Certchain: Public and efficient certificate audit based on blockchain for tls connections J Chen, S Yao, Q Yuan, K He, S Ji, R Du IEEE INFOCOM 2018-IEEE conference on computer communications, 2060-2068, 2018 | 166 | 2018 |
DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments K He, J Chen, R Du, Q Wu, G Xue, X Zhang IEEE Transactions on Computers 65 (12), 3631-3645, 2016 | 102 | 2016 |
Blind filtering at third parties: An efficient privacy-preserving framework for location-based services J Chen, K He, Q Yuan, M Chen, R Du, Y Xiang IEEE Transactions on Mobile Computing 17 (11), 2524-2535, 2018 | 76 | 2018 |
Secure dynamic searchable symmetric encryption with constant client storage cost K He, J Chen, Q Zhou, R Du, Y Xiang IEEE Transactions on Information Forensics and Security 16, 1538-1549, 2020 | 72 | 2020 |
Dominating set and network coding-based routing in wireless mesh networks J Chen, K He, R Du, M Zheng, Y Xiang, Q Yuan IEEE Transactions on Parallel and Distributed Systems 26 (2), 423-433, 2013 | 71 | 2013 |
Dynamic group-oriented provable data possession in the cloud K He, J Chen, Q Yuan, S Ji, D He, R Du IEEE Transactions on Dependable and Secure Computing 18 (3), 1394-1408, 2019 | 59 | 2019 |
Batch identification game model for invalid signatures in wireless mobile networks J Chen, K He, Q Yuan, G Xue, R Du, L Wang IEEE Transactions on Mobile Computing 16 (6), 1530-1543, 2016 | 50 | 2016 |
XAuth: Efficient privacy-preserving cross-domain authentication J Chen, Z Zhan, K He, R Du, D Wang, F Liu IEEE Transactions on Dependable and Secure Computing 19 (5), 3301-3311, 2021 | 48 | 2021 |
Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks C Wu, K He, J Chen, Z Zhao, R Du 29th USENIX Security Symposium (USENIX Security 20), 2219-2236, 2020 | 46 | 2020 |
PBCert: privacy-preserving blockchain-based certificate status validation toward mass storage management S Yao, J Chen, K He, R Du, T Zhu, X Chen IEEE Access 7, 6117-6128, 2018 | 39 | 2018 |
EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data J Chen, K He, L Deng, Q Yuan, R Du, Y Xiang, J Wu IEEE Transactions on Services Computing 13 (6), 1072-1085, 2017 | 38 | 2017 |
Redactable blockchain from decentralized chameleon hash functions M Jia, J Chen, K He, R Du, L Zheng, M Lai, D Wang, F Liu IEEE Transactions on Information Forensics and Security 17, 2771-2783, 2022 | 33 | 2022 |
Proofs of ownership and retrievability in cloud storage R Du, L Deng, J Chen, K He, M Zheng 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 25 | 2014 |
Biometrics-authenticated key exchange for secure messaging M Wang, K He, J Chen, Z Li, W Zhao, R Du Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 17 | 2021 |
Message‐locked proof of ownership and retrievability with remote repairing in cloud J Chen, L Zhang, K He, M Chen, R Du, L Wang Security and Communication Networks 9 (16), 3452-3466, 2016 | 17 | 2016 |
Distributed greedy coding-aware deterministic routing for multi-flow in wireless networks J Chen, K He, Q Yuan, R Du, L Wang, J Wu Computer Networks 105, 194-206, 2016 | 15 | 2016 |
EchoHand: High accuracy and presentation attack resistant hand authentication on commodity mobile devices C Wu, J Chen, K He, Z Zhao, R Du, C Zhang Proceedings of the 2022 ACM SIGSAC conference on computer and communications …, 2022 | 14 | 2022 |
Delia: distributed efficient log integrity audit based on hierarchal multi-party state channel J Chen, X Chen, K He, R Du, W Chen, Y Xiang IEEE Transactions on Dependable and Secure Computing 19 (5), 3286-3300, 2021 | 13 | 2021 |
PROCESS: Privacy-preserving on-chain certificate status service M Jia, K He, J Chen, R Du, W Chen, Z Tian, S Ji IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021 | 13 | 2021 |
Semantics-aware privacy risk assessment using self-learning weight assignment for mobile apps J Chen, C Wang, K He, Z Zhao, M Chen, R Du, GJ Ahn IEEE Transactions on Dependable and Secure Computing 18 (1), 15-29, 2018 | 13 | 2018 |