Follow
Taeho Jung
Taeho Jung
Associate Professor of Computer Science and Engineering, University of Notre Dame
Verified email at nd.edu - Homepage
Title
Cited by
Cited by
Year
Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption
T Jung, XY Li, Z Wan, M Wan
IEEE transactions on information forensics and security 10 (1), 190-199, 2014
2212014
Privacy preserving cloud data access with multi-authorities
T Jung, XY Li, Z Wan, M Wan
2013 Proceedings IEEE INFOCOM, 2625-2633, 2013
2202013
Real-time charging station recommendation system for electric-vehicle taxis
Z Tian, T Jung, Y Wang, F Zhang, L Tu, C Xu, C Tian, XY Li
IEEE Transactions on Intelligent Transportation Systems 17 (11), 3098-3109, 2016
2172016
Achieving differential privacy of data disclosure in the smart grid
J Zhao, T Jung, Y Wang, X Li
IEEE INFOCOM 2014-IEEE conference on computer communications, 504-512, 2014
1722014
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
T Jung, XF Mao, XY Li, SJ Tang, W Gong, L Zhang
2013 Proceedings IEEE INFOCOM, 2634-2642, 2013
1712013
Search me if you can: Privacy-preserving location query service
XY Li, T Jung
2013 Proceedings ieee infocom, 2760-2768, 2013
1532013
PIC: Enable large-scale privacy preserving content-based image search on cloud
L Zhang, T Jung, K Liu, XY Li, X Ding, J Gu, Y Liu
IEEE Transactions on Parallel and Distributed Systems 28 (11), 3258-3271, 2017
1202017
Continuous user identification via touch and movement behavioral biometrics
C Bo, L Zhang, T Jung, J Han, XY Li, Y Wang
2014 IEEE 33rd International Performance Computing and Communications …, 2014
1142014
Social network de-anonymization and privacy inference with knowledge graph model
J Qian, XY Li, C Zhang, L Chen, T Jung, J Han
IEEE Transactions on Dependable and Secure Computing 16 (4), 679-692, 2017
1102017
Collusion-tolerable privacy-preserving sum and product calculation without secure channel
T Jung, XY Li, M Wan
IEEE Transactions on Dependable and secure computing 12 (1), 45-57, 2014
1082014
Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices
L Zhang, T Jung, C Liu, X Ding, XY Li, Y Liu
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
922015
Accounttrade: Accountable protocols for big data trading against dishonest consumers
T Jung, XY Li, W Huang, J Qian, L Chen, J Han, J Hou, C Su
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
862017
FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.
Z Li, W Wang, C Wilson, J Chen, C Qian, T Jung, L Zhang, K Liu, X Li, ...
NDSS, 2017
862017
Graph-based privacy-preserving data publication
XY Li, C Zhang, T Jung, J Qian, L Chen
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
862016
Smartloc: Push the limit of the inertial sensor based metropolitan localization using smartphone
C Bo, XY Li, T Jung, X Mao, Y Tao, L Yao
Proceedings of the 19th annual international conference on Mobile computing …, 2013
802013
It starts with igaze: Visual attention driven networking with smart glasses
L Zhang, XY Li, W Huang, K Liu, S Zong, X Jian, P Feng, T Jung, Y Liu
Proceedings of the 20th annual international conference on Mobile computing …, 2014
722014
Message in a sealed bottle: Privacy preserving friending in mobile social networks
L Zhang, XY Li, K Liu, T Jung, Y Liu
IEEE Transactions on Mobile Computing 14 (9), 1888-1902, 2014
702014
Hidebehind: Enjoy voice input with voiceprint unclonability and anonymity
J Qian, H Du, J Hou, L Chen, T Jung, XY Li
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems …, 2018
682018
Energy-recycling blockchain with proof-of-deep-learning
C Chenli, B Li, Y Shi, T Jung
2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019
622019
Verifiable private multi-party computation: ranging and ranking
L Zhang, XY Li, Y Liu, T Jung
2013 Proceedings IEEE INFOCOM, 605-609, 2013
602013
The system can't perform the operation now. Try again later.
Articles 1–20