Publications

. Ethereum Analysis via Node Clustering. International Conference on Network and System Security(NSS), 2019.

PDF

. A Robust Throughput Scheme for Bitcoin Network without Block Reward. The 21th IEEE International Conference on High Performance Computing and Communications (CCF-C), 2019.

. Time-sync Video Tag Extraction Using Semantic Association Graph. Transactions on Knowledge Discovery from Data (CCF-B), 2019.

PDF

. On the Strategy and Behavior of Bitcoin Mining with N-attackers. Asia Conference on Computer and Communications Security(AsiaCCS) (CCF-C) (Accept ration 19%, 62 in 310), 2018.

PDF

. Pseudonym Inference in Cooperative Vehicular Traffic Scenarios. The IEEE Conference on Communications and Network Security(CNS), 2018.

PDF

. Crowdsourced Time-sync Video Tagging using Semantic Association Graph. IEEE International Conference on Multimedia and Expo (ICME) (CCF-B), 2017.

PDF

. Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter. International Conference on Wireless Algorithms, Systems, and Applications(WASA) (Best Paper Runner-up Award), 2017.

PDF

. Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy. Annual IEEE International Conference on Sensing, Communication, and Networking(SECON) (CCF-B), 2017.

PDF

. Cloud Computing Principle and Practice. China Machine Press, 400,000 words, Publish time 2017-03, 2017.

. A Traffic Based Lightweight Attack Detection Scheme for VoLTE. IEEE Global Communications Conference (GLOBECOM) (CCF-C), 2016.

PDF

. Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-tree. International Conference on Information Security Practice and Experience(ISPEC), 2016.

PDF

. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. ACM SIGSAC Conference on Computer and Communications Security(CCS) (Accepting rate 16.5%, CCF-A), 2016.

PDF

. Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game. International Conference on Distributed Computing Systems(ICDS) (Accepting rate 17.6%, CCF-B), 2016.

PDF

. Efficient and Secure Message Authentication in Cooperative Driving: A Game-Theoretic Approach. IEEE International Conference on Communications(ICC) (CCF-C), 2016.

PDF

. De-anonymizing Social Networks: Using User Interest as a side-channel. IEEE/CIC International Conference on Communications in China(ICCC), 2015.

PDF

. A Paralleling Broadcast Authentication Protocol for sparse RSUs in Internet of Vehicles. International Conference on Mobile Ad-hoc and Sensor Networks(MSN), 2014.

PDF

. Efficient and Enhanced Broadcast Authentication Protocols based on Multilevel uTESLA. IEEE International Performance Computing and Communications Conference(IPCCC) (CCF-C), 2014.

PDF

. Translate Computer Science Theory for the Information Age (Chinese Version). Shanghai Jiao Tong Unversity Press, 500,000 words, ISBN 9787313111098, Publish time 2014-06, 2014.

. DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things. International Conference on Selected Topics in Mobile and Wireless Networking(iCOST), 2012.

PDF

. Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2011.

PDF

. A key management scheme against compromised RSU in VANET. The 64th Joint Conference of Electrical and Electronics Engineers in Kyushu, 2011.

. A Generic Evaluation Method for Key Management Schemes in Wireless Sensor Network. International Conference on Ubiquitous Information Management and Communication(ICUIMC) (Student grant award), 2011.

PDF

. An Evaluation Method for Key Management Schemes in WSN. The 63rd Joint Conference of Electrical and Electronics Engineers in Kyushu, 2010.