KMap
VOSviewer
Courses
- FINSFundamentals of Information and Network Security
- FCNFundamentals of Computer Networks
- CPEAIIComputer Programming for Engineering Applications II
Grants
- Achieving Cyber-Resilience for Power Systems using a Learning Model-Assisted Blockchain Framework
Principal Investigator (PI)
2021
$145.0K
Active - Radio-Frequency Interference for Fault Injection and Sensor Manipulation
Principal Investigator (PI)
2021
$124.9K
Active - A Millimeter-Wave Communication System for Wireless Security and Networking Research and Education
Principal Investigator (PI)
2021
$249.9K
- In-band Wireless Trust Establishment Resistant to Advanced Signal Manipulations
Principal Investigator (PI)
2018
$515.0K
- SaTC: CORE: Medium: Collaborative: Enforcement of Geofencing Policies for Commercial Unmanned Aircraft Systems
Principal Investigator (PI)
2018
$230.0K
- SpecEES: Secure and Fair Spectrum Sharing for Heterogeneous Coexistent Systems
Co-Investigator (COI)
2017
$600.0K
- Toward High Performance Tactical Multi-Hop Wireless Networks via Exploiting Antenna Reconfigurability
Principal Investigator (PI)
2016
$509.4K
- CAREER: Toward Cooperative Interference Mitigation for Heterogeneous Multi-Hop MIMO Wireless Networks
Principal Investigator (PI)
2015
$445.8K
- EARS: Collaborative Research: Crowdsourcing-Based Spectrum Etiquette Enforcement in Dynamic Spectrum Access
Principal Investigator (PI)
2015
$329.3K
- Secure and Resilient Vehicular Platooning
Principal Investigator (PI)
2015
$207.3K
Publications (121)
- Secure and collusion-resistant data aggregation from convertible tags
2021
- Data inference from encrypted databases: a multi-dimensional order-preserving matching approach
2020
- Aggregation-based location privacy: An information theoretic approach
2020
- GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems
2020
- Wireless federated learning with local differential privacy
2020
- Regret Analysis of Stochastic Multi-armed Bandit Problem with Clustered Information Feedback
2020
- Impacts of constrained sensing and communication based attacks on vehicular platoons
2020
- In-band Secret-Free Pairing for COTS Wireless Devices
2020
- SVM: secure vehicle motion verification with a single wireless receiver
2020
- ART: Automatic Recovery of Trust for Mobile Devices
2020
- StegoNet: Turn Deep Neural Network into a Stegomalware
2020
- iJam with channel randomization
2020
- ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization
2020
- Providing Input-Discriminative Protection for Local Differential Privacy
2020
- PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility
2020
- QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data
2020
- Local information privacy and its application to privacy-preserving data aggregation
2020
- GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems
2020
- “Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users
2020
- Enhancing LAA/Wi-Fi Coexistence via Concurrent Transmissions and Interference Cancellation
2019
- Context Aware Laplacian Mechanism for Local Information Privacy
2019
- Secure retrospective interference alignment
2019
- SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks
2019
- Collusion Resistant Aggregation from Convertible Tags
2019
- Fast Reconfigurable Antenna State Selection with Hierarchical Thompson Sampling
2019
- Supporting both range queries and frequency estimation with local differential privacy
2019
- Trading Privacy for Utility in Database-Assisted Dynamic Spectrum Access
2019
- Poster: Perceived Adversarial Examples
2019
- Randex: Mitigating Range Injection Attacks on Searchable Encryption
2019
- In-band Secret-Free Pairing Protocol for COTS Wireless Devices
2019
- Crowdsourced measurements for device fingerprinting
2019
- Online reconfigurable antenna state selection based on Thompson sampling
2019
- Local Information Privacy with Bounded Prior
2019
- On the Secure Degrees of Freedom of 2 x 2 x 2 Multi-Hop Network with Untrusted Relays
2018
- Pseudonym Inference in Cooperative Vehicular Traffic Scenarios
2018
- Online location trace privacy: An information theoretic approach
2018
- Are friends of my friends too social? limitations of location privacy in a socially-connected world
2018
- Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications
2018
- Storage efficient substring searchable symmetric encryption
2018
- Analysis of friendly jamming for secure location verification of vehicles for intelligent highways
2018
- Secure device bootstrapping without secrets resistant to signal manipulation attacks
2018
- LTE misbehavior detection in Wi-Fi/LTE coexistence under the LAA-LTE standard
2018
- On the secure degrees of freedom of the K-user interference channel with delayed CSIT
2018
- On the privacy and utility tradeoff in database-assisted dynamic spectrum access
2018
- On the throughput limit of multi-hop wireless networks with reconfigurable antennas
2018
- SFIRE: Secret-Free-in-band Trust Establishment for COTS Wireless Devices
2018
- Context-aware data aggregation with localized information privacy
2018
- SpecWatch: A framework for adversarial spectrum monitoring with unknown statistics
2018
- Game Theoretical Analysis of Coexistence in MIMO-Empowered Cognitive Radio Networks
2017
- The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services
2017
- Throughput Optimization in Multi-hop Wireless Networks with Reconfigurable Antennas
2017
- Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles
2017
- Cooperative Interference Mitigation for Heterogeneous Multi-hop Wireless Networks Coexistence
2016
- Enabling Mutually Private Location Proximity Services in Smart Cities: A Comparative Assessment
2016
- Making Wireless Body Area Networks Robust under Cross-Technology Interference
2016
- A game theoretical approach to coexistence of heterogeneous mimo wireless networks with interference cancellation
2016
- Analysis of Friendly Jamming for Secure Location Verification of Vehicles
2016
- SpecWatch: Adversarial spectrum usage monitoring in CRNs with unknown statistics
2016
- Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data
2016
- Geometric Range Search on Encrypted Spatial Data
2016
- Jamming Resilient Communication Using MIMO Interference Cancellation
2016
- FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
2016
- Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets
2016
- Practical and secure nearest neighbor search on encrypted large-scale data
2016
- SecReach: Secure Reachability Computation on Encrypted Location Check-in Data
2016
- MASK-BAN: movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks
2015
- Location Based Handshake and Private Proximity Test with Location Tags
2015
- Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice
2015
- Privacy-preserving inference of social relationships from location data: a vision paper
2015
- Circular range search on encrypted spatial data
2015
- Multidimensional signal constellation design for channel dominated with nonlinear phase noise
2015
- Signal Constellation Design for Cross-Phase Modulation Dominated Channels (Invited Paper)
2015
- Identity-Based Private Matching over Outsourced Encrypted Datasets
2015
- A tale of two clouds: Computing on data encrypted under multiple keys
2014
- Poster: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems
2014
- SpecMonitor: Towards Efficient Passive Traffic Monitoring for Cognitive Radio Network
2014
- Privacy-preserving multi-keyword ranked search over encrypted cloud data
2014
- Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks
2014
- Friendly Jamming for Secure Localization in Vehicular Transportation
2014
- Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index
2014
- Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy
2014
- Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
2014
- Toward privacy-assured and searchable cloud data storage services
2013
- Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel
2013
- Storing shared data on the cloud via security-mediator
2013
- Secure ad hoc trust initialization and key management in wireless body area networks
2013
- MIMO-based Jamming Resilient Communication in Wireless Networks
2013
- Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
2013
- Surviving the RF smog: Making Body Area Networks robust to cross-technology interference
2013
- Non-parametric passive traffic monitoring in cognitive radio networks
2013
- Computing encrypted cloud data efficiently under multiple keys
2013
- Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
2013
- Enforcing spectrum access rules in cognitive radio networks through cooperative jamming
2013
- Privacy-preserving public auditing for shared cloud data supporting group dynamics
2013
- Privacy-preserving distributed profile matching in proximity-based mobile social networks
2013
- ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks
2013
- Sharp: Private proximity test and secure handshake with cheat-proof location tags
2012
- BANA: Body Area Network Authentication Exploiting Channel Characteristics
2012
- Throughput analysis of cooperative mobile content distribution in vehicular network using symbol level network coding
2012
- Mushi: Toward multiple level security cloud with strong hardware level isolation
2012
- Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks
2012
- Authenticated secret key extraction using channel characteristics for body area networks
2012
- Toward privacy-assured cloud data services with flexible search functionalities
2012
- Codeon: Cooperative popular content distribution for vehicular networks using symbol level network coding
2011
- Opportunistic broadcast of event-driven warning messages in vehicular ad hoc networks with lossy links
2011
- R-Code: Network coding-based reliable broadcast in wireless mesh networks
2011
- Distributed data mining with differential privacy
2011
- Authorized private keyword search over encrypted data in cloud computing
2011
- Findu: Privacy-preserving personal profile matching in mobile social networks
2011
- Group device pairing based secure sensor association and key management for body area networks
2010
- Adaptive local routing strategy on a scale-free network
2010
- Codeplay: Live multimedia streaming in vanets using symbol-level network coding
2010
- Data security and privacy in wireless body area networks
2010
- Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
2010
- Oppcast: Opportunistic broadcast ofwarning messages in vanets with unreliable links
2009
- A network coding approach to reliable broadcast in wireless mesh networks
2009
- R-Code: Network coding based reliable broadcast in wireless mesh networks with unreliable links
2009
- Remaining Delivery Time Estimation Based Routing for Intermittently Connected Mobile Networks
2008
- Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links
2008
- A rapid antenna selection for MIMO-diversity systems
2007
- Routing strategy on a two-dimensional small-world network model
2007