关注
Haojin Zhu
Haojin Zhu
在 cs.sjtu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
R Lu, X Lin, H Zhu, PH Ho, X Shen
INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 1229-1237, 2008
9542008
Security and privacy for storage and computation in cloud computing
L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen, AV Vasilakos
Information sciences 258, 371-386, 2014
7262014
Securing smart grid: cyber attacks, countermeasures, and challenges
X Li, X Liang, R Lu, X Shen, X Lin, H Zhu
IEEE Communications Magazine 50 (8), 38-45, 2012
4692012
Security in vehicular ad hoc networks
X Lin, R Lu, C Zhang, H Zhu, PH Ho, X Shen
IEEE communications magazine 46 (4), 88-95, 2008
4572008
Spark: a new vanet-based smart parking scheme for large parking lots
R Lu, X Lin, H Zhu, X Shen
INFOCOM 2009, IEEE, 1413-1421, 2009
4022009
SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks
H Zhu, X Lin, R Lu, Y Fan, X Shen
Vehicular Technology, IEEE Transactions on 58 (8), 4628-4639, 2009
3542009
Invisible backdoor attacks on deep neural networks via steganography and regularization
S Li, M Xue, BZH Zhao, H Zhu, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020
3012020
Pi: A practical incentive protocol for delay tolerant networks
R Lu, X Lin, H Zhu, X Shen, B Preiss
IEEE transactions on wireless communications 9 (4), 1483-1493, 2010
2802010
Homonit: Monitoring smart home apps from encrypted traffic
W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2332018
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
S Chen, M Xue, L Fan, S Hao, L Xu, H Zhu, B Li
computers & security 73, 326-344, 2018
2212018
A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks
H Zhu, S Du, Z Gao, M Dong, Z Cao
IEEE Transactions on Parallel and Distributed Systems 25 (1), 22-32, 2013
2152013
Privacy leakage of location sharing in mobile social networks: Attacks and defense
H Li, H Zhu, S Du, X Liang, X Shen
IEEE Transactions on Dependable and Secure Computing 15 (4), 646-660, 2016
2132016
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
2122016
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
R Lu, X Lin, H Zhu, X Liang, XS Shen
Parallel and Distributed Systems, IEEE Transactions on, 1-1, 2010
2032010
Stormdroid: A streaminglized machine learning-based system for detecting android malware
S Chen, M Xue, Z Tang, L Xu, H Zhu
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
1962016
UAV-assisted data gathering in wireless sensor networks
M Dong, K Ota, M Lin, Z Tang, S Du, H Zhu
The Journal of Supercomputing 70, 1142-1155, 2014
1792014
All your location are belong to us: Breaking mobile social networks for automated user location tracking
M Li, H Zhu, Z Gao, S Chen, L Yu, S Hu, K Ren
Proceedings of the 15th ACM international symposium on Mobile ad hoc …, 2014
1692014
Human-factor-aware privacy-preserving aggregation in smart grid
W Jia, H Zhu, Z Cao, X Dong, C Xiao
IEEE Systems Journal 8 (2), 598-607, 2013
1492013
Securing Consumer IoT in Smart Home: Architecture, Challenges and Countermeasures
Y Meng, W Zhang, H Zhu, XS Shen
December 2018 25 (6), 53 - 59, 2018
1482018
Achieving privacy preservation in WiFi fingerprint-based localization
H Li, L Sun, H Zhu, X Lu, X Cheng
Ieee Infocom 2014-IEEE Conference on Computer Communications, 2337-2345, 2014
1442014
系统目前无法执行此操作,请稍后再试。
文章 1–20