]Yunzhi Li, Yidan Hu, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
Secure indoor positioning against signal strength attacks via optimized multi-voting. IWQoS 2019: 33:1-33:10 - [i6]Wanxin Li, Mark M. Nejad, Rui Zhang:
A Blockchain-Based Architecture for Traffic Signal Control Systems. CoRR abs/1906.02628 (2019) - 2018
- [j17]Xin Yao, Yimin Chen, Rui Zhang, Yanchao Zhang, Yaping Lin:
Beware of What You Share: Inferring User Locations in Venmo. IEEE Internet Things J. 5(6): 5109-5118 (2018) - [j16]Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:
The Rise of Social Botnets: Attacks and Countermeasures. IEEE Trans. Dependable Secur. Comput. 15(6): 1068-1082 (2018) - [j15]Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, Chi Zhang:
SpecGuard: Spectrum Misuse Detection in Dynamic Spectrum Access Systems. IEEE Trans. Mob. Comput. 17(12): 2925-2938 (2018) - [c35]Lizhou Yuan, Yidan Hu, Yunzhi Li, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
Secure RSS-Fingerprint-Based Indoor Positioning: Attacks and Countermeasures. CNS 2018: 1-9 - [c34]Tao Li, Yimin Chen, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
Secure Crowdsourced Indoor Positioning Systems. INFOCOM 2018: 1034-1042 - [c33]Jinxue Zhang, Jingchao Sun, Rui Zhang, Yanchao Zhang, Xia Hu:
Privacy-Preserving Social Media Data Outsourcing. INFOCOM 2018: 1106-1114 - [c32]Dianqi Han, Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication. MobiCom 2018: 401-415 - [c31]Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements. IEEE Symposium on Security and Privacy 2018: 144-160 - 2017
- [j14]Depeng Li, Rui Zhang, Yingfei Dong, Fangjin Zhu, Dusko Pavlovic:
A Multisecret Value Access Control Framework for Airliner in Multinational Air Traffic Management. IEEE Internet Things J. 4(6): 1853-1867 (2017) - [c30]Yidan Hu, Rui Zhang:
Secure crowdsourced radio environment map construction. ICNP 2017: 1-10 - [c29]Yimin Chen, Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang:
POWERFUL: Mobile app fingerprinting via power analysis. INFOCOM 2017: 1-9 - [c28]Yimin Chen, Jingchao Sun, Xiaocong Jin, Tao Li, Rui Zhang, Yanchao Zhang:
Your face your heart: Secure mobile face authentication with photoplethysmograms. INFOCOM 2017: 1-9 - [c27]Xin Yao, Rui Zhang, Yanchao Zhang, Yaping Lin:
Verifiable social data outsourcing. INFOCOM 2017: 1-9 - 2016
- [j13]Jingchao Sun, Rui Zhang, Yanchao Zhang:
Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications. IEEE Internet Things J. 3(6): 1048-1060 (2016) - [j12]Jinxue Zhang, Rui Zhang, Jingchao Sun, Yanchao Zhang, Chi Zhang:
TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter. IEEE/ACM Trans. Netw. 24(5): 2834-2846 (2016) - [j11]Jingchao Sun, Rui Zhang, Xiaocong Jin, Yanchao Zhang:
SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing. IEEE Trans. Wirel. Commun. 15(3): 1716-1728 (2016) - [c26]Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, Yanchao Zhang:
DPSense: Differentially Private Crowdsourced Spectrum Sensing. CCS 2016: 296-307 - [c25]Depeng Li, Rui Zhang:
A framework to mitigate airliner risk in air traffic management. CNS 2016: 324-332 - [c24]Tao Li, Rui Zhang, Yanchao Zhang:
PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control. CNS 2016: 333-341 - [c23]Wenxin Chen, Mengjun Liu, Rui Zhang, Yanchao Zhang, Shubo Liu:
Secure outsourced skyline query processing via untrusted cloud service providers. INFOCOM 2016: 1-9 - [c22]Jingchao Sun, Rui Zhang, Jinxue Zhang, Yanchao Zhang:
PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics. INFOCOM 2016: 1-9 - [c21]Jingchao Sun, Xiaocong Jin, Yimin Chen, Jinxue Zhang, Yanchao Zhang, Rui Zhang:
VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion. NDSS 2016 - [i5]Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:
The Rise of Social Botnets: Attacks and Countermeasures. CoRR abs/1603.02714 (2016) - 2015
- [j10]Rui Zhang, Jingchao Sun, Yanchao Zhang, Chi Zhang:
Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers. IEEE Trans. Dependable Secur. Comput. 12(1): 111-124 (2015) - [j9]Rui Zhang, Jingchao Sun, Yanchao Zhang, Xiaoxia Huang:
Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks. IEEE Trans. Wirel. Commun. 14(10): 5588-5601 (2015) - [c20]Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang:
SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users. CCS 2015: 304-315 - [c19]Jinxue Zhang, Jingchao Sun, Rui Zhang, Yanchao Zhang:
Your actions tell where you are: Uncovering Twitter users in a metropolitan area. CNS 2015: 424-432 - [c18]Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, Chi Zhang:
SpecGuard: Spectrum misuse detection in dynamic spectrum access systems. INFOCOM 2015: 172-180 - [c17]Yimin Chen, Jingchao Sun, Rui Zhang, Yanchao Zhang:
Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices. INFOCOM 2015: 2686-2694 - [i4]Jingchao Sun, Rui Zhang, Xiaocong Jin, Yanchao Zhang:
SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing. CoRR abs/1503.07932 (2015) - [i3]Jinxue Zhang, Jingchao Sun, Rui Zhang, Yanchao Zhang:
Your Actions Tell Where You Are: Uncovering Twitter Users in a Metropolitan Area. CoRR abs/1503.08771 (2015) - [i2]Jinxue Zhang, Rui Zhang, Jingchao Sun, Yanchao Zhang, Chi Zhang:
TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter. CoRR abs/1504.04663 (2015) - 2014
- [j8]Rui Zhang, Jing Shi, Yanchao Zhang, Xiaoxia Huang:
Secure Top-k Query Processing in Unattended Tiered Sensor Networks. IEEE Trans. Veh. Technol. 63(9): 4681-4693 (2014) - [j7]Xiaocong Jin, Rui Zhang, Jingchao Sun, Yanchao Zhang:
TIGHT: A Geographic Routing Protocol for Cognitive Radio Mobile Ad Hoc Networks. IEEE Trans. Wirel. Commun. 13(8): 4670-4681 (2014) - [c16]Jingchao Sun, Rui Zhang, Jinxue Zhang, Yanchao Zhang:
TouchIn: Sightless two-factor authentication on multi-touch mobile devices. CNS 2014: 436-444 - [i1]Jingchao Sun, Rui Zhang, Jinxue Zhang, Yanchao Zhang:
TouchIn: Sightless Two-factor Authentication on Multi-touch Mobile Devices. CoRR abs/1402.1216 (2014) - 2013
- [j6]Rui Zhang, Jing Shi, Yanchao Zhang, Chi Zhang:
Verifiable Privacy-Preserving Aggregation in People-Centric Urban Sensing Systems. IEEE J. Sel. Areas Commun. 31(9-Supplement): 268-278 (2013) - [j5]Rui Zhang, Jinxue Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan:
Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking. IEEE J. Sel. Areas Commun. 31(9-Supplement): 656-668 (2013) - [c15]Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:
On the impact of social botnets for spam distribution and digital-influence manipulation. CNS 2013: 46-54 - [c14]Jingchao Sun, Rui Zhang, Yanchao Zhang:
Privacy-preserving spatiotemporal matching. INFOCOM 2013: 800-808 - [c13]Rui Zhang, Jinxue Zhang, Yanchao Zhang, Chi Zhang:
Secure crowdsourcing-based cooperative pectrum sensing. INFOCOM 2013: 2526-2534 - 2012
- [j4]Rui Zhang, Jing Shi, Yanchao Zhang, Jinyuan Sun:
Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks. IEEE J. Sel. Areas Commun. 30(2): 433-441 (2012) - [j3]Rui Zhang, Yanchao Zhang, Kui Ren:
Distributed Privacy-Preserving Access Control in Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(8): 1427-1438 (2012) - [c12]Rui Zhang, Yanchao Zhang, Chi Zhang:
Secure top-k query processing via untrusted location-based service providers. INFOCOM 2012: 1170-1178 - [c11]Rui Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan:
Fine-grained private matching for proximity-based mobile social networking. INFOCOM 2012: 1969-1977 - 2011
- [j2]Jing Shi, Rui Zhang, Yanchao Zhang:
A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks. IEEE Trans. Wirel. Commun. 10(1): 264-273 (2011) - [j1]Rui Zhang, Yanchao Zhang, Yuguang Fang:
AOS: an anonymous overlay system for mobile ad hoc networks. Wirel. Networks 17(4): 843-859 (2011) - [c10]Rui Zhang, Yanchao Zhang:
LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks. ICDCS 2011: 497-506 - [c9]Rui Zhang, Yanchao Zhang, Xiaoxia Huang:
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks. ICDCS 2011: 529-538 - [c8]Rui Zhang, Yunzhong Liu, Yanchao Zhang, Jinyuan Sun:
Fast identification of the missing tags in a large RFID system. SECON 2011: 278-286 - 2010
- [c7]Jing Shi, Rui Zhang, Yunzhong Liu, Yanchao Zhang:
PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems. INFOCOM 2010: 758-766 - [c6]Rui Zhang, Jing Shi, Yunzhong Liu, Yanchao Zhang:
Verifiable Fine-Grained Top-k Queries in Tiered Sensor Networks. INFOCOM 2010: 1199-1207 - [c5]Rui Zhang, Yanchao Zhang:
Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks. INFOCOM 2010: 2633-2641 - [c4]Yunzhong Liu, Rui Zhang, Jing Shi, Yanchao Zhang:
Traffic Inference in Anonymous MANETs. SECON 2010: 547-555 - 2009
- [c3]Jing Shi, Rui Zhang, Yanchao Zhang:
Secure Range Queries in Tiered Sensor Networks. INFOCOM 2009: 945-953 - [c2]Rui Zhang, Yanchao Zhang, Kui Ren:
DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks. INFOCOM 2009: 1251-1259 - [c1]Rui Zhang, Jing Shi, Yanchao Zhang:
Secure multidimensional range queries in sensor networks. MobiHoc 2009: 197-206
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 23:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint