default search action
Ruiying Du
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Qiao Li, Jing Chen, Kun He, Zijun Zhang, Ruiying Du, Jisi She, Xinxin Wang:
Model-agnostic adversarial example detection via high-frequency amplification. Comput. Secur. 141: 103791 (2024) - [j37]Qiao Li, Jing Chen, Kun He, Zijun Zhang, Ruiying Du, Jisi She, Xinxin Wang:
Corrigendum to "Model-agnostic Adversarial Example Detection via High-Frequency Amplification" [Computers & Security, Volume 141, June 2024, 103791]. Comput. Secur. 146: 104006 (2024) - [j36]Meng Jia, Jing Chen, Kun He, Min Shi, Yuanzheng Wang, Ruiying Du:
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation. IEEE Trans. Inf. Forensics Secur. 19: 2549-2564 (2024) - [j35]Siqin Li, Kun He, Jing Chen, Min Shi, Meng Jia, Ruiying Du, Ling Han:
MaskAuct: Seller-Autonomous Auction With Bidder Anonymity and Bidding Confidentiality. IEEE Trans. Inf. Forensics Secur. 19: 7853-7865 (2024) - [j34]Xuanang Yang, Jing Chen, Yuqing Li, Kun He, Xiaojie Huang, Zikuan Jiang, Hao Bai, Ruiying Du:
Fregata: Fast Private Inference With Unified Secure Two-Party Protocols. IEEE Trans. Inf. Forensics Secur. 19: 8472-8484 (2024) - [j33]Yangyang Gu, Jing Chen, Kun He, Cong Wu, Ziming Zhao, Ruiying Du:
WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices. IEEE Trans. Mob. Comput. 23(6): 6997-7011 (2024) - [j32]Mei Wang, Jing Chen, Kun He, Ruozhou Yu, Ruiying Du, Zhihao Qian:
UFinAKA: Fingerprint-Based Authentication and Key Agreement With Updatable Blind Credentials. IEEE/ACM Trans. Netw. 32(2): 1110-1123 (2024) - [c24]Ruichao Liang, Jing Chen, Kun He, Yueming Wu, Gelei Deng, Ruiying Du, Cong Wu:
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG). ICSE 2024: 64:1-64:12 - [i8]Xiping Sun, Jing Chen, Cong Wu, Kun He, Haozhe Xu, Yebo Feng, Ruiying Du, Xianhao Chen:
MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones. CoRR abs/2404.01106 (2024) - [i7]Xinyu Liang, Ruiying Du, Jing Chen, Yu Zhang, Meng Jia, Shuangxi Cao, Yufeng Wei, Shixiong Yao:
A Distributed Scalable Cross-chain State Channel Scheme Based on Recursive State Synchronization. CoRR abs/2404.09408 (2024) - [i6]Xiping Sun, Jing Chen, Kun He, Zhixiang He, Ruiying Du, Yebo Feng, Qingchuan Zhao, Cong Wu:
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing. CoRR abs/2404.15000 (2024) - [i5]Haolin Wu, Jing Chen, Ruiying Du, Cong Wu, Kun He, Xingcan Shang, Hao Ren, Guowen Xu:
CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning. CoRR abs/2404.15854 (2024) - [i4]Haozhe Xu, Cong Wu, Yangyang Gu, Xingcan Shang, Jing Chen, Kun He, Ruiying Du:
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems. CoRR abs/2405.17100 (2024) - [i3]Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Weisong Sun, Ruiying Du, Qingchuan Zhao, Yang Liu:
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph. CoRR abs/2406.00921 (2024) - [i2]Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Ruochen Cao, Ruiying Du, Yang Liu, Ziming Zhao:
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing. CoRR abs/2408.10116 (2024) - [i1]Qiao Li, Cong Wu, Jing Chen, Zijun Zhang, Kun He, Ruiying Du, Xinxin Wang, Qingchuang Zhao, Yang Liu:
Privacy-preserving Universal Adversarial Defense for Black-box Models. CoRR abs/2408.10647 (2024) - 2023
- [j31]Yangyang Gu, Jing Chen, Cong Wu, Kun He, Ziming Zhao, Ruiying Du:
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(4): 160:1-160:24 (2023) - [j30]Xuanang Yang, Jing Chen, Kun He, Hao Bai, Cong Wu, Ruiying Du:
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks. IEEE Trans. Inf. Forensics Secur. 18: 4815-4829 (2023) - [c23]Ran Yan, Ruiying Du, Kun He, Jing Chen:
Efficient Adversarial Training with Membership Inference Resistance. PRCV (1) 2023: 474-486 - [c22]Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du:
Formal Analysis and Patching of BLE-SC Pairing. USENIX Security Symposium 2023: 37-52 - 2022
- [j29]Mei Wang, Kun He, Jing Chen, Ruiying Du, Bingsheng Zhang, Zengpeng Li:
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices. Future Gener. Comput. Syst. 131: 28-42 (2022) - [j28]Xinyu Liang, Jing Chen, Ruiying Du, Tianrui Zhao:
Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification. KSII Trans. Internet Inf. Syst. 16(8): 2507-2528 (2022) - [j27]Jing Chen, Xin Chen, Kun He, Ruiying Du, Weihang Chen, Yang Xiang:
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel. IEEE Trans. Dependable Secur. Comput. 19(5): 3286-3300 (2022) - [j26]Jing Chen, Zeyi Zhan, Kun He, Ruiying Du, Donghui Wang, Fei Liu:
XAuth: Efficient Privacy-Preserving Cross-Domain Authentication. IEEE Trans. Dependable Secur. Comput. 19(5): 3301-3311 (2022) - [j25]Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du:
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors. IEEE Trans. Dependable Secur. Comput. 19(6): 4002-4018 (2022) - [j24]Meng Jia, Jing Chen, Kun He, Ruiying Du, Li Zheng, Mingxi Lai, Donghui Wang, Fei Liu:
Redactable Blockchain From Decentralized Chameleon Hash Functions. IEEE Trans. Inf. Forensics Secur. 17: 2771-2783 (2022) - [c21]Cong Wu, Jing Chen, Kun He, Ziming Zhao, Ruiying Du, Chen Zhang:
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. CCS 2022: 2931-2945 - 2021
- [j23]Jing Chen, Jiong Chen, Kun He, Ruiying Du:
SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures. Future Gener. Comput. Syst. 115: 448-458 (2021) - [j22]Jing Chen, Chiheng Wang, Kun He, Ziming Zhao, Min Chen, Ruiying Du, Gail-Joon Ahn:
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps. IEEE Trans. Dependable Secur. Comput. 18(1): 15-29 (2021) - [j21]Kun He, Jing Chen, Quan Yuan, Shouling Ji, Debiao He, Ruiying Du:
Dynamic Group-Oriented Provable Data Possession in the Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1394-1408 (2021) - [j20]Kun He, Jing Chen, Qinxi Zhou, Ruiying Du, Yang Xiang:
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost. IEEE Trans. Inf. Forensics Secur. 16: 1538-1549 (2021) - [c20]Mei Wang, Kun He, Jing Chen, Zengpeng Li, Wei Zhao, Ruiying Du:
Biometrics-Authenticated Key Exchange for Secure Messaging. CCS 2021: 2618-2631 - [c19]Jing Chen, Peidong Jiang, Kun He, Cheng Zeng, Ruiying Du:
HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors. ICICS (1) 2021: 136-152 - [c18]Meng Jia, Kun He, Jing Chen, Ruiying Du, Weihang Chen, Zhihong Tian, Shouling Ji:
PROCESS: Privacy-Preserving On-Chain Certificate Status Service. INFOCOM 2021: 1-10 - 2020
- [j19]Jiping Li, Ning Zhang, Jianbing Ni, Jing Chen, Ruiying Du:
Secure and Lightweight Authentication With Key Agreement for Smart Wearable Systems. IEEE Internet Things J. 7(8): 7334-7344 (2020) - [j18]Cong Wu, Kun He, Jing Chen, Ruiying Du, Yang Xiang:
CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake. IEEE Internet Things J. 7(12): 11420-11430 (2020) - [j17]Jiong Chen, Kun He, Jing Chen, Yingying Fang, Ruiying Du:
PowerPrint: Identifying Smartphones through Power Consumption of the Battery. Secur. Commun. Networks 2020: 3893106:1-3893106:13 (2020) - [j16]Jing Chen, Kun He, Lan Deng, Quan Yuan, Ruiying Du, Yang Xiang, Jie Wu:
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data. IEEE Trans. Serv. Comput. 13(6): 1072-1085 (2020) - [c17]Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du:
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. USENIX Security Symposium 2020: 2219-2236
2010 – 2019
- 2019
- [j15]Shixiong Yao, Jing Chen, Kun He, Ruiying Du, Tianqing Zhu, Xin Chen:
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management. IEEE Access 7: 6117-6128 (2019) - [c16]Cong Wu, Kun He, Jing Chen, Ruiying Du:
ICAuth: Implicit and Continuous Authentication When the Screen Is Awake. ICC 2019: 1-6 - 2018
- [j14]Jing Chen, Chiheng Wang, Ziming Zhao, Kai Chen, Ruiying Du, Gail-Joon Ahn:
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. IEEE Trans. Inf. Forensics Secur. 13(5): 1286-1300 (2018) - [j13]Jing Chen, Kun He, Quan Yuan, Min Chen, Ruiying Du, Yang Xiang:
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services. IEEE Trans. Mob. Comput. 17(11): 2524-2535 (2018) - [c15]Jing Chen, Shixiong Yao, Quan Yuan, Kun He, Shouling Ji, Ruiying Du:
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections. INFOCOM 2018: 2060-2068 - 2017
- [j12]Kun He, Jing Chen, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure independent-update concise-expression access control for video on demand in cloud. Inf. Sci. 387: 75-89 (2017) - [j11]Jing Chen, Kun He, Quan Yuan, Guoliang Xue, Ruiying Du, Lina Wang:
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks. IEEE Trans. Mob. Comput. 16(6): 1530-1543 (2017) - [c14]Jing Chen, Yingying Fang, Kun He, Ruiying Du:
Charge-Depleting of the Batteries Makes Smartphones Recognizable. ICPADS 2017: 33-40 - [c13]Jing Chen, Shixiong Yao, Quan Yuan, Ruiying Du, Guoliang Xue:
Checks and balances: A tripartite public key infrastructure for secure web-based connections. INFOCOM 2017: 1-9 - 2016
- [j10]Jing Chen, Kun He, Quan Yuan, Ruiying Du, Lina Wang, Jie Wu:
Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks. Comput. Networks 105: 194-206 (2016) - [j9]Jing Chen, Kun He, Ruiying Du, Fajiang Yu, Quan Yuan, Lina Wang, Cai Fu:
A multi-objective optimization model based on immune algorithm in wireless mesh networks. Int. J. Commun. Syst. 29(1): 155-169 (2016) - [j8]Jing Chen, Lihong Zhang, Kun He, Min Chen, Ruiying Du, Lina Wang:
Message-locked proof of ownership and retrievability with remote repairing in cloud. Secur. Commun. Networks 9(16): 3452-3466 (2016) - [j7]Shungan Zhou, Ruiying Du, Jing Chen, Debiao He, Hua Deng:
ESDR: an efficient and secure data repairing paradigm in cloud storage. Secur. Commun. Networks 9(16): 3646-3657 (2016) - [j6]Jing Chen, Bowen Zhang, Min Chen, Quan Yuan, Ruiying Du:
A γ-Strawman privacy-preserving scheme in weighted social networks. Secur. Commun. Networks 9(18): 5625-5638 (2016) - [j5]Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang:
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments. IEEE Trans. Computers 65(12): 3631-3645 (2016) - 2015
- [j4]Jing Chen, Kun He, Ruiying Du, Minghui Zheng, Yang Xiang, Quan Yuan:
Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks. IEEE Trans. Parallel Distributed Syst. 26(2): 423-433 (2015) - [c12]Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du:
Game-theory-based batch identification of invalid signatures in wireless mobile networks. INFOCOM 2015: 262-270 - [c11]Jing Chen, Quan Yuan, Ruiying Du, Jie Wu:
MuCAR: A greedy multi-flow-based coding-aware routing in wireless networks. SECON 2015: 310-318 - [c10]Jing Chen, Yuling Peng, Ruiying Du, Quan Yuan, Minghui Zheng:
Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud Storage. TrustCom/BigDataSE/ISPA (1) 2015: 143-150 - 2014
- [c9]Shixiong Yao, Jing Chen, Ruiying Du, Lan Deng, Chiheng Wang:
A Survey of Security Network Coding toward Various Attacks. TrustCom 2014: 252-259 - [c8]Yu Zhang, Jing Chen, Ruiying Du, Lan Deng, Yang Xiang, Qing Zhou:
FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. TrustCom 2014: 310-319 - [c7]Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng:
Proofs of Ownership and Retrievability in Cloud Storage. TrustCom 2014: 328-335 - 2013
- [c6]Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Peng Zeng, Jianwei Liu, Ruiying Du:
A Generic Construction of Proxy Signatures from Certificateless Signatures. AINA 2013: 259-266 - [c5]Hua Deng, Bo Qin, Ruiying Du, Huanguo Zhang, Lina Wang, Jianwei Liu, Jian Mao:
Finding Key Leakage in Hierarchical Distribution of Encrypted Data. INCoS 2013: 780-785 - [c4]Jianwei Liu, Abdur Rashid Sangi, Ruiying Du, Qianhong Wu:
Light Weight Network Coding Based Key Distribution Scheme for MANETs. NSS 2013: 521-534 - [c3]Jing Chen, Ruiying Du, Li Zhao, Chiheng Wang, Minghui Zheng, Yang Xiang:
Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs. NSS 2013: 590-598 - [c2]Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao:
Secure Routing Based on Network Coding in Wireless Sensor Networks. TrustCom/ISPA/IUCC 2013: 58-64 - 2012
- [j3]Jianwei Liu, Ruiying Du, Jing Chen, Kun He:
A key distribution scheme using network coding for mobile ad hoc network. Secur. Commun. Networks 5(1): 59-67 (2012) - 2010
- [j2]Jing Chen, Shiguo Lian, Cai Fu, Ruiying Du:
A hybrid game model based on reputation for spectrum allocation in wireless networks. Comput. Commun. 33(14): 1623-1631 (2010) - [j1]Ruiying Du, Chunyu Ai, Longjiang Guo, Jing Chen, Jianwei Liu, Jing He, Yingshu Li:
A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks. J. Commun. 5(9): 654-664 (2010)
2000 – 2009
- 2009
- [c1]Chunyu Ai, Ruiying Du, Minghong Zhang, Yingshu Li:
In-Network Historical Data Storage and Query Processing Based on Distributed Indexing Techniques in Wireless Sensor Networks. WASA 2009: 264-273
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint