مرور بر اساس تاریخ انتشار Kui Ren

Showing results 1 to 20 of 28  بعدی >
PreviewIssue DateTitleContributor(s)
2017Capability-Based Security Enforcement in Named Data NetworkingQi Li; Patrick P. C. Lee; Peng Zhang; Purui Su; Liang He; Kui Ren
2017Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the NoiseZijian Zhang; Zhan Qin; Liehuang Zhu; Jian Weng; Kui Ren
7422120.pdf.jpg2016DPcode: Privacy-Preserving Frequent Visual Patterns Publication on CloudZhan Qin; Kui Ren; Ting Yu; Jian Weng
2017DPPro: Differentially Private High-Dimensional Data Release via Random ProjectionChugui Xu; Ju Ren; Yaoxue Zhang; Zhan Qin; Kui Ren
2017An Efficient Flicker-Free FEC Coding Scheme for Dimmable Visible Light Communication Based on Polar CodesJunbin Fang; Zhen Che; Zoe Lin Jiang; Xiaolong Yu; Siu-Ming Yiu; Kui Ren; Xiaoqing Tan; Zhe Chen
2017Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced DataZhangjie Fu; Xinle Wu; Qian Wang; Kui Ren
7404239.pdf.jpg2016Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key UpdatesJia Yu; Kui Ren; Cong Wang
7349214.pdf.jpg2016Enabling Personalized Search over Encrypted Outsourced Data with Efficiency ImprovementZhangjie Fu; Kui Ren; Jiangang Shu; Xingming Sun; Fengxiao Huang
7552468.pdf.jpg2016Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive SensingXingliang Yuan; Xinyu Wang; Cong Wang; Jian Weng; Kui Ren
7484373.pdf.jpg2016Guest Editorial: Introduction to the Special Section on Emerging Security Trends for Biomedical Computations, Devices, and InfrastructuresMehran Mozaffari-Kermani; Reza Azarderakhsh; Kui Ren; Jean-Luc Beuchat
7362239.pdf.jpg2016Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio NetworksQian Wang; Kui Ren; Peng Ning; Shengshan Hu
2017Leakage of .onion at the DNS Root: Measurements, Causes, and CountermeasuresAziz Mohaisen; Kui Ren
2017P^{2} -SAS: Privacy-Preserving Centralized Dynamic Spectrum Access SystemYanzhi Dou; Kexiong Zeng; He Li; Yaling Yang; Bo Gao; Kui Ren; Shaoqian Li
7061471.pdf.jpg2016Password Extraction via Reconstructed Wireless Mouse TrajectoryXian Pan; Zhen Ling; Aniket Pingley; Wei Yu; Nan Zhang; Kui Ren; Xinwen Fu
2017Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart GridsLiehuang Zhu; Zijian Zhang; Zhan Qin; Jian Weng; Kui Ren
7511677.pdf.jpg2016A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud ComputingZhihua Xia; Xinhui Wang; Liangao Zhang; Zhan Qin; Xingming Sun; Kui Ren
2017Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced DataZhangjie Fu; Fengxiao Huang; Kui Ren; Jian Weng; Cong Wang
7061506.pdf.jpg2016SBVLC: Secure Barcode-Based Visible Light Communication for SmartphonesBingsheng Zhang; Kui Ren; Guoliang Xing; Xinwen Fu; Cong Wang
7070751.pdf.jpg2016Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear ProgrammingCong Wang; Kui Ren; Jia Wang
7469805.pdf.jpg2016Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image DataShengshan Hu; Qian Wang; Jingjun Wang; Zhan Qin; Kui Ren