​
Login / Signup
Kun He
ORCID
Publication Activity (10 Years)
Years Active: 2012-2024
Publications (10 Years): 46
Top Topics
Storage Management
Liveness Detection
Authentication And Key Agreement
Mobile Devices
Top Venues
IEEE Trans. Dependable Secur. Comput.
CoRR
IEEE Trans. Inf. Forensics Secur.
IEEE Trans. Mob. Comput.
</>
Publications
</>
Mei Wang
,
Jing Chen
,
Kun He
,
Ruozhou Yu
,
Ruiying Du
,
Zhihao Qian
UFinAKA: Fingerprint-Based Authentication and Key Agreement With Updatable Blind Credentials.
IEEE/ACM Trans. Netw.
32 (2) (2024)
Xiping Sun
,
Jing Chen
,
Kun He
,
Zhixiang He
,
Ruiying Du
,
Yebo Feng
,
Qingchuan Zhao
,
Cong Wu
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR
(2024)
Haozhe Xu
,
Cong Wu
,
Yangyang Gu
,
Xingcan Shang
,
Jing Chen
,
Kun He
,
Ruiying Du
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems.
CoRR
(2024)
Yangyang Gu
,
Jing Chen
,
Kun He
,
Cong Wu
,
Ziming Zhao
,
Ruiying Du
WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices.
IEEE Trans. Mob. Comput.
23 (6) (2024)
Ruichao Liang
,
Jing Chen
,
Kun He
,
Yueming Wu
,
Gelei Deng
,
Ruiying Du
,
Cong Wu
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
ICSE
(2024)
Xiping Sun
,
Jing Chen
,
Cong Wu
,
Kun He
,
Haozhe Xu
,
Yebo Feng
,
Ruiying Du
,
Xianhao Chen
MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones.
CoRR
(2024)
Meng Jia
,
Jing Chen
,
Kun He
,
Min Shi
,
Yuanzheng Wang
,
Ruiying Du
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Ruichao Liang
,
Jing Chen
,
Cong Wu
,
Kun He
,
Yueming Wu
,
Weisong Sun
,
Ruiying Du
,
Qingchuan Zhao
,
Yang Liu
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph.
CoRR
(2024)
Haolin Wu
,
Jing Chen
,
Ruiying Du
,
Cong Wu
,
Kun He
,
Xingcan Shang
,
Hao Ren
,
Guowen Xu
CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning.
CoRR
(2024)
Renli Zhang
,
Ruiting Zhou
,
Yufeng Wang
,
Haisheng Tan
,
Kun He
Incentive Mechanisms for Online Task Offloading With Privacy-Preserving in UAV-Assisted Mobile Edge Computing.
IEEE/ACM Trans. Netw.
32 (3) (2024)
Qiao Li
,
Jing Chen
,
Kun He
,
Zijun Zhang
,
Ruiying Du
,
Jisi She
,
Xinxin Wang
Model-agnostic adversarial example detection via high-frequency amplification.
Comput. Secur.
141 (2024)
Cong Wu
,
Jing Chen
,
Qianru Fang
,
Kun He
,
Ziming Zhao
,
Hao Ren
,
Guowen Xu
,
Yang Liu
,
Yang Xiang
Rethinking Membership Inference Attacks Against Transfer Learning.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Nan Yan
,
Yuqing Li
,
Jing Chen
,
Xiong Wang
,
Jianan Hong
,
Kun He
,
Wei Wang
Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning.
INFOCOM
(2024)
Yangyang Gu
,
Jing Chen
,
Cong Wu
,
Kun He
,
Ziming Zhao
,
Ruiying Du
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
7 (4) (2023)
Xuanang Yang
,
Jing Chen
,
Kun He
,
Hao Bai
,
Cong Wu
,
Ruiying Du
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Min Shi
,
Jing Chen
,
Kun He
,
Haoran Zhao
,
Meng Jia
,
Ruiying Du
Formal Analysis and Patching of BLE-SC Pairing.
USENIX Security Symposium
(2023)
Ran Yan
,
Ruiying Du
,
Kun He
,
Jing Chen
Efficient Adversarial Training with Membership Inference Resistance.
PRCV (1)
(2023)
Cong Wu
,
Kun He
,
Jing Chen
,
Ziming Zhao
,
Ruiying Du
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput.
19 (6) (2022)
Jing Chen
,
Xin Chen
,
Kun He
,
Ruiying Du
,
Weihang Chen
,
Yang Xiang
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel.
IEEE Trans. Dependable Secur. Comput.
19 (5) (2022)
Cong Wu
,
Jing Chen
,
Kun He
,
Ziming Zhao
,
Ruiying Du
,
Chen Zhang
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
CCS
(2022)
Jing Chen
,
Zeyi Zhan
,
Kun He
,
Ruiying Du
,
Donghui Wang
,
Fei Liu
XAuth: Efficient Privacy-Preserving Cross-Domain Authentication.
IEEE Trans. Dependable Secur. Comput.
19 (5) (2022)
Mei Wang
,
Kun He
,
Jing Chen
,
Ruiying Du
,
Bingsheng Zhang
,
Zengpeng Li
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst.
131 (2022)
Meng Jia
,
Jing Chen
,
Kun He
,
Ruiying Du
,
Li Zheng
,
Mingxi Lai
,
Donghui Wang
,
Fei Liu
Redactable Blockchain From Decentralized Chameleon Hash Functions.
IEEE Trans. Inf. Forensics Secur.
17 (2022)
Kun He
,
Jing Chen
,
Qinxi Zhou
,
Ruiying Du
,
Yang Xiang
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost.
IEEE Trans. Inf. Forensics Secur.
16 (2021)
Jing Chen
,
Chiheng Wang
,
Kun He
,
Ziming Zhao
,
Min Chen
,
Ruiying Du
,
Gail-Joon Ahn
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps.
IEEE Trans. Dependable Secur. Comput.
18 (1) (2021)
Kun He
,
Jing Chen
,
Quan Yuan
,
Shouling Ji
,
Debiao He
,
Ruiying Du
Dynamic Group-Oriented Provable Data Possession in the Cloud.
IEEE Trans. Dependable Secur. Comput.
18 (3) (2021)
Meng Jia
,
Kun He
,
Jing Chen
,
Ruiying Du
,
Weihang Chen
,
Zhihong Tian
,
Shouling Ji
PROCESS: Privacy-Preserving On-Chain Certificate Status Service.
INFOCOM
(2021)
Mei Wang
,
Kun He
,
Jing Chen
,
Zengpeng Li
,
Wei Zhao
,
Ruiying Du
Biometrics-Authenticated Key Exchange for Secure Messaging.
CCS
(2021)
Jing Chen
,
Jiong Chen
,
Kun He
,
Ruiying Du
SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures.
Future Gener. Comput. Syst.
115 (2021)
Jing Chen
,
Peidong Jiang
,
Kun He
,
Cheng Zeng
,
Ruiying Du
HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors.
ICICS (1)
(2021)
Wenna Song
,
Jiang Ming
,
Han Yan
,
Yi Xiang
,
Yuan Chen
,
Yuan Luo
,
Kun He
,
Guojun Peng
Android Data-Clone Attack via Operating System Customization.
IEEE Access
8 (2020)
Cong Wu
,
Kun He
,
Jing Chen
,
Ziming Zhao
,
Ruiying Du
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
USENIX Security Symposium
(2020)
Cong Wu
,
Kun He
,
Jing Chen
,
Ruiying Du
,
Yang Xiang
CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake.
IEEE Internet Things J.
7 (12) (2020)
Jing Chen
,
Kun He
,
Lan Deng
,
Quan Yuan
,
Ruiying Du
,
Yang Xiang
,
Jie Wu
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data.
IEEE Trans. Serv. Comput.
13 (6) (2020)
Jiong Chen
,
Kun He
,
Jing Chen
,
Yingying Fang
,
Ruiying Du
PowerPrint: Identifying Smartphones through Power Consumption of the Battery.
Secur. Commun. Networks
2020 (2020)
Shixiong Yao
,
Jing Chen
,
Kun He
,
Ruiying Du
,
Tianqing Zhu
,
Xin Chen
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management.
IEEE Access
7 (2019)
Cong Wu
,
Kun He
,
Jing Chen
,
Ruiying Du
ICAuth: Implicit and Continuous Authentication When the Screen Is Awake.
ICC
(2019)
Jing Chen
,
Shixiong Yao
,
Quan Yuan
,
Kun He
,
Shouling Ji
,
Ruiying Du
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections.
INFOCOM
(2018)
Jing Chen
,
Kun He
,
Quan Yuan
,
Min Chen
,
Ruiying Du
,
Yang Xiang
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services.
IEEE Trans. Mob. Comput.
17 (11) (2018)
Kun He
,
Jing Chen
,
Yu Zhang
,
Ruiying Du
,
Yang Xiang
,
Mohammad Mehedi Hassan
,
Abdulhameed Alelaiwi
Secure independent-update concise-expression access control for video on demand in cloud.
Inf. Sci.
387 (2017)
Jing Chen
,
Kun He
,
Quan Yuan
,
Guoliang Xue
,
Ruiying Du
,
Lina Wang
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks.
IEEE Trans. Mob. Comput.
16 (6) (2017)
Jing Chen
,
Yingying Fang
,
Kun He
,
Ruiying Du
Charge-Depleting of the Batteries Makes Smartphones Recognizable.
ICPADS
(2017)
Jing Chen
,
Kun He
,
Ruiying Du
,
Fajiang Yu
,
Quan Yuan
,
Lina Wang
,
Cai Fu
A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst.
29 (1) (2016)
Kun He
,
Jing Chen
,
Ruiying Du
,
Qianhong Wu
,
Guoliang Xue
,
Xiang Zhang
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments.
IEEE Trans. Computers
65 (12) (2016)
Jing Chen
,
Lihong Zhang
,
Kun He
,
Min Chen
,
Ruiying Du
,
Lina Wang
Message-locked proof of ownership and retrievability with remote repairing in cloud.
Secur. Commun. Networks
9 (16) (2016)
Jing Chen
,
Kun He
,
Quan Yuan
,
Ruiying Du
,
Lina Wang
,
Jie Wu
Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks.
Comput. Networks
105 (2016)
Jing Chen
,
Kun He
,
Ruiying Du
,
Minghui Zheng
,
Yang Xiang
,
Quan Yuan
Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks.
IEEE Trans. Parallel Distributed Syst.
26 (2) (2015)
Ruiying Du
,
Lan Deng
,
Jing Chen
,
Kun He
,
Minghui Zheng
Proofs of Ownership and Retrievability in Cloud Storage.
TrustCom
(2014)
Jianwei Liu
,
Ruiying Du
,
Jing Chen
,
Kun He
A key distribution scheme using network coding for mobile ad hoc network.
Secur. Commun. Networks
5 (1) (2012)