default search action
Wenjing Lou
Person information
- affiliation: Virginia Tech, Falls Church, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j144]Chengzhang Li, Qingyu Liu, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
Aequitas: A 5G Scheduler for Minimizing Outdated Information in IoT Networks. IEEE Internet Things J. 11(13): 23322-23335 (2024) - [j143]Yongce Chen, Y. Thomas Hou, Wenjing Lou, Jeffrey H. Reed, Sastry Kompella:
O-M3: Real-Time Multi-Cell MIMO Scheduling in 5G O-RAN. IEEE J. Sel. Areas Commun. 42(2): 339-355 (2024) - [j142]Shaoran Li, Nan Jiang, Yongce Chen, Weijun Xie, Wenjing Lou, Y. Thomas Hou:
MU-MIMO Beamforming With Limited Channel Data Samples. IEEE J. Sel. Areas Commun. 42(11): 3032-3047 (2024) - [j141]Naru Jai, Yi Shi, Shaoran Li, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Jeffrey H. Reed, Masoud Olfat, Sastry Kompella, Luiz A. DaSilva:
Modeling and Optimization of Channel Allocation for PAL and GAA Users in the CBRS Band. IEEE Trans. Cogn. Commun. Netw. 10(1): 1-20 (2024) - [j140]Qingyu Liu, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Jeffrey H. Reed, Sastry Kompella:
Aion: A Bandwidth Conserving Scheduler With Data Freshness Guarantee. IEEE Trans. Mob. Comput. 23(1): 102-116 (2024) - [c164]Shanghao Shi, Yang Xiao, Changlai Du, Yi Shi, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Eric William Burger, Luiz A. DaSilva, Wenjing Lou:
TriSAS: Toward Dependable Inter-SAS Coordination with Auditability. AsiaCCS 2024 - [c163]Naru Jai, Yi Shi, Masoud Olfat, Jeffrey H. Reed, Luiz A. DaSilva, Wenjing Lou, Y. Thomas Hou:
An Optimized Move List for DPA in CBRS. DySPAN 2024: 88-96 - [c162]Hexuan Yu, Shanghao Shi, Yi Shi, Eric William Burger, Y. Thomas Hou, Wenjing Lou:
Pri-Share: Enabling Inter-SAS Privacy Protection via Secure Multi-Party Spectrum Allocation. DySPAN 2024: 347-356 - [c161]Md Mohaimin Al Barat, Shaoyu Li, Changlai Du, Y. Thomas Hou, Wenjing Lou:
SoK: Public Blockchain Sharding. ICBC 2024: 766-783 - [c160]Shaoran Li, Nan Jiang, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Weijun Xie:
ReDBeam: Real-time MU-MIMO Beamforming with Limited CSI Data Samples. ICC 2024: 5104-5110 - [c159]Ehsan Ghoreishi, Bahman Abolhassani, Yan Huang, Shiva Acharya, Wenjing Lou, Y. Thomas Hou:
Cyrus: A DRL-based Puncturing Solution to URLLC/eMBB Multiplexing in O-RAN. ICCCN 2024: 1-9 - [c158]Md Hasan Shahriar, Mohammad Raashid Ansari, Jean-Philippe Monteuuis, Cong Chen, Jonathan Petit, Y. Thomas Hou, Wenjing Lou:
Vehigan:Generative Adversarial Networks for Adversarially Robust V2X Misbehavior Detection Systems. ICDCS 2024: 1294-1305 - [c157]Chaoyu Zhang, Shanghao Shi, Ning Wang, Xiangxiang Xu, Shaoyu Li, Lizhong Zheng, Randy C. Marchany, Mark Gardner, Y. Thomas Hou, Wenjing Lou:
Hermes: Boosting the Performance of Machine-Learning-Based Intrusion Detection System through Geometric Feature Learning. MobiHoc 2024: 251-260 - [c156]Hexuan Yu, Changlai Du, Yang Xiao, Angelos D. Keromytis, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Wenjing Lou:
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials. NDSS 2024 - [i18]Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou:
ProFLingo: A Fingerprinting-based Copyright Protection Scheme for Large Language Models. CoRR abs/2405.02466 (2024) - [i17]Md Mohaimin Al Barat, Shaoyu Li, Changlai Du, Y. Thomas Hou, Wenjing Lou:
SoK: Public Blockchain Sharding. CoRR abs/2405.20521 (2024) - [i16]Md Hasan Shahriar, Ning Wang, Y. Thomas Hou, Wenjing Lou:
NoiSec: Harnessing Noise for Security against Adversarial and Backdoor Attacks. CoRR abs/2406.13073 (2024) - [i15]Ning Wang, Shanghao Shi, Yang Xiao, Yimin Chen, Y. Thomas Hou, Wenjing Lou:
BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning. CoRR abs/2407.09658 (2024) - [i14]Shanghao Shi, Md Shahedul Haque, Abhijeet Parida, Marius George Linguraru, Y. Thomas Hou, Syed Muhammad Anwar, Wenjing Lou:
Harvesting Private Medical Images in Federated Learning Systems with Crafted Models. CoRR abs/2407.09972 (2024) - 2023
- [j139]Qingyu Liu, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Jeffrey H. Reed, Sastry Kompella:
Wireless Scheduling to Optimize Age of Information Based on Earliest Update Time. IEEE Internet Things J. 10(7): 6352-6366 (2023) - [j138]Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wenjing Lou, Y. Thomas Hou:
CANShield: Deep-Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal Level. IEEE Internet Things J. 10(24): 22111-22127 (2023) - [j137]Shaoran Li, Chengzhang Li, Yan Huang, Brian A. Jalaian, Y. Thomas Hou, Wenjing Lou:
Enhancing Resilience in Mobile Edge Computing Under Processing Uncertainty. IEEE J. Sel. Areas Commun. 41(3): 659-674 (2023) - [j136]Yang Xiao, Shanghao Shi, Wenjing Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. Thomas Hou, Jeffrey H. Reed:
BD-SAS: Enabling Dynamic Spectrum Sharing in Low-Trust Environment. IEEE Trans. Cogn. Commun. Netw. 9(4): 842-856 (2023) - [j135]Ning Wang, Yimin Chen, Yang Xiao, Yang Hu, Wenjing Lou, Y. Thomas Hou:
MANDA: On Adversarial Example Detection for Network Intrusion Detection System. IEEE Trans. Dependable Secur. Comput. 20(2): 1139-1153 (2023) - [j134]Xindi Ma, Qi Jiang, Ximeng Liu, Qingqi Pei, Jianfeng Ma, Wenjing Lou:
Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy. IEEE Trans. Dependable Secur. Comput. 20(3): 2641-2656 (2023) - [j133]Shaoran Li, Yan Huang, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Brian A. Jalaian, Stephen Russell:
Achieving Real-Time Spectrum Sharing in 5G Underlay Coexistence With Channel Uncertainty. IEEE Trans. Mob. Comput. 22(4): 1922-1937 (2023) - [j132]Yongce Chen, Shaoran Li, Chengzhang Li, Huacheng Zeng, Brian Jalaian, Y. Thomas Hou, Wenjing Lou:
On DoF Conservation in MIMO Interference Cancellation Based on Signal Strength in the Eigenspace. IEEE Trans. Mob. Comput. 22(5): 2862-2877 (2023) - [j131]Yongce Chen, Yan Huang, Chengzhang Li, Y. Thomas Hou, Wenjing Lou:
Turbo-HB: A Sub-Millisecond Hybrid Beamforming Design for 5G mmWave Systems. IEEE Trans. Mob. Comput. 22(7): 4332-4346 (2023) - [j130]Yongce Chen, Yubo Wu, Y. Thomas Hou, Wenjing Lou:
mCore+: A Real-Time Design Achieving ∼ 500 μs Scheduling for 5G MU-MIMO Systems. IEEE Trans. Mob. Comput. 22(12): 7249-7265 (2023) - [c155]Shaoyu Li, Shanghao Shi, Yang Xiao, Chaoyu Zhang, Y. Thomas Hou, Wenjing Lou:
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities. ESORICS (3) 2023: 306-326 - [c154]Chengzhang Li, Shaoran Li, Qingyu Liu, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
Eywa: A General Approach for Scheduler Design in AoI Optimization. INFOCOM 2023: 1-9 - [c153]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem. INFOCOM 2023: 1-10 - [c152]Chaoyu Zhang, Ning Wang, Shanghao Shi, Changlai Du, Wenjing Lou, Y. Thomas Hou:
MINDFL: Mitigating the Impact of Imbalanced and Noisy-labeled Data in Federated Learning with Quality and Fairness-Aware Client Selection. MILCOM 2023: 331-338 - [c151]Qingyu Liu, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality. MILCOM 2023: 747-754 - [c150]Changlai Du, Hexuan Yu, Yang Xiao, Y. Thomas Hou, Angelos D. Keromytis, Wenjing Lou:
UCBlocker: Unwanted Call Blocking Using Anonymous Authentication. USENIX Security Symposium 2023: 445-462 - [c149]Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang:
ARI: Attestation of Real-time Mission Execution Integrity. USENIX Security Symposium 2023: 2761-2778 - [c148]Wenjing Lou:
Fortifying Your Defenses: Techniques to Thwart Adversarial Attacks and Boost Performance of Machine Learning-Based Intrusion Detection Systems. WiseML@WiSec 2023: 1 - [c147]Shanghao Shi, Yang Xiao, Changlai Du, Md Hasan Shahriar, Ao Li, Ning Zhang, Y. Thomas Hou, Wenjing Lou:
MS-PTP: Protecting Network Timing from Byzantine Attacks. WISEC 2023: 61-71 - [i13]Shanghao Shi, Ning Wang, Yang Xiao, Chaoyu Zhang, Yi Shi, Y. Thomas Hou, Wenjing Lou:
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction. CoRR abs/2311.05808 (2023) - 2022
- [j129]Yan Huang, Y. Thomas Hou, Wenjing Lou:
DELUXE: A DL-Based Link Adaptation for URLLC/eMBB Multiplexing in 5G NR. IEEE J. Sel. Areas Commun. 40(1): 143-162 (2022) - [j128]Xiaoqun Yuan, Mengting Sun, Wenjing Lou:
A Dynamic Deep-Learning-Based Virtual Edge Node Placement Scheme for Edge Cloud Systems in Mobile Environment. IEEE Trans. Cloud Comput. 10(2): 1317-1328 (2022) - [j127]Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators. IEEE Trans. Dependable Secur. Comput. 19(1): 67-76 (2022) - [j126]Chong-zhi Gao, Jin Li, Shi-bing Xia, Kim-Kwang Raymond Choo, Wenjing Lou, Changyu Dong:
MAS-Encryption and its Applications in Privacy-Preserving Classifiers. IEEE Trans. Knowl. Data Eng. 34(5): 2306-2323 (2022) - [j125]Yan Huang, Shaoran Li, Y. Thomas Hou, Wenjing Lou:
GPF+: A Novel Ultrafast GPU-Based Proportional Fair Scheduler for 5G NR. IEEE/ACM Trans. Netw. 30(2): 601-615 (2022) - [j124]Chengzhang Li, Qingyu Liu, Shaoran Li, Yongce Chen, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
Scheduling With Age of Information Guarantee. IEEE/ACM Trans. Netw. 30(5): 2046-2059 (2022) - [j123]Shaoran Li, Y. Thomas Hou, Wenjing Lou, Brian Jalaian, Stephen Russell:
Maximizing Energy Efficiency With Channel Uncertainty Under Mutual Interference. IEEE Trans. Wirel. Commun. 21(10): 8476-8488 (2022) - [j122]Yang Xiao, Shanghao Shi, Wenjing Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. Thomas Hou, Jeffrey H. Reed:
Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution. IEEE Wirel. Commun. 29(1): 220-228 (2022) - [c146]Ning Wang, Yang Xiao, Yimin Chen, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning. ACSAC 2022: 647-657 - [c145]Ning Wang, Yang Xiao, Yimin Chen, Yang Hu, Wenjing Lou, Y. Thomas Hou:
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations. AsiaCCS 2022: 946-958 - [c144]Yang Hu, Ning Wang, Yimin Chen, Wenjing Lou, Y. Thomas Hou:
Transferability of Adversarial Examples in Machine Learning-based Malware Detection. CNS 2022: 28-36 - [c143]Shaoran Li, Nan Jiang, Yongce Chen, Y. Thomas Hou, Wenjing Lou, Weijun Xie:
D2BF - Data-Driven Beamforming in MU-MIMO with Channel Estimation Uncertainty. INFOCOM 2022: 120-129 - [c142]Yongce Chen, Y. Thomas Hou, Wenjing Lou, Jeffrey H. Reed, Sastry Kompella:
M3: A Sub-Millisecond Scheduler for Multi-Cell MIMO Networks under C-RAN Architecture. INFOCOM 2022: 130-139 - [c141]Qingyu Liu, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Jeffrey H. Reed, Sastry Kompella:
Ao2I: Minimizing Age of Outdated Information to Improve Freshness in Data Collection. INFOCOM 2022: 1359-1368 - [c140]Ning Wang, Yimin Chen, Yang Hu, Wenjing Lou, Y. Thomas Hou:
FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning. INFOCOM 2022: 1409-1418 - [c139]Heng Jin, Qingyu Liu, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
Hector: A Reinforcement Learning-based Scheduler for Minimizing Casualties of a Military Drone Swarm. MILCOM 2022: 887-894 - [i12]Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wenjing Lou, Y. Thomas Hou:
CANShield: Signal-based Intrusion Detection for Controller Area Networks. CoRR abs/2205.01306 (2022) - 2021
- [j121]Shanghao Shi, Yang Xiao, Wenjing Lou, Chonggang Wang, Xu Li, Y. Thomas Hou, Jeffrey H. Reed:
Challenges and New Directions in Securing Spectrum Access Systems. IEEE Internet Things J. 8(8): 6498-6518 (2021) - [j120]Chengzhang Li, Yan Huang, Shaoran Li, Yongce Chen, Brian Jalaeian, Y. Thomas Hou, Wenjing Lou, Jeffrey H. Reed, Sastry Kompella:
Minimizing AoI in a 5G-Based IoT Network Under Varying Channel Conditions. IEEE Internet Things J. 8(19): 14543-14558 (2021) - [j119]Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu, Changyu Dong, Wenjing Lou:
Searchable Symmetric Encryption with Forward Search Privacy. IEEE Trans. Dependable Secur. Comput. 18(1): 460-474 (2021) - [j118]Tong Li, Jin Li, Xiaofeng Chen, Zheli Liu, Wenjing Lou, Y. Thomas Hou:
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning. IEEE Trans. Dependable Secur. Comput. 18(6): 2969-2982 (2021) - [j117]Shaoran Li, Yan Huang, Chengzhang Li, Brian Jalaian, Y. Thomas Hou, Wenjing Lou, Stephen Russell:
Maximize Spectrum Efficiency in Underlay Coexistence With Channel Uncertainty. IEEE/ACM Trans. Netw. 29(2): 764-778 (2021) - [c138]Naru Jai, Shaoran Li, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Jeffrey H. Reed, Sastry Kompella:
Optimal Channel Allocation in the CBRS Band with Shipborne Radar Incumbents. DySPAN 2021: 80-88 - [c137]Yan Huang, Y. Thomas Hou, Wenjing Lou:
A Deep-Learning-based Link Adaptation Design for eMBB/URLLC Multiplexing in 5G NR. INFOCOM 2021: 1-10 - [c136]Yongce Chen, Yubo Wu, Y. Thomas Hou, Wenjing Lou:
mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO Systems. INFOCOM 2021: 1-10 - [c135]Chengzhang Li, Qingyu Liu, Shaoran Li, Yongce Chen, Y. Thomas Hou, Wenjing Lou:
On Scheduling with AoI Violation Tolerance. INFOCOM 2021: 1-9 - [c134]Qingyu Liu, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
Aion: A Bandwidth Optimized Scheduler with AoI Guarantee. INFOCOM 2021: 1-10 - [c133]Ning Wang, Yimin Chen, Yang Hu, Wenjing Lou, Y. Thomas Hou:
MANDA: On Adversarial Example Detection for Network Intrusion Detection System. INFOCOM 2021: 1-10 - [c132]Shaoran Li, Chengzhang Li, Yan Huang, Brian Jalaian, Y. Thomas Hou, Wenjing Lou:
Task Offloading with Uncertain Processing Cycles. MobiHoc 2021: 51-60 - [i11]Yang Xiao, Shanghao Shi, Wenjing Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. Thomas Hou, Jeffrey H. Reed:
Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution. CoRR abs/2112.05612 (2021) - 2020
- [j116]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
A Survey of Distributed Consensus Protocols for Blockchain Networks. IEEE Commun. Surv. Tutorials 22(2): 1432-1465 (2020) - [j115]Yan Huang, Shaoran Li, Chengzhang Li, Y. Thomas Hou, Wenjing Lou:
A Deep-Reinforcement-Learning-Based Approach to Dynamic eMBB/URLLC Multiplexing in 5G NR. IEEE Internet Things J. 7(7): 6439-6456 (2020) - [j114]Yan Huang, Shaoran Li, Yongce Chen, Y. Thomas Hou, Wenjing Lou, James Delfeld, Vikrama Ditya:
GPU: A New Enabling Platform for Real-Time Optimization in Wireless Networks. IEEE Netw. 34(6): 77-83 (2020) - [j113]Yan Huang, Yongce Chen, Y. Thomas Hou, Wenjing Lou:
Achieving Fair LTE/Wi-Fi Coexistence with Real-Time Scheduling. IEEE Trans. Cogn. Commun. Netw. 6(1): 366-380 (2020) - [j112]Pedram Kheirkhah Sangdeh, Hossein Pirayesh, Qiben Yan, Kai Zeng, Wenjing Lou, Huacheng Zeng:
A Practical Downlink NOMA Scheme for Wireless LANs. IEEE Trans. Commun. 68(4): 2236-2250 (2020) - [j111]Chengzhang Li, Shaoran Li, Yongce Chen, Y. Thomas Hou, Wenjing Lou:
Minimizing Age of Information Under General Models for IoT Data Collection. IEEE Trans. Netw. Sci. Eng. 7(4): 2256-2270 (2020) - [j110]Yongce Chen, Yan Huang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
On DoF-Based Interference Cancellation Under General Channel Rank Conditions. IEEE/ACM Trans. Netw. 28(3): 1002-1016 (2020) - [j109]Wei Chang, Yang Xiao, Wenjing Lou, Guochu Shou:
Offloading Decision in Edge Computing for Continuous Applications Under Uncertainty. IEEE Trans. Wirel. Commun. 19(9): 6196-6209 (2020) - [c131]Yang Xiao, Shanghao Shi, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication. ACSAC 2020: 681-693 - [c130]Yang Xiao, Ning Zhang, Jin Li, Wenjing Lou, Y. Thomas Hou:
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution. ESORICS (2) 2020: 610-629 - [c129]Ruide Zhang, Ning Zhang, Assad Moini, Wenjing Lou, Y. Thomas Hou:
PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications. ICDCS 2020: 34-44 - [c128]Chengzhang Li, Shaoran Li, Yongce Chen, Y. Thomas Hou, Wenjing Lou:
AoI Scheduling with Maximum Thresholds. INFOCOM 2020: 436-445 - [c127]Yongce Chen, Yan Huang, Chengzhang Li, Y. Thomas Hou, Wenjing Lou:
Turbo-HB: A Novel Design and Implementation to Achieve Ultra-Fast Hybrid Beamforming. INFOCOM 2020: 1489-1498 - [c126]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain. INFOCOM 2020: 1648-1657 - [i10]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain. CoRR abs/2002.08912 (2020)
2010 – 2019
- 2019
- [j108]Yaxing Chen, Wenhai Sun, Ning Zhang, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou:
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT. IEEE Trans. Inf. Forensics Secur. 14(7): 1830-1842 (2019) - [j107]Xueqin Liang, Zheng Yan, Xiaofeng Chen, Laurence T. Yang, Wenjing Lou, Y. Thomas Hou:
Game Theoretical Analysis on Encrypted Cloud Data Deduplication. IEEE Trans. Ind. Informatics 15(10): 5778-5789 (2019) - [j106]Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
A General Method to Determine Asymptotic Capacity Upper Bounds for Wireless Networks. IEEE Trans. Netw. Sci. Eng. 6(1): 2-15 (2019) - [j105]Xiaoqi Qin, Xu Yuan, Zhi Zhang, Feng Tian, Y. Thomas Hou, Wenjing Lou:
Joint User-AP Association and Resource Allocation in Multi-AP 60-GHz WLAN. IEEE Trans. Veh. Technol. 68(6): 5696-5710 (2019) - [c125]Ruide Zhang, Ning Wang, Ning Zhang, Zheng Yan, Wenjing Lou, Y. Thomas Hou:
PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Networks. DySPAN 2019: 1-10 - [c124]Shaoran Li, Yan Huang, Chengzhang Li, Brian Jalaian, Stephen Russell, Y. Thomas Hou, Wenjing Lou, Benjamin MacCall:
A Real-Time Solution for Underlay Coexistence with Channel Uncertainty. GLOBECOM 2019: 1-6 - [c123]Chengzhang Li, Yan Huang, Yongce Chen, Brian Jalaian, Y. Thomas Hou, Wenjing Lou:
Kronos: A 5G Scheduler for AoI Minimization Under Dynamic Channel Conditions. ICDCS 2019: 1466-1475 - [c122]Shaoran Li, Y. Thomas Hou, Wenjing Lou, Brian Jalaian, Stephen Russell, Benjamin MacCall:
Optimal Power Control with Channel Uncertainty in Ad Hoc Networks. MILCOM 2019: 652-657 - [c121]Shaoran Li, Yan Huang, Chengzhang Li, Brian Jalaian, Y. Thomas Hou, Wenjing Lou:
Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation. MobiHoc 2019: 71-80 - [e3]Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 304, Springer 2019, ISBN 978-3-030-37227-9 [contents] - [e2]Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 305, Springer 2019, ISBN 978-3-030-37230-9 [contents] - [i9]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
A Survey of Distributed Consensus Protocols for Blockchain Networks. CoRR abs/1904.04098 (2019) - [i8]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution. CoRR abs/1904.07275 (2019) - [i7]Yaxing Chen, Qinghua Zheng, Dan Liu, Zheng Yan, Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data. CoRR abs/1912.08454 (2019) - 2018
- [j104]Yan Huang, Yongce Chen, Y. Thomas Hou, Wenjing Lou, Jeffrey H. Reed:
Recent Advances of LTE/WiFi Coexistence in Unlicensed Spectrum. IEEE Netw. 32(2): 107-113 (2018) - [j103]Huacheng Zeng, Xiaoqi Qin, Xu Yuan, Yi Shi, Y. Thomas Hou, Wenjing Lou:
Cooperative Interference Neutralization in Multi-Hop Wireless Networks. IEEE Trans. Commun. 66(2): 889-903 (2018) - [j102]Ning Zhang, Ruide Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, Sushil Jajodia:
Memory Forensic Challenges Under Misused Architectural Features. IEEE Trans. Inf. Forensics Secur. 13(9): 2345-2358 (2018) - [j101]Feng Tian, Xu Yuan, Y. Thomas Hou, Wenjing Lou, Zhen Yang:
Cost Minimization for Cooperative Traffic Relaying Between Primary and Secondary Networks. IEEE Trans. Mob. Comput. 17(9): 2014-2027 (2018) - [j100]Huacheng Zeng, Xiaoqi Qin, Xu Yuan, Feng Tian, Y. Thomas Hou, Wenjing Lou, Scott F. Midkiff:
On Multicast Throughput in Multihop MIMO Networks With Interference Alignment. IEEE Trans. Veh. Technol. 67(7): 6627-6641 (2018) - [j99]Borhan (Brian) Jalaeian, Xu Yuan, Yi Shi, Y. Thomas Hou, Wenjing Lou, Scott F. Midkiff, Venkat R. Dasari:
On the integration of SIC and MIMO DoF for interference cancellation in wireless networks. Wirel. Networks 24(7): 2357-2374 (2018) - [c120]Ning Zhang, Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Wade Trappe:
ROSTER: Radio Context Attestation in Cognitive Radio Network. CNS 2018: 1-9 - [c119]Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup. CNS 2018: 1-9 - [c118]Yan Huang, Yongce Chen, Y. Thomas Hou, Wenjing Lou:
CURT: A Real-Time Scheduling Algorithm for Coexistence of LTE and Wi-Fi in Unlicensed Spectrum. DySPAN 2018: 1-9 - [c117]Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publication. ESORICS (2) 2018: 187-206 - [c116]Ning Zhang, Jin Li, Wenjing Lou, Y. Thomas Hou:
PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution. DPM/CBT@ESORICS 2018: 345-353 - [c115]Xiaoqun Yuan, Xiaowen Tong, Qing Fang, Wenhai Sun, Wenjing Lou:
A Service Strategy Selection in Collaboration Model for the Business Growth of Content Providers. HPCC/SmartCity/DSS 2018: 842-847 - [c114]Wenhai Sun, Ruide Zhang, Wenjing Lou, Y. Thomas Hou:
REARGUARD: Secure Keyword Search Using Trusted Hardware. INFOCOM 2018: 801-809 - [c113]Yongce Chen, Yan Huang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
A General Model for DoF-based Interference Cancellation in MIMO Networks With Rank-Deficient Channels. INFOCOM 2018: 900-907 - [c112]Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou:
TruSense: Information Leakage from TrustZone. INFOCOM 2018: 1097-1105 - [c111]Yan Huang, Shaoran Li, Y. Thomas Hou, Wenjing Lou:
GPF: A GPU-based Design to Achieve ~100 μs Scheduling for 5G NR. MobiCom 2018: 207-222 - [c110]Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou:
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. RAID 2018: 380-400 - [c109]Changlai Du, Xiaoqun Yuan, Wenjing Lou, Y. Thomas Hou:
Context-Free Fine-Grained Motion Sensing Using WiFi. SECON 2018: 199-207 - [c108]Yaxing Chen, Wenhai Sun, Ning Zhang, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou:
A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT. SecureComm (1) 2018: 3-21 - 2017
- [j98]Wei Song, Bing Wang, Qian Wang, Zhiyong Peng, Wenjing Lou:
Tell me the truth: Practically public authentication for outsourced databases with multi-user modification. Inf. Sci. 387: 221-237 (2017) - [j97]Wei Song, Bing Wang, Qian Wang, Zhiyong Peng, Wenjing Lou, Yihui Cui:
A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications. J. Parallel Distributed Comput. 99: 14-27 (2017) - [j96]Xu Yuan, Xiaoqi Qin, Feng Tian, Y. Thomas Hou, Wenjing Lou, Scott F. Midkiff, Jeffrey H. Reed:
Coexistence Between Wi-Fi and LTE on Unlicensed Spectrum: A Human-Centric Approach. IEEE J. Sel. Areas Commun. 35(4): 964-977 (2017) - [j95]Huacheng Zeng, Y. Thomas Hou, Yi Shi, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
A Distributed Scheduling Algorithm for Underwater Acoustic Networks With Large Propagation Delays. IEEE Trans. Commun. 65(3): 1131-1145 (2017) - [j94]Huacheng Zeng, Yi Shi, Y. Thomas Hou, Wenjing Lou, Xu Yuan, Rongbo Zhu, Jiannong Cao:
OFDM-Based Interference Alignment in Single-Antenna Cellular Wireless Networks. IEEE Trans. Commun. 65(10): 4492-4506 (2017) - [j93]Yao Zheng, Ming Li, Wenjing Lou, Y. Thomas Hou:
Location Based Handshake and Private Proximity Test with Location Tags. IEEE Trans. Dependable Secur. Comput. 14(4): 406-419 (2017) - [j92]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. IEEE Trans. Inf. Forensics Secur. 12(3): 532-543 (2017) - [j91]Wei Song, Bing Wang, Qian Wang, Chengliang Shi, Wenjing Lou, Zhiyong Peng:
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources. IEEE Trans. Inf. Forensics Secur. 12(10): 2334-2347 (2017) - [j90]Ruide Zhang, Ning Zhang, Changlai Du, Wenjing Lou, Y. Thomas Hou, Yuichi Kawamoto:
From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality. ACM Trans. Intell. Syst. Technol. 9(1): 13:1-13:20 (2017) - [j89]Xu Yuan, Yi Shi, Xiaoqi Qin, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff, Jeffrey H. Reed:
Beyond Overlay: Reaping Mutual Benefits for Primary and Secondary Networks Through Node-Level Cooperation. IEEE Trans. Mob. Comput. 16(1): 2-15 (2017) - [j88]Xiaoqi Qin, Huacheng Zeng, Xu Yuan, Brian Jalaian, Y. Thomas Hou, Wenjing Lou, Scott F. Midkiff:
Impact of Full Duplex Scheduling on End-to-End Throughput in Multi-Hop Wireless Networks. IEEE Trans. Mob. Comput. 16(1): 158-171 (2017) - [j87]Xuefeng Liu, Wenhai Sun, Hanyu Quan, Wenjing Lou, Yuqing Zhang, Hui Li:
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys. IEEE Trans. Serv. Comput. 10(5): 826-838 (2017) - [c107]Ning Zhang, Ruide Zhang, Qiben Yan, Wenjing Lou, Y. Thomas Hou, Danfeng Yao:
Black penguin: On the feasibility of detecting intrusion with homogeneous memory. CNS 2017: 586-594 - [c106]Andrey Garnaev, Wade Trappe, Y. Thomas Hou, Wenjing Lou:
Spectrum attacks aimed at minimizing spectrum opportunities. ICASSP 2017: 2092-2096 - [c105]Ruide Zhang, Ning Zhang, Changlai Du, Wenjing Lou, Y. Thomas Hou, Yuichi Kawamoto:
AugAuth: Shoulder-surfing resistant authentication for augmented reality. ICC 2017: 1-6 - [c104]Xuefeng Liu, Wenhai Sun, Wenjing Lou, Qingqi Pei, Yuqing Zhang:
One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. INFOCOM 2017: 1-9 - [c103]Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data. INFOCOM 2017: 1-9 - [c102]Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou:
Privacy-preserving pattern matching over encrypted genetic data in cloud computing. INFOCOM 2017: 1-9 - [c101]Xiaoqi Qin, Xu Yuan, Zhi Zhang, Feng Tian, Y. Thomas Hou, Wenjing Lou:
On AP Assignment and Transmission Scheduling for Multi-AP 60 GHz WLAN. MASS 2017: 189-197 - 2016
- [j86]Liang Liu, Xiaofeng Chen, Wenjing Lou:
Secure three-party computational protocols for triangle area. Int. J. Inf. Sec. 15(1): 1-13 (2016) - [j85]Xu Yuan, Feng Tian, Y. Thomas Hou, Wenjing Lou, Hanif D. Sherali, Sastry Kompella, Jeffrey H. Reed:
On Throughput Region for Primary and Secondary Networks With Node-Level Cooperation. IEEE J. Sel. Areas Commun. 34(10): 2763-2775 (2016) - [j84]Huacheng Zeng, Feng Tian, Y. Thomas Hou, Wenjing Lou, Scott F. Midkiff:
Interference alignment for multihop wireless networks: challenges and research directions. IEEE Netw. 30(2): 74-80 (2016) - [j83]Yao Zheng, Assad Moini, Wenjing Lou, Y. Thomas Hou, Yuichi Kawamoto:
Cognitive security: securing the burgeoning landscape of mobile networks. IEEE Netw. 30(4): 66-71 (2016) - [j82]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. IEEE Trans. Computers 65(10): 3184-3195 (2016) - [j81]Xu Yuan, Xiaoqi Qin, Feng Tian, Brian Jalaian, Yi Shi, Y. Thomas Hou, Wenjing Lou, Wade Trappe:
An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm. IEEE Trans. Cogn. Commun. Netw. 2(4): 411-426 (2016) - [j80]Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Yiwei Thomas Hou:
Jamming Resilient Communication Using MIMO Interference Cancellation. IEEE Trans. Inf. Forensics Secur. 11(7): 1486-1499 (2016) - [j79]Huacheng Zeng, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
An Analytical Model for Interference Alignment in Multi-Hop MIMO Networks. IEEE Trans. Mob. Comput. 15(1): 17-31 (2016) - [j78]Huacheng Zeng, Yi Shi, Y. Thomas Hou, Wenjing Lou, Hanif D. Sherali, Rongbo Zhu, Scott F. Midkiff:
A Scheduling Algorithm for MIMO DoF Allocation in Multi-Hop Networks. IEEE Trans. Mob. Comput. 15(2): 264-277 (2016) - [j77]Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud. IEEE Trans. Parallel Distributed Syst. 27(4): 1187-1198 (2016) - [j76]Xiaoqi Qin, Xu Yuan, Yi Shi, Y. Thomas Hou, Wenjing Lou, Scott F. Midkiff:
Joint Flow Routing and DoF Allocation in Multihop MIMO Networks. IEEE Trans. Wirel. Commun. 15(3): 1907-1922 (2016) - [j75]Yantian Hou, Ming Li, Xu Yuan, Yiwei Thomas Hou, Wenjing Lou:
Cooperative Interference Mitigation for Heterogeneous Multi-Hop Wireless Networks Coexistence. IEEE Trans. Wirel. Commun. 15(8): 5328-5340 (2016) - [j74]Canming Jiang, Yi Shi, Xiaoqi Qin, Xu Yuan, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
Cross-Layer Optimization for Multi-Hop Wireless Networks With Successive Interference Cancellation. IEEE Trans. Wirel. Commun. 15(8): 5819-5831 (2016) - [j73]Xu Yuan, Xiaoqi Qin, Feng Tian, Yi Shi, Y. Thomas Hou, Wenjing Lou, Scott F. Midkiff, Sastry Kompella:
A Distributed Algorithm to Achieve Transparent Coexistence for a Secondary Multi-Hop MIMO Network. IEEE Trans. Wirel. Commun. 15(9): 6063-6077 (2016) - [c100]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Towards Efficient Fully Randomized Message-Locked Encryption. ACISP (1) 2016: 361-375 - [c99]Ethan Gaebel, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Looks Good To Me: Authentication for Augmented Reality. TrustED@CCS 2016: 57-67 - [c98]Ning Zhang, He Sun, Kun Sun, Wenjing Lou, Yiwei Thomas Hou:
CacheKit: Evading Memory Introspection Using Cache Incoherence. EuroS&P 2016: 337-352 - [c97]Changlai Du, Ruide Zhang, Wenjing Lou, Y. Thomas Hou:
MobTrack: Locating indoor interfering radios with a single device. INFOCOM 2016: 1-9 - [c96]Huacheng Zeng, Xu Yuan, Xiaoqi Qin, Yi Shi, Y. Thomas Hou, Wenjing Lou:
Nullification in the air: Interference neutralization in multi-hop wireless networks. INFOCOM 2016: 1-9 - [c95]Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou:
CaSE: Cache-Assisted Secure Execution on ARM Processors. IEEE Symposium on Security and Privacy 2016: 72-90 - [c94]Yao Zheng, Matthias Schulz, Wenjing Lou, Y. Thomas Hou, Matthias Hollick:
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding. WISEC 2016: 21-30 - [i6]Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou:
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices. IACR Cryptol. ePrint Arch. 2016: 980 (2016) - 2015
- [j72]Li Yang, Jianfeng Ma, Wenjing Lou, Qi Jiang:
A delegation based cross trusted domain direct anonymous attestation scheme. Comput. Networks 81: 245-257 (2015) - [j71]Bing Wang, Yao Zheng, Wenjing Lou, Y. Thomas Hou:
DDoS attack protection in the era of cloud computing and Software-Defined Networking. Comput. Networks 81: 308-319 (2015) - [j70]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
New access control systems based on outsourced attribute-based encryption. J. Comput. Secur. 23(6): 659-683 (2015) - [j69]Xu Yuan, Canming Jiang, Yi Shi, Yiwei Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks. IEEE J. Sel. Areas Commun. 33(5): 958-971 (2015) - [j68]Liguang Xie, Yi Shi, Yiwei Thomas Hou, Wenjing Lou, Hanif D. Sherali, Huaibei Zhou, Scott F. Midkiff:
A Mobile Platform for Wireless Charging and Data Collection in Sensor Networks. IEEE J. Sel. Areas Commun. 33(8): 1521-1533 (2015) - [j67]Amr Nabil, Yiwei Thomas Hou, Rongbo Zhu, Wenjing Lou, Scott F. Midkiff:
Recent advances in interference management for wireless networks. IEEE Netw. 29(5): 83-89 (2015) - [j66]Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Wenjing Lou:
Identity-Based Encryption with Outsourced Revocation in Cloud Computing. IEEE Trans. Computers 64(2): 425-437 (2015) - [j65]Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou:
New Publicly Verifiable Databases with Efficient Updates. IEEE Trans. Dependable Secur. Comput. 12(5): 546-556 (2015) - [j64]Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. IEEE Trans. Inf. Forensics Secur. 10(1): 69-78 (2015) - [j63]Liguang Xie, Yi Shi, Yiwei Thomas Hou, Wenjing Lou, Hanif D. Sherali, Scott F. Midkiff:
Multi-Node Wireless Energy Charging in Sensor Networks. IEEE/ACM Trans. Netw. 23(2): 437-450 (2015) - [j62]Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou:
A Hybrid Cloud Approach for Secure Authorized Deduplication. IEEE Trans. Parallel Distributed Syst. 26(5): 1206-1216 (2015) - [j61]Yao Zheng, Matthias Schulz, Wenjing Lou, Yiwei Thomas Hou, Matthias Hollick:
Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security. IEEE Wirel. Commun. Lett. 4(1): 34-37 (2015) - [c93]Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou, Sushil Jajodia:
Now You See Me: Hide and Seek in Physical Address Space. AsiaCCS 2015: 321-331 - [c92]Bing Wang, Wenjing Lou, Y. Thomas Hou:
Modeling the side-channel attacks in data deduplication with game theory. CNS 2015: 200-208 - [c91]Xu Yuan, Feng Tian, Y. Thomas Hou, Wenjing Lou, Hanif D. Sherali, Sastry Kompella, Jeffrey H. Reed:
Optimal throughput curve for primary and secondary users with node-level cooperation. DySPAN 2015: 358-364 - [c90]Yao Zheng, Bing Wang, Wenjing Lou, Yiwei Thomas Hou:
Privacy-Preserving Link Prediction in Decentralized Online Social Networks. ESORICS (2) 2015: 61-80 - [c89]Changlai Du, Huacheng Zeng, Wenjing Lou, Yiwei Thomas Hou:
On cyclostationary analysis of WiFi signals for direction estimation. ICC 2015: 3557-3561 - [c88]Qiben Yan, Yao Zheng, Tingting Jiang, Wenjing Lou, Y. Thomas Hou:
PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis. INFOCOM 2015: 316-324 - [c87]Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou:
Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. INFOCOM 2015: 2092-2100 - [c86]Wenhai Sun, Xuefeng Liu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. INFOCOM 2015: 2110-2118 - [c85]Brian Jalaeian, Yi Shi, Xu Yuan, Yiwei Thomas Hou, Wenjing Lou, Scott F. Midkiff:
Harmonizing SIC and MIMO DoF Interference Cancellation for Efficient Network-Wide Resource Allocation. MASS 2015: 316-323 - 2014
- [j60]Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New and efficient conditional e-payment systems with transferability. Future Gener. Comput. Syst. 37: 252-258 (2014) - [j59]Huacheng Zeng, Yi Shi, Yiwei Thomas Hou, Rongbo Zhu, Wenjing Lou:
A novel MIMO DoF model for multi-hop networks. IEEE Netw. 28(5): 81-85 (2014) - [j58]Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou:
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Trans. Parallel Distributed Syst. 25(1): 222-233 (2014) - [j57]Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P. C. Lee, Wenjing Lou:
Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Trans. Parallel Distributed Syst. 25(6): 1615-1625 (2014) - [j56]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Trans. Parallel Distributed Syst. 25(9): 2386-2396 (2014) - [j55]Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li:
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking. IEEE Trans. Parallel Distributed Syst. 25(11): 3025-3035 (2014) - [j54]Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Yiwei Thomas Hou, Chang-Tien Lu:
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 13(10): 5893-5905 (2014) - [c84]Liang Liu, Xiaofeng Chen, Wenjing Lou:
A Secure Three-Party Computational Protocol for Triangle Area. ACISP 2014: 82-97 - [c83]Haixin Nie, Xiaofeng Chen, Jin Li, Josolph Liu, Wenjing Lou:
Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming. AINA 2014: 591-596 - [c82]Ning Zhang, Wenjing Lou, Xuxian Jiang, Y. Thomas Hou:
Enabling Trusted Data-intensive execution in cloud computing. CNS 2014: 355-363 - [c81]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. ESORICS (1) 2014: 148-162 - [c80]Bing Wang, Yao Zheng, Wenjing Lou, Y. Thomas Hou:
DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking. ICNP 2014: 624-629 - [c79]Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. INFOCOM 2014: 226-234 - [c78]Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, Wenjing Lou:
Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks. INFOCOM 2014: 880-888 - [c77]Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou:
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. INFOCOM 2014: 2112-2120 - [c76]Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Y. Thomas Hou:
MIMO-based jamming resilient communication in wireless networks. INFOCOM 2014: 2697-2706 - [c75]Xu Yuan, Yi Shi, Yiwei Thomas Hou, Wenjing Lou, Scott F. Midkiff, Sastry Kompella:
Achieving transparent coexistence in a multi-hop secondary network through distributed computation. IPCCC 2014: 1-7 - [c74]Huacheng Zeng, Yi Shi, Y. Thomas Hou, Wenjing Lou, Xu Yuan, Rongbo Zhu, Jiannong Cao:
Increasing user throughput in cellular networks with interference alignment. SECON 2014: 346-353 - [c73]Huacheng Zeng, Yiwei Thomas Hou, Yi Shi, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
Shark-IA: An Interference Alignment Algorithm for Multi-hop Underwater Acoustic Networks with Large Propagation Delays. WUWNet 2014: 6:1-6:8 - [p1]Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Hui Li:
Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing. Secure Cloud Computing 2014: 189-212 - 2013
- [j53]Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, Y. Thomas Hou:
Toward privacy-assured and searchable cloud data storage services. IEEE Netw. 27(4): 1-0 (2013) - [j52]Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans. Computers 62(2): 362-375 (2013) - [j51]Liang Xiao, Qiben Yan, Wenjing Lou, Guiquan Chen, Y. Thomas Hou:
Proximity-Based Security Techniques for Mobile Users in Wireless Networks. IEEE Trans. Inf. Forensics Secur. 8(12): 2089-2100 (2013) - [j50]Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou, Kui Ren:
Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Networks 9(2): 18:1-18:35 (2013) - [j49]Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, Wenjing Lou:
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Trans. Parallel Distributed Syst. 24(1): 131-143 (2013) - [j48]Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Hanif D. Sherali:
Throughput Maximization for Multi-Hop Wireless Networks with Network-Wide Energy Constraint. IEEE Trans. Wirel. Commun. 12(3): 1255-1267 (2013) - [j47]Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou:
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks. IEEE Trans. Wirel. Commun. 12(5): 2024-2033 (2013) - [j46]Liguang Xie, Yi Shi, Y. Thomas Hou, Wenjing Lou:
Wireless power transfer and applications to sensor networks. IEEE Wirel. Commun. 20(4) (2013) - [c72]Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li:
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. AsiaCCS 2013: 71-82 - [c71]Sushil Jajodia, Wenjing Lou, Wade Trappe:
Welcome message. CNS 2013: 1-2 - [c70]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. ESORICS 2013: 592-609 - [c69]Liang Xiao, Qiben Yan, Wenjing Lou, Y. Thomas Hou:
Proximity-based security using ambient radio signals. ICC 2013: 1609-1613 - [c68]Lu Shi, Shucheng Yu, Wenjing Lou, Y. Thomas Hou:
SybilShield: An agent-aided social network-based Sybil defense among multiple communities. INFOCOM 2013: 1034-1042 - [c67]Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas Hou, Chang-Tien Lu:
Non-parametric passive traffic monitoring in cognitive radio networks. INFOCOM 2013: 1240-1248 - [c66]Huacheng Zeng, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
On interference alignment for multi-hop MIMO networks. INFOCOM 2013: 1330-1338 - [c65]Huacheng Zeng, Yi Shi, Y. Thomas Hou, Wenjing Lou:
An efficient DoF scheduling algorithm for multi-hop MIMO networks. INFOCOM 2013: 1546-1554 - [c64]Liguang Xie, Yi Shi, Y. Thomas Hou, Wenjing Lou, Hanif D. Sherali, Scott F. Midkiff:
Bundling mobile base station and wireless energy transfer: Modeling and optimization. INFOCOM 2013: 1636-1644 - [c63]Xiaoqi Qin, Xu Yuan, Yi Shi, Y. Thomas Hou, Wenjing Lou, Scott F. Midkiff:
On Throughput Maximization for a Multi-hop MIMO Network. MASS 2013: 37-45 - [c62]Xu Yuan, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
UPS: A United Cooperative Paradigm for Primary and Secondary Networks. MASS 2013: 78-85 - [c61]Liguang Xie, Yi Shi, Y. Thomas Hou, Wenjing Lou, Hanif D. Sherali:
On traveling path and related problems for a mobile station in a rechargeable sensor network. MobiHoc 2013: 109-118 - [c60]Xu Yuan, Canming Jiang, Yi Shi, Yiwei Thomas Hou, Wenjing Lou, Sastry Kompella:
Beyond interference avoidance: On transparent coexistence for multi-hop secondary CR networks. SECON 2013: 398-405 - 2012
- [j45]Qiben Yan, Ming Li, Zhenyu Yang, Wenjing Lou, Hongqiang Zhai:
Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding. IEEE J. Sel. Areas Commun. 30(2): 484-492 (2012) - [j44]Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. IEEE Trans. Parallel Distributed Syst. 23(8): 1467-1479 (2012) - [j43]Cong Wang, Qian Wang, Kui Ren, Ning Cao, Wenjing Lou:
Toward Secure and Dependable Storage Services in Cloud Computing. IEEE Trans. Serv. Comput. 5(2): 220-232 (2012) - [j42]Zhenyu Yang, Ming Li, Wenjing Lou:
CodePlay: Live Multimedia Streaming in VANETs Using Symbol-Level Network Coding. IEEE Trans. Wirel. Commun. 11(8): 3006-3013 (2012) - [j41]Tingting Jiang, Huacheng Zeng, Qiben Yan, Wenjing Lou, Y. Thomas Hou:
On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication. IEEE Wirel. Commun. Lett. 1(4): 324-327 (2012) - [j40]Kai Zeng, Jie Yang, Wenjing Lou:
On energy efficiency of geographic opportunistic routing in lossy multihop wireless networks. Wirel. Networks 18(8): 967-983 (2012) - [c59]Yao Zheng, Ming Li, Wenjing Lou, Y. Thomas Hou:
SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags. ESORICS 2012: 361-378 - [c58]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. ESORICS 2012: 541-556 - [c57]Ming Li, Shucheng Yu, Wenjing Lou, Y. Thomas Hou:
Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities. ICDCS Workshops 2012: 466-470 - [c56]Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance. INFOCOM 2012: 424-432 - [c55]Ning Cao, Shucheng Yu, Zhenyu Yang, Wenjing Lou, Y. Thomas Hou:
LT codes-based secure and reliable cloud storage service. INFOCOM 2012: 693-701 - [c54]Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
Toward simple criteria to establish capacity scaling laws for wireless networks. INFOCOM 2012: 774-782 - [c53]Qiben Yan, Ming Li, Tingting Jiang, Wenjing Lou, Y. Thomas Hou:
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks. INFOCOM 2012: 900-908 - [c52]Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou:
Cherish every joule: Maximizing throughput with an eye on network-wide energy consumption. INFOCOM 2012: 1934-1941 - [c51]Ning Zhang, Ming Li, Wenjing Lou, Y. Thomas Hou:
MUSHI: Toward Multiple Level Security cloud with strong Hardware level Isolation. MILCOM 2012: 1-6 - [c50]Liguang Xie, Yi Shi, Y. Thomas Hou, Wenjing Lou, Hanif D. Sherali, Scott F. Midkiff:
On renewable sensor networks with wireless energy transfer: The multi-node case. SECON 2012: 10-18 - [e1]Pierangela Samarati, Wenjing Lou, Jianying Zhou:
SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress 2012, ISBN 978-989-8565-24-2 [contents] - 2011
- [j39]Zhenyu Yang, Ming Li, Wenjing Lou:
R-Code: Network coding-based reliable broadcast in wireless mesh networks. Ad Hoc Networks 9(5): 788-798 (2011) - [j38]Ming Li, Kai Zeng, Wenjing Lou:
Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links. Comput. Networks 55(10): 2443-2464 (2011) - [j37]Ming Li, Zhenyu Yang, Wenjing Lou:
CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding. IEEE J. Sel. Areas Commun. 29(1): 223-235 (2011) - [j36]Qian Wang, Kui Ren, Shucheng Yu, Wenjing Lou:
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. ACM Trans. Sens. Networks 8(1): 9:1-9:24 (2011) - [j35]Shucheng Yu, Kui Ren, Wenjing Lou:
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 22(4): 673-686 (2011) - [j34]Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li:
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distributed Syst. 22(5): 847-859 (2011) - [j33]Zhenyu Yang, Shucheng Yu, Wenjing Lou, Cong Liu:
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid. IEEE Trans. Smart Grid 2(4): 697-706 (2011) - [c49]Ning Zhang, Ming Li, Wenjing Lou:
Distributed Data Mining with Differential Privacy. ICC 2011: 1-5 - [c48]Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou:
Authorized Private Keyword Search over Encrypted Data in Cloud Computing. ICDCS 2011: 383-392 - [c47]Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing. ICDCS 2011: 393-402 - [c46]Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou:
Privacy-preserving multi-keyword ranked search over encrypted cloud data. INFOCOM 2011: 829-837 - [c45]Ming Li, Ning Cao, Shucheng Yu, Wenjing Lou:
FindU: Privacy-preserving personal profile matching in mobile social networks. INFOCOM 2011: 2435-2443 - [r2]Shucheng Yu, Wenjing Lou, Kui Ren:
Privacy-Preserving Authentication in Wireless Access Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 972-974 - [r1]Ming Li, Wenjing Lou, Kui Ren:
Secure Device Pairing. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1111-1115 - 2010
- [j32]Shucheng Yu, Kui Ren, Wenjing Lou:
Attribute-based on-demand multicast group setup with membership anonymity. Comput. Networks 54(3): 377-386 (2010) - [j31]Cong Wang, Kui Ren, Wenjing Lou, Jin Li:
Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4): 19-24 (2010) - [j30]Kui Ren, Shucheng Yu, Wenjing Lou, Yanchao Zhang:
PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. IEEE Trans. Parallel Distributed Syst. 21(2): 203-215 (2010) - [j29]Kai Zeng, Zhenyu Yang, Wenjing Lou:
Opportunistic Routing in Multi-Radio Multi-Channel Multi-Hop Wireless Networks. IEEE Trans. Wirel. Commun. 9(11): 3512-3521 (2010) - [j28]Ming Li, Wenjing Lou, Kui Ren:
Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1): 51-58 (2010) - [c44]Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou:
Attribute based data sharing with attribute revocation. AsiaCCS 2010: 261-270 - [c43]Ning Cao, Qian Wang, Kui Ren, Wenjing Lou:
Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks. ICC 2010: 1-5 - [c42]Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou:
Secure Ranked Keyword Search over Encrypted Cloud Data. ICDCS 2010: 253-262 - [c41]Zhenyu Yang, Ming Li, Wenjing Lou:
CodePlay: Live multimedia streaming in VANETs using symbol-level network coding. ICNP 2010: 223-232 - [c40]Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Fuzzy Keyword Search over Encrypted Data in Cloud Computing. INFOCOM 2010: 441-445 - [c39]Kai Zeng, Zhenyu Yang, Wenjing Lou:
Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks. INFOCOM 2010: 476-480 - [c38]Cong Wang, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. INFOCOM 2010: 525-533 - [c37]Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou:
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. INFOCOM 2010: 534-542 - [c36]Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren:
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks. INFOCOM 2010: 2651-2659 - [c35]Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou:
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. SecureComm 2010: 89-106
2000 – 2009
- 2009
- [j27]Kui Ren, Wenjing Lou, Bo Zhu, Sushil Jajodia:
Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation. IEEE Trans. Veh. Technol. 58(4): 2018-2029 (2009) - [j26]Kai Zeng, Zhenyu Yang, Wenjing Lou:
Location-Aided Opportunistic Forwarding in Multirate and Multihop Wireless Networks. IEEE Trans. Veh. Technol. 58(6): 3032-3040 (2009) - [j25]Kui Ren, Shucheng Yu, Wenjing Lou, Yanchao Zhang:
Multi-User Broadcast Authentication in Wireless Sensor Networks. IEEE Trans. Veh. Technol. 58(8): 4554-4564 (2009) - [j24]Wenjing Lou, Kui Ren:
Security, privacy, and accountability in wireless access networks. IEEE Wirel. Commun. 16(4): 80-87 (2009) - [j23]Kai Zeng, Kui Ren, Wenjing Lou, Patrick J. Moran:
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply. Wirel. Networks 15(1): 39-51 (2009) - [j22]Wenjing Lou, Wei Liu, Yanchao Zhang, Yuguang Fang:
SPREAD: Improving network security by multipath routing in mobile ad hoc networks. Wirel. Networks 15(3): 279-294 (2009) - [c34]Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. ESORICS 2009: 355-370 - [c33]Zhenyu Yang, Ming Li, Wenjing Lou:
R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links. GLOBECOM 2009: 1-6 - [c32]Zhenyu Yang, Kai Zeng, Wenjing Lou:
FSA: A Fast Coordination Scheme for Opportunistic Routing. ICC 2009: 1-5 - [c31]Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang:
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. INFOCOM 2009: 954-962 - [c30]Shucheng Yu, Kui Ren, Wenjing Lou:
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks. INFOCOM 2009: 963-971 - [c29]Cong Wang, Qian Wang, Kui Ren, Wenjing Lou:
Ensuring data storage security in Cloud Computing. IWQoS 2009: 1-9 - [c28]Ming Li, Wenjing Lou, Kai Zeng:
OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links. MASS 2009: 534-543 - [c27]Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li:
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. SecureComm 2009: 311-329 - [c26]Zhenyu Yang, Ming Li, Wenjing Lou:
A Network Coding Approach to Reliable Broadcast in Wireless Mesh Networks. WASA 2009: 234-243 - [i5]Cong Wang, Qian Wang, Kui Ren, Wenjing Lou:
Ensuring Data Storage Security in Cloud Computing. IACR Cryptol. ePrint Arch. 2009: 81 (2009) - [i4]Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security. IACR Cryptol. ePrint Arch. 2009: 281 (2009) - [i3]Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li:
Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. IACR Cryptol. ePrint Arch. 2009: 295 (2009) - [i2]Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IACR Cryptol. ePrint Arch. 2009: 579 (2009) - [i1]Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing. IACR Cryptol. ePrint Arch. 2009: 593 (2009) - 2008
- [j21]Wenxuan Guo, Xinming Huang, Wenjing Lou, Cao Liang:
On Relay Node Placement and Assignment for Two-tiered Wireless Networks. Mob. Networks Appl. 13(1-2): 186-197 (2008) - [j20]Kui Ren, Wenjing Lou, Yanchao Zhang:
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 7(5): 585-598 (2008) - [j19]Kui Ren, Kai Zeng, Wenjing Lou:
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 7(1): 354-363 (2008) - [j18]Kai Zeng, Wenjing Lou, Hongqiang Zhai:
Capacity of opportunistic routing in multi-rate and multi-hop wireless networks. IEEE Trans. Wirel. Commun. 7(12-1): 5118-5128 (2008) - [c25]Kai Zeng, Shucheng Yu, Kui Ren, Wenjing Lou, Yanchao Zhang:
Towards Secure Link Quality Measurement in Multihop Wireless Networks. GLOBECOM 2008: 4946-4950 - [c24]Kui Ren, Wenjing Lou:
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. ICDCS 2008: 286-294 - [c23]Wei Ren, Kui Ren, Wenjing Lou:
Optimized User Revocation for Group Signature Based Privacy-Aware PKI. ICDCS Workshops 2008: 388-393 - [c22]Kai Zeng, Wenjing Lou, Hongqiang Zhai:
On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks. INFOCOM 2008: 816-824 - [c21]Wei Ren, Kui Ren, Wenjing Lou, Yanchao Zhang:
Efficient user revocation for privacy-aware PKI. QSHINE 2008: 11 - [c20]Ming Li, Wenjing Lou:
Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links. QSHINE 2008: 47 - [c19]Shucheng Yu, Kui Ren, Wenjing Lou:
Attribute-based on-demand multicast group setup with membership anonymity. SecureComm 2008: 18 - [c18]Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel:
Anonymous ID-Based Group Key Agreement for Wireless Networks. WCNC 2008: 2615-2620 - 2007
- [j17]Kui Ren, Wenjing Lou:
Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. Mob. Networks Appl. 12(1): 79-92 (2007) - [j16]Kai Zeng, Wenjing Lou, Jie Yang, Donald Richard Brown:
On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks. Mob. Networks Appl. 12(5-6): 347-357 (2007) - [j15]Kui Ren, Wenjing Lou, Kai Zeng, Patrick J. Moran:
On Broadcast Authentication in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 6(11): 4136-4144 (2007) - [j14]Yanchao Zhang, Wenjing Lou, Wei Liu, Yuguang Fang:
A secure incentive protocol for mobile ad hoc networks. Wirel. Networks 13(5): 569-582 (2007) - [c17]Kai Zeng, Wenjing Lou, Jie Yang, D. Richard Brown III:
On throughput efficiency of geographic opportunistic routing in multihop wireless networks. QSHINE 2007: 41 - [c16]Kui Ren, Wenjing Lou, Yanchao Zhang:
Multi-user Broadcast Authentication in Wireless Sensor Networks. SECON 2007: 223-232 - 2006
- [j13]Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng:
Routing optimization security in mobile IPv6. Comput. Networks 50(13): 2401-2419 (2006) - [j12]Guohong Cao, Wenjing Lou, Mukesh Singhal:
Mobile Ad Hoc and Sensor Systems. Int. J. Wirel. Inf. Networks 13(4): 261-262 (2006) - [j11]Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang:
Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2): 247-260 (2006) - [j10]Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang:
Securing Mobile Ad Hoc Networks with Certificateless Public Keys. IEEE Trans. Dependable Secur. Comput. 3(4): 386-399 (2006) - [j9]Wenjing Lou, Younggoo Kwon:
H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Trans. Veh. Technol. 55(4): 1320-1330 (2006) - [j8]Kui Ren, Wenjing Lou, Kwangjo Kim, Robert H. Deng:
A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Trans. Veh. Technol. 55(4): 1373-1384 (2006) - [j7]Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang:
MASK: anonymous on-demand routing in mobile ad hoc networks. IEEE Trans. Wirel. Commun. 5(9): 2376-2385 (2006) - [j6]Kui Ren, Kai Zeng, Wenjing Lou:
A new approach for random key pre-distribution in large-scale wireless sensor networks. Wirel. Commun. Mob. Comput. 6: 307-318 (2006) - [j5]Wei Liu, Yanchao Zhang, Wenjing Lou, Yuguang Fang:
A robust and energy-efficient data dissemination framework for wireless sensor networks. Wirel. Networks 12(4): 465-479 (2006) - [c15]Kui Ren, Kai Zeng, Wenjing Lou:
Fault-tolerant Event Boundary Detection in Wireless Sensor Networks. GLOBECOM 2006 - [c14]Kui Ren, Wenjing Lou, Yanchao Zhang:
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. INFOCOM 2006 - [c13]Kai Zeng, Kui Ren, Wenjing Lou, Patrick J. Moran:
Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply. QSHINE 2006: 8 - [c12]Kui Ren, Kai Zeng, Wenjing Lou, Patrick J. Moran:
On Broadcast Authentication in Wireless Sensor Networks. WASA 2006: 502-514 - 2005
- [j4]Wei Liu, Wenjing Lou, Yuguang Fang:
An efficient quality of service routing algorithm for delay-sensitive applications. Comput. Networks 47(1): 87-104 (2005) - [c11]Kui Ren, Wenjing Lou:
Privacy enhanced access control in pervasive computing environments. BROADNETS 2005: 384-396 - [c10]Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang, Younggoo Kwon:
AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks. ICC 2005: 3515-3519 - [c9]Yanchao Zhang, Wei Liu, Wenjing Lou:
Anonymous communications in mobile ad hoc networks. INFOCOM 2005: 1940-1951 - [c8]Wenjing Lou:
An efficient N-to-1 multipath routing protocol in wireless sensor networks. MASS 2005 - [c7]Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang:
Securing sensor networks with location-based keys. WCNC 2005: 1909-1914 - 2004
- [c6]Wei Liu, Yanchao Zhang, Wenjing Lou, Yuguang Fang, Tan F. Wong:
Scalable and robust data dissemination in wireless sensor networks. GLOBECOM 2004: 3177-3181 - [c5]Wenjing Lou, Wei Liu, Yuguang Fang:
SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks. INFOCOM 2004: 2404-2413 - [c4]Wei Liu, Yanchao Zhang, Wenjing Lou, Yuguang Fang:
Managing Wireless Sensor Networks with Supply Chain Strategy. QSHINE 2004: 59-66 - [c3]Yanchao Zhang, Wenjing Lou, Yuguang Fang:
SIP: a secure incentive protocol against selfishness in mobile ad hoc networks. WCNC 2004: 1679-1684 - 2003
- [j3]Arun Avudainayagam, Wenjing Lou, Yuguang Fang:
DEAR: A Device and Energy Aware Routing protocol for heterogeneous ad hoc networks. J. Parallel Distributed Comput. 63(2): 228-236 (2003) - [c2]Wei Liu, Wenjing Lou, Xiang Chen, Yuguang Fang:
A QoS-enabled MAC architecture for prioritized service in IEEE 802.11 WLANs. GLOBECOM 2003: 3802-3807 - [c1]Wei Liu, Wenjing Lou, Yuguang Fang:
A selection function based distributed algorithm for delay-constraint least-cost unicast routing. ICC 2003: 1738-1742 - 2002
- [j2]Wenjing Lou, Yuguang Fang:
Predictive Caching Strategy for On-Demand Routing Protocols in Wireless Ad Hoc Networks. Wirel. Networks 8(6): 671-679 (2002) - 2001
- [j1]Wenjing Lou, Liang-Tien Chia, Bu-Sung Lee, Bin Wang:
The transmission of MPEG-2 VBR video under usage parameter control. Int. J. Commun. Syst. 14(2): 125-146 (2001)
Coauthor Index
aka: Yiwei Thomas Hou
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint