


Остановите войну!
for scientists:


default search action
Kui Ren 0001
Person information

- affiliation: Zhejiang University, School of Cyber Science and Technology, Hangzhou, China
- affiliation (former): State University of New York af Buffalo, Department of Computer Science and Engineering, NY, USA
- affiliation (former): Illinois Institute of Technology, Chicago, IL, USA
- affiliation (former, PhD): Worcester Polytechnic Institute, MA, USA
Other persons with the same name
- Kui Ren — disambiguation page
- Kui Ren 0002
— Columbia University, Department of Applied Physics and Applied Mathematics, NY, USA (and 2 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j184]Zhibo Wang
, Jingjing Ma
, Xue Wang
, Jiahui Hu
, Zhan Qin
, Kui Ren
:
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems. ACM Comput. Surv. 55(7): 134:1-134:36 (2023) - [j183]Lei Wang
, Meng Chen
, Li Lu
, Zhongjie Ba
, Feng Lin
, Kui Ren
:
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(1): 32:1-32:22 (2023) - [j182]Antonino Rullo
, Elisa Bertino
, Kui Ren
:
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things. IEEE Internet Things J. 10(10): 8327-8330 (2023) - [j181]Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo:
Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 519-542 (2023) - [j180]Jian Lin
, Dingding Wang, Rui Chang
, Lei Wu
, Yajin Zhou
, Kui Ren
:
EnBinDiff: Identifying Data-Only Patches for Binaries. IEEE Trans. Dependable Secur. Comput. 20(1): 343-359 (2023) - [j179]Xinliang Miao
, Rui Chang
, Jianhong Zhao, Yongwang Zhao, Shuang Cao, Tao Wei, Liehui Jiang, Kui Ren
:
CVTEE: A Compatible Verified TEE Architecture With Enhanced Security. IEEE Trans. Dependable Secur. Comput. 20(1): 377-391 (2023) - [j178]Jianwei Liu
, Chaowei Xiao, Kaiyan Cui
, Jinsong Han
, Xian Xu, Kui Ren
:
Behavior Privacy Preserving in RF Sensing. IEEE Trans. Dependable Secur. Comput. 20(1): 784-796 (2023) - [j177]Zhiguo Wan
, Yan Zhou, Kui Ren:
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof. IEEE Trans. Dependable Secur. Comput. 20(2): 1335-1347 (2023) - [j176]Jinmeng Zhou
, Tong Zhang
, Wenbo Shen
, Dongyoon Lee
, Changhee Jung
, Ahmed M. Azab, Ruowen Wang
, Peng Ning, Kui Ren:
Automatic Permission Check Analysis for Linux Kernel. IEEE Trans. Dependable Secur. Comput. 20(3): 1849-1866 (2023) - [j175]Yiling He
, Yiping Li, Lei Wu
, Ziqi Yang, Kui Ren, Zhan Qin
:
MsDroid: Identifying Malicious Snippets for Android Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(3): 2025-2039 (2023) - [j174]Xiaoyi Pang
, Zhibo Wang
, Zeqing He, Peng Sun
, Meng Luo, Ju Ren
, Kui Ren:
Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation. IEEE Trans. Dependable Secur. Comput. 20(3): 2421-2432 (2023) - [j173]Ziming Zhao
, Zhaoxuan Li
, Fan Zhang
, Ziqi Yang, Shuang Luo, Tingting Li, Rui Zhang
, Kui Ren
:
SAGE: Steering the Adversarial Generation of Examples With Accelerations. IEEE Trans. Inf. Forensics Secur. 18: 789-803 (2023) - [j172]Keyu Ji
, Bingsheng Zhang
, Tianpei Lu, Kui Ren
:
Multi-Party Private Function Evaluation for RAM. IEEE Trans. Inf. Forensics Secur. 18: 1252-1267 (2023) - [j171]Anxiao He, Xiang Li, Jiandong Fu, Haoyu Hu, Kai Bu
, Chenlu Miao, Kui Ren
:
Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling. IEEE Trans. Inf. Forensics Secur. 18: 1268-1282 (2023) - [j170]Wenyuan Yang
, Xiaoyu Zhou, Zhikai Chen, Bofei Guo, Zhongjie Ba
, Zhihua Xia
, Xiaochun Cao
, Kui Ren
:
AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake. IEEE Trans. Inf. Forensics Secur. 18: 2015-2029 (2023) - [j169]Huining Li
, Chenhan Xu
, Aditya Singh Rathore
, Zhengxiong Li
, Hanbin Zhang
, Chen Song, Kun Wang
, Lu Su
, Feng Lin
, Kui Ren
, Wenyao Xu
:
VocalPrint: A mmWave-Based Unmediated Vocal Sensing System for Secure Authentication. IEEE Trans. Mob. Comput. 22(1): 589-606 (2023) - [j168]Shaoke Xi, Kai Bu
, Wensen Mao, Xiaoyu Zhang
, Kui Ren
, Xinxin Ren:
RuleOut Forwarding Anomalies for SDN. IEEE/ACM Trans. Netw. 31(1): 395-407 (2023) - [j167]Muhui Jiang
, Qinming Dai, Wenlong Zhang, Rui Chang
, Yajin Zhou
, Xiapu Luo
, Ruoyu Wang, Yang Liu
, Kui Ren:
A Comprehensive Study on ARM Disassembly Tools. IEEE Trans. Software Eng. 49(4): 1683-1703 (2023) - [c217]Ziqi Yuan, Siyu Hong, Rui Chang, Yajin Zhou, Wenbo Shen, Kui Ren:
VDom: Fast and Unlimited Virtual Domains on Multiple Architectures. ASPLOS (2) 2023: 905-919 - [c216]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Endemic Oblivious Transfer via Random Oracles, Revisited. EUROCRYPT (1) 2023: 303-329 - [c215]Xingyu Chen, Zhengxiong Li, Baicheng Chen, Yi Zhu, Chris Xiaoxuan Lu, Zhengyu Peng, Feng Lin, Wenyao Xu, Kui Ren, Chunming Qiao:
MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags. NDSS 2023 - [c214]Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Fan Zhang, Kui Ren:
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise. NDSS 2023 - [c213]Peipei Jiang, Qian Wang, Jianhao Cheng, Cong Wang, Lei Xu, Xinyu Wang, Yihao Wu, Xiaoyuan Li, Kui Ren:
Boomerang: Metadata-Private Messaging under Hardware Trust. NSDI 2023: 877-899 - [i64]Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan:
False Claims against Model Ownership Resolution. CoRR abs/2304.06607 (2023) - 2022
- [j166]Zhibo Wang
, Defang Liu, Yunan Sun, Xiaoyi Pang
, Peng Sun
, Feng Lin
, John C. S. Lui
, Kui Ren
:
A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses. IEEE Commun. Surv. Tutorials 24(4): 2292-2328 (2022) - [j165]Zhengxiong Li, Baicheng Chen, Xingyu Chen, Chenhan Xu, Yuyang Chen, Feng Lin, Changzhi Li, Karthik Dantu, Kui Ren, Wenyao Xu:
Reliable Digital Forensics in the Air: Exploring an RF-based Drone Identification System. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 63:1-63:25 (2022) - [j164]Chao Wang
, Feng Lin
, Zhongjie Ba, Fan Zhang, Wenyao Xu, Kui Ren:
Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 77:1-77:26 (2022) - [j163]Ziwei Liu
, Feng Lin
, Chao Wang
, Yijie Shen
, Zhongjie Ba
, Li Lu
, Wenyao Xu
, Kui Ren
:
CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(4): 173:1-173:25 (2022) - [j162]Zhelei Zhou, Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Yibiao Lu, Kui Ren, Phuc Thai, Hong-Sheng Zhou
:
Scriptable and composable SNARKs in the trusted hardware model. J. Comput. Secur. 30(6): 757-793 (2022) - [j161]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. Proc. VLDB Endow. 16(2): 202-215 (2022) - [j160]Jian Liu
, Kui Ren
:
Improving Blockchains With Client-Assistance. IEEE Trans. Computers 71(5): 1230-1236 (2022) - [j159]Fan Zhang, Tianxiang Feng, Zhiqi Li, Kui Ren, Xinjie Zhao:
Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 289-311 (2022) - [j158]Xiaogang Zhu
, Xiaotao Feng, Xiaozhu Meng, Sheng Wen
, Seyit Camtepe
, Yang Xiang
, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. IEEE Trans. Dependable Secur. Comput. 19(2): 912-923 (2022) - [j157]Xinyu Zhang
, Bingsheng Zhang
, Aggelos Kiayias
, Thomas Zacharias
, Kui Ren
:
An Efficient E2E Crowd Verifiable E-Voting System. IEEE Trans. Dependable Secur. Comput. 19(6): 3607-3620 (2022) - [j156]Yang Liu
, Zhuo Ma
, Yilong Yang
, Ximeng Liu
, Jianfeng Ma
, Kui Ren
:
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning. IEEE Trans. Dependable Secur. Comput. 19(6): 3671-3685 (2022) - [j155]Yang Liu
, Zhuo Ma
, Ximeng Liu
, Siqi Ma, Kui Ren
:
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN. IEEE Trans. Inf. Forensics Secur. 17: 69-84 (2022) - [j154]Yanbin Wang
, Haitao Xu
, Zhenhao Guo, Zhan Qin, Kui Ren
:
snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning. IEEE Trans. Inf. Forensics Secur. 17: 1214-1226 (2022) - [j153]Mengnan Zhao
, Bo Wang
, Wei Wang
, Yuqiu Kong
, Tianhang Zheng, Kui Ren
:
Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection. IEEE Trans. Inf. Forensics Secur. 17: 2468-2482 (2022) - [j152]Zeyuan Yin
, Bingsheng Zhang
, Jingzhong Xu, Kaiyu Lu, Kui Ren
:
Bool Network: An Open, Distributed, Secure Cross-Chain Notary Platform. IEEE Trans. Inf. Forensics Secur. 17: 3465-3478 (2022) - [j151]Aditya Singh Rathore
, Chenhan Xu
, Weijin Zhu
, Afee Daiyan, Kun Wang, Feng Lin
, Kui Ren
, Wenyao Xu
:
Scanning the Voice of Your Fingerprint With Everyday Surfaces. IEEE Trans. Mob. Comput. 21(8): 3024-3040 (2022) - [j150]Siwei Wu, Lei Wu
, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo
, Cong Wang, Kui Ren:
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum. ACM Trans. Softw. Eng. Methodol. 31(3): 54:1-54:33 (2022) - [j149]Chengliang Tian
, Jia Yu
, Hanlin Zhang, Haiyang Xue, Cong Wang
, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. IEEE Trans. Serv. Comput. 15(1): 241-253 (2022) - [c212]Yutian Yang
, Wenbo Shen
, Xun Xie
, Kangjie Lu
, Mingsen Wang
, Tianyu Zhou
, Chenggang Qin
, Wang Yu
, Kui Ren
:
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms. ACSAC 2022: 869-880 - [c211]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou
, Kui Ren:
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility. ASIACRYPT (4) 2022: 129-158 - [c210]Muhui Jiang, Tianyi Xu, Yajin Zhou, Yufeng Hu, Ming Zhong, Lei Wu, Xiapu Luo, Kui Ren:
EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM. ASPLOS 2022: 846-858 - [c209]Jianwei Liu, Guozheng Yang, Cheng Zang, Jiajun Chen, Xianming Hu, Jingzhi Zhang, Yinghui He, Jinsong Han, Kui Ren:
Device-free Crowd Density Estimation with Off-the-shelf WiFi Traffic. CBD 2022: 306-311 - [c208]Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, Kui Ren:
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. CVPR 2022: 10369-10378 - [c207]Fan Zhang, Zhiyong Wang, Haoting Shen, Bolin Yang, Qianmei Wu, Kui Ren:
DARPT: defense against remote physical attack based on TDC in multi-tenant scenario. DAC 2022: 559-564 - [c206]Junge Xu, Bohan Xuan, Anlin Liu, Mo Sun, Fan Zhang, Zeke Wang, Kui Ren:
Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV object detection. DAC 2022: 685-690 - [c205]Jinyan Xu, Haoran Lin, Ziqi Yuan, Wenbo Shen, Yajin Zhou, Rui Chang, Lei Wu, Kui Ren:
RegVault: hardware assisted selective data randomization for operating system kernels. DAC 2022: 715-720 - [c204]Xia Zhou, Jiaqi Li, Wenlong Zhang, Yajin Zhou, Wenbo Shen, Kui Ren:
OPEC: operation-based security isolation for bare-metal embedded systems. EuroSys 2022: 317-333 - [c203]Li Lu
, Zhongjie Ba, Feng Lin
, Jinsong Han, Kui Ren:
ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures. ICDCS 2022: 776-786 - [c202]Kunzhe Huang, Yiming Li, Baoyuan Wu, Zhan Qin, Kui Ren:
Backdoor Defense via Decoupling the Training Process. ICLR 2022 - [c201]Zhanglei Shu, Zhangsen Wang, Guozheng Yang, Cheng Zang, Zhe Ma, Feng Lin, Kui Ren:
Fingersound: A Low-cost and Deployable Authentication System with Fingertip Sliding Sound. ICPADS 2022: 33-40 - [c200]Jianwei Liu, Yinghui He, Chaowei Xiao, Jinsong Han, Le Cheng, Kui Ren:
Physical-World Attack towards WiFi-based Behavior Recognition. INFOCOM 2022: 400-409 - [c199]Chao Wang
, Feng Lin
, Tiantian Liu, Ziwei Liu, Yijie Shen, Zhongjie Ba, Li Lu
, Wenyao Xu, Kui Ren:
mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect. INFOCOM 2022: 820-829 - [c198]Yike Chen, Ming Gao
, Yimin Li, Lingfeng Zhang, Li Lu
, Feng Lin
, Jinsong Han, Kui Ren:
Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers. INFOCOM 2022: 1119-1128 - [c197]Meng Chen
, Li Lu
, Zhongjie Ba, Kui Ren:
PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition. INFOCOM 2022: 1419-1428 - [c196]Ziwei Liu, Linzhong Xu, Feng Lin, Zhangsen Wang, Kui Ren:
CTJammer: A Cross-Technology Reactive Jammer towards Unlicensed LTE. IoTDI 2022: 95-106 - [c195]Weiye Xu, Wenfan Song, Jianwei Liu, Yajie Liu, Xin Cui, Yuanqing Zheng, Jinsong Han, Xinhuai Wang, Kui Ren:
Mask does not matter: anti-spoofing face authentication using mmWave without on-site registration. MobiCom 2022: 310-323 - [c194]Chao Wang
, Feng Lin
, Tiantian Liu, Kaidi Zheng, Zhibo Wang, Zhengxiong Li, Ming-Chun Huang, Wenyao Xu, Kui Ren:
mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device. MobiCom 2022: 338-351 - [c193]Meng Chen, Li Lu
, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin
, Kui Ren:
A non-intrusive and adaptive speaker de-identification scheme using adversarial examples. MobiCom 2022: 853-855 - [c192]Zhengxiong Li, Baicheng Chen, Xingyu Chen, Huining Li, Chenhan Xu, Feng Lin, Chris Xiaoxuan Lu, Kui Ren, Wenyao Xu:
SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing. NDSS 2022 - [c191]Aditya Singh Rathore, Yijie Shen, Chenhan Xu, Jacob Snyderman, Jinsong Han, Fan Zhang, Zhengxiong Li, Feng Lin, Wenyao Xu, Kui Ren:
FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing. NDSS 2022 - [c190]Ming Gao, Lingfeng Zhang, Leming Shen
, Xiang Zou, Jinsong Han, Feng Lin, Kui Ren:
KITE: Exploring the Practical Threat from Acoustic Transduction Attacks on Inertial Sensors. SenSys 2022: 696-709 - [c189]Qianniu Chen, Meng Chen, Li Lu
, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren:
Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain. SenSys 2022: 710-724 - [c188]Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wang, Qingbiao Wu, Kui Ren:
"Adversarial Examples" for Proof-of-Learning. IEEE Symposium on Security and Privacy 2022: 1408-1422 - [c187]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. USENIX Security Symposium 2022: 4129-4146 - [i63]Kunzhe Huang, Yiming Li, Baoyuan Wu, Zhan Qin, Kui Ren:
Backdoor Defense via Decoupling the Training Process. CoRR abs/2202.03423 (2022) - [i62]Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, Kui Ren:
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. CoRR abs/2203.01584 (2022) - [i61]Guodong Cao, Zhibo Wang, Xiaowei Dong, Zhifei Zhang, Hengchang Guo, Zhan Qin, Kui Ren:
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training. CoRR abs/2206.02158 (2022) - [i60]Jingyi Guo, Min Zheng, Yajin Zhou, Haoyu Wang, Lei Wu, Xiapu Luo, Kui Ren:
iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps. CoRR abs/2207.01837 (2022) - [i59]Zhuoruo Zhang, Chenyang Yu, He Huang, Rui Chang, Mingshuai Chen, Qinming Dai, Wenbo Shen, Yongwang Zhao, Kui Ren:
PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot. CoRR abs/2209.07936 (2022) - [i58]Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin:
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization. CoRR abs/2210.01318 (2022) - [i57]Zhihua Tian, Jian Liu, Jingyu Li, Xinle Cao, Ruoxi Jia, Kui Ren:
Private Data Valuation and Fair Payment in Data Marketplaces. CoRR abs/2210.08723 (2022) - [i56]Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren:
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples. CoRR abs/2211.05446 (2022) - [i55]Shuo Shao, Wenyuan Yang, Hanlin Gu, Jian Lou, Zhan Qin, Lixin Fan, Qiang Yang, Kui Ren:
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model. CoRR abs/2211.07160 (2022) - [i54]Jiachen Lei, Shuang Ma, Zhongjie Ba, Sai Vemprala, Ashish Kapoor, Kui Ren:
Masked Autoencoders for Egocentric Video Understanding @ Ego4D Challenge 2022. CoRR abs/2211.15286 (2022) - [i53]Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren:
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. CoRR abs/2212.00612 (2022) - [i52]Keyu Ji, Bingsheng Zhang, Tianpei Lu, Kui Ren:
Multi-party Private Function Evaluation for RAM. IACR Cryptol. ePrint Arch. 2022: 939 (2022) - [i51]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility. IACR Cryptol. ePrint Arch. 2022: 1127 (2022) - [i50]Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, Kui Ren:
Bool Network: An Open, Distributed, Secure Cross-chain Notary Platform. IACR Cryptol. ePrint Arch. 2022: 1290 (2022) - [i49]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Endemic Oblivious Transfer via Random Oracles, Revisited. IACR Cryptol. ePrint Arch. 2022: 1525 (2022) - 2021
- [j148]Yangfei Lin, Jie Li
, Xiaohua Jia, Kui Ren:
Multiple-replica integrity auditing schemes for cloud data storage. Concurr. Comput. Pract. Exp. 33(7): 1 (2021) - [j147]Kai Bu
, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, Kui Ren:
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation. ACM Comput. Surv. 53(5): 104:1-104:34 (2021) - [j146]Peipei Jiang
, Qian Wang
, Muqi Huang, Cong Wang
, Qi Li
, Chao Shen
, Kui Ren
:
Building In-the-Cloud Network Functions: Security and Privacy Challenges. Proc. IEEE 109(12): 1888-1919 (2021) - [j145]Xinle Cao, Jian Liu, Hao Lu, Kui Ren:
Cryptanalysis of An Encrypted Database in SIGMOD '14. Proc. VLDB Endow. 14(10): 1743-1755 (2021) - [j144]Jinfei Liu, Qiongqiong Lin, Jiayao Zhang, Kui Ren, Jian Lou, Junxu Liu, Li Xiong, Jian Pei
, Jimeng Sun
:
Demonstration of Dealer: An End-to-End Model Marketplace with Differential Privacy. Proc. VLDB Endow. 14(12): 2747-2750 (2021) - [j143]Fan Zhang
, Bolin Yang
, Bojie Yang, Yiran Zhang, Xuanle Ren, Shivam Bhasin
, Kui Ren
:
Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1063-1076 (2021) - [j142]Guorui Xu
, Fan Zhang
, Bolin Yang
, Xinjie Zhao, Wei He
, Kui Ren
:
Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1102-1116 (2021) - [j141]Bo Wang
, Mengnan Zhao
, Wei Wang
, Fei Wei
, Zhan Qin, Kui Ren
:
Are You Confident That You Have Successfully Generated Adversarial Examples? IEEE Trans. Circuits Syst. Video Technol. 31(6): 2089-2099 (2021) - [j140]Sekhar Rajendran, Zhi Sun
, Feng Lin
, Kui Ren
:
Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things. IEEE Trans. Inf. Forensics Secur. 16: 1896-1911 (2021) - [j139]Jianghong Wei
, Xiaofeng Chen
, Jianfeng Ma
, Xuexian Hu
, Kui Ren:
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging. IEEE/ACM Trans. Netw. 29(5): 2242-2253 (2021) - [j138]Muhammad Saad
, Zhan Qin, Kui Ren, DaeHun Nyang
, David Mohaisen
:
e-PoS: Making Proof-of-Stake Decentralized and Fair. IEEE Trans. Parallel Distributed Syst. 32(8): 1961-1973 (2021) - [c186]Lin Ma, Jinyan Xu, Jiadong Sun, Yajin Zhou, Xun Xie, Wenbo Shen, Rui Chang, Kui Ren:
Revisiting challenges for selective data protection of real applications. APSys 2021: 138-145 - [c185]Kui Ren:
Encrypted Databases: Progresses and Challenges. AsiaCCS 2021: 628 - [c184]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CCS 2021: 734-748 - [c183]Nanzi Yang, Wenbo Shen, Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, Kui Ren:
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization. CCS 2021: 764-778 - [c182]Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Phuc Thai, Hong-Sheng Zhou
, Kui Ren:
Succinct Scriptable NIZK via Trusted Hardware. ESORICS (1) 2021: 430-451 - [c181]Zhelei Zhou, Xinle Cao, Jian Liu, Bingsheng Zhang, Kui Ren:
Zero Knowledge Contingent Payments for Trained Neural Networks. ESORICS (2) 2021: 628-648 - [c180]Yibiao Lu
, Bingsheng Zhang, Hong-Sheng Zhou
, Weiran Liu, Lei Zhang, Kui Ren:
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation. ESORICS (2) 2021: 699-720 - [c179]Liu Liu, Hanlin Yu, Zhongjie Ba, Li Lu
, Feng Lin
, Kui Ren:
PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting. ICC 2021: 1-6 - [c178]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Wenxin Liu, Zhan Qin, Kui Ren:
Feature Importance-aware Transferable Adversarial Attacks. ICCV 2021: 7619-7628 - [c177]Jianwei Liu, Wenfan Song, Leming Shen
, Jinsong Han, Xian Xu, Kui Ren:
MandiPass: Secure and Usable User Authentication via Earphone IMU. ICDCS 2021: 674-684 - [c176]Jianwei Liu, Xiang Zou, Feng Lin
, Jinsong Han, Xian Xu, Kui Ren:
Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFID. ICDCS 2021: 1042-1052 - [c175]