{"id":46,"date":"2023-07-20T01:47:19","date_gmt":"2023-07-20T08:47:19","guid":{"rendered":"https:\/\/labs.engineering.asu.edu\/cnsg\/?page_id=46"},"modified":"2025-12-24T13:44:52","modified_gmt":"2025-12-24T20:44:52","slug":"publication","status":"publish","type":"page","link":"https:\/\/labs.engineering.asu.edu\/cnsg\/publication\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">2025<\/h4>\n\n\n\n<p>[C72] Abdualrhman Almeajel, Yan Zhang, Tao Li, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2025\/12\/C72.pdf\">mmRhythm: secure and usable user authentication for IoT devices based on hand-tapping patterns<\/a>,&#8221; <em>IEEE Miliary Communications Conference<\/em> (MILCOM), Los Angeles, CA, October 2025.<\/p>\n\n\n\n<p>[C71] Zhaofeng Zhang, Xuanli Lin, Guoliang Xue, Yanchao Zhang, and Kevin S Chan, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2025\/12\/C71.pdf\">Multi-Hop relay-aided task offloading for tactical edge computing<\/a>,&#8221; <em>IEEE Miliary Communications Conference<\/em> (MILCOM), Los Angeles, CA, October 2025.<\/p>\n\n\n\n<p>[C70] Aliu Akinwale, Wentao Gao, Jiawei Li, Ang Li, Xiaojun Shang, Yanchao Zhang, and Dianqi Han, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2025\/12\/C70.pdf\">Practical reflection manipulation on mmWave-based physical intrusion detection<\/a>,&#8221; <em>IEEE Conference on Communications and Network Security<\/em> (CNS), Avignon, France, September 2025.<\/p>\n\n\n\n<p>[C69] Ye Zheng, Shafizur Rahman Seeam, Yidan Hu, Rui Zhang, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2025\/07\/C69.pdf\" data-type=\"attachment\" data-id=\"422\">Locally differentially private frequency estimation via joint randomized response<\/a>,&#8221; <em>Privacy Enhancing Technologies Symposium<\/em> (PETS), Washington, DC, July 2025.<\/p>\n\n\n\n<p>[C68] Ziqian Bi, Amit Singha, Hongfei Xue, Tao Li, Yimin Chen, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2025\/07\/C68.pdf\" data-type=\"attachment\" data-id=\"423\">Physical backdoor attacks against mmWave-based human activity recognition<\/a>,&#8221; <em>IEEE International Conference on Distributed Computing Systems<\/em> (ICDCS), Glasgow, Scotland, UK, July 2025.<\/p>\n\n\n\n<p>[C67] Yan Zhang, Tao Li, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2025\/07\/C67.pdf\" data-type=\"attachment\" data-id=\"421\">GNN-SML: Graph neural network-based spectrum misuser localization<\/a>,&#8221; <em>IEEE International Conference on Computer Communications<\/em> (INFOCOM), London, UK, May 2025.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2024<\/h4>\n\n\n\n<p>[C66] Xuanli Lin, Zhaofeng Zhang, Yinxin Wang, Ethan Z Teo, Guoliang Xue, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2025\/07\/C66.pdf\" data-type=\"attachment\" data-id=\"420\">Most vulnerable attack trace in a probabilistic attack graph<\/a>,&#8221; <em>IEEE Military Communications Conference<\/em> (MILCOM), Washington, DC, October 2024.<\/p>\n\n\n\n<p>[C65] Zhaofeng Zhang, Xuanli Lin, Guoliang Xue, Yanchao Zhang, and Kevin S Chan, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2025\/07\/C65.pdf\" data-type=\"attachment\" data-id=\"419\">Joint optimization of task offloadingand resource allocation in tactical edge networks<\/a>,&#8221; <em>IEEE Military Communications Conference<\/em> (MILCOM), Washington, DC, October 2024.<\/p>\n\n\n\n<p>[C64] Yan Zhang, Jiawei Li, Diani Han, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2025\/02\/C64.pdf\" data-type=\"attachment\" data-id=\"413\">W-MIA: Membership inference attack against deep learning-based RF fingerprinting<\/a>,&#8221; <em>IEEE Conference on Communications and Network Security<\/em> (CNS), Taipei, Taiwan, September 2024.<\/p>\n\n\n\n<p>[C63] Dianiqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2024\/07\/C63.pdf\">WaveKey: Secure mobile ad hoc access to RFID-protected systems<\/a>,&#8221; <em>IEEE International Conference on Distributed Computing Systems<\/em> (ICDCS), Jersey City, New Jersey, USA, July 2024.<\/p>\n\n\n\n<p>[C62] Amit Singha, Ziqian Bi, Tao Li, Yimin Chen, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2024\/07\/C62.pdf\">Securing contrastive mmWave-based human activity recognition against adversarial label flipping<\/a>,&#8221; <em>ACM Conference on Security and Privacy in Wireless and Mobile Networks<\/em> (WiSec), Seoul, Korea, May 2024.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2023<\/h4>\n\n\n\n<p>[C61] Jiawei Xu, Ziqian Bi, Amit Singha, Tao Li, Yimin Chen and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2024\/02\/C61.pdf\" data-type=\"attachment\" data-id=\"359\">mmLock: User leaving setection against data theft via high-quality mmWave radar imaging<\/a>,&#8221; <em>IEEE International Conference on Computer Communications and Networks<\/em> (ICCCN), invited paper, Honolulu, HI, USA, July 2023.<\/p>\n\n\n\n<p>[C60] Xin Yao, Yu Zhan, Yimin Chen, Fengxiao Tang, Ming Zhao, Enlang Li, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2024\/02\/C60.pdf\" data-type=\"attachment\" data-id=\"358\">DUO: Stealthy adversarial example attack on video retrieval systems via frame-pixel search<\/a>&#8220;, &nbsp;<em>IEEE International Conference on Distributed Computing Systems<\/em> ICDCS, Hong Kong, China, July 2023.<\/p>\n\n\n\n<p>[C59] Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2024\/02\/C59.pdf\" data-type=\"attachment\" data-id=\"357\">PhyAuth: Physical-layer message authentication for ZigBee networks<\/a>,\u201d <em>USENIX Security<\/em>, Anaheim, CA, August 2023.<\/p>\n\n\n\n<p>[J47] Ang Li, Jiawei Li, Yan Zhang, Dianqi Han, Tao Li, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2024\/02\/J47.pdf\" data-type=\"attachment\" data-id=\"361\">Secure UHF RFID authentication with smart devices<\/a>,&#8221; <em>IEEE Transactions on Wireless Communications<\/em>, vol. 22, no. 7, pp. 4520-4533, July 2023.<\/p>\n\n\n\n<p>[J46] Yidan Hu, Xin Yao, Rui Zhang and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2024\/02\/J46.pdf\" data-type=\"attachment\" data-id=\"360\">Freshness authentication for outsourced multi-version key-value stores<\/a>,&#8221; <em>IEEE Transactions on Dependable and Secure Computing<\/em>, vol. 20, no. 3, pp. 2071-2084, May 2023.<\/p>\n\n\n\n<p>[J45] Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J45.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Rhythmic RFID authentication<\/a>,&#8221; <em>IEEE\/ACM Transactions on Networking<\/em>, vol. 31, no. 2, pp. 877-890, April 2023.<\/p>\n\n\n\n<p>[J44] Yan Zhang, Dianqi Han, Ang Li, Lili Zhang, Tao Li, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J44.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">MagAuth: secure and usable two-factor authentication with magnetic wrist wearables<\/a>,\u201d <em>IEEE Transactions on Mobile Computing<\/em>, vol. 22, no. 1, pp. 311-327, January 2023.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2022<\/h4>\n\n\n\n<p>[C58] Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/c58.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">WearRF-CLA: Continuous location authentication with wrist wearables and UHF RFID<\/a>,\u201d <em>ACM ASIA Conference on Computer and Communications Security<\/em> (AsiaCCS), Nagasaki, Japan, May 2022.<\/p>\n\n\n\n<p>[C57] Jiawei Li, Ang Li, Dianqi Han, Yan Zhang, Tao Li, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C57.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">RCID: Fingerprinting passive RFID tags via wideband backscatter<\/a>,\u201d IEEE International Conference on Computer Communications (INFOCOM), May 2022.<\/p>\n\n\n\n<p>[J43] Yan Zhang, Ang Li, Jiawei Li, Dianqi Han, Tao Li, Rui Zhang, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J43.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SpecKriging: GNN-based secure cooperative spectrum sensing<\/a>,&#8221; <em>IEEE Transactions on Wireless Communications<\/em>, vol. 21, no. 11, pp. 9936-9946, November 2022.<\/p>\n\n\n\n<p>[J42] Dianqi Han, Ang Li, Lili Zhang, Yan Zhang, Jiawei Li, Tao Li, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J42.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">(In)secure acoustic mobile authentication<\/a>,\u201d <em>IEEE Transactions on Mobile Computing<\/em>, vol. 21, no. 9, pp. 3193-3207, September 2022.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2021<\/h4>\n\n\n\n<p>[C56] Dianqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C56.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">DroneKey: a drone-aided group-key generation scheme for large-Scale IoT networks<\/a>,\u201d ACM Conference on Computer and Communications Security (CCS), October 2021.<\/p>\n\n\n\n<p>[C55] Xixun Yu, Yidan Hu, Rui Zhang, Zheng Yan, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C55.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Secure outsourced top-k selection queries against untrusted cloud service providers<\/a>,\u201d <em>IEEE International Conference on Computer Communications<\/em> (INFOCOM), May 2021.<\/p>\n\n\n\n<p>[C54] Xin Yao, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C54.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Differential privacy-preserving user linkage across online social networks<\/a>,\u201d <em>IEEE\/ACM International Symposium on Quality of Service<\/em> (IWQOS), June 2021.<\/p>\n\n\n\n<p>[C53] Tao Li, Dianqi Han, Jiawei Li, Ang Li, Yan Zhang, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C53.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Your home is insecure: practical attacks on wireless home alarm systems<\/a>,\u201d <em>IEEE International Conference on Computer Communications <\/em>(INFOCOM), May 2021.<\/p>\n\n\n\n<p>[J41] Xin Yao, Rui Zhang, Dingquan Huang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J41.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Verifiable query processing over outsourced social graph<\/a>,\u201d <em>IEEE\/ACM Transactions on Networking<\/em>, vol. 29, no. 5, pp.2313-2326, October 2021.<\/p>\n\n\n\n<p>[J40] Dianqi Han, Ang Li, Lili Zhang, Yan Zhang, Jiawei Li, Tao Li, Ting Zhu, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J40.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Deep learning-guided jamming for cross-technology wireless networks: attack and defense<\/a>,\u201d <em>IEEE\/ACM Transactions on Networking<\/em>, vol. 29, no. 5, pp. 1922-1932, October 2021.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2020<\/h4>\n\n\n\n<p>[C52] Yan Li, Xin Liu, Wei Wang, Yao Yao, Ting Zhu, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C52.pdf\">Countering cross-technology jamming attack<\/a>,&#8221;&nbsp;<em>ACM Conference on Security and Privacy in Wireless and Mobile Networks<\/em>&nbsp;(WiSec), July 2020.<\/p>\n\n\n\n<p>[C51]&nbsp;Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C51.pdf\">RF-Rhythm: secure and usable two-factor RFID authentication<\/a>,&#8221;&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), June 2020.<\/p>\n\n\n\n<p>[C50]&nbsp;Yidan Hu, Rui Zhang, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C50.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">KV-Fresh: freshness authentication for outsourced multi-version key-value stores<\/a>,&#8221;&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), June 2020.&nbsp;<\/p>\n\n\n\n<p>[J39] Tao Li, Dianqi Han, Yimin Chen, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J39.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">IndoorWaze: a crowdsourcing-based context-aware indoor navigation system<\/a>,&#8221;&nbsp;<em>IEEE Transactions on Wireless Communications<\/em>, vol. 19, no. 8, pp. 5461-5472, May 2020.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2019<\/h4>\n\n\n\n<p>[C49]&nbsp;Zicheng Chi, Yan Li, Xin Liu,Yao Yao,Yanchao Zhang,&nbsp; and Ting Zhu, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C49.pdf\">Parallel inclusive communication for connecting heterogeneous IoT devices at the edge<\/a>,&#8221;&nbsp;<em>ACM Conference on Embedded Networked Sensor Systems<\/em>&nbsp;(SenSys), New York, NY, November 2019.&nbsp;<\/p>\n\n\n\n<p>[C48] Lili Zhang, Dianqi Han, Ang Li, Tao Li, Yan Zhang, and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C48.pdf\">WristUnlock: secure and usable smartphone unlocking with wrist wearables<\/a>,&#8221;&nbsp;<em>IEEE Conference on Communications and Network Security<\/em>&nbsp;(CNS), Washington, DC, June 2019.<\/p>\n\n\n\n<p>[C47]&nbsp;Ang Li, Tao Li, Yan Zhang, Lili Zhang and Yanchao Zhang, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C47.pdf\">SocialDistance: how far are you from verified users in online social media?<\/a>&#8220;,&nbsp;&nbsp;<em>IEEE\/ACM International Symposium on Quality of Service<\/em>&nbsp;(IWQoS), Phoenix, AZ, June 2019.<\/p>\n\n\n\n<p>[C46]&nbsp;Yunzhi Li, Yidan Hu, Rui Zhang,Yanchao Zhang, and Terri Hedgpeth, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C46.pdf\">Secure indoor positioning against signal strength attacks via optimized multi-voting<\/a>,&#8221;&nbsp;<em>IEEE\/ACM International Symposium on Quality of Service<\/em>&nbsp;(IWQoS), Phoenix, AZ, June 2019.<\/p>\n\n\n\n<p>[C45] Ghazaleh Beigi, Ruocheng Guo, Alexander Nou, Yanchao Zhang, and Huan Liu, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C45.pdf\">Protecting user privacy: an approach for untraceable web browsing history and unambiguous user profiles<\/a>,&#8221;&nbsp;<em>ACM International Conference on Web Search and Data Mining<\/em>&nbsp;(WSDM), Melbourne, Australia, February 2019.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2018<\/h4>\n\n\n\n<p>[C44] Dianqi Han, Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, and&nbsp;Terri Hedgpeth, &#8220;<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C44.pdf\">Proximity-Proof: secure and usable two-factor mobile authentication<\/a>,&#8221;&nbsp;<em>ACM Annual Conference on Mobile Computing and Networking<\/em>&nbsp;(MobiCom), New Delhi, India, October 2018.&nbsp;<\/p>\n\n\n\n<p>[C43] Ghazaleh Beigi, Kai Shu, Yanchao Zhang, and Huan Liu, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C43.pdf\">Securing social media user data: an adversarial approach<\/a>,\u201d&nbsp;<em>ACM Conference on HyperText and Social Media&nbsp;<\/em>(HT), Baltimore, MD, July 2018.<em>&nbsp;<\/em><\/p>\n\n\n\n<p>[C42] Lizhou Yuan, Yidan Hu, Yunzhi Li, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C42.pdf\">Secure RSS-fingerprint-based indoor positioning: attacks and countermeasures<\/a>,\u201d&nbsp;<em>IEEE Conference on Communications and Network Security<\/em>&nbsp;(CNS), Beijing, China, May 2018.<\/p>\n\n\n\n<p>[C41] Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C41.pdf\">EyeTell: video-assisted touchscreen keystroke inference from eye movements<\/a>, \u201d&nbsp;<em>IEEE Symposium on Security and Privacy<\/em>&nbsp;(SP), San Francisco, CA, May 2018.<\/p>\n\n\n\n<p>[C40] Jinxue Zhang, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Xia Hu, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C40.pdf\">Privacy-preserving social media data outsourcing<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Honolulu, HI, April 2018.<\/p>\n\n\n\n<p>[C39]&nbsp;Tao Li, Yimin Chen, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C39.pdf\">Secure crowdsourced indoor positioning systems<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Honolulu, HI, April 2018.<\/p>\n\n\n\n<p>[J38] Xin Yao, Yimin Chen, Rui Zhang, Yanchao Zhang, and Yaping Lin, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J38.pdf\">Beware of what you share:&nbsp; inferring user locations in Venmo<\/a>,\u201d&nbsp;<em>IEEE Internet of Things Journal<\/em>, vol. 5, no. 6, pp. 5109-5118, December 2018.&nbsp;<\/p>\n\n\n\n<p>[J37] Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Chi Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J37.pdf\">SpecGuard: spectrum misuse detection in dynamic spectrum access systems<\/a>,\u201d&nbsp;<em>IEEE Transactions on Mobile Computing<\/em>, vol. 17, no. 12, pp. 2925-2938, December 2018.&nbsp;<\/p>\n\n\n\n<p>[J36] Xiaocong Jin and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J36.pdf\">Privacy-preserving crowdsourced spectrum sensing<\/a>,\u201d&nbsp;<em>IEEE\/ACM Transactions on Networking<\/em>, vol. 26, no. 3, pp. 1236-1249, June 2018.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2017<\/h4>\n\n\n\n<p>[C38] Yimin Chen, Jingchao Sun, Xiaocong Jin, Tao Li, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C38.pdf\">Your face your heart: secure mobile face authentication with photoplethysmograms<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Atlanta, GA, April 2017.<\/p>\n\n\n\n<p>[C37] Yimin Chen, Xiaocong Jin, Jingchao Sun, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C37.pdf\">POWERFUL: mobile app fingerprinting via power analysis<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Atlanta, GA, April 2017.<\/p>\n\n\n\n<p>[C36] Xin Yao, Rui Zhang, Yanchao Zhang, and Yaping Lin, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C36.pdf\">Verifiable social data outsourcing<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Atlanta, GA, April 2017.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2016<\/h4>\n\n\n\n<p>[C35] Tao Li, Yimin Chen, Jingchao Sun, Xiaocong Jin, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C35.pdf\">iLock: immediate and automatic locking of mobile devices against data theft<\/a>,\u201d&nbsp;<em>ACM Conference on Computer and Communications Security<\/em>&nbsp;(CCS), Vienna, Austria, October 2016.<\/p>\n\n\n\n<p>[C34] Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C34.pdf\">DPSense: differentially private crowdsourced spectrum sensing<\/a>,\u201d&nbsp;<em>ACM Conference on Computer and Communications Security<\/em>&nbsp;(CCS), Vienna, Austria, October 2016.<\/p>\n\n\n\n<p>[C33] Tao Li, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C33.pdf\">PriExpress: privacy-preserving express delivery with fine-grained attribute-based access control<\/a>,\u201d&nbsp;<em>IEEE Conference on Communications and Network Security<\/em>&nbsp;(CNS), Philadelphia, PA, October 2016.<\/p>\n\n\n\n<p>[C32] Xin Yao, Yaping Lin, Qin Liu, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C32.pdf\">A secure hierarchical deduplication system in cloud storage<\/a>,\u201d&nbsp;<em>IEEE\/ACM International Symposium on Quality of Service<\/em>&nbsp;(IWQoS), Beijing, China, June 2016.<\/p>\n\n\n\n<p>[C31] Jinxue Zhang, Xia Hu, Yanchao Zhang, and Huan Liu, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C31.pdf\">Your age is no secret: Inferring microbloggers\u2019 ages via content and interaction analysis<\/a>,\u201d&nbsp;<em>International AAAI Conference on Web and Social Media<\/em>&nbsp;(ICWSM), Cologne, Germany, May 2016.<\/p>\n\n\n\n<p>[C30] Xiaocong Jin and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C30.pdf\">Privacy-preserving crowdsourced spectrum sensing<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), San Francisco, CA, April 2016.<\/p>\n\n\n\n<p>[C29] Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C29.pdf\">PriStream: privacy-preserving distributed stream monitoring of thresholded percentile statistics<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), San Francisco, CA, China, April 2016.<\/p>\n\n\n\n<p>[C28] Wenxin Chen, Mengjun Liu, Rui Zhang, Yanchao Zhang, and Shubo Liu, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C28.pdf\">Secure outsourced skyline query processing via untrusted cloud service providers<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), San Francisco, April 2016.<\/p>\n\n\n\n<p>[C27] Jingchao Sun, Xiaocong Jin, Yimin Chen, Jingxue Zhang, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C27.pdf\">VISIBLE: video-assisted keystroke inference from tablet backside motion<\/a>,\u201d&nbsp;<em>ISOC Network and Distributed System Security Symposium<\/em>&nbsp;(NDSS), San Diego, California, February 2016.<\/p>\n\n\n\n<p>[J35] Jinxue Zhang, Rui Zhang, Yanchao Zhang and Guanhua Yan, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J35.pdf\">The rise of social botnets: attacks and countermeasures<\/a>,\u201d&nbsp;<em>IEEE Transactions on Dependable and Secure Computing<\/em>, accepted, April 2016.<\/p>\n\n\n\n<p>[J34] Jinghcao Sun, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J34.pdf\">Privacy-preserving spatiotemporal matching for secure device-to-device communications<\/a>,\u201d&nbsp;<em>IEEE Internet of Things Journal<\/em>, vol. 3, no. 6, pp. 1048-1060, December 2016.<\/p>\n\n\n\n<p>[J33] Jinxue Zhang, Rui Zhang, Jingchao Sun, Yanchao Zhang and Chi Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J33.pdf\">TrueTop: a sybil-resilient system for user influence measurement on Twitter<\/a>,\u201d&nbsp;<em>IEEE\/ACM Transactions on Networking<\/em>, vol. 24, no. 5, pp. 2834-2846, October 2016.<\/p>\n\n\n\n<p>[J32] Jingchao Sun, Rui Zhang, Xiaocong Jin, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J32.pdf\">SecureFind: secure and privacy-preserving object finding via mobile crowdsourcing<\/a>,\u201d&nbsp;<em>IEEE Transactions on Wireless Communications<\/em>, vol. 15, no. 3, pp. 1716-1728, March 2016.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2015<\/h4>\n\n\n\n<p>[C26] Xiaocong Jin, Jingchao Sun, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C26.pdf\">SafeDSA: safeguard dynamic spectrum access against fake secondary users<\/a>,\u201d&nbsp;<em>ACM Conference on Computer and Communications Security<\/em>&nbsp;(CCS), Denver, Colorado, October 2015.<\/p>\n\n\n\n<p>[C25] Jinxue Zhang, Jingchao Sun, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C25.pdf\">Your actions tell where you are: uncovering Twitter users in a metropolitan area<\/a>,\u201d&nbsp;<em>IEEE Conference on Communications and Network Security<\/em>&nbsp;(CNS), Florence, Italy, September 2015.<\/p>\n\n\n\n<p>[C24] Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Chi Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C24.pdf\">SpecGuard: spectrum misuse detection in dynamic spectrum access systems<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Hong Kong, China, April 2015.<\/p>\n\n\n\n<p>[C23] Yimin Chen, Jingchao Sun, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C23.pdf\">Your song your way: rhythm-based two-factor authentication for multi-touch mobile devices<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Hong Kong, China, April 2015.<\/p>\n\n\n\n<p>[J31] Rui Zhang, Jingchao Sun, Yanchao Zhang and Xiaoxia Huang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J31.pdf\">Jamming-resistant secure neighbor discovery in mobile ad hoc networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Wireless Communications<\/em>, vol. 14, no. 10, pp. 5588-5601, October 2015.<\/p>\n\n\n\n<p>[J30] Rui Zhang, Jingchao Sun, Yanchao Zhang and Chi Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J30.pdf\">Secure spatial top-K query processing via untrusted location-based service providers<\/a>,\u201d&nbsp;<em>IEEE Transactions on Dependable and Secure Computing<\/em>, vol. 12, no. 1, pp. 111-124, January\/February 2015.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2014<\/h4>\n\n\n\n<p>[C22] Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C22.pdf\">TouchIn: sightless two-factor authentication on multi-touch mobile devices<\/a>,\u201d&nbsp;<em>IEEE Conference on Communication and Network Security<\/em>&nbsp;(CNS), San Francisco, CA, October 2014.<\/p>\n\n\n\n<p>[C21] Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C21.pdf\">SYNERGY: a game-theoretical approach for cooperative key generation in wireless networks<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Toronto, Canada, April 2014.<\/p>\n\n\n\n<p>[J29] Xiaocong Jin, Rui Zhang, Jingchao Sun, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J29.pdf\">TIGHT: a geographic routing protocol for cognitive radio mobile ad hoc networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Wireless Communications<\/em>, vol. 13, no. 8, pp. 4670-4681, August 2014.<\/p>\n\n\n\n<p>[J28] Rui Zhang, Jing Shi, Yanchao Zhang and Chi Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J28.pdf\">Secure top-K query processing in unattended tiered sensor networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Vehicular Technology<\/em>, vol. 63, no. 9, pp. 4681-4693, November 2014.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2013<\/h4>\n\n\n\n<p>[C20] Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C20.pdf\">On the impact of social botnets for spam distribution and digital-influence manipulation<\/a>,\u201d&nbsp;<em>IEEE Conference on Communications and Network Security<\/em>&nbsp;(CNS), Washington, D.C., October 2013.<\/p>\n\n\n\n<p>[C19] Xia Hu, Jiliang Tang, Yanchao Zhang, and Huan Liu, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C19.pdf\">Social spammer detection in microblogging<\/a>,\u201d&nbsp;<em>International Joint Conference on Artificial Intelligence<\/em>&nbsp;(IJCAI), Beijing, China, August 2013.<\/p>\n\n\n\n<p>[C18] Rui Zhang, Jinxue Zhang, Yanchao Zhang, and Chi Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C18.pdf\">Secure crowdsourcing-based cooperative spectrum sensing<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Turin, Italy, April 2013.<\/p>\n\n\n\n<p>[C17] Jingchao Sun, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C17.pdf\">Privacy-preserving spatiotemporal matching<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Turin, Italy, April 2013.<\/p>\n\n\n\n<p>[J27] Rui Zhang, Jing Shi, Yanchao Zhang and Chi Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J27.pdf\">Verifiable privacy-preserving aggregation in people-centric urban sensing systems<\/a>,\u201d&nbsp;<em>IEEE Journal on Selected Areas in Communications<\/em>&nbsp;(Special Issue on Emerging Technologies in Communications), vol. 31, no. 9, pp. 268-278, September 2013.<\/p>\n\n\n\n<p>[J26] Rui Zhang, Jinxue Zhang, Yanchao Zhang Jinyuan Sun, and Guanhua Yan, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J26.pdf\">Privacy-preserving profile matching for proximity-based mobile social networking<\/a>,\u201d&nbsp;<em>IEEE Journal on Selected Areas in Communications<\/em>&nbsp;(Special Issue on Emerging Technologies in Communications), vol. 31, no. 9, pp. 656-668, September 2013.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2012<\/h4>\n\n\n\n<p>[C16] Rui Zhang, Yanchao Zhang, and Chi Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C16.pdf\">Secure top-k query processing via untrusted location-based service providers<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communication<\/em>&nbsp;(INFOCOM), Orlando, FL, March 2012.<\/p>\n\n\n\n<p>[C15] Rui Zhang, Yanchao Zhang, Jinyuan Sun, and Guanhua Yan, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C15.pdf\">Fine-grained private matching for proximity-based mobile social networking<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communication<\/em>&nbsp;(INFOCOM), Orlando, FL, March 2012.<\/p>\n\n\n\n<p>[J25] Rui Zhang, Yanchao Zhang and Kui Ren, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J25.pdf\">Distributed privacy-preserving access control in sensor networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Parallel and Distributed Systems<\/em>, vol. 23, no.8, pp. 1427\u20131438, August 2012.<\/p>\n\n\n\n<p>[J24] Rui Zhang, Jing Shi, Yanchao Zhang and Jinyuan Sun, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J24.pdf\">Secure cooperative data storage and query processing in unattended tiered sensor networks<\/a>,\u201d&nbsp;<em>IEEE Journal on Selected Areas in Communications<\/em>&nbsp;(Special Issue on Cooperative Networking Challenges and Applications), vol. 30, no. 2, pp. 433\u2013441, February 2012.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2011<\/h4>\n\n\n\n<p>[C14] Rui Zhang and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C14.pdf\">LR-Seluge: loss-resilient and secure code dissemination in wireless sensor networks<\/a>,\u201d&nbsp;<em>International Conference on Distributed Computing Systems<\/em>&nbsp;(ICDCS), Minneapolis, Minnesota, June 2011.<\/p>\n\n\n\n<p>[C13] Rui Zhang, Yanchao Zhang, and Xiaoxia Huang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C13.pdf\">JR-SND: jamming-resilient secure neighbor discovery in mobile ad hoc networks<\/a>,\u201d&nbsp;<em>International Conference on Distributed Computing Systems<\/em>&nbsp;(ICDCS), Minneapolis, Minnesota, June 2011.<\/p>\n\n\n\n<p>[C12] Rui Zhang, Yunzhong Liu, Yanchao Zhang, and Jinyuan Sun, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C12.pdf\">Fast identification of the missing tags in a large RFID system<\/a>,\u201d&nbsp;<em>IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks<\/em>&nbsp;(SECON), Salt Lake City, Utah, June 2011.<\/p>\n\n\n\n<p>[J23] Rui Zhang, Yanchao Zhang and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J23.pdf\">AOS: an anonymous overlay system for mobile ad hoc networks<\/a>,\u201d&nbsp;<em>ACM Wireless Networks&nbsp;<\/em>(WINET), vol. 17, no. 4, pp. 843\u2013859, May 2011.<\/p>\n\n\n\n<p>[J22] Chi Zhang, Yang Song, Yuguang Fang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J22.pdf\">On the price of security in large-scale wireless ad hoc networks<\/a>,\u201d&nbsp;<em>IEEE\/ACM Transactions on Networking<\/em>, vol. 19, no. 2, pp. 319-332, April 2011.<\/p>\n\n\n\n<p>[J21] Jing Shi, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J21.pdf\">A spatiotemporal approach for secure range queries in tiered sensor networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Wireless Communications<\/em>, vol. 10, no. 1, pp. 264-273, January 2011.<\/p>\n\n\n\n<p>[J20] Jinyuan Sun, Chi Zhang, Yanchao Zhang and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J20.pdf\">SAT: a security architecture achieving anonymity and traceability in wireless mesh networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Dependable and Secure Computing<\/em>, vol. 8, no. 2, pp. 295-307, March 2011.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2010<\/h4>\n\n\n\n<p>[C11] Yunzhong Liu, Rui Zhang, Jing Shi, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C11.pdf\">Traffic inference in anonymous MANETs<\/a>,\u201d&nbsp;<em>IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks<\/em>&nbsp;(SECON), Boston, MA, June 2010.<\/p>\n\n\n\n<p>[C10] Rui Zhang and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C10.pdf\">Wormhole-resilient secure neighbor discovery in underwater acoustic networks<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), San Diego, CA, March 2010.<\/p>\n\n\n\n<p>[C09] Rui Zhang, Jing Shi, Yunzhong Liu, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C9.pdf\">Verifiable fine-grained top-k queries in tiered sensor networks<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), San Diego, CA, March 2010.<\/p>\n\n\n\n<p>[C08]&nbsp;Jing Shi, Rui Zhang, Yunzhong Liu, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C8.pdf\">PriSense: privacy-preserving data aggregation in people-centric urban sensing systems<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), San Diego, CA, March 2010.<\/p>\n\n\n\n<p>[J19] Jinyuan Sun, Chi Zhang, Yanchao Zhang and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J19.pdf\">An identity-based security system for user privacy in vehicular ad hoc networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Parallel and Distributed Systems<\/em>, vol. 21, no. 9, pp. 1227-1239, September 2010.<\/p>\n\n\n\n<p>[J18] Chi Zhang, Yanchao Zhang and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J18.pdf\">A coverage inference protocol for wireless sensor networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Mobile Computing<\/em>, vol. 9, no. 6, pp. 850-864, June 2010.<\/p>\n\n\n\n<p>[J17] Kui Ren, Shucheng Yu, Wenjing Lou, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J17.pdf\">PEACE: a sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Parallel and Distributed Systems<\/em>, vol. 21, no. 2, pp. 203-215, February 2010.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2009<\/h4>\n\n\n\n<p>[C07] Rui Zhang, Jing Shi, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C7.pdf\">Secure multidimensional range queries in sensor networks<\/a>,\u201d&nbsp;<em>ACM International Symposium on Mobile Ad Hoc Networking and Computing<\/em>&nbsp;(MobiHoc), New Orleans, LA, May 2009.<\/p>\n\n\n\n<p>[C06] Jing Shi, Rui Zhang, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C6.pdf\">Secure range queries in tiered sensor networks<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Rio de Janeiro, Brazil, April 2009.<\/p>\n\n\n\n<p>[C05] Rui Zhang, Yanchao Zhang, and Kui Ren, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C5.pdf\">DP<sup>2<\/sup>AC: distributed privacy-preserving access control in sensor networks<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Rio de Janeiro, Brazil, April 2009.<\/p>\n\n\n\n<p>[C04] Qian Wang, Kui Ren, Wenjing Lou, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C4.pdf\">Dependable and secure sensor data storage with dynamic integrity assurance<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Rio de Janeiro, Brazil, April 2009.<\/p>\n\n\n\n<p>[J16] Kui Ren, Wenjing Lou, Shucheng Yu, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J16.pdf\">Multi-user broadcast authentication in wireless sensor networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Vehicular Technology<\/em>, vol. 58, no. 8, pp. 4554-4464, October 2009.<\/p>\n\n\n\n<p>[J15] Chi Zhang, Yanchao Zhang and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J15.pdf\">Localized coverage boundary detection for wireless sensor networks<\/a>,\u201d&nbsp;<em>ACM Wireless Networks&nbsp;<\/em>(WINET), vol. 15, no. 1, pp. 3-20, January 2009.<\/p>\n\n\n\n<p>[J14] Yanchao Zhang and Kui Ren, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J14.pdf\">On address privacy in mobile ad hoc networks<\/a>,\u201d&nbsp;<em>ACM Mobile Networks and Applications<\/em>&nbsp;(MONET), vol. 14, no. 2, pp. 188-197, April 2009.<\/p>\n\n\n\n<p>[J13] Wenjing Lou, Wei Liu, Yanchao Zhang and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J13.pdf\">SPREAD: improving network security by multipath routing in mobile ad hoc networks<\/a>,\u201d&nbsp;<em>ACM Wireless Networks<\/em>&nbsp;(WINET), vol. 15, no. 3, pp. 279-294, April 2009.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2008<\/h4>\n\n\n\n<p>[J12] Kui Ren, Wenjing Lou, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J12.pdf\">LEDS: providing location-aware end-to-end data security in wireless sensor networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Mobile Computing<\/em>, vol. 7, no. 5, pp. 585-598, May 2008.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2007<\/h4>\n\n\n\n<p>[C03] Kui Ren, Wenjing Lou, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C3.pdf\">Multi-user broadcast authentication in wireless sensor networks<\/a>,\u201d&nbsp;<em>IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks<\/em>&nbsp;(SECON), San Diego, June 2007.<\/p>\n\n\n\n<p>[J11] Yanchao Zhang and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J11.pdf\">A secure authentication and billing architecture for wireless mesh networks<\/a>,\u201d&nbsp;<em>ACM Wireless Networks&nbsp;<\/em>(WINET), vol. 13, no. 5, pp. 663-678, October 2007.<\/p>\n\n\n\n<p>[J10] Yanchao Zhang, Wenjing Lou, Wei Liu, and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J10.pdf\">A secure incentive protocol for mobile ad hoc networks<\/a>,\u201d&nbsp;<em>ACM Wireless Networks&nbsp;<\/em>(WINET), vol. 13, no. 5, pp. 569-582, October 2007.<\/p>\n\n\n\n<p>[J09]&nbsp; Yanchao Zhang and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J9.pdf\">A fine-grained reputation system for reliable service selection in peer-to-peer networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Parallel and Distributed Systems<\/em>, vol. 18, no. 8, pp. 1134-1145, August 2007.<\/p>\n\n\n\n<p>[J08] Yun Zhou, Yanchao Zhang and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J8.pdf\">Access control in wireless sensor networks<\/a>,\u201d&nbsp;<em>Ad Hoc Networks<\/em>&nbsp;(Special Issue on Security in Ad Hoc and Sensor Networks), vol. 5, no. 1, pp. 3-13, January 2007.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2006 and prior<\/h4>\n\n\n\n<p>[C02] Kui Ren, Wenjing Lou, and Yanchao Zhang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C2.pdf\">LEDS: providing location-aware end-to-end data security in wireless sensor networks<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Barcelona, Spain, April 2006.<\/p>\n\n\n\n<p>[C01] Yanchao Zhang, Wei Liu, and Wenjing Lou, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/C1.pdf\">Anonymous communications in mobile ad hoc networks<\/a>,\u201d&nbsp;<em>IEEE International Conference on Computer Communications<\/em>&nbsp;(INFOCOM), Miami, Florida, March 2005.<\/p>\n\n\n\n<p>[J07] Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J7.pdf\">Securing mobile ad hoc networks with certificateless public keys<\/a>,\u201d&nbsp;<em>IEEE Transactions on Dependable and Secure Computing<\/em>, vol. 3, no. 4, pp. 386-399, October 2006.<\/p>\n\n\n\n<p>[J06] Yanchao Zhang and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J6.pdf\">ARSA: an attack-resilient security architecture for multi-hop wireless mesh networks<\/a>,\u201d&nbsp;<em>IEEE Journal on Selected Areas in Communications<\/em>&nbsp;(Special Issue on High-Speed Network Security\u2013Architecture, Algorithms, and Implementation), vol. 24, no. 10, pp. 1916-1928, October 2006.<\/p>\n\n\n\n<p>[J05] Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J5.pdf\">MASK: anonymous on-demand routing in mobile ad hoc networks<\/a>,\u201d&nbsp;<em>IEEE Transactions on Wireless Communications<\/em>, vol. 5, no. 9, pp. 2376-2385, September 2006.<\/p>\n\n\n\n<p>[J04] Wei Liu, Yanchao Zhang Wenjing Lou, and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J4.pdf\">A robust and energy-efficient data dissemination framework for wireless sensor networks<\/a>,\u201d&nbsp;<em>ACM Wireless Networks<\/em>&nbsp;(WINET), vol. 12, no. 4, pp. 465-479, August 2006.<\/p>\n\n\n\n<p>[J03] Yanchao Zhang, Wei Liu, Yuguang Fang, and Dapeng Wu, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J3.pdf\">Secure localization and authentication in ultra-wideband sensor networks<\/a>,\u201d&nbsp;<em>IEEE Journal on Selected Areas in Communications<\/em>&nbsp;(Special Issue on Ultra Wideband Wireless Communications\u2013Theory and Applications), vol. 24, no. 4, pp. 829-835, April 2006.<\/p>\n\n\n\n<p>[J02] Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J2.pdf\">Location-based compromise-tolerant security mechanisms for wireless sensor networks<\/a>,\u201d&nbsp;<em>IEEE Journal on Selected Areas in Communications<\/em>&nbsp;(Special Issue on Security in Wireless Ad Hoc Networks), vol. 24, no. 2, pp. 247-260, February 2006.<\/p>\n\n\n\n<p>[J01] Wei Liu, Yanchao Zhang, Kejie Lu, and Yuguang Fang, \u201c<a href=\"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-content\/uploads\/sites\/147\/2023\/07\/J1.pdf\">Energy conservation through resource-aware movement in heterogeneous mobile ad hoc networks<\/a>,\u201d&nbsp;<em>Journal of Combinatorial Optimization&nbsp;<\/em>(Special Issue on Wireless Network Applications), vol. 11, no. 1, pp. 7-20, February 2006.<\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"mb-2\">2025 [C72] Abdualrhman Almeajel, Yan Zhang, Tao Li, and Yanchao Zhang, &#8220;mmRhythm: secure and usable user authentication for IoT devices based on hand-tapping patterns,&#8221; IEEE Miliary Communications Conference (MILCOM), Los Angeles, CA, October 2025. [C71] Zhaofeng Zhang, Xuanli Lin, Guoliang Xue, Yanchao Zhang, and Kevin S Chan, &#8220;Multi-Hop relay-aided task offloading for tactical edge computing,&#8221;&#8230;<\/p>\n","protected":false},"author":274,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-46","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/pages\/46","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/users\/274"}],"replies":[{"embeddable":true,"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/comments?post=46"}],"version-history":[{"count":0,"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/pages\/46\/revisions"}],"wp:attachment":[{"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/media?parent=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}