1 |
A Systematic Evaluation of Wavelet-based Attack Framework on Random Delay Countermeasures
|
期刊论文 |
Fan Zhang;Xiaofei Dong;Bolin Yang;Yajin Zhou;Kui Ren |
2 |
Fluctuating Power Logic: SCA Protection by $V_{DD}$ Randomization at the Cell-level
|
会议论文 |
Fan Zhang;Bolin Yang;Bojie Yang;Yiran Zhang;Shivam Bhasin;Kui Ren |
3 |
From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices
|
会议论文 |
Fan Zhang;Bin Shao;Guorui Xu;Bolin Yang;Ziqi Yang;Zhan Qin;Kui Ren |
4 |
Atomos: Constant-Size Path Validation Proof
|
期刊论文 |
He Anxiao;Bu Kai;Li Yucong;Chida Eikoh;Gu Qianping;Ren Kui |
5 |
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization
|
会议论文 |
Nanzi Yang;Wenbo Shen;Jinku Li;Yutian Yang;Kangjie Lu;Jietao Xiao;Tianyu Zhou;Chenggang Qin;Wang Yu;Jianfeng Ma;Kui Ren |
6 |
A Behavior Privacy Preserving Method towards RF Sensing
|
会议论文 |
Jianwei Liu;Chaowei Xiao;Kaiyan Cui;Jinsong Han;Xian Xu;Kui Ren;Xufei Mao |
7 |
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer
|
会议论文 |
Zhongjie Ba;Tianhang Zheng;Xinyu Zhang;Zhan Qin;Baochun Li;Xue Liu;Kui Ren |
8 |
Deaf-Aid: Mobile IoT Communication Exploiting Stealthy Speaker-to-Gyroscope Channel
|
会议论文 |
Ming Gao;Feng Lin;Weiye Xu;Muertikepu Nuermaimaiti;Jinsong Han;Wenyao Xu;Kui Ren |
9 |
A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks
|
期刊论文 |
Gao Feng;Zhu Liehuang;Shen Meng;Sharif Kashif;Wan Zhiguo;Ren Kui |
10 |
Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers
|
期刊论文 |
Fan Zhang;Bolin Yang;Guorui Xu;Xin-jie Zhao;Wei He;Kui Ren |
11 |
Unveiling the mystery of Internet packet forwarding: A survey of network path validation
|
期刊论文 |
LiYingjiu;LuoJiaqing;ChengLinfeng;LairdAvery;YangYutian;RenKui;BuKai |
12 |
Towards privacy-preserving malware detection systems for android
|
会议论文 |
Helei Cui;Yajin Zhou;Cong Wang;Qi Li;Kui Ren |
13 |
一种基于定制硬件安全属性的内核敏感数据保护方法
|
专利 |
徐金焱;孙家栋;申文博;周亚金;任奎 |
14 |
PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting
|
会议论文 |
Liu Liu;Hanlin Yu;Zhongjie Ba;Li Lu;Feng Lin;Kui Ren |
15 |
一种隐私保护远程统一生物认证方法及装置、电子设备
|
专利 |
张秉晟;王熙璟;任奎 |
16 |
PESC: A Per System-Call Stack Canary Design for Linux Kernel
|
会议论文 |
Jiadong Sun;Xia Zhou;Wenbo Shen;Yajin Zhou;Kui Ren |
17 |
一种基于深度学习的无线信号中用户行为隐私的滤除方法、系统及无线信号收发装置
|
专利 |
刘建伟;韩劲松;肖超玮;许贤;任奎;毛续飞 |
18 |
OneFi: One-Shot Recognition for Unseen Gesture via COTS WiFi
|
会议论文 |
Rui Xiao;Jianwei Liu;Jinsong Han;Kui Ren |
19 |
Persistent Fault Attack in Practice
|
期刊论文 |
Fan Zhang;Xiang Zhu;Shivam Bhasin;Xinjie Zhao;Huilong Jiang;Dawu Gu;Zhe Liu;Yiran Zhang;Kui Ren |
20 |
Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance
|
会议论文 |
Xiaoxuan Lou;Fan Zhang;Guorui Xu;Ziyuan Liang;Xinjie Zhao;Shize Guo;Kui Ren |
21 |
Side-Channel Analysis and Countermeasure Design on ARM-based Quantum-Resistant SIKE
|
期刊论文 |
Fan ZHANG;Bolin YANG;Xiaofei DONG;Sylvain GUILLEY;Zhe LIU;Wei HE;Fangguo ZHANG;Kui REN |
22 |
You Can Access But You Cannot Leak: Defending against Illegal Content Redistribution in Encrypted Cloud Media Center
|
期刊论文 |
Leo Yu Zhang;Yifeng Zheng;Jian Weng;Cong Wang;Zihao Shan;Kui Ren |
23 |
PhantomCache: Obfuscating Cache Conflicts with Localized Randomization
|
会议论文 |
Qinhan Tan;Zhihua Zeng;Kai Bu;Kui Ren |
24 |
一种基于B方法的Android访问控制建模与安全性分析方法
|
专利 |
常瑞;苗新亮;任璐;赵永望;任奎;赵俊;单夏烨;任新新;段吉瑞 |
25 |
Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization
|
会议论文 |
Shengshan Hu;Chengjun Cai;Qian Wang;Cong Wang;Xiangyang Luo;Kui Ren |
26 |
Trustworthy Authentication for IoT with Human-and-Environment-in-the-Loop
|
会议论文 |
Jinsong Han;Feng Lin;Wenbo Shen;Kui Ren |
27 |
WiPIN: Operation-free Passive Person Identification Using Wi-Fi Signals
|
会议论文 |
Fei Wang;Jinsong Han;Feng Lin;Kui Ren |
28 |
HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services
|
会议论文 |
Kui Ren;Yu Guo;Jiaqi Li;Xiaohua Jia;Cong Wang;Yajin Zhou;Sheng Wang;Ning Cao;Feifei Li |
29 |
Persistent Fault Injection in FPGA via BRAM Modification
|
会议论文 |
Yiran Zhang;Fan Zhang;Bolin Yang;Guorui Xu;Bin Shao;Xinjie Zhao;Kui Ren |
30 |
Wavoice: A Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals
|
会议论文 |
Zhongjie Ba;Jinsong Han;Wenyao Xu;Kui Ren;Chao Wang;Feng Lin;Ming Gao;Tiantian Liu |
31 |
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing
|
期刊论文 |
Dong Yuan;Qi Li;Guoliang Li;Qian Wang;Kui Ren |
32 |
Security Policy Violations in SDN Data Plane
|
期刊论文 |
Li Qi;Chen Yanyu;Lee Patrick P. C.;Xu Mingwei;Ren Kui |
33 |
RFL: Robust Fault Localization on Unreliable Communication Channels
|
期刊论文 |
Bo Wu;Ke Xu;Qi Li;Bingyang Liu;Shoushou Ren;Fan Yang;Meng Shen;Kui Ren |
34 |
Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFID
|
会议论文 |
Jianwei Liu;Xiang Zou;Feng Lin;Jinsong Han;Xian Xu;Kui Ren |
35 |
Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level
|
期刊论文 |
Fan Zhang;Shivam Bhasin;Bolin Yang;Bojie Yang;Yiran Zhang;Xuanle Ren;Kui Ren |
36 |
Building In-the-Cloud Network Functions: Security and Privacy Challenges
|
期刊论文 |
Liu Liu;Hanlin Yu;Zhongjie Ba;Li Lu;Feng Lin;Kui Ren |