Cross-app interference threats in smart homes: Categorization, detection and handling H Chi, Q Zeng, X Du, J Yu 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 103 | 2020 |
Mobicache: When k-anonymity meets cache X Zhu, H Chi, B Niu, W Zhang, Z Li, H Li 2013 IEEE Global Communications Conference (GLOBECOM), 820-825, 2013 | 92 | 2013 |
Pfirewall: Semantics-aware customizable data flow control for home automation systems H Chi, Q Zeng, X Du, L Luo Network and Distributed Systems Security (NDSS) Symposium, 0 | 56* | |
Privacy leakage in smart homes and its mitigation: IFTTT as a case study R Xu, Q Zeng, L Zhu, H Chi, X Du, M Guizani IEEE Access 7, 63457-63471, 2019 | 53 | 2019 |
Privacy and authentication protocol for mobile RFID systems B Niu, X Zhu, H Chi, H Li Wireless Personal Communications 77, 1713-1731, 2014 | 50 | 2014 |
3PLUS: Privacy-preserving pseudo-location updating system in location-based services B Niu, X Zhu, H Chi, H Li 2013 IEEE Wireless Communications and Networking Conference (WCNC), 4564-4569, 2013 | 44 | 2013 |
FineRoute: Personalized and time-aware route recommendation based on check-ins X Zhu, R Hao, H Chi, X Du IEEE Transactions on Vehicular Technology 66 (11), 10461-10469, 2017 | 29 | 2017 |
Delay wreaks havoc on your smart home: Delay-based automation interference attacks H Chi, C Fu, Q Zeng, X Du 2022 IEEE Symposium on Security and Privacy (SP), 285-302, 2022 | 22 | 2022 |
Using dynamic pseudo-IDs to protect privacy in location-based services X Zhu, H Chi, S Jiang, X Lei, H Li 2014 IEEE international conference on communications (ICC), 2307-2312, 2014 | 17 | 2014 |
P-match: Priority-aware friend discovery for proximity-based mobile social networks B Niu, X Zhu, T Zhang, H Chi, H Li 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems …, 2013 | 17 | 2013 |
Iot phantom-delay attacks: Demystifying and exploiting iot timeout behaviors C Fu, Q Zeng, H Chi, X Du, SL Valluru 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 12 | 2022 |
e-safe: Secure, efficient and forensics-enabled access to implantable medical devices H Chi, L Wu, X Du, Q Zeng, P Ratazzi 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 10 | 2018 |
Two-party and multi-party private matching for proximity-based mobile social networks X Zhu, Z Chen, H Chi, J Liu, S Jiang 2014 IEEE International Conference on Communications (ICC), 926-931, 2014 | 10 | 2014 |
No more companion apps hacking but one dongle: Hub-based blackbox fuzzing of iot firmware X Ma, Q Zeng, H Chi, L Luo Proceedings of the 21st Annual International Conference on Mobile Systems …, 2023 | 8 | 2023 |
Pseudo-Location Updating System for privacy-preserving location-based services B Niu, X Zhu, H Chi, H Li China Communications 10 (9), 1-12, 2013 | 8 | 2013 |
Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes H Chi, Q Zeng, X Du 32nd USENIX Security Symposium (USENIX Security 23), 1559-1576, 2023 | 7 | 2023 |
Personalized location recommendations with local feature awareness X Zhu, R Hao, H Chi, X Du 2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016 | 7 | 2016 |
Verification of boolean queries over outsourced encrypted data based on counting bloom filter X Zhu, R Hao, S Jiang, H Chi, H Li 2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015 | 6 | 2015 |
A Secure Proxy-based Access Control Scheme for Implantable Medical Devices L Wu, H Chi, X Du arXiv preprint arXiv:1803.07751, 2018 | 5 | 2018 |
Q-learning-based LTE-U and WiFi coexistence algorithm for wireless healthcare systems Y Su, L Huang, X Du, A Mohamed, H Chi, M Guizani Proc. 5th Int. Conf. Control Eng. Inf. Technol.(CEIT) 32, 91-96, 2017 | 4 | 2017 |