Calculated based on number of publications stored in Pure and citations from Scopus
20072025

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Efficient and Privacy-Preserving Integrity Verification for Federated Learning with TEEs

    Li, J., Chen, N., Yu, S. & Srivatanakul, T., 2024, 2024 IEEE Military Communications Conference, MILCOM 2024. p. 999-1004 6 p. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient Multi-Authority ABE from Learning With Errors Over Rings

    Li, J. & Yu, S., 2024, 2024 IEEE Military Communications Conference, MILCOM 2024. p. 963-968 6 p. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • GridSE: Towards Practical Secure Geographic Search via Prefix Symmetric Searchable Encryption

    Guo, R., Li, J. & Yu, S., 2024, Proceedings of the 33rd USENIX Security Symposium. p. 5413-5430 18 p. (Proceedings of the 33rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • QE-DBA: Query-Efficient Decision-Based Adversarial Attacks via Bayesian Optimization

    Zhang, Z., Ahmed, N. & Yu, S., 2024, 2024 International Conference on Computing, Networking and Communications, ICNC 2024. p. 783-788 6 p. (2024 International Conference on Computing, Networking and Communications, ICNC 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    A-C: An NDN-based Blockchain Network with Erasure Coding

    Wang, R., Njilla, L. & Yu, S., 2023, 2023 International Conference on Computing, Networking and Communications, ICNC 2023. p. 591-595 5 p. (2023 International Conference on Computing, Networking and Communications, ICNC 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Secure Device Trust Bootstrapping Against Collaborative Signal Modification Attacks

    Xue, X., Yu, S. & Song, M., 2023, INFOCOM 2023 - IEEE Conference on Computer Communications. (Proceedings - IEEE INFOCOM; vol. 2023-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secured Full-Duplex UAV-Aided Spectrum-Sharing Network Based on NOMA

    Hasan, M. K., Yu, S. & Song, M., 2023, Proceedings - 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2023. p. 125-133 9 p. (Proceedings - 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Uplink Secrecy Analysis for UAV-enabled PD-NOMA-based Underlay Spectrum Sharing Networks

    Khalid Hasan, M., Yu, S. & Song, M., 2023, 2023 IEEE Wireless Communications and Networking Conference, WCNC 2023 - Proceedings. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 2023-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Efficient parameter aggregation in federated learning with hybrid convergecast

    Tao, Y., Zhou, J. & Yu, S., 9 Jan 2021, 2021 IEEE 18th Annual Consumer Communications and Networking Conference, CCNC 2021. 9369497. (2021 IEEE 18th Annual Consumer Communications and Networking Conference, CCNC 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • K-Group Random Channel Hopping (K-RCH) Rendezvous for Cognitive Radio Networks

    Xue, X., Yu, S., Song, M. & Xin, C., Jun 2021, ICC 2021 - IEEE International Conference on Communications, Proceedings. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2020

    ELVMC: A Predictive Energy-Aware Algorithm for Virtual Machine Consolidation in Cloud Computing

    Zhao, D. M., Zhou, J. T. & Yu, S., 2020, Algorithms and Architectures for Parallel Processing - 20th International Conference, ICA3PP 2020, Proceedings. Qiu, M. (ed.). p. 62-81 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12453 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2019

    Cost-Effective NLOS Detection for Privacy Invasion Attacks by Consumer Drones

    Tian, Y., Njilla, L., Raja, A., Yuan, J., Yu, S., Steinbacher, A., Tong, T. & Tinsley, J., Sep 2019, DASC 2019 - 38th Digital Avionics Systems Conference, Proceedings. 9081802. (AIAA/IEEE Digital Avionics Systems Conference - Proceedings; vol. 2019-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Edge-assisted CNN inference over encrypted data for internet of things

    Tian, Y., Yuan, J., Yu, S., Hou, Y. & Song, H., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K.-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). p. 85-104 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Enabling Blockchain Applications over Named Data Networking

    Guo, J., Wang, M., Chen, B., Yu, S., Zhang, H. & Zhang, Y., May 2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. 8761919. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Flexibly and securely shape your data disclosed to others

    Xie, Q., Hou, Y., Cheng, K., Dagher, G. G., Wang, L. & Yu, S., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. p. 160-167 8 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Indoor Localization Using Commodity Wi-Fi APs: Techniques and Challenges

    Kandel, L. N. & Yu, S., 8 Apr 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. p. 526-530 5 p. 8685501. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • kFHCO: Optimal VM Consolidation via k -Factor Horizontal Checkpoint Oversubscription

    Tao, Y. & Yu, S., 8 Apr 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. p. 380-384 5 p. 8685604. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Poster: Using Commodity WiFi Devices for Object Sensing and Imaging

    Kandel, L. N., Zhang, Z. & Yu, S., Nov 2019, 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, DySPAN 2019. 8935637. (2019 IEEE International Symposium on Dynamic Spectrum Access Networks, DySPAN 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • QoS-aware power management with deep learning

    Zhou, J., Liu, X., Tao, Y. & Yu, S., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. p. 289-294 6 p. 8717848. (2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • VWAN: Virtual WiFi ANtennas for increased indoor localization accuracy

    Kandel, L. N. & Yu, S., Nov 2019, Proceedings - IEEE International Conference on Industrial Internet Cloud, ICII 2019. p. 258-267 10 p. 9065032. (Proceedings - IEEE International Conference on Industrial Internet Cloud, ICII 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2018

    Developing Secure Privacy Preserving and Causal Genetic Alteration Research in Building an Innovative Systematic Pedagogy for Integrated Research and Education: The INSPIRE Model

    Yang, M. Q., Yu, S., Yang, W., Milanova, M., Zhao, W., Yang, J. Y. & Arabnia, H. R., 4 Dec 2018, Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017. Tinetti, F. G., Tran, Q.-N., Deligiannidis, L., Yang, M. Q., Yang, M. Q. & Arabnia, H. R. (eds.). p. 1149-1154 6 p. 8560960. (Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Information Flow Queue Optimization in EC Cloud

    Tao, Y., Yu, S. & Zhou, J., 19 Jun 2018, 2018 International Conference on Computing, Networking and Communications, ICNC 2018. p. 888-892 5 p. (2018 International Conference on Computing, Networking and Communications, ICNC 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Optimal Code Regeneration with Background Traffic Awareness in Distributed Storage

    Tao, Y., Yu, S., Yoshigoe, K. & Zhou, J., 19 Jun 2018, 2018 International Conference on Computing, Networking and Communications, ICNC 2018. p. 48-52 5 p. (2018 International Conference on Computing, Networking and Communications, ICNC 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Secure Privacy Preserving across Personal Health Data and Single Cell Genomics Research INSPIRE Academic Pedagogy - Merging Big Data Multiplatform with Deep Learning

    Yang, M. Q., Yu, S., Cruz-Neira, C., Yang, W., Tudoreanu, M. E., Li, D., Zhang, Y., He, Q., Guan, R., Wang, R. Y. & Zhao, W., 4 Dec 2018, Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017. Tinetti, F. G., Tran, Q.-N., Deligiannidis, L., Yang, M. Q., Yang, M. Q. & Arabnia, H. R. (eds.). p. 1244-1251 8 p. 8560980. (Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2017

    Investigating and securing communications in the Controller Area Network (CAN)

    King, Z. & Yu, S., 10 Mar 2017, 2017 International Conference on Computing, Networking and Communications, ICNC 2017. p. 814-818 5 p. 7876236. (2017 International Conference on Computing, Networking and Communications, ICNC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • SBPA: Social behavior based cross Social Network phishing attacks

    Tian, Y., Yuan, J. & Yu, S., 21 Feb 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. p. 366-367 2 p. 7860514. (2016 IEEE Conference on Communications and Network Security, CNS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2015

    IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles

    Ansari, M. R., Yu, S. & Yu, Q., 2 Nov 2015, Proceedings of the 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2015. p. 233-236 4 p. 7315168. (Proceedings of the 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • SEISA: Secure and efficient encrypted image search with access control

    Yuan, J., Yu, S. & Guo, L., 21 Aug 2015, 2015 IEEE Conference on Computer Communications, IEEE INFOCOM 2015. p. 2083-2091 9 p. 7218593. (Proceedings - IEEE INFOCOM; vol. 26).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    94 Scopus citations
  • 2014

    Efficient public integrity checking for cloud data sharing with multi-user modification

    Yuan, J. & Yu, S., 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. p. 2121-2129 9 p. 6848154. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    113 Scopus citations
  • Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud

    Wang, B., Yu, S., Lou, W. & Hou, Y. T., 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. p. 2112-2120 9 p. 6848153. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    384 Scopus citations
  • Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud

    Sun, W., Yu, S., Lou, W., Hou, Y. T. & Li, H., 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. p. 226-234 9 p. 6847943. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    205 Scopus citations
  • 2013

    ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for Body Area Networks

    Shi, L., Yuan, J., Yu, S. & Li, M., 2013, WiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. p. 155-166 12 p. (WiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    62 Scopus citations
  • Efficient privacy-preserving biometric identification in cloud computing

    Yuan, J. & Yu, S., 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 2652-2660 9 p. 6567073. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    106 Scopus citations
  • Flexible and publicly verifiable aggregation query for outsourced databases in cloud

    Yuan, J. & Yu, S., 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. p. 520-524 5 p. 6682770. (2013 IEEE Conference on Communications and Network Security, CNS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • Privacy preserving back-propagation learning made practical with cloud computing

    Yuan, J. & Yu, S., 2013, Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Revised Selected Papers. p. 292-309 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 106 LNICS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Proofs of retrievability with public verifiability and constant communication cost in cloud

    Yuan, J. & Yu, S., 2013, Cloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing. p. 19-26 8 p. (Cloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    119 Scopus citations
  • Secure and constant cost public cloud storage auditing with deduplication

    Yuan, J. & Yu, S., 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. p. 145-153 9 p. 6682702. (2013 IEEE Conference on Communications and Network Security, CNS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    113 Scopus citations
  • Surviving the RF smog: Making Body Area Networks robust to cross-technology interference

    Hou, Y., Li, M. & Yu, S., 2013, 2013 IEEE International Conference on Sensing, Communications and Networking, SECON 2013. p. 353-361 9 p. 6645005. (2013 IEEE International Conference on Sensing, Communications and Networking, SECON 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • SybilShield: An agent-aided social network-based Sybil defense among multiple communities

    Shi, L., Yu, S., Lou, W. & Hou, Y. T., 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 1034-1042 9 p. 6566893. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    47 Scopus citations
  • 2012

    Achieving usable and privacy-assured similarity search over outsourced cloud data

    Wang, C., Ren, K., Yu, S. & Urs, K. M. R., 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 451-459 9 p. 6195784. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    275 Scopus citations
  • BANA: Body area network authentication exploiting channel characteristics

    Shi, L., Li, M., Yu, S. & Yuan, J., 2012, WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks. p. 27-38 12 p. (WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    38 Scopus citations
  • LT codes-based secure and reliable cloud storage service

    Cao, N., Yu, S., Yang, Z., Lou, W. & Hou, Y. T., 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 693-701 9 p. 6195814. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    111 Scopus citations
  • POSTER: Authenticated secret key extraction using channel characteristics for Body Area Networks

    Yuan, J., Shi, L., Yu, S. & Li, M., 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 1028-1030 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • 2011

    Authorized private keyword search over encrypted data in cloud computing

    Li, M., Yu, S., Cao, N. & Lou, W., 2011, Proceedings - 31st International Conference on Distributed Computing Systems, ICDCS 2011. p. 383-392 10 p. 5961719. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    286 Scopus citations
  • FindU: Privacy-preserving personal profile matching in mobile social networks

    Li, M., Cao, N., Yu, S. & Lou, W., 2011, 2011 Proceedings IEEE INFOCOM. p. 2435-2443 9 p. 5935065. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    202 Scopus citations
  • 2010

    Achieving secure, scalable, and fine-grained data access control in cloud computing

    Yu, S., Wang, C., Ren, K. & Lou, W., 2010, 2010 Proceedings IEEE INFOCOM. 5462174. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1341 Scopus citations
  • Attribute based data sharing with attribute revocation

    Yu, S., Wang, C., Ren, K. & Lou, W., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 261-270 10 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    555 Scopus citations
  • Group device pairing based secure sensor association and key management for body area networks

    Li, M., Yu, S., Lou, W. & Ren, K., 2010, 2010 Proceedings IEEE INFOCOM. 5462095. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    77 Scopus citations
  • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings

    Li, M., Yu, S., Ren, K. & Lou, W., 2010, Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings. p. 89-106 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 50 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    340 Scopus citations
  • 2009

    Defending against key abuse attacks in KP-ABE enabled broadcast systems

    Yu, S., Ren, K., Lou, W. & Li, J., 2009, Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers. p. 311-329 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 19 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    66 Scopus citations