• Publications
  • Influence
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications
TLDR
We introduce an efficient conditional privacy preservation (ECPP) protocol in vehicular ad hoc networks (VANETs) to address the issue on anonymous authentication for safety messages with authority traceability. Expand
  • 601
  • 44
  • PDF
SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks
TLDR
We propose a secure multilayer credit-based incentive scheme to stimulate bundle forwarding cooperation among DTN nodes, which is called opportunistic data forwarding. Expand
  • 284
  • 28
  • PDF
SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots
TLDR
We propose a new VANET-based smart parking scheme (SPARK) for large parking lots through vehicular communication. Expand
  • 274
  • 14
  • PDF
Pi: A practical incentive protocol for delay tolerant networks
TLDR
In this paper, we propose a practical incentive protocol to stimulate selfish nodes in order to cooperate in forwarding bundle packets in DTNs. Expand
  • 220
  • 14
  • PDF
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware
TLDR
This paper tackles this challenge by introducing a streaminglized machine learning-based MD framework, StormDroid, which improves MD accuracy by almost 10% compared with state-of-the-art antivirus systems. Expand
  • 97
  • 14
  • PDF
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
TLDR
We propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data in wireless sensor networks. Expand
  • 168
  • 13
  • PDF
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures
TLDR
In this paper, we identify a new location privacy attack towards database driven CRNs, which enables the attacker to geo-locate an SU by observing the spectrum he has used. Expand
  • 110
  • 13
  • PDF
Security and privacy for storage and computation in cloud computing
TLDR
We propose a first protocol bridging secure storage and secure computation auditing in cloud and achieving privacy cheating discouragement by designated verifier signature, batch verification and probabilistic sampling techniques. Expand
  • 450
  • 10
  • PDF
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
TLDR
We present WindTalker, a novel and practical keystroke inference framework that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi-based side-channel information. Expand
  • 99
  • 9
  • PDF
Achieving privacy preservation in WiFi fingerprint-based localization
TLDR
We first analyze the privacy issues of WiFi fingerprint-based localization and then propose a Privacy-Preserving WiFi Fingerprint Localization scheme (PriWFL) that can protect both the client's location privacy and the service provider's data privacy. Expand
  • 86
  • 8
  • PDF