Remote data checking for network coding-based distributed storage systems B Chen, R Curtmola, G Ateniese, R Burns Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 31-42, 2010 | 315 | 2010 |
Personalized privacy-preserving social recommendation X Meng, S Wang, K Shu, J Li, B Chen, H Liu, Y Zhang Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018 | 90 | 2018 |
Robust dynamic provable data possession B Chen, R Curtmola 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 74 | 2012 |
Deftl: Implementing plausibly deniable encryption in flash translation layer S Jia, L Xia, B Chen, P Liu Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 53 | 2017 |
Nfps: Adding undetectable secure deletion to flash translation layer S Jia, L Xia, B Chen, P Liu Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 44 | 2016 |
Mobipluto: File system friendly deniable storage for mobile devices B Chang, Z Wang, B Chen, F Zhang Proceedings of the 31st annual computer security applications conference …, 2015 | 43 | 2015 |
ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN Z Xu, B Chen, N Wang, Y Zhang, Z Li 2015 IEEE 40th Conference on Local Computer Networks (LCN), 82-90, 2015 | 41 | 2015 |
What if routers are malicious? mitigating content poisoning attack in ndn D Wu, Z Xu, B Chen, Y Zhang 2016 IEEE Trustcom/BigDataSE/ISPA, 481-488, 2016 | 40 | 2016 |
Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices B Chang, F Zhang, B Chen, Y Li, WT Zhu, Y Tian, Z Wang, A Ching 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 33 | 2018 |
Mobihydra: Pragmatic and multi-level plausibly deniable encryption storage for mobile devices X Yu, B Chen, Z Wang, B Chang, WT Zhu, J Jing Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014 | 33 | 2014 |
Studying analysts’ data triage operations in cyber defense situational analysis C Zhong, J Yen, P Liu, RF Erbacher, C Garneau, B Chen Theory and models for cyber situation awareness, 128-169, 2017 | 31 | 2017 |
Towards self-repairing replication-based storage systems using untrusted clouds B Chen, R Curtmola Proceedings of the third ACM conference on Data and application security and …, 2013 | 31 | 2013 |
Towards privacy preserving social recommendation under personalized privacy settings X Meng, S Wang, K Shu, J Li, B Chen, H Liu, Y Zhang World Wide Web 22, 2853-2881, 2019 | 28 | 2019 |
RDS3: Ransomware defense strategy by using stealthily spare space KP Subedi, DR Budhathoki, B Chen, D Dasgupta 2017 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2017 | 28 | 2017 |
Supporting transparent snapshot for bare-metal malware analysis on mobile devices L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 27 | 2017 |
Sanitizing data is not enough! Towards sanitizing structural artifacts in flash media B Chen, S Jia, L Xia, P Liu Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 27 | 2016 |
Internet protocol cameras with no password protection: An empirical investigation H Xu, F Xu, B Chen Passive and Active Measurement: 19th International Conference, PAM 2018 …, 2018 | 26 | 2018 |
Auditable Version Control Systems. B Chen, R Curtmola NDSS, 2014 | 26 | 2014 |
Robust dynamic remote data checking for public clouds B Chen, R Curtmola Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 26 | 2012 |
Enabling blockchain applications over named data networking J Guo, M Wang, B Chen, S Yu, H Zhang, Y Zhang ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 21 | 2019 |