Calculated based on number of publications stored in Pure and citations from Scopus
20072025

Research activity per year

Search results

  • 2024

    Efficient and Privacy-Preserving Integrity Verification for Federated Learning with TEEs

    Li, J., Chen, N., Yu, S. & Srivatanakul, T., 2024, 2024 IEEE Military Communications Conference, MILCOM 2024. p. 999-1004 6 p. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient Multi-Authority ABE from Learning With Errors Over Rings

    Li, J. & Yu, S., 2024, 2024 IEEE Military Communications Conference, MILCOM 2024. p. 963-968 6 p. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • GridSE: Towards Practical Secure Geographic Search via Prefix Symmetric Searchable Encryption

    Guo, R., Li, J. & Yu, S., 2024, Proceedings of the 33rd USENIX Security Symposium. p. 5413-5430 18 p. (Proceedings of the 33rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • QE-DBA: Query-Efficient Decision-Based Adversarial Attacks via Bayesian Optimization

    Zhang, Z., Ahmed, N. & Yu, S., 2024, 2024 International Conference on Computing, Networking and Communications, ICNC 2024. p. 783-788 6 p. (2024 International Conference on Computing, Networking and Communications, ICNC 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    A-C: An NDN-based Blockchain Network with Erasure Coding

    Wang, R., Njilla, L. & Yu, S., 2023, 2023 International Conference on Computing, Networking and Communications, ICNC 2023. p. 591-595 5 p. (2023 International Conference on Computing, Networking and Communications, ICNC 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Cooperative NOMA-based spectrum leasing with multiple secondary users

    Hasan, M. K., Xue, X., Yu, S. & Song, M., 1 Nov 2023, In: IEEE Transactions on Vehicular Technology. 72, 11, p. 14543-14558 16 p.

    Research output: Contribution to journalArticlepeer-review

    3 Scopus citations
  • SAFELearning: Secure Aggregation in Federated Learning With Backdoor Detectability

    Zhang, Z., Li, J., Yu, S. & Makaya, C., 2023, In: IEEE Transactions on Information Forensics and Security. 18, p. 3289-3304 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    14 Scopus citations
  • Secure Device Trust Bootstrapping Against Collaborative Signal Modification Attacks

    Xue, X., Yu, S. & Song, M., 2023, INFOCOM 2023 - IEEE Conference on Computer Communications. (Proceedings - IEEE INFOCOM; vol. 2023-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secured Full-Duplex UAV-Aided Spectrum-Sharing Network Based on NOMA

    Hasan, M. K., Yu, S. & Song, M., 2023, Proceedings - 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2023. p. 125-133 9 p. (Proceedings - 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Uplink Secrecy Analysis for UAV-enabled PD-NOMA-based Underlay Spectrum Sharing Networks

    Khalid Hasan, M., Yu, S. & Song, M., 2023, 2023 IEEE Wireless Communications and Networking Conference, WCNC 2023 - Proceedings. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 2023-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Improved Secure Deep Neural Network Inference Offloading with Privacy-Preserving Scalar Product Evaluation for Edge Computing

    Li, J., Zhang, Z., Yu, S. & Yuan, J., Sep 2022, In: Applied Sciences (Switzerland). 12, 18, 9010.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    2 Scopus citations
  • Indirect Revocable KP-ABE With Revocation Undoing Resistance

    Rasori, M., Perazzo, P., Dini, G. & Yu, S., 2022, In: IEEE Transactions on Services Computing. 15, 5, p. 2854-2868 15 p.

    Research output: Contribution to journalArticlepeer-review

    10 Scopus citations
  • 2021

    Efficient parameter aggregation in federated learning with hybrid convergecast

    Tao, Y., Zhou, J. & Yu, S., 9 Jan 2021, 2021 IEEE 18th Annual Consumer Communications and Networking Conference, CCNC 2021. 9369497. (2021 IEEE 18th Annual Consumer Communications and Networking Conference, CCNC 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • K-Group Random Channel Hopping (K-RCH) Rendezvous for Cognitive Radio Networks

    Xue, X., Yu, S., Song, M. & Xin, C., Jun 2021, ICC 2021 - IEEE International Conference on Communications, Proceedings. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Low-Latency Privacy-Preserving Outsourcing of Deep Neural Network Inference

    Tian, Y., Njilla, L., Yuan, J. & Yu, S., 1 Mar 2021, In: IEEE Internet of Things Journal. 8, 5, p. 3300-3309 10 p., 9120239.

    Research output: Contribution to journalArticlepeer-review

    15 Scopus citations
  • 2020

    ELVMC: A Predictive Energy-Aware Algorithm for Virtual Machine Consolidation in Cloud Computing

    Zhao, D. M., Zhou, J. T. & Yu, S., 2020, Algorithms and Architectures for Parallel Processing - 20th International Conference, ICA3PP 2020, Proceedings. Qiu, M. (ed.). p. 62-81 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12453 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2019

    Cost-Effective NLOS Detection for Privacy Invasion Attacks by Consumer Drones

    Tian, Y., Njilla, L., Raja, A., Yuan, J., Yu, S., Steinbacher, A., Tong, T. & Tinsley, J., Sep 2019, DASC 2019 - 38th Digital Avionics Systems Conference, Proceedings. 9081802. (AIAA/IEEE Digital Avionics Systems Conference - Proceedings; vol. 2019-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Edge-assisted CNN inference over encrypted data for internet of things

    Tian, Y., Yuan, J., Yu, S., Hou, Y. & Song, H., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K.-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). p. 85-104 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Edge-assisted learning for real-time UAV imagery via predictive offloading

    Zhang, Z., Njilla, L. L., Yu, S. & Yuan, J., 2019, In: Proceedings - IEEE Global Communications Conference, GLOBECOM. 9013352.

    Research output: Contribution to journalConference articlepeer-review

    8 Scopus citations
  • Enabling Blockchain Applications over Named Data Networking

    Guo, J., Wang, M., Chen, B., Yu, S., Zhang, H. & Zhang, Y., May 2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. 8761919. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Exploiting CSI-MIMO for accurate and efficient device identification

    Kandel, L. N., Zhang, Z. & Yu, S., 2019, In: Proceedings - IEEE Global Communications Conference, GLOBECOM. 9014191.

    Research output: Contribution to journalConference articlepeer-review

    8 Scopus citations
  • Flexibly and securely shape your data disclosed to others

    Xie, Q., Hou, Y., Cheng, K., Dagher, G. G., Wang, L. & Yu, S., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. p. 160-167 8 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Indoor Localization Using Commodity Wi-Fi APs: Techniques and Challenges

    Kandel, L. N. & Yu, S., 8 Apr 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. p. 526-530 5 p. 8685501. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • kFHCO: Optimal VM Consolidation via k -Factor Horizontal Checkpoint Oversubscription

    Tao, Y. & Yu, S., 8 Apr 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. p. 380-384 5 p. 8685604. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Poster: Using Commodity WiFi Devices for Object Sensing and Imaging

    Kandel, L. N., Zhang, Z. & Yu, S., Nov 2019, 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, DySPAN 2019. 8935637. (2019 IEEE International Symposium on Dynamic Spectrum Access Networks, DySPAN 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • QoS-aware power management with deep learning

    Zhou, J., Liu, X., Tao, Y. & Yu, S., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. p. 289-294 6 p. 8717848. (2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • VWAN: Virtual WiFi ANtennas for increased indoor localization accuracy

    Kandel, L. N. & Yu, S., Nov 2019, Proceedings - IEEE International Conference on Industrial Internet Cloud, ICII 2019. p. 258-267 10 p. 9065032. (Proceedings - IEEE International Conference on Industrial Internet Cloud, ICII 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2018

    Developing Secure Privacy Preserving and Causal Genetic Alteration Research in Building an Innovative Systematic Pedagogy for Integrated Research and Education: The INSPIRE Model

    Yang, M. Q., Yu, S., Yang, W., Milanova, M., Zhao, W., Yang, J. Y. & Arabnia, H. R., 4 Dec 2018, Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017. Tinetti, F. G., Tran, Q.-N., Deligiannidis, L., Yang, M. Q., Yang, M. Q. & Arabnia, H. R. (eds.). p. 1149-1154 6 p. 8560960. (Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Information Flow Queue Optimization in EC Cloud

    Tao, Y., Yu, S. & Zhou, J., 19 Jun 2018, 2018 International Conference on Computing, Networking and Communications, ICNC 2018. p. 888-892 5 p. (2018 International Conference on Computing, Networking and Communications, ICNC 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Optimal Code Regeneration with Background Traffic Awareness in Distributed Storage

    Tao, Y., Yu, S., Yoshigoe, K. & Zhou, J., 19 Jun 2018, 2018 International Conference on Computing, Networking and Communications, ICNC 2018. p. 48-52 5 p. (2018 International Conference on Computing, Networking and Communications, ICNC 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Secure Privacy Preserving across Personal Health Data and Single Cell Genomics Research INSPIRE Academic Pedagogy - Merging Big Data Multiplatform with Deep Learning

    Yang, M. Q., Yu, S., Cruz-Neira, C., Yang, W., Tudoreanu, M. E., Li, D., Zhang, Y., He, Q., Guan, R., Wang, R. Y. & Zhao, W., 4 Dec 2018, Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017. Tinetti, F. G., Tran, Q.-N., Deligiannidis, L., Yang, M. Q., Yang, M. Q. & Arabnia, H. R. (eds.). p. 1244-1251 8 p. 8560980. (Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2017

    Investigating and securing communications in the Controller Area Network (CAN)

    King, Z. & Yu, S., 10 Mar 2017, 2017 International Conference on Computing, Networking and Communications, ICNC 2017. p. 814-818 5 p. 7876236. (2017 International Conference on Computing, Networking and Communications, ICNC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • Making Wireless Body Area Networks Robust under Cross-Technology Interference

    Hou, Y., Li, M. & Yu, S., Jan 2017, In: IEEE Transactions on Wireless Communications. 16, 1, p. 429-440 12 p., 7731176.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    6 Scopus citations
  • SBPA: Social behavior based cross Social Network phishing attacks

    Tian, Y., Yuan, J. & Yu, S., 21 Feb 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. p. 366-367 2 p. 7860514. (2016 IEEE Conference on Communications and Network Security, CNS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2016

    Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

    Sun, W., Yu, S., Lou, W., Hou, Y. T. & Li, H., 1 Apr 2016, In: IEEE Transactions on Parallel and Distributed Systems. 27, 4, p. 1187-1198 12 p., 6893023.

    Research output: Contribution to journalArticlepeer-review

    288 Scopus citations
  • Third-Party Providers Integrity Assurance for Data Outsourcing

    Yuan, J. & Yu, S., 1 Jan 2016, Cloud Computing Security: Foundations and Challenges. p. 241-256 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2015

    IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles

    Ansari, M. R., Yu, S. & Yu, Q., 2 Nov 2015, Proceedings of the 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2015. p. 233-236 4 p. 7315168. (Proceedings of the 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks

    Shi, L., Yuan, J., Yu, S. & Li, M., 1 Feb 2015, In: IEEE Internet of Things Journal. 2, 1, p. 52-62 11 p., 7006641.

    Research output: Contribution to journalArticlepeer-review

    43 Scopus citations
  • PCPOR: Public and constant-cost proofs of retrievability in cloud

    Yuan, J. & Yu, S., 2 Jul 2015, In: Journal of Computer Security. 23, 3, p. 403-425 23 p.

    Research output: Contribution to journalArticlepeer-review

    17 Scopus citations
  • Public Integrity Auditing for Dynamic Data Sharing with Multiuser Modification

    Yuan, J. & Yu, S., 1 Aug 2015, In: IEEE Transactions on Information Forensics and Security. 10, 8, p. 1717-1726 10 p., 7086294.

    Research output: Contribution to journalArticlepeer-review

    133 Scopus citations
  • SEISA: Secure and efficient encrypted image search with access control

    Yuan, J., Yu, S. & Guo, L., 21 Aug 2015, 2015 IEEE Conference on Computer Communications, IEEE INFOCOM 2015. p. 2083-2091 9 p. 7218593. (Proceedings - IEEE INFOCOM; vol. 26).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    95 Scopus citations
  • 2014

    Cloud-enabled software testing based on program understanding

    Chiang, C. C. & Yu, S., 31 Oct 2014, Cloud Technology: Concepts, Methodologies, Tools, and Applications. Vol. 2. p. 717-729 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Efficient public integrity checking for cloud data sharing with multi-user modification

    Yuan, J. & Yu, S., 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. p. 2121-2129 9 p. 6848154. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    113 Scopus citations
  • Privacy preserving back-propagation neural network learning made practical with cloud computing

    Yuan, J. & Yu, S., 1 Jan 2014, In: IEEE Transactions on Parallel and Distributed Systems. 25, 1, p. 212-221 10 p., 6410315.

    Research output: Contribution to journalArticlepeer-review

    218 Scopus citations
  • Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud

    Wang, B., Yu, S., Lou, W. & Hou, Y. T., 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. p. 2112-2120 9 p. 6848153. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    384 Scopus citations
  • Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud

    Sun, W., Yu, S., Lou, W., Hou, Y. T. & Li, H., 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. p. 226-234 9 p. 6847943. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    205 Scopus citations
  • Trust Establishment in Wireless Body Area Networks

    Yu, S., Li, M. & Shi, L., 3 Sep 2014, Wearable Sensors: Fundamentals, Implementation and Applications. p. 475-491 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations
  • 2013

    ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for Body Area Networks

    Shi, L., Yuan, J., Yu, S. & Li, M., 2013, WiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. p. 155-166 12 p. (WiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    62 Scopus citations
  • BANA: Body area network authentication exploiting channel characteristics

    Shi, L., Li, M., Yu, S. & Yuan, J., 2013, In: IEEE Journal on Selected Areas in Communications. 31, 9, p. 1803-1816 14 p., 6584939.

    Research output: Contribution to journalArticlepeer-review

    113 Scopus citations
  • Efficient privacy-preserving biometric identification in cloud computing

    Yuan, J. & Yu, S., 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 2652-2660 9 p. 6567073. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    106 Scopus citations