What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Wenjing Lou
Google Scholar
45
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction.
Shanghao Shi
Ning Wang
Yang Xiao
Chaoyu Zhang
Yi Shi
Y. Thomas Hou
Wenjing Lou
2025
conf/esorics
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks.
Md Hasan Shahriar
Ning Wang
Naren Ramakrishnan
Y. Thomas Hou
Wenjing Lou
2024
conf/asiaccs
TriSAS: Toward Dependable Inter-SAS Coordination with Auditability.
Shanghao Shi
Yang Xiao
Changlai Du
Yi Shi
Chonggang Wang
Robert Gazda
Y. Thomas Hou
Eric William Burger
Luiz A. DaSilva
Wenjing Lou
2024
conf/ndss
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials.
Hexuan Yu
Changlai Du
Yang Xiao
Angelos D. Keromytis
Chonggang Wang
Robert Gazda
Y. Thomas Hou
Wenjing Lou
2024
conf/icbc2
SoK: Public Blockchain Sharding.
Md Mohaimin Al Barat
Shaoyu Li
Changlai Du
Y. Thomas Hou
Wenjing Lou
2023
conf/uss
UCBlocker: Unwanted Call Blocking Using Anonymous Authentication.
Changlai Du
Hexuan Yu
Yang Xiao
Y. Thomas Hou
Angelos D. Keromytis
Wenjing Lou
2023
conf/uss
ARI: Attestation of Real-time Mission Execution Integrity.
Jinwen Wang
Yujie Wang
Ao Li
Yang Xiao
Ruide Zhang
Wenjing Lou
Y. Thomas Hou
Ning Zhang
2023
conf/esorics
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities.
Shaoyu Li
Shanghao Shi
Yang Xiao
Chaoyu Zhang
Y. Thomas Hou
Wenjing Lou
2023
conf/wisec
Fortifying Your Defenses: Techniques to Thwart Adversarial Attacks and Boost Performance of Machine Learning-Based Intrusion Detection Systems.
Wenjing Lou
2023
conf/wisec
MS-PTP: Protecting Network Timing from Byzantine Attacks.
Shanghao Shi
Yang Xiao
Changlai Du
Md Hasan Shahriar
Ao Li
Ning Zhang
Y. Thomas Hou
Wenjing Lou
2022
conf/asiaccs
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations.
Ning Wang
Yang Xiao
Yimin Chen
Yang Hu
Wenjing Lou
Y. Thomas Hou
2022
conf/cns
Transferability of Adversarial Examples in Machine Learning-based Malware Detection.
Yang Hu
Ning Wang
Yimin Chen
Wenjing Lou
Y. Thomas Hou
2022
conf/acsac
Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning.
Ning Wang
Yang Xiao
Yimin Chen
Ning Zhang
Wenjing Lou
Y. Thomas Hou
2020
conf/esorics
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
Yang Xiao
Ning Zhang
Jin Li
Wenjing Lou
Y. Thomas Hou
2020
conf/acsac
Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication.
Yang Xiao
Shanghao Shi
Ning Zhang
Wenjing Lou
Y. Thomas Hou
2019
journals/tifs
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT.
Yaxing Chen
Wenhai Sun
Ning Zhang
Qinghua Zheng
Wenjing Lou
Y. Thomas Hou
2018
journals/tifs
Memory Forensic Challenges Under Misused Architectural Features.
Ning Zhang
Ruide Zhang
Kun Sun
Wenjing Lou
Y. Thomas Hou
Sushil Jajodia
2018
conf/esorics
Efficient and Secure Outsourcing of Differentially Private Data Publication.
Jin Li
Heng Ye
Wei Wang
Wenjing Lou
Y. Thomas Hou
Jiqiang Liu
Rongxing Lu
2018
conf/esorics
PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution.
Ning Zhang
Jin Li
Wenjing Lou
Y. Thomas Hou
2018
conf/cns
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup.
Wenhai Sun
Ning Zhang
Wenjing Lou
Y. Thomas Hou
2018
conf/cns
ROSTER: Radio Context Attestation in Cognitive Radio Network.
Ning Zhang
Wenhai Sun
Wenjing Lou
Y. Thomas Hou
Wade Trappe
2017
journals/tifs
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources.
Wei Song
Bing Wang
Qian Wang
Chengliang Shi
Wenjing Lou
Zhiyong Peng
2017
journals/tifs
Secure and Efficient Cloud Data Deduplication With Randomized Tag.
Tao Jiang
Xiaofeng Chen
Qianhong Wu
Jianfeng Ma
Willy Susilo
Wenjing Lou
2017
conf/cns
Black penguin: On the feasibility of detecting intrusion with homogeneous memory.
Ning Zhang
Ruide Zhang
Qiben Yan
Wenjing Lou
Y. Thomas Hou
Danfeng Yao
2016
journals/tifs
Jamming Resilient Communication Using MIMO Interference Cancellation.
Qiben Yan
Huacheng Zeng
Tingting Jiang
Ming Li
Wenjing Lou
Yiwei Thomas Hou
2016
conf/ccs
Looks Good To Me: Authentication for Augmented Reality.
Ethan Gaebel
Ning Zhang
Wenjing Lou
Y. Thomas Hou
2016
conf/acisp
Towards Efficient Fully Randomized Message-Locked Encryption.
Tao Jiang
Xiaofeng Chen
Qianhong Wu
Jianfeng Ma
Willy Susilo
Wenjing Lou
2016
conf/sp
CaSE: Cache-Assisted Secure Execution on ARM Processors.
Ning Zhang
Kun Sun
Wenjing Lou
Yiwei Thomas Hou
2016
conf/eurosp
CacheKit: Evading Memory Introspection Using Cache Incoherence.
Ning Zhang
He Sun
Kun Sun
Wenjing Lou
Yiwei Thomas Hou
2016
conf/wisec
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
Yao Zheng
Matthias Schulz
Wenjing Lou
Y. Thomas Hou
Matthias Hollick
2015
journals/tifs
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
Xiaofeng Chen
Xinyi Huang
Jin Li
Jianfeng Ma
Wenjing Lou
Duncan S. Wong
2015
conf/ccs
Now You See Me: Hide and Seek in Physical Address Space.
Ning Zhang
Kun Sun
Wenjing Lou
Yiwei Thomas Hou
Sushil Jajodia
2015
conf/esorics
Privacy-Preserving Link Prediction in Decentralized Online Social Networks.
Yao Zheng
Bing Wang
Wenjing Lou
Yiwei Thomas Hou
2015
conf/cns
Modeling the side-channel attacks in data deduplication with game theory.
Bing Wang
Wenjing Lou
Y. Thomas Hou
2014
conf/acisp
A Secure Three-Party Computational Protocol for Triangle Area.
Liang Liu
Xiaofeng Chen
Wenjing Lou
2014
conf/esorics
Verifiable Computation over Large Database with Incremental Updates.
Xiaofeng Chen
Jin Li
Jian Weng
Jianfeng Ma
Wenjing Lou
2014
conf/cns
Enabling Trusted Data-intensive execution in cloud computing.
Ning Zhang
Wenjing Lou
Xuxian Jiang
Y. Thomas Hou
2013
journals/tifs
Proximity-Based Security Techniques for Mobile Users in Wireless Networks.
Liang Xiao
Qiben Yan
Wenjing Lou
Guiquan Chen
Y. Thomas Hou
2013
conf/ccs
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Wenhai Sun
Bing Wang
Ning Cao
Ming Li
Wenjing Lou
Y. Thomas Hou
Hui Li
2013
conf/esorics
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Jin Li
Xiaofeng Chen
Jingwei Li
Chunfu Jia
Jianfeng Ma
Wenjing Lou
2013
conf/cns
Welcome message.
Sushil Jajodia
Wenjing Lou
Wade Trappe
2012
conf/esorics
New Algorithms for Secure Outsourcing of Modular Exponentiations.
Xiaofeng Chen
Jin Li
Jianfeng Ma
Qiang Tang
Wenjing Lou
2012
conf/esorics
SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags.
Yao Zheng
Ming Li
Wenjing Lou
Y. Thomas Hou
2010
conf/ccs
Attribute based data sharing with attribute revocation.
Shucheng Yu
Cong Wang
Kui Ren
Wenjing Lou
2009
conf/esorics
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Qian Wang
Cong Wang
Jin Li
Kui Ren
Wenjing Lou
Coauthors
Angelos D. Keromytis
(2)
Ao Li
(2)
Bing Wang
(4)
Changlai Du
(5)
Chaoyu Zhang
(2)
Chengliang Shi
(1)
Chonggang Wang
(2)
Chunfu Jia
(1)
Cong Wang
(2)
Danfeng Yao
(1)
Duncan S. Wong
(1)
Eric William Burger
(1)
Ethan Gaebel
(1)
Guiquan Chen
(1)
He Sun
(1)
Heng Ye
(1)
Hexuan Yu
(2)
Huacheng Zeng
(1)
Hui Li
(1)
Jian Weng
(1)
Jianfeng Ma
(6)
Jin Li
(8)
Jingwei Li
(1)
Jinwen Wang
(1)
Jiqiang Liu
(1)
Kui Ren
(2)
Kun Sun
(4)
Liang Liu
(1)
Liang Xiao
(1)
Luiz A. DaSilva
(1)
Matthias Hollick
(1)
Matthias Schulz
(1)
Md Hasan Shahriar
(2)
Md Mohaimin Al Barat
(1)
Ming Li
(3)
Naren Ramakrishnan
(1)
Ning Cao
(1)
Ning Wang
(5)
Ning Zhang
(16)
Qian Wang
(2)
Qiang Tang
(1)
Qianhong Wu
(2)
Qiben Yan
(3)
Qinghua Zheng
(1)
Robert Gazda
(2)
Rongxing Lu
(1)
Ruide Zhang
(3)
Shanghao Shi
(5)
Shaoyu Li
(2)
Shucheng Yu
(1)
Sushil Jajodia
(3)
Tao Jiang
(2)
Tingting Jiang
(1)
Wade Trappe
(2)
Wei Song
(1)
Wei Wang
(1)
Wenhai Sun
(4)
Wenjing Lou
(45)
Willy Susilo
(2)
Xiaofeng Chen
(7)
Xinyi Huang
(1)
Xuxian Jiang
(1)
Y. Thomas Hou
(28)
Yang Hu
(2)
Yang Xiao
(11)
Yao Zheng
(3)
Yaxing Chen
(1)
Yi Shi
(2)
Yimin Chen
(3)
Yiwei Thomas Hou
(5)
Yujie Wang
(1)
Zhiyong Peng
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to