Sign in
Kun He
ORCID
Publication Activity (10 Years)
Years Active: 2012-2024
Publications (10 Years): 36
Top Topics
Mobile Devices
Storage Management
Robust Detection
Dominating Set
Top Venues
IEEE Trans. Dependable Secur. Comput.
IEEE Trans. Inf. Forensics Secur.
Future Gener. Comput. Syst.
Secur. Commun. Networks
</>
Publications
</>
Ruichao Liang
,
Jing Chen
,
Kun He
,
Yueming Wu
,
Gelei Deng
,
Ruiying Du
,
Cong Wu
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
ICSE
(2024)
Meng Jia
,
Jing Chen
,
Kun He
,
Min Shi
,
Yuanzheng Wang
,
Ruiying Du
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Yangyang Gu
,
Jing Chen
,
Cong Wu
,
Kun He
,
Ziming Zhao
,
Ruiying Du
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
7 (4) (2023)
Xuanang Yang
,
Jing Chen
,
Kun He
,
Hao Bai
,
Cong Wu
,
Ruiying Du
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Min Shi
,
Jing Chen
,
Kun He
,
Haoran Zhao
,
Meng Jia
,
Ruiying Du
Formal Analysis and Patching of BLE-SC Pairing.
USENIX Security Symposium
(2023)
Ran Yan
,
Ruiying Du
,
Kun He
,
Jing Chen
Efficient Adversarial Training with Membership Inference Resistance.
PRCV (1)
(2023)
Cong Wu
,
Kun He
,
Jing Chen
,
Ziming Zhao
,
Ruiying Du
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput.
19 (6) (2022)
Jing Chen
,
Xin Chen
,
Kun He
,
Ruiying Du
,
Weihang Chen
,
Yang Xiang
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel.
IEEE Trans. Dependable Secur. Comput.
19 (5) (2022)
Cong Wu
,
Jing Chen
,
Kun He
,
Ziming Zhao
,
Ruiying Du
,
Chen Zhang
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
CCS
(2022)
Jing Chen
,
Zeyi Zhan
,
Kun He
,
Ruiying Du
,
Donghui Wang
,
Fei Liu
XAuth: Efficient Privacy-Preserving Cross-Domain Authentication.
IEEE Trans. Dependable Secur. Comput.
19 (5) (2022)
Mei Wang
,
Kun He
,
Jing Chen
,
Ruiying Du
,
Bingsheng Zhang
,
Zengpeng Li
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst.
131 (2022)
Meng Jia
,
Jing Chen
,
Kun He
,
Ruiying Du
,
Li Zheng
,
Mingxi Lai
,
Donghui Wang
,
Fei Liu
Redactable Blockchain From Decentralized Chameleon Hash Functions.
IEEE Trans. Inf. Forensics Secur.
17 (2022)
Kun He
,
Jing Chen
,
Qinxi Zhou
,
Ruiying Du
,
Yang Xiang
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost.
IEEE Trans. Inf. Forensics Secur.
16 (2021)
Jing Chen
,
Chiheng Wang
,
Kun He
,
Ziming Zhao
,
Min Chen
,
Ruiying Du
,
Gail-Joon Ahn
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps.
IEEE Trans. Dependable Secur. Comput.
18 (1) (2021)
Kun He
,
Jing Chen
,
Quan Yuan
,
Shouling Ji
,
Debiao He
,
Ruiying Du
Dynamic Group-Oriented Provable Data Possession in the Cloud.
IEEE Trans. Dependable Secur. Comput.
18 (3) (2021)
Meng Jia
,
Kun He
,
Jing Chen
,
Ruiying Du
,
Weihang Chen
,
Zhihong Tian
,
Shouling Ji
PROCESS: Privacy-Preserving On-Chain Certificate Status Service.
INFOCOM
(2021)
Mei Wang
,
Kun He
,
Jing Chen
,
Zengpeng Li
,
Wei Zhao
,
Ruiying Du
Biometrics-Authenticated Key Exchange for Secure Messaging.
CCS
(2021)
Jing Chen
,
Jiong Chen
,
Kun He
,
Ruiying Du
SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures.
Future Gener. Comput. Syst.
115 (2021)
Jing Chen
,
Peidong Jiang
,
Kun He
,
Cheng Zeng
,
Ruiying Du
HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors.
ICICS (1)
(2021)
Wenna Song
,
Jiang Ming
,
Han Yan
,
Yi Xiang
,
Yuan Chen
,
Yuan Luo
,
Kun He
,
Guojun Peng
Android Data-Clone Attack via Operating System Customization.
IEEE Access
8 (2020)
Cong Wu
,
Kun He
,
Jing Chen
,
Ziming Zhao
,
Ruiying Du
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
USENIX Security Symposium
(2020)
Cong Wu
,
Kun He
,
Jing Chen
,
Ruiying Du
,
Yang Xiang
CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake.
IEEE Internet Things J.
7 (12) (2020)
Jing Chen
,
Kun He
,
Lan Deng
,
Quan Yuan
,
Ruiying Du
,
Yang Xiang
,
Jie Wu
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data.
IEEE Trans. Serv. Comput.
13 (6) (2020)
Jiong Chen
,
Kun He
,
Jing Chen
,
Yingying Fang
,
Ruiying Du
PowerPrint: Identifying Smartphones through Power Consumption of the Battery.
Secur. Commun. Networks
2020 (2020)
Shixiong Yao
,
Jing Chen
,
Kun He
,
Ruiying Du
,
Tianqing Zhu
,
Xin Chen
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management.
IEEE Access
7 (2019)
Cong Wu
,
Kun He
,
Jing Chen
,
Ruiying Du
ICAuth: Implicit and Continuous Authentication When the Screen Is Awake.
ICC
(2019)
Jing Chen
,
Shixiong Yao
,
Quan Yuan
,
Kun He
,
Shouling Ji
,
Ruiying Du
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections.
INFOCOM
(2018)
Jing Chen
,
Kun He
,
Quan Yuan
,
Min Chen
,
Ruiying Du
,
Yang Xiang
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services.
IEEE Trans. Mob. Comput.
17 (11) (2018)
Kun He
,
Jing Chen
,
Yu Zhang
,
Ruiying Du
,
Yang Xiang
,
Mohammad Mehedi Hassan
,
Abdulhameed Alelaiwi
Secure independent-update concise-expression access control for video on demand in cloud.
Inf. Sci.
387 (2017)
Jing Chen
,
Kun He
,
Quan Yuan
,
Guoliang Xue
,
Ruiying Du
,
Lina Wang
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks.
IEEE Trans. Mob. Comput.
16 (6) (2017)
Jing Chen
,
Yingying Fang
,
Kun He
,
Ruiying Du
Charge-Depleting of the Batteries Makes Smartphones Recognizable.
ICPADS
(2017)
Jing Chen
,
Kun He
,
Ruiying Du
,
Fajiang Yu
,
Quan Yuan
,
Lina Wang
,
Cai Fu
A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst.
29 (1) (2016)
Kun He
,
Jing Chen
,
Ruiying Du
,
Qianhong Wu
,
Guoliang Xue
,
Xiang Zhang
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments.
IEEE Trans. Computers
65 (12) (2016)
Jing Chen
,
Lihong Zhang
,
Kun He
,
Min Chen
,
Ruiying Du
,
Lina Wang
Message-locked proof of ownership and retrievability with remote repairing in cloud.
Secur. Commun. Networks
9 (16) (2016)
Jing Chen
,
Kun He
,
Quan Yuan
,
Ruiying Du
,
Lina Wang
,
Jie Wu
Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks.
Comput. Networks
105 (2016)
Jing Chen
,
Kun He
,
Ruiying Du
,
Minghui Zheng
,
Yang Xiang
,
Quan Yuan
Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks.
IEEE Trans. Parallel Distributed Syst.
26 (2) (2015)
Ruiying Du
,
Lan Deng
,
Jing Chen
,
Kun He
,
Minghui Zheng
Proofs of Ownership and Retrievability in Cloud Storage.
TrustCom
(2014)
Jianwei Liu
,
Ruiying Du
,
Jing Chen
,
Kun He
A key distribution scheme using network coding for mobile ad hoc network.
Secur. Commun. Networks
5 (1) (2012)