What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kun He
Google Scholar
25
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Volia: An Efficient and Light Asynchronous BFT Protocol.
Hao Yang
Jing Chen
Kewen Pan
Kun He
Meng Jia
Ruiying Du
2025
journals/tifs
SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes.
Xiping Sun
Jing Chen
Kun He
Zhixiang He
Ruiying Du
Yebo Feng
Qingchuan Zhao
Cong Wu
2025
journals/tifs
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
Ruichao Liang
Jing Chen
Cong Wu
Kun He
Yueming Wu
Ruochen Cao
Ruiying Du
Ziming Zhao
Yang Liu
2025
journals/tifs
Forward and Backward Private Conjunctive Dynamic Searchable Symmetric Encryption With Refined Leakage Function and Low Communication.
Beining Wang
Yinuo Li
Jing Chen
Kun He
Meng Jia
Ruiying Du
2025
journals/tifs
Boreas: Fully Anonymous Sealed-Bid Auction.
Erjun Zhou
Jing Chen
Min Shi
Zhengdi Huang
Meng Jia
Kun He
Ruiying Du
2025
journals/tifs
Multi-Authority Anonymous Credentials With Efficient and Decentralized Supervision.
Meng Jia
Jing Chen
Yuanzheng Wang
Kun He
Min Shi
Ruiying Du
2025
journals/istr
An auditable and privacy-preserving user-controllable group signature scheme in blockchain.
Ao Liu
Jing Chen
Shixiong Yao
Kun He
Ruiying Du
2025
journals/tifs
Lightweight Dynamic Conjunctive Keyword Searchable Encryption With Result Pattern Hiding.
Chenbin Zhao
Ruiying Du
Jing Chen
Kun He
Ximeng Liu
Yang Xiang
2025
conf/uss
When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems.
Haolin Wu
Chang Liu
Jing Chen
Ruiying Du
Kun He
Yu Zhang
Cong Wu
Tianwei Zhang
Qing Guo
Jie Zhang
2025
conf/uss
EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models.
Nan Yan
Yuqing Li
Xiong Wang
Jing Chen
Kun He
Bo Li
2024
journals/compsec
Model-agnostic adversarial example detection via high-frequency amplification.
Qiao Li
Jing Chen
Kun He
Zijun Zhang
Ruiying Du
Jisi She
Xinxin Wang
2024
journals/compsec
Corrigendum to "Model-agnostic Adversarial Example Detection via High-Frequency Amplification" [Computers & Security, Volume 141, June 2024, 103791].
Qiao Li
Jing Chen
Kun He
Zijun Zhang
Ruiying Du
Jisi She
Xinxin Wang
2024
journals/tifs
Fregata: Fast Private Inference With Unified Secure Two-Party Protocols.
Xuanang Yang
Jing Chen
Yuqing Li
Kun He
Xiaojie Huang
Zikuan Jiang
Hao Bai
Ruiying Du
2024
journals/tifs
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation.
Meng Jia
Jing Chen
Kun He
Min Shi
Yuanzheng Wang
Ruiying Du
2024
journals/tifs
MaskAuct: Seller-Autonomous Auction With Bidder Anonymity and Bidding Confidentiality.
Siqin Li
Kun He
Jing Chen
Min Shi
Meng Jia
Ruiying Du
Ling Han
2024
journals/tifs
Rethinking Membership Inference Attacks Against Transfer Learning.
Cong Wu
Jing Chen
Qianru Fang
Kun He
Ziming Zhao
Hao Ren
Guowen Xu
Yang Liu
Yang Xiang
2024
conf/ccs
TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning.
Cong Wu
Jing Chen
Ziming Zhao
Kun He
Guowen Xu
Yueming Wu
Haijun Wang
Hongwei Li
Yang Liu
Yang Xiang
2023
journals/tifs
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks.
Xuanang Yang
Jing Chen
Kun He
Hao Bai
Cong Wu
Ruiying Du
2023
conf/uss
Formal Analysis and Patching of BLE-SC Pairing.
Min Shi
Jing Chen
Kun He
Haoran Zhao
Meng Jia
Ruiying Du
2022
journals/tifs
Redactable Blockchain From Decentralized Chameleon Hash Functions.
Meng Jia
Jing Chen
Kun He
Ruiying Du
Li Zheng
Mingxi Lai
Donghui Wang
Fei Liu
2022
conf/ccs
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Cong Wu
Jing Chen
Kun He
Ziming Zhao
Ruiying Du
Chen Zhang
2021
journals/tifs
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost.
Kun He
Jing Chen
Qinxi Zhou
Ruiying Du
Yang Xiang
2021
conf/ccs
Biometrics-Authenticated Key Exchange for Secure Messaging.
Mei Wang
Kun He
Jing Chen
Zengpeng Li
Wei Zhao
Ruiying Du
2021
conf/icics
HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors.
Jing Chen
Peidong Jiang
Kun He
Cheng Zeng
Ruiying Du
2020
conf/uss
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Cong Wu
Kun He
Jing Chen
Ziming Zhao
Ruiying Du
Coauthors
Ao Liu
(1)
Beining Wang
(1)
Bo Li
(1)
Chang Liu
(1)
Chen Zhang
(1)
Chenbin Zhao
(1)
Cheng Zeng
(1)
Cong Wu
(8)
Donghui Wang
(1)
Erjun Zhou
(1)
Fei Liu
(1)
Guowen Xu
(2)
Haijun Wang
(1)
Hao Bai
(2)
Hao Ren
(1)
Hao Yang
(1)
Haolin Wu
(1)
Haoran Zhao
(1)
Hongwei Li
(1)
Jie Zhang
(1)
Jing Chen
(25)
Jisi She
(2)
Kewen Pan
(1)
Kun He
(25)
Li Zheng
(1)
Ling Han
(1)
Mei Wang
(1)
Meng Jia
(8)
Min Shi
(5)
Mingxi Lai
(1)
Nan Yan
(1)
Peidong Jiang
(1)
Qianru Fang
(1)
Qiao Li
(2)
Qing Guo
(1)
Qingchuan Zhao
(1)
Qinxi Zhou
(1)
Ruichao Liang
(1)
Ruiying Du
(22)
Ruochen Cao
(1)
Shixiong Yao
(1)
Siqin Li
(1)
Tianwei Zhang
(1)
Wei Zhao
(1)
Xiaojie Huang
(1)
Ximeng Liu
(1)
Xinxin Wang
(2)
Xiong Wang
(1)
Xiping Sun
(1)
Xuanang Yang
(2)
Yang Liu
(3)
Yang Xiang
(4)
Yebo Feng
(1)
Yinuo Li
(1)
Yu Zhang
(1)
Yuanzheng Wang
(2)
Yueming Wu
(2)
Yuqing Li
(2)
Zengpeng Li
(1)
Zhengdi Huang
(1)
Zhixiang He
(1)
Zijun Zhang
(2)
Zikuan Jiang
(1)
Ziming Zhao
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to