Follow
Haojin Zhu
Haojin Zhu
FIEEE, Distinguished Professor, Shanghai Jiao Tong University
Verified email at cs.sjtu.edu.cn - Homepage
Title
Cited by
Cited by
Year
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
R Lu, X Lin, H Zhu, PH Ho, X Shen
INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 1229-1237, 2008
9902008
Security and privacy for storage and computation in cloud computing
L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen, AV Vasilakos
Information sciences 258, 371-386, 2014
7442014
Securing smart grid: cyber attacks, countermeasures, and challenges
X Li, X Liang, R Lu, X Shen, X Lin, H Zhu
IEEE Communications Magazine 50 (8), 38-45, 2012
4882012
Security in vehicular ad hoc networks
X Lin, R Lu, C Zhang, H Zhu, PH Ho, X Shen
IEEE communications magazine 46 (4), 88-95, 2008
4692008
Spark: a new vanet-based smart parking scheme for large parking lots
R Lu, X Lin, H Zhu, X Shen
INFOCOM 2009, IEEE, 1413-1421, 2009
4132009
Invisible backdoor attacks on deep neural networks via steganography and regularization
S Li, M Xue, BZH Zhao, H Zhu, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020
4122020
SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks
H Zhu, X Lin, R Lu, Y Fan, X Shen
Vehicular Technology, IEEE Transactions on 58 (8), 4628-4639, 2009
3722009
Pi: A practical incentive protocol for delay tolerant networks
R Lu, X Lin, H Zhu, X Shen, B Preiss
IEEE transactions on wireless communications 9 (4), 1483-1493, 2010
2872010
Homonit: Monitoring smart home apps from encrypted traffic
W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2602018
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
S Chen, M Xue, L Fan, S Hao, L Xu, H Zhu, B Li
computers & security 73, 326-344, 2018
2492018
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
2332016
Privacy leakage of location sharing in mobile social networks: Attacks and defense
H Li, H Zhu, S Du, X Liang, X Shen
IEEE Transactions on Dependable and Secure Computing 15 (4), 646-660, 2016
2252016
A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks
H Zhu, S Du, Z Gao, M Dong, Z Cao
IEEE Transactions on Parallel and Distributed Systems 25 (1), 22-32, 2013
2182013
Stormdroid: A streaminglized machine learning-based system for detecting android malware
S Chen, M Xue, Z Tang, L Xu, H Zhu
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
2082016
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
R Lu, X Lin, H Zhu, X Liang, XS Shen
Parallel and Distributed Systems, IEEE Transactions on, 1-1, 2010
2082010
UAV-assisted data gathering in wireless sensor networks
M Dong, K Ota, M Lin, Z Tang, S Du, H Zhu
The Journal of Supercomputing 70, 1142-1155, 2014
1902014
All your location are belong to us: Breaking mobile social networks for automated user location tracking
M Li, H Zhu, Z Gao, S Chen, L Yu, S Hu, K Ren
Proceedings of the 15th ACM international symposium on Mobile ad hoc …, 2014
1792014
Securing Consumer IoT in Smart Home: Architecture, Challenges and Countermeasures
Y Meng, W Zhang, H Zhu, XS Shen
December 2018 25 (6), 53 - 59, 2018
1612018
Achieving privacy preservation in WiFi fingerprint-based localization
H Li, L Sun, H Zhu, X Lu, X Cheng
Ieee Infocom 2014-IEEE Conference on Computer Communications, 2337-2345, 2014
1582014
Human-factor-aware privacy-preserving aggregation in smart grid
W Jia, H Zhu, Z Cao, X Dong, C Xiao
IEEE Systems Journal 8 (2), 598-607, 2013
1552013
The system can't perform the operation now. Try again later.
Articles 1–20