Publications
2024~
[C63] Dianiqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, and Yanchao Zhang, “WaveKey: Secure mobile ad hoc access to RFID-protected systems,” IEEE International Conference on Distributed Computing Systems (ICDCS), Jersey City, New Jersey, USA, July 2024.
[C62] Amit Singha, Ziqian Bi, Tao Li, Yimin Chen, and Yanchao Zhang, “Securing contrastive mmWave-based human activity recognition against adversarial label flipping,” ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Seoul, Korea, May 2024.
2023
[C61] Jiawei Xu, Ziqian Bi, Amit Singha, Tao Li, Yimin Chen and Yanchao Zhang, “mmLock: User leaving setection against data theft via high-quality mmWave radar imaging,” IEEE International Conference on Computer Communications and Networks (ICCCN), invited paper, Honolulu, HI, USA, July 2023.
[C60] Xin Yao, Yu Zhan, Yimin Chen, Fengxiao Tang, Ming Zhao, Enlang Li, and Yanchao Zhang, “DUO: Stealthy adversarial example attack on video retrieval systems via frame-pixel search“, IEEE International Conference on Distributed Computing Systems ICDCS, Hong Kong, China, July 2023.
[C59] Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, and Yanchao Zhang, “PhyAuth: Physical-layer message authentication for ZigBee networks,” USENIX Security, Anaheim, CA, August 2023.
[J47] Ang Li, Jiawei Li, Yan Zhang, Dianqi Han, Tao Li, and Yanchao Zhang, “Secure UHF RFID authentication with smart devices,” IEEE Transactions on Wireless Communications, vol. 22, no. 7, pp. 4520-4533, July 2023.
[J46] Yidan Hu, Xin Yao, Rui Zhang and Yanchao Zhang, “Freshness authentication for outsourced multi-version key-value stores,” IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 3, pp. 2071-2084, May 2023.
[J45] Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, and Yanchao Zhang, “Rhythmic RFID authentication,” IEEE/ACM Transactions on Networking, vol. 31, no. 2, pp. 877-890, April 2023.
[J44] Yan Zhang, Dianqi Han, Ang Li, Lili Zhang, Tao Li, and Yanchao Zhang, “MagAuth: secure and usable two-factor authentication with magnetic wrist wearables,” IEEE Transactions on Mobile Computing, vol. 22, no. 1, pp. 311-327, January 2023.
2022
[C58] Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, and Yanchao Zhang, “WearRF-CLA: Continuous location authentication with wrist wearables and UHF RFID,” ACM ASIA Conference on Computer and Communications Security (AsiaCCS), Nagasaki, Japan, May 2022.
[C57] Jiawei Li, Ang Li, Dianqi Han, Yan Zhang, Tao Li, and Yanchao Zhang, “RCID: Fingerprinting passive RFID tags via wideband backscatter,” IEEE International Conference on Computer Communications (INFOCOM), May 2022.
[J43] Yan Zhang, Ang Li, Jiawei Li, Dianqi Han, Tao Li, Rui Zhang, and Yanchao Zhang, “SpecKriging: GNN-based secure cooperative spectrum sensing,” IEEE Transactions on Wireless Communications, vol. 21, no. 11, pp. 9936-9946, November 2022.
[J42] Dianqi Han, Ang Li, Lili Zhang, Yan Zhang, Jiawei Li, Tao Li, Rui Zhang, and Yanchao Zhang, “(In)secure acoustic mobile authentication,” IEEE Transactions on Mobile Computing, vol. 21, no. 9, pp. 3193-3207, September 2022.
2021
[C56] Dianqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, and Yanchao Zhang, “DroneKey: a drone-aided group-key generation scheme for large-Scale IoT networks,” ACM Conference on Computer and Communications Security (CCS), October 2021.
[C55] Xixun Yu, Yidan Hu, Rui Zhang, Zheng Yan, and Yanchao Zhang, “Secure outsourced top-k selection queries against untrusted cloud service providers,” IEEE International Conference on Computer Communications (INFOCOM), May 2021.
[C54] Xin Yao, Rui Zhang, and Yanchao Zhang, “Differential privacy-preserving user linkage across online social networks,” IEEE/ACM International Symposium on Quality of Service (IWQOS), June 2021.
[C53] Tao Li, Dianqi Han, Jiawei Li, Ang Li, Yan Zhang, Rui Zhang, and Yanchao Zhang, “Your home is insecure: practical attacks on wireless home alarm systems,” IEEE International Conference on Computer Communications (INFOCOM), May 2021.
[J41] Xin Yao, Rui Zhang, Dingquan Huang, and Yanchao Zhang, “Verifiable query processing over outsourced social graph,” IEEE/ACM Transactions on Networking, vol. 29, no. 5, pp.2313-2326, October 2021.
[J40] Dianqi Han, Ang Li, Lili Zhang, Yan Zhang, Jiawei Li, Tao Li, Ting Zhu, and Yanchao Zhang, “Deep learning-guided jamming for cross-technology wireless networks: attack and defense,” IEEE/ACM Transactions on Networking, vol. 29, no. 5, pp. 1922-1932, October 2021.
2020
[C52] Yan Li, Xin Liu, Wei Wang, Yao Yao, Ting Zhu, and Yanchao Zhang, “Countering cross-technology jamming attack,” ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), July 2020.
[C51] Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, and Yanchao Zhang, “RF-Rhythm: secure and usable two-factor RFID authentication,” IEEE International Conference on Computer Communications (INFOCOM), June 2020.
[C50] Yidan Hu, Rui Zhang, and Yanchao Zhang, “KV-Fresh: freshness authentication for outsourced multi-version key-value stores,” IEEE International Conference on Computer Communications (INFOCOM), June 2020.
[J39] Tao Li, Dianqi Han, Yimin Chen, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, “IndoorWaze: a crowdsourcing-based context-aware indoor navigation system,” IEEE Transactions on Wireless Communications, vol. 19, no. 8, pp. 5461-5472, May 2020.
2019
[C49] Zicheng Chi, Yan Li, Xin Liu,Yao Yao,Yanchao Zhang, and Ting Zhu, “Parallel inclusive communication for connecting heterogeneous IoT devices at the edge,” ACM Conference on Embedded Networked Sensor Systems (SenSys), New York, NY, November 2019.
[C48] Lili Zhang, Dianqi Han, Ang Li, Tao Li, Yan Zhang, and Yanchao Zhang, “WristUnlock: secure and usable smartphone unlocking with wrist wearables,” IEEE Conference on Communications and Network Security (CNS), Washington, DC, June 2019.
[C47] Ang Li, Tao Li, Yan Zhang, Lili Zhang and Yanchao Zhang, “SocialDistance: how far are you from verified users in online social media?“, IEEE/ACM International Symposium on Quality of Service (IWQoS), Phoenix, AZ, June 2019.
[C46] Yunzhi Li, Yidan Hu, Rui Zhang,Yanchao Zhang, and Terri Hedgpeth, “Secure indoor positioning against signal strength attacks via optimized multi-voting,” IEEE/ACM International Symposium on Quality of Service (IWQoS), Phoenix, AZ, June 2019.
[C45] Ghazaleh Beigi, Ruocheng Guo, Alexander Nou, Yanchao Zhang, and Huan Liu, “Protecting user privacy: an approach for untraceable web browsing history and unambiguous user profiles,” ACM International Conference on Web Search and Data Mining (WSDM), Melbourne, Australia, February 2019.
2018
[C44] Dianqi Han, Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, “Proximity-Proof: secure and usable two-factor mobile authentication,” ACM Annual Conference on Mobile Computing and Networking (MobiCom), New Delhi, India, October 2018.
[C43] Ghazaleh Beigi, Kai Shu, Yanchao Zhang, and Huan Liu, “Securing social media user data: an adversarial approach,” ACM Conference on HyperText and Social Media (HT), Baltimore, MD, July 2018.
[C42] Lizhou Yuan, Yidan Hu, Yunzhi Li, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, “Secure RSS-fingerprint-based indoor positioning: attacks and countermeasures,” IEEE Conference on Communications and Network Security (CNS), Beijing, China, May 2018.
[C41] Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, “EyeTell: video-assisted touchscreen keystroke inference from eye movements, ” IEEE Symposium on Security and Privacy (SP), San Francisco, CA, May 2018.
[C40] Jinxue Zhang, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Xia Hu, “Privacy-preserving social media data outsourcing,” IEEE International Conference on Computer Communications (INFOCOM), Honolulu, HI, April 2018.
[C39] Tao Li, Yimin Chen, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, “Secure crowdsourced indoor positioning systems,” IEEE International Conference on Computer Communications (INFOCOM), Honolulu, HI, April 2018.
[J38] Xin Yao, Yimin Chen, Rui Zhang, Yanchao Zhang, and Yaping Lin, “Beware of what you share: inferring user locations in Venmo,” IEEE Internet of Things Journal, vol. 5, no. 6, pp. 5109-5118, December 2018.
[J37] Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Chi Zhang, “SpecGuard: spectrum misuse detection in dynamic spectrum access systems,” IEEE Transactions on Mobile Computing, vol. 17, no. 12, pp. 2925-2938, December 2018.
[J36] Xiaocong Jin and Yanchao Zhang, “Privacy-preserving crowdsourced spectrum sensing,” IEEE/ACM Transactions on Networking, vol. 26, no. 3, pp. 1236-1249, June 2018.
2017
[C38] Yimin Chen, Jingchao Sun, Xiaocong Jin, Tao Li, Rui Zhang, and Yanchao Zhang, “Your face your heart: secure mobile face authentication with photoplethysmograms,” IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, April 2017.
[C37] Yimin Chen, Xiaocong Jin, Jingchao Sun, Rui Zhang, and Yanchao Zhang, “POWERFUL: mobile app fingerprinting via power analysis,” IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, April 2017.
[C36] Xin Yao, Rui Zhang, Yanchao Zhang, and Yaping Lin, “Verifiable social data outsourcing,” IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, April 2017.
2016
[C35] Tao Li, Yimin Chen, Jingchao Sun, Xiaocong Jin, and Yanchao Zhang, “iLock: immediate and automatic locking of mobile devices against data theft,” ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, October 2016.
[C34] Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, and Yanchao Zhang, “DPSense: differentially private crowdsourced spectrum sensing,” ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, October 2016.
[C33] Tao Li, Rui Zhang, and Yanchao Zhang, “PriExpress: privacy-preserving express delivery with fine-grained attribute-based access control,” IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, October 2016.
[C32] Xin Yao, Yaping Lin, Qin Liu, and Yanchao Zhang, “A secure hierarchical deduplication system in cloud storage,” IEEE/ACM International Symposium on Quality of Service (IWQoS), Beijing, China, June 2016.
[C31] Jinxue Zhang, Xia Hu, Yanchao Zhang, and Huan Liu, “Your age is no secret: Inferring microbloggers’ ages via content and interaction analysis,” International AAAI Conference on Web and Social Media (ICWSM), Cologne, Germany, May 2016.
[C30] Xiaocong Jin and Yanchao Zhang, “Privacy-preserving crowdsourced spectrum sensing,” IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, April 2016.
[C29] Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang, “PriStream: privacy-preserving distributed stream monitoring of thresholded percentile statistics,” IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, China, April 2016.
[C28] Wenxin Chen, Mengjun Liu, Rui Zhang, Yanchao Zhang, and Shubo Liu, “Secure outsourced skyline query processing via untrusted cloud service providers,” IEEE International Conference on Computer Communications (INFOCOM), San Francisco, April 2016.
[C27] Jingchao Sun, Xiaocong Jin, Yimin Chen, Jingxue Zhang, Rui Zhang, and Yanchao Zhang, “VISIBLE: video-assisted keystroke inference from tablet backside motion,” ISOC Network and Distributed System Security Symposium (NDSS), San Diego, California, February 2016.
[J35] Jinxue Zhang, Rui Zhang, Yanchao Zhang and Guanhua Yan, “The rise of social botnets: attacks and countermeasures,” IEEE Transactions on Dependable and Secure Computing, accepted, April 2016.
[J34] Jinghcao Sun, Rui Zhang, and Yanchao Zhang, “Privacy-preserving spatiotemporal matching for secure device-to-device communications,” IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1048-1060, December 2016.
[J33] Jinxue Zhang, Rui Zhang, Jingchao Sun, Yanchao Zhang and Chi Zhang, “TrueTop: a sybil-resilient system for user influence measurement on Twitter,” IEEE/ACM Transactions on Networking, vol. 24, no. 5, pp. 2834-2846, October 2016.
[J32] Jingchao Sun, Rui Zhang, Xiaocong Jin, and Yanchao Zhang, “SecureFind: secure and privacy-preserving object finding via mobile crowdsourcing,” IEEE Transactions on Wireless Communications, vol. 15, no. 3, pp. 1716-1728, March 2016.
2015
[C26] Xiaocong Jin, Jingchao Sun, Rui Zhang, and Yanchao Zhang, “SafeDSA: safeguard dynamic spectrum access against fake secondary users,” ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, October 2015.
[C25] Jinxue Zhang, Jingchao Sun, Rui Zhang, and Yanchao Zhang, “Your actions tell where you are: uncovering Twitter users in a metropolitan area,” IEEE Conference on Communications and Network Security (CNS), Florence, Italy, September 2015.
[C24] Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Chi Zhang, “SpecGuard: spectrum misuse detection in dynamic spectrum access systems,” IEEE International Conference on Computer Communications (INFOCOM), Hong Kong, China, April 2015.
[C23] Yimin Chen, Jingchao Sun, Rui Zhang, and Yanchao Zhang, “Your song your way: rhythm-based two-factor authentication for multi-touch mobile devices,” IEEE International Conference on Computer Communications (INFOCOM), Hong Kong, China, April 2015.
[J31] Rui Zhang, Jingchao Sun, Yanchao Zhang and Xiaoxia Huang, “Jamming-resistant secure neighbor discovery in mobile ad hoc networks,” IEEE Transactions on Wireless Communications, vol. 14, no. 10, pp. 5588-5601, October 2015.
[J30] Rui Zhang, Jingchao Sun, Yanchao Zhang and Chi Zhang, “Secure spatial top-K query processing via untrusted location-based service providers,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 111-124, January/February 2015.
2014
[C22] Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang, “TouchIn: sightless two-factor authentication on multi-touch mobile devices,” IEEE Conference on Communication and Network Security (CNS), San Francisco, CA, October 2014.
[C21] Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan Zhang, “SYNERGY: a game-theoretical approach for cooperative key generation in wireless networks,” IEEE International Conference on Computer Communications (INFOCOM), Toronto, Canada, April 2014.
[J29] Xiaocong Jin, Rui Zhang, Jingchao Sun, and Yanchao Zhang, “TIGHT: a geographic routing protocol for cognitive radio mobile ad hoc networks,” IEEE Transactions on Wireless Communications, vol. 13, no. 8, pp. 4670-4681, August 2014.
[J28] Rui Zhang, Jing Shi, Yanchao Zhang and Chi Zhang, “Secure top-K query processing in unattended tiered sensor networks,” IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4681-4693, November 2014.
2013
[C20] Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan, “On the impact of social botnets for spam distribution and digital-influence manipulation,” IEEE Conference on Communications and Network Security (CNS), Washington, D.C., October 2013.
[C19] Xia Hu, Jiliang Tang, Yanchao Zhang, and Huan Liu, “Social spammer detection in microblogging,” International Joint Conference on Artificial Intelligence (IJCAI), Beijing, China, August 2013.
[C18] Rui Zhang, Jinxue Zhang, Yanchao Zhang, and Chi Zhang, “Secure crowdsourcing-based cooperative spectrum sensing,” IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy, April 2013.
[C17] Jingchao Sun, Rui Zhang, and Yanchao Zhang, “Privacy-preserving spatiotemporal matching,” IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy, April 2013.
[J27] Rui Zhang, Jing Shi, Yanchao Zhang and Chi Zhang, “Verifiable privacy-preserving aggregation in people-centric urban sensing systems,” IEEE Journal on Selected Areas in Communications (Special Issue on Emerging Technologies in Communications), vol. 31, no. 9, pp. 268-278, September 2013.
[J26] Rui Zhang, Jinxue Zhang, Yanchao Zhang Jinyuan Sun, and Guanhua Yan, “Privacy-preserving profile matching for proximity-based mobile social networking,” IEEE Journal on Selected Areas in Communications (Special Issue on Emerging Technologies in Communications), vol. 31, no. 9, pp. 656-668, September 2013.
2012
[C16] Rui Zhang, Yanchao Zhang, and Chi Zhang, “Secure top-k query processing via untrusted location-based service providers,” IEEE International Conference on Computer Communication (INFOCOM), Orlando, FL, March 2012.
[C15] Rui Zhang, Yanchao Zhang, Jinyuan Sun, and Guanhua Yan, “Fine-grained private matching for proximity-based mobile social networking,” IEEE International Conference on Computer Communication (INFOCOM), Orlando, FL, March 2012.
[J25] Rui Zhang, Yanchao Zhang and Kui Ren, “Distributed privacy-preserving access control in sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no.8, pp. 1427–1438, August 2012.
[J24] Rui Zhang, Jing Shi, Yanchao Zhang and Jinyuan Sun, “Secure cooperative data storage and query processing in unattended tiered sensor networks,” IEEE Journal on Selected Areas in Communications (Special Issue on Cooperative Networking Challenges and Applications), vol. 30, no. 2, pp. 433–441, February 2012.
2011
[C14] Rui Zhang and Yanchao Zhang, “LR-Seluge: loss-resilient and secure code dissemination in wireless sensor networks,” International Conference on Distributed Computing Systems (ICDCS), Minneapolis, Minnesota, June 2011.
[C13] Rui Zhang, Yanchao Zhang, and Xiaoxia Huang, “JR-SND: jamming-resilient secure neighbor discovery in mobile ad hoc networks,” International Conference on Distributed Computing Systems (ICDCS), Minneapolis, Minnesota, June 2011.
[C12] Rui Zhang, Yunzhong Liu, Yanchao Zhang, and Jinyuan Sun, “Fast identification of the missing tags in a large RFID system,” IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Salt Lake City, Utah, June 2011.
[J23] Rui Zhang, Yanchao Zhang and Yuguang Fang, “AOS: an anonymous overlay system for mobile ad hoc networks,” ACM Wireless Networks (WINET), vol. 17, no. 4, pp. 843–859, May 2011.
[J22] Chi Zhang, Yang Song, Yuguang Fang, and Yanchao Zhang, “On the price of security in large-scale wireless ad hoc networks,” IEEE/ACM Transactions on Networking, vol. 19, no. 2, pp. 319-332, April 2011.
[J21] Jing Shi, Rui Zhang, and Yanchao Zhang, “A spatiotemporal approach for secure range queries in tiered sensor networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 1, pp. 264-273, January 2011.
[J20] Jinyuan Sun, Chi Zhang, Yanchao Zhang and Yuguang Fang, “SAT: a security architecture achieving anonymity and traceability in wireless mesh networks,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 2, pp. 295-307, March 2011.
2010
[C11] Yunzhong Liu, Rui Zhang, Jing Shi, and Yanchao Zhang, “Traffic inference in anonymous MANETs,” IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Boston, MA, June 2010.
[C10] Rui Zhang and Yanchao Zhang, “Wormhole-resilient secure neighbor discovery in underwater acoustic networks,” IEEE International Conference on Computer Communications (INFOCOM), San Diego, CA, March 2010.
[C09] Rui Zhang, Jing Shi, Yunzhong Liu, and Yanchao Zhang, “Verifiable fine-grained top-k queries in tiered sensor networks,” IEEE International Conference on Computer Communications (INFOCOM), San Diego, CA, March 2010.
[C08] Jing Shi, Rui Zhang, Yunzhong Liu, and Yanchao Zhang, “PriSense: privacy-preserving data aggregation in people-centric urban sensing systems,” IEEE International Conference on Computer Communications (INFOCOM), San Diego, CA, March 2010.
[J19] Jinyuan Sun, Chi Zhang, Yanchao Zhang and Yuguang Fang, “An identity-based security system for user privacy in vehicular ad hoc networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227-1239, September 2010.
[J18] Chi Zhang, Yanchao Zhang and Yuguang Fang, “A coverage inference protocol for wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 9, no. 6, pp. 850-864, June 2010.
[J17] Kui Ren, Shucheng Yu, Wenjing Lou, and Yanchao Zhang, “PEACE: a sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 2, pp. 203-215, February 2010.
2009
[C07] Rui Zhang, Jing Shi, and Yanchao Zhang, “Secure multidimensional range queries in sensor networks,” ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), New Orleans, LA, May 2009.
[C06] Jing Shi, Rui Zhang, and Yanchao Zhang, “Secure range queries in tiered sensor networks,” IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 2009.
[C05] Rui Zhang, Yanchao Zhang, and Kui Ren, “DP2AC: distributed privacy-preserving access control in sensor networks,” IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 2009.
[C04] Qian Wang, Kui Ren, Wenjing Lou, and Yanchao Zhang, “Dependable and secure sensor data storage with dynamic integrity assurance,” IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 2009.
[J16] Kui Ren, Wenjing Lou, Shucheng Yu, and Yanchao Zhang, “Multi-user broadcast authentication in wireless sensor networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4554-4464, October 2009.
[J15] Chi Zhang, Yanchao Zhang and Yuguang Fang, “Localized coverage boundary detection for wireless sensor networks,” ACM Wireless Networks (WINET), vol. 15, no. 1, pp. 3-20, January 2009.
[J14] Yanchao Zhang and Kui Ren, “On address privacy in mobile ad hoc networks,” ACM Mobile Networks and Applications (MONET), vol. 14, no. 2, pp. 188-197, April 2009.
[J13] Wenjing Lou, Wei Liu, Yanchao Zhang and Yuguang Fang, “SPREAD: improving network security by multipath routing in mobile ad hoc networks,” ACM Wireless Networks (WINET), vol. 15, no. 3, pp. 279-294, April 2009.
2008
[J12] Kui Ren, Wenjing Lou, and Yanchao Zhang, “LEDS: providing location-aware end-to-end data security in wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 7, no. 5, pp. 585-598, May 2008.
2007
[C03] Kui Ren, Wenjing Lou, and Yanchao Zhang, “Multi-user broadcast authentication in wireless sensor networks,” IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), San Diego, June 2007.
[J11] Yanchao Zhang and Yuguang Fang, “A secure authentication and billing architecture for wireless mesh networks,” ACM Wireless Networks (WINET), vol. 13, no. 5, pp. 663-678, October 2007.
[J10] Yanchao Zhang, Wenjing Lou, Wei Liu, and Yuguang Fang, “A secure incentive protocol for mobile ad hoc networks,” ACM Wireless Networks (WINET), vol. 13, no. 5, pp. 569-582, October 2007.
[J09] Yanchao Zhang and Yuguang Fang, “A fine-grained reputation system for reliable service selection in peer-to-peer networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 8, pp. 1134-1145, August 2007.
[J08] Yun Zhou, Yanchao Zhang and Yuguang Fang, “Access control in wireless sensor networks,” Ad Hoc Networks (Special Issue on Security in Ad Hoc and Sensor Networks), vol. 5, no. 1, pp. 3-13, January 2007.
2006 and prior
[C02] Kui Ren, Wenjing Lou, and Yanchao Zhang, “LEDS: providing location-aware end-to-end data security in wireless sensor networks,” IEEE International Conference on Computer Communications (INFOCOM), Barcelona, Spain, April 2006.
[C01] Yanchao Zhang, Wei Liu, and Wenjing Lou, “Anonymous communications in mobile ad hoc networks,” IEEE International Conference on Computer Communications (INFOCOM), Miami, Florida, March 2005.
[J07] Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, “Securing mobile ad hoc networks with certificateless public keys,” IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 386-399, October 2006.
[J06] Yanchao Zhang and Yuguang Fang, “ARSA: an attack-resilient security architecture for multi-hop wireless mesh networks,” IEEE Journal on Selected Areas in Communications (Special Issue on High-Speed Network Security–Architecture, Algorithms, and Implementation), vol. 24, no. 10, pp. 1916-1928, October 2006.
[J05] Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, “MASK: anonymous on-demand routing in mobile ad hoc networks,” IEEE Transactions on Wireless Communications, vol. 5, no. 9, pp. 2376-2385, September 2006.
[J04] Wei Liu, Yanchao Zhang Wenjing Lou, and Yuguang Fang, “A robust and energy-efficient data dissemination framework for wireless sensor networks,” ACM Wireless Networks (WINET), vol. 12, no. 4, pp. 465-479, August 2006.
[J03] Yanchao Zhang, Wei Liu, Yuguang Fang, and Dapeng Wu, “Secure localization and authentication in ultra-wideband sensor networks,” IEEE Journal on Selected Areas in Communications (Special Issue on Ultra Wideband Wireless Communications–Theory and Applications), vol. 24, no. 4, pp. 829-835, April 2006.
[J02] Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, “Location-based compromise-tolerant security mechanisms for wireless sensor networks,” IEEE Journal on Selected Areas in Communications (Special Issue on Security in Wireless Ad Hoc Networks), vol. 24, no. 2, pp. 247-260, February 2006.
[J01] Wei Liu, Yanchao Zhang, Kejie Lu, and Yuguang Fang, “Energy conservation through resource-aware movement in heterogeneous mobile ad hoc networks,” Journal of Combinatorial Optimization (Special Issue on Wireless Network Applications), vol. 11, no. 1, pp. 7-20, February 2006.