What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kui Ren
Google Scholar
129
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Load-Balanced Server-Aided MPC in Heterogeneous Computing.
Yibiao Lu
Bingsheng Zhang
Kui Ren
2025
journals/tifs
DroneAudioID: A Lightweight Acoustic Fingerprint-Based Drone Authentication System for Secure Drone Delivery.
Meng Zhang
Li Lu
Yuhan Wu
Zheng Yan
Jiaqi Sun
Feng Lin
Kui Ren
2025
journals/tifs
Secure Service Function Chain Provisioning for Task Offloading in Device-Edge-Cloud Computing.
Jianhua Liu
Xin Wang
Kui Ren
Yiyi Zhou
Minglu Li
2025
journals/tifs
Poisoning Attacks to Knowledge Distillation-Based Federated Learning Under Robust Aggregation Rules.
Xiaoyi Pang
Zhibo Wang
Defang Liu
Jiahui Hu
Peng Sun
Meng Luo
Kui Ren
2025
conf/sp
From One Stolen Utterance: Assessing the Risks of Voice Cloning in the AIGC Era.
Kun Wang
Meng Chen
Li Lu
Jingwen Feng
Qianniu Chen
Zhongjie Ba
Kui Ren
Chun Chen
2025
conf/ndss
Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution.
Shuo Shao
Yiming Li
Hongwei Yao
Yiling He
Zhan Qin
Kui Ren
2025
conf/ndss
MineShark: Cryptomining Traffic Detection at Scale.
Shaoke Xi
Tianyi Fu
Kai Bu
Chunling Yang
Zhihua Chang
Wenzhi Chen
Zhou Ma
Chongjie Chen
Yongsheng Shen
Kui Ren
2025
conf/ndss
BumbleBee: Secure Two-party Inference Framework for Large Transformers.
Wen-jie Lu
Zhicong Huang
Zhen Gu
Jingyu Li
Jian Liu
Cheng Hong
Kui Ren
Tao Wei
Wenguang Chen
2025
conf/ndss
Delay-allowed Differentially Private Data Stream Release.
Xiaochen Li
Zhan Qin
Kui Ren
Chen Gong
Shuya Feng
Yuan Hong
Tianhao Wang
2025
conf/ndss
A New PPML Paradigm for Quantized Models.
Tianpei Lu
Bingsheng Zhang
Xiaoyuan Zhang
Kui Ren
2025
conf/ndss
Secure Transformer Inference Made Non-interactive.
Jiawen Zhang
Xinpeng Yang
Lipeng He
Kejia Chen
Wen-jie Lu
Yinghao Wang
Xiaoyang Hou
Jian Liu
Kui Ren
Xiaohu Yang
2025
conf/pkc
Single-Input Functionality Against a Dishonest Majority: Practical and Round-Optimal.
Zhelei Zhou
Bingsheng Zhang
Hong-Sheng Zhou
Kui Ren
2025
journals/tifs
AV-Agent: A Bottom-Up Interpretable Malware Classifier Based on Large Language Models.
Rui Zheng
Zhibo Wang
Kui Ren
Chun Chen
2025
journals/tifs
Liquid Crystal Mimics Your Heart: A Physical Spoofing Attack Against PPG-Based Systems.
Junhao Wang
Li Lu
Hao Kong
Feng Lin
Zhongjie Ba
Kui Ren
2025
conf/uss
SoK: On Gradient Leakage in Federated Learning.
Jiacheng Du
Jiahui Hu
Zhibo Wang
Peng Sun
Neil Gong
Kui Ren
Chun Chen
2025
conf/uss
Efficient 2PC for Constant Round Secure Equality Testing and Comparison.
Tianpei Lu
Xin Kang
Bingsheng Zhang
Zhuo Ma
Xiaoyuan Zhang
Yang Liu
Kui Ren
Chun Chen
2025
conf/uss
Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models.
Yu He
Boheng Li
Liu Liu
Zhongjie Ba
Wei Dong
Yiming Li
Zhan Qin
Kui Ren
Chun Chen
2025
conf/uss
Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense.
Jiawen Zhang
Kejia Chen
Lipeng He
Jian Lou
Dan Li
Zunlei Feng
Mingli Song
Jian Liu
Kui Ren
Xiaohu Yang
2025
conf/uss
Membership Inference Attacks Against Vision-Language Models.
Yuke Hu
Zheng Li
Zhihao Liu
Yang Zhang
Zhan Qin
Kui Ren
Chun Chen
2025
conf/uss
PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning.
Xiaoyi Pang
Chenxu Zhao
Zhibo Wang
Jiahui Hu
Yinggui Wang
Lei Wang
Tao Wei
Kui Ren
Chun Chen
2025
conf/uss
On the Atomicity and Efficiency of Blockchain Payment Channels.
Di Wu
Shoupeng Ren
Yuman Bai
Lipeng He
Jian Liu
Wu Wen
Kui Ren
Chun Chen
2024
journals/tifs
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
Meng Chen
Li Lu
Jiadi Yu
Zhongjie Ba
Feng Lin
Kui Ren
2024
journals/tifs
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles.
Feng Lin
Hao Yan
Jin Li
Ziwei Liu
Li Lu
Zhongjie Ba
Kui Ren
2024
journals/tifs
Indelible "Footprints" of Inaudible Command Injection.
Zhongjie Ba
Bin Gong
Yuwei Wang
Yuxuan Liu
Peng Cheng
Feng Lin
Li Lu
Kui Ren
2024
journals/tifs
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.
Xinyu Zhang
Qingyu Liu
Zhongjie Ba
Yuan Hong
Tianhang Zheng
Feng Lin
Li Lu
Kui Ren
2024
conf/ccs
TabularMark: Watermarking Tabular Datasets for Machine Learning.
Yihao Zheng
Haocheng Xia
Junyuan Pang
Jinfei Liu
Kui Ren
Lingyang Chu
Yang Cao
Li Xiong
2024
conf/ccs
A Causal Explainable Guardrails for Large Language Models.
Zhixuan Chu
Yan Wang
Longfei Li
Zhibo Wang
Zhan Qin
Kui Ren
2024
conf/ccs
ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach.
Yuke Hu
Jian Lou
Jiaqi Liu
Wangze Ni
Feng Lin
Zhan Qin
Kui Ren
2024
conf/ccs
SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution.
Zhongjie Ba
Jieming Zhong
Jiachen Lei
Peng Cheng
Qinglong Wang
Zhan Qin
Zhibo Wang
Kui Ren
2024
conf/ccs
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning.
Huiyu Xu
Yaopeng Wang
Zhibo Wang
Zhongjie Ba
Wenxin Liu
Lu Jin
Haiqin Weng
Tao Wei
Kui Ren
2024
conf/uss
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
Tiantian Liu
Feng Lin
Zhongjie Ba
Li Lu
Zhan Qin
Kui Ren
2024
conf/uss
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition.
Kun Wang
Xiangyu Xu
Li Lu
Zhongjie Ba
Feng Lin
Kui Ren
2024
conf/uss
FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition.
Shuaifan Jin
He Wang
Zhibo Wang
Feng Xiao
Jiahui Hu
Yuan He
Wenwen Zhang
Zhongjie Ba
Weijie Fang
Shuhong Yuan
Kui Ren
2024
conf/uss
VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel.
Chao Wang
Feng Lin
Hao Yan
Tong Wu
Wenyao Xu
Kui Ren
2024
conf/uss
Devil in the Room: Triggering Audio Backdoors in the Physical World.
Meng Chen
Xiangyu Xu
Li Lu
Zhongjie Ba
Feng Lin
Kui Ren
2024
conf/uss
False Claims against Model Ownership Resolution.
Jian Liu
Rui Zhang
Sebastian Szyller
Kui Ren
N. Asokan
2024
conf/sp
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
Xinyu Zhang
Hanbin Hong
Yuan Hong
Peng Huang
Binghui Wang
Zhongjie Ba
Kui Ren
2024
conf/sp
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification.
Hongwei Yao
Jian Lou
Zhan Qin
Kui Ren
2024
conf/sp
PIRANA: Faster Multi-query PIR via Constant-weight Codes.
Jian Liu
Jingyu Li
Di Wu
Kui Ren
2024
conf/sp
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features.
Peng Cheng
Yuwei Wang
Peng Huang
Zhongjie Ba
Xiaodong Lin
Feng Lin
Li Lu
Kui Ren
2024
conf/eurosp
Practical Constructions for Single Input Functionality Against a Dishonest Majority.
Zhelei Zhou
Bingsheng Zhang
Hong-Sheng Zhou
Kui Ren
2024
conf/ndss
Symphony: Path Validation at Scale.
Anxiao He
Jiandong Fu
Kai Bu
Ruiqi Zhou
Chenlu Miao
Kui Ren
2024
conf/ndss
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token.
Ge Ren
Gaolei Li
Shenghong Li
Libo Chen
Kui Ren
2024
conf/asiacrypt
On the Complexity of Cryptographic Groups and Generic Group Models.
Keyu Ji
Cong Zhang
Taiyu Wang
Bingsheng Zhang
Hong-Sheng Zhou
Xin Wang
Kui Ren
2023
journals/tches
Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts.
Fan Zhang
Run Huang
Tianxiang Feng
Xue Gong
Yulong Tao
Kui Ren
Xinjie Zhao
Shize Guo
2023
journals/tifs
AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake.
Wenyuan Yang
Xiaoyu Zhou
Zhikai Chen
Bofei Guo
Zhongjie Ba
Zhihua Xia
Xiaochun Cao
Kui Ren
2023
journals/tifs
Low Communication Secure Computation From Semi-Trusted Hardware.
Yibiao Lu
Bingsheng Zhang
Kui Ren
2023
journals/tifs
Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling.
Anxiao He
Xiang Li
Jiandong Fu
Haoyu Hu
Kai Bu
Chenlu Miao
Kui Ren
2023
journals/tifs
Multi-Party Private Function Evaluation for RAM.
Keyu Ji
Bingsheng Zhang
Tianpei Lu
Kui Ren
2023
journals/tifs
SAGE: Steering the Adversarial Generation of Examples With Accelerations.
Ziming Zhao
Zhaoxuan Li
Fan Zhang
Ziqi Yang
Shuang Luo
Tingting Li
Rui Zhang
Kui Ren
2023
conf/ccs
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
Liu Liu
Xinwen Fu
Xiaodong Chen
Jianpeng Wang
Zhongjie Ba
Feng Lin
Li Lu
Kui Ren
2023
conf/ccs
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis.
Yiling He
Jian Lou
Zhan Qin
Kui Ren
2023
conf/uss
Demystifying Pointer Authentication on Apple M1.
Zechao Cai
Jiaxun Zhu
Wenbo Shen
Yutian Yang
Rui Chang
Yu Wang
Jinku Li
Kui Ren
2023
conf/sp
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
Tiantian Liu
Feng Lin
Zhangsen Wang
Chao Wang
Zhongjie Ba
Li Lu
Wenyao Xu
Kui Ren
2023
conf/sp
When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel.
Lin Ma
Duoming Zhou
Hanjie Wu
Yajin Zhou
Rui Chang
Hao Xiong
Lei Wu
Kui Ren
2023
conf/ndss
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Peng Huang
Yao Wei
Peng Cheng
Zhongjie Ba
Li Lu
Feng Lin
Fan Zhang
Kui Ren
2023
conf/ndss
MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags.
Xingyu Chen
Zhengxiong Li
Baicheng Chen
Yi Zhu
Chris Xiaoxuan Lu
Zhengyu Peng
Feng Lin
Wenyao Xu
Kui Ren
Chunming Qiao
2023
conf/eurocrypt
Endemic Oblivious Transfer via Random Oracles, Revisited.
Zhelei Zhou
Bingsheng Zhang
Hong-Sheng Zhou
Kui Ren
2022
journals/tches
Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers.
Fan Zhang
Tianxiang Feng
Zhiqi Li
Kui Ren
Xinjie Zhao
2022
journals/tifs
snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning.
Yanbin Wang
Haitao Xu
Zhenhao Guo
Zhan Qin
Kui Ren
2022
journals/tifs
Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection.
Mengnan Zhao
Bo Wang
Wei Wang
Yuqiu Kong
Tianhang Zheng
Kui Ren
2022
journals/tifs
Bool Network: An Open, Distributed, Secure Cross-Chain Notary Platform.
Zeyuan Yin
Bingsheng Zhang
Jingzhong Xu
Kaiyu Lu
Kui Ren
2022
journals/tifs
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN.
Yang Liu
Zhuo Ma
Ximeng Liu
Siqi Ma
Kui Ren
2022
conf/uss
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
Yuan Chen
Jiaqi Li
Guorui Xu
Yajin Zhou
Zhi Wang
Cong Wang
Kui Ren
2022
conf/sp
"Adversarial Examples" for Proof-of-Learning.
Rui Zhang
Jian Liu
Yuan Ding
Zhibo Wang
Qingbiao Wu
Kui Ren
2022
conf/ndss
SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing.
Zhengxiong Li
Baicheng Chen
Xingyu Chen
Huining Li
Chenhan Xu
Feng Lin
Chris Xiaoxuan Lu
Kui Ren
Wenyao Xu
2022
conf/ndss
FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing.
Aditya Singh Rathore
Yijie Shen
Chenhan Xu
Jacob Snyderman
Jinsong Han
Fan Zhang
Zhengxiong Li
Feng Lin
Wenyao Xu
Kui Ren
2022
conf/asiacrypt
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility.
Zhelei Zhou
Bingsheng Zhang
Hong-Sheng Zhou
Kui Ren
2022
conf/acsac
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms.
Yutian Yang
Wenbo Shen
Xun Xie
Kangjie Lu
Mingsen Wang
Tianyu Zhou
Chenggang Qin
Wang Yu
Kui Ren
2021
journals/tifs
Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things.
Sekhar Rajendran
Zhi Sun
Feng Lin
Kui Ren
2021
conf/ccs
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Nanzi Yang
Wenbo Shen
Jinku Li
Yutian Yang
Kangjie Lu
Jietao Xiao
Tianyu Zhou
Chenggang Qin
Wang Yu
Jianfeng Ma
Kui Ren
2021
conf/ccs
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels.
Muhui Jiang
Lin Ma
Yajin Zhou
Qiang Liu
Cen Zhang
Zhi Wang
Xiapu Luo
Lei Wu
Kui Ren
2021
conf/esorics
Succinct Scriptable NIZK via Trusted Hardware.
Bingsheng Zhang
Yuan Chen
Jiaqi Li
Yajin Zhou
Phuc Thai
Hong-Sheng Zhou
Kui Ren
2021
conf/esorics
Zero Knowledge Contingent Payments for Trained Neural Networks.
Zhelei Zhou
Xinle Cao
Jian Liu
Bingsheng Zhang
Kui Ren
2021
conf/esorics
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation.
Yibiao Lu
Bingsheng Zhang
Hong-Sheng Zhou
Weiran Liu
Lei Zhang
Kui Ren
2021
conf/asiaccs
Encrypted Databases: Progresses and Challenges.
Kui Ren
2020
journals/tches
Persistent Fault Attack in Practice.
Fan Zhang
Yiran Zhang
Huilong Jiang
Xiang Zhu
Shivam Bhasin
Xinjie Zhao
Zhe Liu
Dawu Gu
Kui Ren
2020
journals/tifs
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures.
Fan Zhang
Xiaofei Dong
Bolin Yang
Yajin Zhou
Kui Ren
2020
journals/tifs
Atomos: Constant-Size Path Validation Proof.
Anxiao He
Kai Bu
Yucong Li
Eikoh Chida
Qianping Gu
Kui Ren
2020
journals/tifs
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing.
Dong Yuan
Qi Li
Guoliang Li
Qian Wang
Kui Ren
2020
journals/tifs
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs.
Jun Zhou
Zhenfu Cao
Zhan Qin
Xiaolei Dong
Kui Ren
2020
journals/tifs
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
Xiao Chen
Chaoran Li
Derui Wang
Sheng Wen
Jun Zhang
Surya Nepal
Yang Xiang
Kui Ren
2020
conf/ccs
Faster Secure Multiparty Computation of Adaptive Gradient Descent.
Wen-jie Lu
Yixuan Fang
Zhicong Huang
Cheng Hong
Chaochao Chen
Hunter Qu
Yajin Zhou
Kui Ren
2020
conf/ndss
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Zhongjie Ba
Tianhang Zheng
Xinyu Zhang
Zhan Qin
Baochun Li
Xue Liu
Kui Ren
2020
conf/ndss
PhantomCache: Obfuscating Cache Conflicts with Localized Randomization.
Qinhan Tan
Zhihua Zeng
Kai Bu
Kui Ren
2019
journals/tifs
GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy.
Chugui Xu
Ju Ren
Deyu Zhang
Yaoxue Zhang
Zhan Qin
Kui Ren
2019
journals/tifs
CIM: Camera in Motion for Smartphone Authentication.
Zhongjie Ba
Zhan Qin
Xinwen Fu
Kui Ren
2019
conf/ccs
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.
Huayi Duan
Cong Wang
Xingliang Yuan
Yajin Zhou
Qian Wang
Kui Ren
2018
journals/tches
Persistent Fault Analysis on Block Ciphers.
Fan Zhang
Xiaoxuan Lou
Xinjie Zhao
Shivam Bhasin
Wei He
Ruyi Ding
Samiya Qureshi
Kui Ren
2018
journals/compsec
Privacy-preserving power usage and supply control in smart grid.
Hu Chun
Kui Ren
Wei Jiang
2018
conf/ccs
SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction.
Zihao Shan
Zhan Qin
Leslie Ying
Kui Ren
2018
conf/ndss
ABC: Enabling Smartphone Authentication with Built-in Camera.
Zhongjie Ba
Sixu Piao
Xinwen Fu
Dimitrios Koutsonikolas
Aziz Mohaisen
Kui Ren
2017
journals/tifs
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
Zhangjie Fu
Fengxiao Huang
Kui Ren
Jian Weng
Cong Wang
2017
journals/tifs
DPPro: Differentially Private High-Dimensional Data Release via Random Projection.
Chugui Xu
Ju Ren
Yaoxue Zhang
Zhan Qin
Kui Ren
2017
journals/tifs
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data.
Zhangjie Fu
Xinle Wu
Qian Wang
Kui Ren
2017
conf/ccs
Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.
Zhan Qin
Ting Yu
Yin Yang
Issa Khalil
Xiaokui Xiao
Kui Ren
2017
conf/fc
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Qian Wang
Kui Ren
Minxin Du
Qi Li
Aziz Mohaisen
2016
journals/tifs
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.
Jia Yu
Kui Ren
Cong Wang
2016
journals/tifs
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.
Zhangjie Fu
Xinle Wu
Chaowen Guan
Xingming Sun
Kui Ren
2016
journals/tifs
Wireless Physical-Layer Identification: Modeling and Validation.
Wenhao Wang
Zhi Sun
Sixu Piao
Bocheng Zhu
Kui Ren
2016
journals/tifs
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.
Zhihua Xia
Xinhui Wang
Liangao Zhang
Zhan Qin
Xingming Sun
Kui Ren
2016
conf/ccs
Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control.
Heyi Tang
Yong Cui
Chaowen Guan
Jianping Wu
Jian Weng
Kui Ren
2016
conf/ccs
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.
Chen Song
Feng Lin
Zhongjie Ba
Kui Ren
Chi Zhou
Wenyao Xu
2016
conf/ccs
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy.
Zhan Qin
Yin Yang
Ting Yu
Issa Khalil
Xiaokui Xiao
Kui Ren
2016
conf/ccs
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud.
Qian Wang
Jingjun Wang
Shengshan Hu
Qin Zou
Kui Ren
2016
conf/wisa
Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment.
Aziz Mohaisen
Ah Reum Kang
Kui Ren
2015
journals/tifs
Enabling Cloud Storage Auditing With Key-Exposure Resistance.
Jia Yu
Kui Ren
Cong Wang
Vijay Varadharajan
2015
conf/ccs
Enabling IP Protection for Outsourced Integrated Circuit Design.
Xingliang Yuan
Cong Wang
Kui Ren
2015
conf/ccs
Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible.
Haibo Tian
Fangguo Zhang
Kui Ren
2015
conf/ccs
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Qian Wang
Kui Ren
Guancheng Li
Chenbo Xia
Xiaobing Chen
Zhibo Wang
Qin Zou
2015
conf/ccs
Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation.
Rong Cheng
Jingbo Yan
Chaowen Guan
Fangguo Zhang
Kui Ren
2015
conf/ccs
Secure Outsourcing Image Feature Extraction: Challenges and Solutions.
Kui Ren
2015
conf/esorics
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.
Chaowen Guan
Kui Ren
Fangguo Zhang
Florian Kerschbaum
Jia Yu
2015
conf/esorics
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Qian Wang
Shengshan Hu
Kui Ren
Meiqi He
Minxin Du
Zhibo Wang
2014
journals/tifs
Proof-Carrying Cloud Computation: The Case of Convex Optimization.
Zhen Xu
Cong Wang
Kui Ren
Lingyu Wang
Bingsheng Zhang
2014
conf/ccs
Blind Recognition of Touched Keys on Mobile Devices.
Qinggang Yue
Zhen Ling
Xinwen Fu
Benyuan Liu
Kui Ren
Wei Zhao
2014
conf/ccs
POSTER: LocMask: A Location Privacy Protection Framework in Android System.
Qiuyu Xiao
Jiayi Chen
Le Yu
Huaxin Li
Haojin Zhu
Muyuan Li
Kui Ren
2013
journals/tifs
DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems.
Kan Yang
Xiaohua Jia
Kui Ren
Bo Zhang
Ruitao Xie
2013
conf/ccs
Attribute-based fine-grained access control with efficient revocation in cloud storage systems.
Kan Yang
Xiaohua Jia
Kui Ren
2013
conf/fc
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.
Bingsheng Zhang
Helger Lipmaa
Cong Wang
Kui Ren
2013
conf/ndss
How Privacy Leaks From Bluetooth Mouse?
Xian Pan
Zhen Ling
Aniket Pingley
Wei Yu
Kui Ren
Nan Zhang
Xinwen Fu
2013
conf/ndss
OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance.
Cong Wang
Zhen Xu
Kui Ren
Janet Meiling Wang
2010
conf/ccs
Attribute-based signature and its applications.
Jin Li
Man Ho Au
Willy Susilo
Dongqing Xie
Kui Ren
2010
conf/ccs
Attribute based data sharing with attribute revocation.
Shucheng Yu
Cong Wang
Kui Ren
Wenjing Lou
2009
conf/ccs
Anonymous user communication for privacy protection in wireless metropolitan mesh networks.
Zhiguo Wan
Kui Ren
Bo Zhu
Bart Preneel
Ming Gu
2009
conf/esorics
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Qian Wang
Cong Wang
Jin Li
Kui Ren
Wenjing Lou
2008
conf/wisec
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks.
Zhiguo Wan
Kui Ren
Bart Preneel
2004
conf/wisa
Efficient Authenticated Key Agreement Protocol for Dynamic Groups.
Kui Ren
Hyunrok Lee
Kwangjo Kim
Taewhan Yoo
2003
conf/acns
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
Gang Yao
Kui Ren
Feng Bao
Robert H. Deng
Dengguo Feng
Coauthors
Aditya Singh Rathore
(1)
Ah Reum Kang
(1)
Aniket Pingley
(1)
Anxiao He
(3)
Aziz Mohaisen
(3)
Baicheng Chen
(2)
Baochun Li
(1)
Bart Preneel
(2)
Benyuan Liu
(1)
Bin Gong
(1)
Binghui Wang
(1)
Bingsheng Zhang
(16)
Bo Wang
(1)
Bo Zhang
(1)
Bo Zhu
(1)
Bocheng Zhu
(1)
Bofei Guo
(1)
Boheng Li
(1)
Bolin Yang
(1)
Cen Zhang
(1)
Chao Wang
(2)
Chaochao Chen
(1)
Chaoran Li
(1)
Chaowen Guan
(4)
Chen Gong
(1)
Chen Song
(1)
Chenbo Xia
(1)
Cheng Hong
(2)
Chenggang Qin
(2)
Chenhan Xu
(2)
Chenlu Miao
(2)
Chenxu Zhao
(1)
Chi Zhou
(1)
Chongjie Chen
(1)
Chris Xiaoxuan Lu
(2)
Chugui Xu
(2)
Chun Chen
(8)
Chunling Yang
(1)
Chunming Qiao
(1)
Cong Wang
(11)
Cong Zhang
(1)
Dan Li
(1)
Dawu Gu
(1)
Defang Liu
(1)
Dengguo Feng
(1)
Derui Wang
(1)
Deyu Zhang
(1)
Di Wu
(2)
Dimitrios Koutsonikolas
(1)
Dong Yuan
(1)
Dongqing Xie
(1)
Duoming Zhou
(1)
Eikoh Chida
(1)
Fan Zhang
(8)
Fangguo Zhang
(3)
Feng Bao
(1)
Feng Lin
(20)
Feng Xiao
(1)
Fengxiao Huang
(1)
Florian Kerschbaum
(1)
Gang Yao
(1)
Gaolei Li
(1)
Ge Ren
(1)
Guancheng Li
(1)
Guoliang Li
(1)
Guorui Xu
(1)
Haibo Tian
(1)
Haiqin Weng
(1)
Haitao Xu
(1)
Hanbin Hong
(1)
Hanjie Wu
(1)
Hao Kong
(1)
Hao Xiong
(1)
Hao Yan
(2)
Haocheng Xia
(1)
Haojin Zhu
(1)
Haoyu Hu
(1)
He Wang
(1)
Helger Lipmaa
(1)
Heyi Tang
(1)
Hong-Sheng Zhou
(7)
Hongwei Yao
(2)
Hu Chun
(1)
Huaxin Li
(1)
Huayi Duan
(1)
Huilong Jiang
(1)
Huining Li
(1)
Huiyu Xu
(1)
Hunter Qu
(1)
Hyunrok Lee
(1)
Issa Khalil
(2)
Jacob Snyderman
(1)
Janet Meiling Wang
(1)
Jia Yu
(3)
Jiachen Lei
(1)
Jiacheng Du
(1)
Jiadi Yu
(1)
Jiahui Hu
(4)
Jian Liu
(8)
Jian Lou
(4)
Jian Weng
(2)
Jiandong Fu
(2)
Jianfeng Ma
(1)
Jianhua Liu
(1)
Jianpeng Wang
(1)
Jianping Wu
(1)
Jiaqi Li
(2)
Jiaqi Liu
(1)
Jiaqi Sun
(1)
Jiawen Zhang
(1)
Jiawen Zhang
(1)
Jiaxun Zhu
(1)
Jiayi Chen
(1)
Jieming Zhong
(1)
Jietao Xiao
(1)
Jin Li
(2)
Jin Li
(1)
Jinfei Liu
(1)
Jingbo Yan
(1)
Jingjun Wang
(1)
Jingwen Feng
(1)
Jingyu Li
(2)
Jingzhong Xu
(1)
Jinku Li
(2)
Jinsong Han
(1)
Ju Ren
(2)
Jun Zhang
(1)
Jun Zhou
(1)
Junhao Wang
(1)
Junyuan Pang
(1)
Kai Bu
(5)
Kaiyu Lu
(1)
Kan Yang
(2)
Kangjie Lu
(2)
Kejia Chen
(2)
Keyu Ji
(2)
Kui Ren
(129)
Kun Wang
(2)
Kwangjo Kim
(1)
Le Yu
(1)
Lei Wang
(1)
Lei Wu
(2)
Lei Zhang
(1)
Leslie Ying
(1)
Li Lu
(14)
Li Xiong
(1)
Liangao Zhang
(1)
Libo Chen
(1)
Lin Ma
(2)
Lingyang Chu
(1)
Lingyu Wang
(1)
Lipeng He
(3)
Liu Liu
(2)
Longfei Li
(1)
Lu Jin
(1)
Man Ho Au
(1)
Meiqi He
(1)
Meng Chen
(3)
Meng Luo
(1)
Meng Zhang
(1)
Mengnan Zhao
(1)
Ming Gu
(1)
Mingli Song
(1)
Minglu Li
(1)
Mingsen Wang
(1)
Minxin Du
(2)
Muhui Jiang
(1)
Muyuan Li
(1)
N. Asokan
(1)
Nan Zhang
(1)
Nanzi Yang
(1)
Neil Gong
(1)
Peng Cheng
(4)
Peng Huang
(3)
Peng Sun
(2)
Phuc Thai
(1)
Qi Li
(2)
Qian Wang
(8)
Qiang Liu
(1)
Qianniu Chen
(1)
Qianping Gu
(1)
Qin Zou
(2)
Qingbiao Wu
(1)
Qinggang Yue
(1)
Qinglong Wang
(1)
Qingyu Liu
(1)
Qinhan Tan
(1)
Qiuyu Xiao
(1)
Robert H. Deng
(1)
Rong Cheng
(1)
Rui Chang
(2)
Rui Zhang
(1)
Rui Zhang
(2)
Rui Zheng
(1)
Ruiqi Zhou
(1)
Ruitao Xie
(1)
Run Huang
(1)
Ruyi Ding
(1)
Samiya Qureshi
(1)
Sebastian Szyller
(1)
Sekhar Rajendran
(1)
Shaoke Xi
(1)
Sheng Wen
(1)
Shenghong Li
(1)
Shengshan Hu
(2)
Shivam Bhasin
(2)
Shize Guo
(1)
Shoupeng Ren
(1)
Shuaifan Jin
(1)
Shuang Luo
(1)
Shucheng Yu
(1)
Shuhong Yuan
(1)
Shuo Shao
(1)
Shuya Feng
(1)
Siqi Ma
(1)
Sixu Piao
(2)
Surya Nepal
(1)
Taewhan Yoo
(1)
Taiyu Wang
(1)
Tao Wei
(3)
Tianhang Zheng
(3)
Tianhao Wang
(1)
Tianpei Lu
(3)
Tiantian Liu
(2)
Tianxiang Feng
(2)
Tianyi Fu
(1)
Tianyu Zhou
(2)
Ting Yu
(2)
Tingting Li
(1)
Tong Wu
(1)
Vijay Varadharajan
(1)
Wang Yu
(2)
Wangze Ni
(1)
Wei Dong
(1)
Wei He
(1)
Wei Jiang
(1)
Wei Wang
(1)
Wei Yu
(1)
Wei Zhao
(1)
Weijie Fang
(1)
Weiran Liu
(1)
Wen-jie Lu
(3)
Wenbo Shen
(3)
Wenguang Chen
(1)
Wenhao Wang
(1)
Wenjing Lou
(2)
Wenwen Zhang
(1)
Wenxin Liu
(1)
Wenyao Xu
(6)
Wenyuan Yang
(1)
Wenzhi Chen
(1)
Willy Susilo
(1)
Wu Wen
(1)
Xian Pan
(1)
Xiang Li
(1)
Xiang Zhu
(1)
Xiangyu Xu
(2)
Xiao Chen
(1)
Xiaobing Chen
(1)
Xiaochen Li
(1)
Xiaochun Cao
(1)
Xiaodong Chen
(1)
Xiaodong Lin
(1)
Xiaofei Dong
(1)
Xiaohu Yang
(2)
Xiaohua Jia
(2)
Xiaokui Xiao
(2)
Xiaolei Dong
(1)
Xiaoxuan Lou
(1)
Xiaoyang Hou
(1)
Xiaoyi Pang
(2)
Xiaoyu Zhou
(1)
Xiaoyuan Zhang
(2)
Xiapu Luo
(1)
Ximeng Liu
(1)
Xin Kang
(1)
Xin Wang
(2)
Xingliang Yuan
(2)
Xingming Sun
(2)
Xingyu Chen
(2)
Xinhui Wang
(1)
Xinjie Zhao
(4)
Xinle Cao
(1)
Xinle Wu
(2)
Xinpeng Yang
(1)
Xinwen Fu
(5)
Xinyu Zhang
(3)
Xue Gong
(1)
Xue Liu
(1)
Xun Xie
(1)
Yajin Zhou
(7)
Yan Wang
(1)
Yanbin Wang
(1)
Yang Cao
(1)
Yang Liu
(2)
Yang Xiang
(1)
Yang Zhang
(1)
Yao Wei
(1)
Yaopeng Wang
(1)
Yaoxue Zhang
(2)
Yi Zhu
(1)
Yibiao Lu
(3)
Yihao Zheng
(1)
Yijie Shen
(1)
Yiling He
(2)
Yiming Li
(2)
Yin Yang
(2)
Yinggui Wang
(1)
Yinghao Wang
(1)
Yiran Zhang
(1)
Yixuan Fang
(1)
Yiyi Zhou
(1)
Yong Cui
(1)
Yongsheng Shen
(1)
Yu He
(1)
Yu Wang
(1)
Yuan Chen
(2)
Yuan Ding
(1)
Yuan He
(1)
Yuan Hong
(3)
Yucong Li
(1)
Yuhan Wu
(1)
Yuke Hu
(2)
Yulong Tao
(1)
Yuman Bai
(1)
Yuqiu Kong
(1)
Yutian Yang
(3)
Yuwei Wang
(2)
Yuxuan Liu
(1)
Zechao Cai
(1)
Zeyuan Yin
(1)
Zhan Qin
(20)
Zhangjie Fu
(3)
Zhangsen Wang
(1)
Zhaoxuan Li
(1)
Zhe Liu
(1)
Zhelei Zhou
(5)
Zhen Gu
(1)
Zhen Ling
(2)
Zhen Xu
(2)
Zhenfu Cao
(1)
Zheng Li
(1)
Zheng Yan
(1)
Zhengxiong Li
(3)
Zhengyu Peng
(1)
Zhenhao Guo
(1)
Zhi Sun
(2)
Zhi Wang
(2)
Zhibo Wang
(11)
Zhicong Huang
(2)
Zhiguo Wan
(2)
Zhihao Liu
(1)
Zhihua Chang
(1)
Zhihua Xia
(2)
Zhihua Zeng
(1)
Zhikai Chen
(1)
Zhiqi Li
(1)
Zhixuan Chu
(1)
Zhongjie Ba
(23)
Zhou Ma
(1)
Zhuo Ma
(2)
Zihao Shan
(1)
Ziming Zhao
(1)
Ziqi Yang
(1)
Ziwei Liu
(1)
Zunlei Feng
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to