default search action
Haojin Zhu
Person information
- affiliation: Shanghai Jiao Tong University, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [b3]Shaofeng Li, Haojin Zhu, Wen Wu, Xuemin (Sherman) Shen:
Backdoor Attacks against Learning-Based Algorithms. Wireless Networks, Springer 2024, ISBN 978-3-031-57388-0, pp. 1-153 - [j79]Yan Meng, Jiachun Li, Haojin Zhu, Yuan Tian, Jiming Chen:
Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces. IEEE Trans. Dependable Secur. Comput. 21(4): 2900-2916 (2024) - [j78]Le Yu, Shufan Zhang, Yan Meng, Suguo Du, Yuling Chen, Yanli Ren, Haojin Zhu:
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability. IEEE Trans. Mob. Comput. 23(8): 8256-8273 (2024) - [c113]Shaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen:
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection. USENIX Security Symposium 2024 - 2023
- [b2]Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen:
Security in Smart Home Networks. Wireless Networks, Springer 2023, ISBN 978-3-031-24184-0, pp. 1-166 - [j77]Jiachun Li, Weijiong Zhang, Yan Meng, Shaofeng Li, Lichuan Ma, Zhen Liu, Haojin Zhu:
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network. IEEE Trans. Veh. Technol. 72(8): 10682-10695 (2023) - [c112]Yan Meng, Haojin Zhu:
Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home. ACM TUR-C 2023: 150-151 - [c111]Hui Liu, Hongzhi Luo, Shaofeng Li, Tian Dong, Guoxing Chen, Yan Meng, Haojin Zhu:
Privacy Computing with Right to Be Forgotten in Trusted Execution Environment. GLOBECOM 2023: 2566-2571 - [c110]Yichi Zhang, Guoxing Chen, Yan Meng, Haojin Zhu:
Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps. GLOBECOM 2023: 6705-6710 - [c109]Shaofeng Li, Wen Wu, Yan Meng, Jiachun Li, Haojin Zhu, Xuemin Sherman Shen:
Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks. ICC 2023: 13-18 - [c108]Jiachun Li, Yan Meng, Le Zhang, Fazhong Liu, Haojin Zhu:
EM-Whisperer: A Voice Injection Attack via Powerline for Virtual Meeting Scenarios. ICCC 2023: 1-6 - [c107]Yan Meng, Jiachun Li, Fazhong Liu, Shaofeng Li, Haotian Hu, Haojin Zhu:
GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis. ICCC 2023: 1-6 - [c106]Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, Haojin Zhu, Xuemin Sherman Shen:
MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging. INFOCOM 2023: 1-10 - [c105]Yan Meng, Yuxia Zhan, Jiachun Li, Suguo Du, Haojin Zhu, Xuemin Sherman Shen:
De-anonymization Attacks on Metaverse. INFOCOM 2023: 1-10 - [c104]Yuxia Zhan, Yan Meng, Lu Zhou, Haojin Zhu:
Vetting Privacy Policies in VR: A Data Minimization Principle Perspective. INFOCOM Workshops 2023: 1-2 - [c103]Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu:
RAI2: Responsible Identity Audit Governing the Artificial Intelligence. NDSS 2023 - [c102]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors. ESEC/SIGSOFT FSE 2023: 1573-1585 - [c101]Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu:
POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices. USENIX Security Symposium 2023: 1073-1090 - [d2]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 1. Zenodo, 2023 [all versions] - [d1]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 2. Zenodo, 2023 [all versions] - [i14]Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. CoRR abs/2309.08230 (2023) - [i13]Tian Dong, Guoxing Chen, Shaofeng Li, Minhui Xue, Rayne Holland, Yan Meng, Zhen Liu, Haojin Zhu:
Unleashing Cheapfakes through Trojan Plugins of Large Language Models. CoRR abs/2312.00374 (2023) - 2022
- [j76]Shaofeng Li, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Suguo Du, Haojin Zhu:
Backdoors Against Natural Language Processing: A Review. IEEE Secur. Priv. 20(5): 50-59 (2022) - [j75]Zhuo Chang, Yan Meng, Wenyuan Liu, Haojin Zhu, Lin Wang:
WiCapose: Multi-modal fusion based transparent authentication in mobile environments. J. Inf. Secur. Appl. 66: 103130 (2022) - [j74]Jiachun Li, Yan Meng, Lichuan Ma, Suguo Du, Haojin Zhu, Qingqi Pei, Xuemin Shen:
A Federated Learning Based Privacy-Preserving Smart Healthcare System. IEEE Trans. Ind. Informatics 18(3): 2021-2031 (2022) - [j73]Edwin Yang, Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
Wireless Training-Free Keystroke Inference Attack and Defense. IEEE/ACM Trans. Netw. 30(4): 1733-1748 (2022) - [c100]Zirui Peng, Shaofeng Li, Guoxing Chen, Cheng Zhang, Haojin Zhu, Minhui Xue:
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations. CVPR 2022: 13420-13429 - [c99]Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. ESORICS (1) 2022: 89-109 - [c98]Zhaoyu Gao, Ahmad Sepahi, Shahrooz Pouryousef, Lu Zhou, Haojin Zhu:
Tradeoff between Privacy and Utility for Location-based Recommendation Services. ICC 2022: 4396-4401 - [c97]Le Yu, Shufan Zhang, Lu Zhou, Yan Meng, Suguo Du, Haojin Zhu:
Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing. ICDCS 2022: 470-480 - [c96]Wenbin Huang, Wenjuan Tang, Kuan Zhang, Haojin Zhu, Yaoxue Zhang:
Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems. INFOCOM 2022: 31-40 - [c95]Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian:
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers. USENIX Security Symposium 2022: 1077-1094 - [i12]Zirui Peng, Shaofeng Li, Guoxing Chen, Cheng Zhang, Haojin Zhu, Minhui Xue:
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations. CoRR abs/2202.08602 (2022) - [i11]Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. IACR Cryptol. ePrint Arch. 2022: 627 (2022) - 2021
- [j72]Jing Xu, Kai Xing, Chi Zhang, Shuo Zhang, Zhonghu Xu, Chunlin Zhong, Haojin Zhu, Zheng Yang, Yunhao Liu:
Collective Memory for Detecting Nonconcurrent Clones: A Localized Approach for Global Topology and Identity Tracing in IoT Networks. IEEE Internet Things J. 8(7): 5762-5777 (2021) - [j71]Lichuan Ma, Qingqi Pei, Lu Zhou, Haojin Zhu, Licheng Wang, Yusheng Ji:
Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence. IEEE Internet Things J. 8(8): 6757-6770 (2021) - [j70]Yiting Qu, Suguo Du, Shaofeng Li, Yan Meng, Le Zhang, Haojin Zhu:
Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications. IEEE Internet Things J. 8(9): 7394-7406 (2021) - [j69]Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan, David S. L. Wei:
Advances in privacy-preserving computing. Peer-to-Peer Netw. Appl. 14(3): 1348-1352 (2021) - [j68]Pengyu Wang, Jing Wang, Chao Li, Jianzong Wang, Haojin Zhu, Minyi Guo:
Grus: Toward Unified-memory-efficient High-performance Graph Processing on GPU. ACM Trans. Archit. Code Optim. 18(2): 22:1-22:25 (2021) - [j67]Shaofeng Li, Minhui Xue, Benjamin Zi Hao Zhao, Haojin Zhu, Xinpeng Zhang:
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization. IEEE Trans. Dependable Secur. Comput. 18(5): 2088-2105 (2021) - [j66]Yan Meng, Haojin Zhu, Jinlei Li, Jin Li, Yao Liu:
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment. IEEE Trans. Dependable Secur. Comput. 18(6): 2996-3011 (2021) - [c94]Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. CCS 2021: 271-286 - [c93]Suibin Sun, Le Yu, Xiaokuan Zhang, Minhui Xue, Ren Zhou, Haojin Zhu, Shuang Hao, Xiaodong Lin:
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic. CCS 2021: 287-303 - [c92]Brandon Falk, Yan Meng, Yuxia Zhan, Haojin Zhu:
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures. CCS 2021: 2405-2407 - [c91]Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu:
Hidden Backdoors in Human-Centric Language Models. CCS 2021: 3123-3140 - [c90]Youqun Li, Yichi Zhang, Haojin Zhu, Suguo Du:
Toward Automatically Generating Privacy Policy for Smart Home Apps. INFOCOM Workshops 2021: 1-7 - [c89]Binhan Xi, Shaofeng Li, Jiachun Li, Hui Liu, Hong Liu, Haojin Zhu:
BatFL: Backdoor Detection on Federated Learning in e-Health. IWQoS 2021: 1-10 - [i10]Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu:
Hidden Backdoors in Human-Centric Language Models. CoRR abs/2105.00164 (2021) - [i9]Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. CoRR abs/2105.11103 (2021) - [i8]Wei Wang, Ruoxi Sun, Tian Dong, Shaofeng Li, Minhui Xue, Gareth Tyson, Haojin Zhu:
Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks. CoRR abs/2111.10085 (2021) - 2020
- [j65]Lin Wang, Haonan An, Haojin Zhu, Wenyuan Liu:
MobiKey: Mobility-Based Secret Key Generation in Smart Home. IEEE Internet Things J. 7(8): 7590-7600 (2020) - [j64]Yaping Liu, Shuo Zhang, Haojin Zhu, Peng-Jun Wan, Lixin Gao, Yaoxue Zhang, Zhihong Tian:
A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks. J. Parallel Distributed Comput. 142: 77-89 (2020) - [j63]Huaxin Li, Qingrong Chen, Haojin Zhu, Di Ma, Hong Wen, Xuemin Sherman Shen:
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks. IEEE Trans. Dependable Secur. Comput. 17(2): 350-362 (2020) - [j62]Yan Meng, Jinlei Li, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan:
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures. IEEE Trans. Mob. Comput. 19(2): 432-449 (2020) - [c88]Jinlei Li, Yan Meng, Lu Zhou, Haojin Zhu:
Securing App Behaviors in Smart Home: A Human-App Interaction Perspective. ICPADS 2020: 308-315 - [c87]Lei Zhang, Yan Meng, Jiahao Yu, Chong Xiang, Brandon Falk, Haojin Zhu:
Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home. INFOCOM 2020: 377-386 - [c86]Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu:
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications. USENIX Security Symposium 2020: 2415-2432
2010 – 2019
- 2019
- [j61]Sijia Yang, Jiang Bian, Licheng Wang, Haojin Zhu, Yanjie Fu, Haoyi Xiong:
EdgeSense: Edge-Mediated Spatial- Temporal Crowdsensing. IEEE Access 7: 1495122-95131 (2019) - [j60]Zhushou Tang, Minhui Xue, Guozhu Meng, Chengguo Ying, Yugeng Liu, Jianan He, Haojin Zhu, Yang Liu:
Securing android applications via edge assistant third-party library detection. Comput. Secur. 80: 257-272 (2019) - [j59]Lu Zhou, Le Yu, Suguo Du, Haojin Zhu, Cailian Chen:
Achieving Differentially Private Location Privacy in Edge-Assistant Connected Vehicles. IEEE Internet Things J. 6(3): 4472-4481 (2019) - [j58]Licheng Wang, Yan Meng, Haojin Zhu, Minxing Tang, Kaoru Ota:
Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT. IEEE Internet Things J. 6(4): 7282-7292 (2019) - [j57]Erdong Deng, Huajun Zhang, Peilin Wu, Fei Guo, Zhen Liu, Haojin Zhu, Zhenfu Cao:
Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing. Inf. Sci. 504: 354-371 (2019) - [j56]Huajun Zhang, Erdong Deng, Haojin Zhu, Zhenfu Cao:
Smart contract for secure billing in ride-hailing service via blockchain. Peer-to-Peer Netw. Appl. 12(5): 1346-1357 (2019) - [j55]Lu Zhou, Suguo Du, Haojin Zhu, Cailian Chen, Kaoru Ota, Mianxiong Dong:
Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures. IEEE Trans. Inf. Forensics Secur. 14(1): 196-211 (2019) - [j54]Mohammad Hadian, Thamer Altuwaiyan, Xiaohui Liang, Haojin Zhu:
Privacy-Preserving Task Scheduling for Time-Sharing Services of Autonomous Vehicles. IEEE Trans. Veh. Technol. 68(6): 5260-5270 (2019) - [j53]Fei Guo, Zichang Wang, Suguo Du, Huaxin Li, Haojin Zhu, Qingqi Pei, Zhenfu Cao, Jianhong Zhao:
Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic. IEEE Trans. Veh. Technol. 68(6): 5618-5628 (2019) - [c85]Peilin Wu, Jinlei Li, Yan Meng, Haojin Zhu:
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts. IEEE BigData 2019: 5937-5944 - [c84]Jie Li, Lu Zhou, Huaxin Li, Lu Yan, Haojin Zhu:
Dynamic Traffic Feature Camouflaging via Generative Adversarial Networks. CNS 2019: 268-276 - [c83]Chong Xiang, Xinyu Wang, Qingrong Chen, Minhui Xue, Zhaoyu Gao, Haojin Zhu, Cailian Chen, Qiuhua Fan:
No-jump-into-latency in China's internet!: toward last-mile hop count based IP geo-localization. IWQoS 2019: 42:1-42:10 - [c82]Yaping Liu, Shuo Zhang, Haojin Zhu, Peng-Jun Wan, Lixin Gao, Yaoxue Zhang:
An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain. SecureComm (1) 2019: 63-82 - [c81]Matthew Joslin, Neng Li, Shuang Hao, Minhui Xue, Haojin Zhu:
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions. IEEE Symposium on Security and Privacy 2019: 1311-1325 - [c80]Cheng Chang, Huaxin Li, Yichi Zhang, Suguo Du, Hui Cao, Haojin Zhu:
Automated and Personalized Privacy Policy Extraction Under GDPR Consideration. WASA 2019: 43-54 - [c79]Qiwei Jia, Lu Zhou, Huaxin Li, Ruoxu Yang, Suguo Du, Haojin Zhu:
Who Leaks My Privacy: Towards Automatic and Association Detection with GDPR Compliance. WASA 2019: 137-148 - [i7]Shaofeng Li, Benjamin Zi Hao Zhao, Jiahao Yu, Minhui Xue, Dali Kaafar, Haojin Zhu:
Invisible Backdoor Attacks Against Deep Neural Networks. CoRR abs/1909.02742 (2019) - 2018
- [j52]Suguo Du, Xiaolong Li, Jinli Zhong, Lu Zhou, Minhui Xue, Haojin Zhu, Limin Sun:
Modeling Privacy Leakage Risks in Large-Scale Social Networks. IEEE Access 6: 17653-17665 (2018) - [j51]Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li:
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. Comput. Secur. 73: 326-344 (2018) - [j50]Huaxin Li, Haojin Zhu, Suguo Du, Xiaohui Liang, Xuemin Sherman Shen:
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense. IEEE Trans. Dependable Secur. Comput. 15(4): 646-660 (2018) - [j49]Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu:
Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices. IEEE Trans. Inf. Forensics Secur. 13(3): 802-817 (2018) - [j48]Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu:
Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817]. IEEE Trans. Inf. Forensics Secur. 13(6): 1595 (2018) - [j47]Huaxin Li, Haojin Zhu, Di Ma:
Demographic Information Inference through Meta-Data Analysis of Wi-Fi Traffic. IEEE Trans. Mob. Comput. 17(5): 1033-1047 (2018) - [j46]Lichuan Ma, Yong Xiang, Qingqi Pei, Yang Xiang, Haojin Zhu:
Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel. IEEE Trans. Veh. Technol. 67(5): 3950-3963 (2018) - [j45]Yan Meng, Wei Zhang, Haojin Zhu, Xuemin Sherman Shen:
Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures. IEEE Wirel. Commun. 25(6): 53-59 (2018) - [c78]Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu:
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. CCS 2018: 1074-1088 - [c77]Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing. CCS 2018: 1747-1760 - [c76]Zichang Wang, Fei Guo, Yan Meng, Huaxin Li, Haojin Zhu, Zhenfu Cao:
Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism. GLOBECOM 2018: 1-7 - [c75]Chong Xiang, Qingrong Chen, Minhui Xue, Haojin Zhu:
APPCLASSIFIER: Automated App Inference on Encrypted Traffic via Meta Data Analysis. GLOBECOM 2018: 1-7 - [c74]Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, Yao Liu:
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment. MobiHoc 2018: 81-90 - [c73]Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross:
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. NDSS 2018 - [i6]Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaafar, Haojin Zhu:
Differentially Private Data Generative Models. CoRR abs/1812.02274 (2018) - 2017
- [j44]Na Ruan, Mingli Wu, Shiheng Ma, Haojin Zhu, Weijia Jia, Songyang Wu:
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design. IEICE Trans. Inf. Syst. 100-D(10): 2287-2294 (2017) - [j43]Mengyuan Li, Na Ruan, Qiyang Qian, Haojin Zhu, Xiaohui Liang, Le Yu:
SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud. IEEE Internet Things J. 4(2): 583-591 (2017) - [j42]Haojin Zhu, Kuai Xu, Xiang Lu:
Guest editorial: Special issue on algorithms, systems and applications in mobile social networks. Peer-to-Peer Netw. Appl. 10(2): 293-295 (2017) - [j41]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme with CS E-Ticket. Secur. Commun. Networks 2017: 4796373:1-4796373:9 (2017) - [j40]Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu, Tao Wang:
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks. IEEE Trans. Mob. Comput. 16(2): 566-580 (2017) - [c72]Huaxin Li, Qingrong Chen, Haojin Zhu, Di Ma:
Hybrid de-anonymization across real-world heterogeneous social networks. ACM TUR-C 2017: 33:1-33:7 - [c71]Jiafa Liu, Di Ma, André Weimerskirch, Haojin Zhu:
A Functional Co-Design towards Safe and Secure Vehicle Platooning. CPSS@AsiaCCS 2017: 81-90 - [c70]Haizhong Zheng, Neng Li, Minhui Xue, Suguo Du, Haojin Zhu:
Fake reviews tell no tales? Dissecting click farming in content-generated social networks. ICCC 2017: 1-6 - [c69]Lu Zhou, Qingrong Chen, Zutian Luo, Haojin Zhu, Cailian Chen:
Speed-Based Location Tracking in Usage-Based Automotive Insurance. ICDCS 2017: 2252-2257 - [c68]Wenyan Yao, Na Ruan, Feifan Yu, Weijia Jia, Haojin Zhu:
Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy. SECON 2017: 1-9 - [c67]Jinli Zhong, Suguo Du, Lu Zhou, Haojin Zhu, Fan Cheng, Cailian Chen, Qingshui Xue:
Security Modeling and Analysis on Intra Vehicular Network. VTC Fall 2017: 1-5 - [c66]Mingli Wu, Na Ruan, Shiheng Ma, Haojin Zhu, Weijia Jia, Qingshui Xue, Songyang Wu:
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter. WASA 2017: 124-135 - [i5]Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu:
Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach. CoRR abs/1706.04146 (2017) - [i4]Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross:
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. CoRR abs/1709.06916 (2017) - 2016
- [j39]Yi Li, Lu Zhou, Haojin Zhu, Limin Sun:
Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks. IEEE Internet Things J. 3(4): 563-571 (2016) - [j38]Haojin Zhu, Chenliaohui Fang, Yao Liu, Cailian Chen, Mengyuan Li, Xuemin Sherman Shen:
You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing. IEEE J. Sel. Areas Commun. 34(10): 2723-2737 (2016) - [j37]Weiwei Jia, Haojin Zhu, Suguo Du, Xiaolei Dong, Zhenfu Cao:
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks. Secur. Commun. Networks 9(13): 1905-1915 (2016) - [j36]Xiuzhen Cheng, Miroslaw Kutylowski, Kuai Xu, Haojin Zhu:
Cyber security, crime, and forensics of wireless networks and applications. Secur. Commun. Networks 9