关注
Haotian Chi
Haotian Chi
在 sxu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Cross-app interference threats in smart homes: Categorization, detection and handling
H Chi, Q Zeng, X Du, J Yu
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
1032020
Mobicache: When k-anonymity meets cache
X Zhu, H Chi, B Niu, W Zhang, Z Li, H Li
2013 IEEE Global Communications Conference (GLOBECOM), 820-825, 2013
922013
Pfirewall: Semantics-aware customizable data flow control for home automation systems
H Chi, Q Zeng, X Du, L Luo
Network and Distributed Systems Security (NDSS) Symposium, 0
56*
Privacy leakage in smart homes and its mitigation: IFTTT as a case study
R Xu, Q Zeng, L Zhu, H Chi, X Du, M Guizani
IEEE Access 7, 63457-63471, 2019
532019
Privacy and authentication protocol for mobile RFID systems
B Niu, X Zhu, H Chi, H Li
Wireless Personal Communications 77, 1713-1731, 2014
502014
3PLUS: Privacy-preserving pseudo-location updating system in location-based services
B Niu, X Zhu, H Chi, H Li
2013 IEEE Wireless Communications and Networking Conference (WCNC), 4564-4569, 2013
442013
FineRoute: Personalized and time-aware route recommendation based on check-ins
X Zhu, R Hao, H Chi, X Du
IEEE Transactions on Vehicular Technology 66 (11), 10461-10469, 2017
292017
Delay wreaks havoc on your smart home: Delay-based automation interference attacks
H Chi, C Fu, Q Zeng, X Du
2022 IEEE Symposium on Security and Privacy (SP), 285-302, 2022
222022
Using dynamic pseudo-IDs to protect privacy in location-based services
X Zhu, H Chi, S Jiang, X Lei, H Li
2014 IEEE international conference on communications (ICC), 2307-2312, 2014
172014
P-match: Priority-aware friend discovery for proximity-based mobile social networks
B Niu, X Zhu, T Zhang, H Chi, H Li
2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems …, 2013
172013
Iot phantom-delay attacks: Demystifying and exploiting iot timeout behaviors
C Fu, Q Zeng, H Chi, X Du, SL Valluru
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
122022
e-safe: Secure, efficient and forensics-enabled access to implantable medical devices
H Chi, L Wu, X Du, Q Zeng, P Ratazzi
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
102018
Two-party and multi-party private matching for proximity-based mobile social networks
X Zhu, Z Chen, H Chi, J Liu, S Jiang
2014 IEEE International Conference on Communications (ICC), 926-931, 2014
102014
No more companion apps hacking but one dongle: Hub-based blackbox fuzzing of iot firmware
X Ma, Q Zeng, H Chi, L Luo
Proceedings of the 21st Annual International Conference on Mobile Systems …, 2023
82023
Pseudo-Location Updating System for privacy-preserving location-based services
B Niu, X Zhu, H Chi, H Li
China Communications 10 (9), 1-12, 2013
82013
Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes
H Chi, Q Zeng, X Du
32nd USENIX Security Symposium (USENIX Security 23), 1559-1576, 2023
72023
Personalized location recommendations with local feature awareness
X Zhu, R Hao, H Chi, X Du
2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016
72016
Verification of boolean queries over outsourced encrypted data based on counting bloom filter
X Zhu, R Hao, S Jiang, H Chi, H Li
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
62015
A Secure Proxy-based Access Control Scheme for Implantable Medical Devices
L Wu, H Chi, X Du
arXiv preprint arXiv:1803.07751, 2018
52018
Q-learning-based LTE-U and WiFi coexistence algorithm for wireless healthcare systems
Y Su, L Huang, X Du, A Mohamed, H Chi, M Guizani
Proc. 5th Int. Conf. Control Eng. Inf. Technol.(CEIT) 32, 91-96, 2017
42017
系统目前无法执行此操作,请稍后再试。
文章 1–20