• Publications
  • Influence
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks
TLDR
We analyze the vulnerabilities of distributed sensing architecture based on a representative distributed consensus-based spectrum sensing algorithm. Expand
  • 100
  • 12
  • PDF
Significant Permission Identification for Machine-Learning-Based Android Malware Detection
TLDR
The alarming growth rate of malicious apps has become a serious issue that sets back the prosperous mobile ecosystem. Expand
  • 183
  • 9
  • PDF
MIMO-based jamming resilient communication in wireless networks
TLDR
We explore the use of MIMO technology for jamming resilient OFDM communication, especially its capability to communicate against the powerful reactive jammer. Expand
  • 35
  • 4
  • PDF
PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis
TLDR
We present PeerClean, a new network flow-based system that detects P2P botnets in real time using only high-level features extracted from C&C network flow traffic. Expand
  • 20
  • 4
  • PDF
Efficient Signature Generation for Classifying Cross-Architecture IoT Malware
TLDR
We propose an efficient signature generation method for IoT malware, which generates distinguishable signatures based on high-level structural, statistical and string feature vectors, as high- level features are more robust against code variations across different architectures. Expand
  • 15
  • 3
  • PDF
A First Look at Android Malware Traffic in First Few Minutes
TLDR
We design an Android malware traffic behavior monitoring scheme to capture traffic data generated by malware samples in a real Internet environment, and analyze the major compositions of the traffic data. Expand
  • 9
  • 3
  • PDF
Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding
TLDR
This paper presents a theoretical study of the throughput of mobile content distribution (MCD) in vehicular ad hoc networks (VANETs). Expand
  • 70
  • 2
  • PDF
SigPID: significant permission identification for android malware detection
TLDR
In this paper, we introduce SIGPID, a malware detection system based on permission analysis to cope with the rapid increase in the number of Android malware. Expand
  • 34
  • 2
  • PDF
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic
TLDR
In this paper, we propose TrafficAV, which is an effective and explainable detection of mobile malware behavior using network traffic. Expand
  • 30
  • 2
  • PDF
Identity management using blockchain for cognitive cellular networks
TLDR
We propose a privacy-enhancing user identity management system using blockchain technology which places due importance on both anonymity and attribution, and supports end-to-end management from user assertion to usage billing. Expand
  • 28
  • 2
  • PDF