- mmEcho: A mmWave-based Acoustic Eavesdropping Method, Oakland'23
- NFChain: A Practical Fingerprinting Scheme for NFC Tag Authentication, INFOCOM'23
- Towards System-Level Security Analysis of IoT Using Attack Graphs, TMC'22
- Towards Unconstrained Vocabulary Eavesdropping With Mmwave Radar Using GAN, TMC'23
- Reinforcement learning based adversarial malware example generation against black-box detectors, Computers & Security'22
- Accear: Accelerometer acoustic eavesdropping with unconstrained vocabulary, Oakland'22
- Milliear: Millimeter-wave acoustic eavesdropping with unconstrained vocabulary, INFOCOM'22
- Iotgaze: Iot security enforcement via wireless context analysis, INFOCOM'20
- Towards automatic detection of nonfunctional sensitive transmissions in mobile applications, TMC'20
- NFChain: A Practical Fingerprinting Scheme for NFC Tag Authentication, INFOCOM'23
- Membership inference attacks against recommender systems, CCS'21
- Ginver: Generative Model Inversion Attacks Against Collaborative Inference, WWW'23
- Model Poisoning Attack on Neural Network without Reference Data, TC (under major revision)
- Federated Learning Hyper-Parameter Tuning From A System Perspective, IoT-J'23
- Spectroscopy Approaches for Food Safety Applications: Improving Data Efficiency Using Active Learning and Semi-Supervised Learning, frontiers in AI'22
- MASTAF: A Model-Agnostic Spatio-Temporal Attention Fusion Network for Few-shot Video Classification, WACV'22
- Incentive Mechanism Design for Joint Resource Allocation in Blockchain-based Federated Learning, TPDS'23
- Split: A Hash-based Memory Optimization Method for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK) , TC'23
- Latency-First Smart Contract: Overclock the Blockchain for a While, INFOCOM'23
- A Trustless Architecture of Blockchain-enabled Metaverse, HCC'23
- SPDL: A Blockchain-enabled Secure and Privacy-preserving Decentralized Learning System, TC'22
- Curb: Trusted and Scalable Software-Defined Network Control Plane for Edge Computing, ICDCS'22
- BLOWN: A Blockchain Protocol for Single-Hop Wireless Networks under Adversarial SINR, TMC'22
- Extending On-chain Trust to Off-chain--Trustworthy Blockchain Data Collection using Trusted Execution Environment, TC'22
- CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA, TC'22
- wChain: A Fast Fault-Tolerant Blockchain Protocol for Multihop Wireless Networks, TWC'21
- Predictable Virtualization on Memory Protection Unit-based Microcontrollers, RTAS'18
- MxU: Towards Predictable, Flexible, and Efficient Memory Access Control for the Secure IoT, EMSOFT'19
- Practical Principle of Least Privilege for Secure Embedded Systems, RTAS'21
- SBIs: Application Access to Safe, Baremetal Interrupt Latencies, RTAS'22