Bo Chen
Cytowane przez
Cytowane przez
Remote data checking for network coding-based distributed storage systems
B Chen, R Curtmola, G Ateniese, R Burns
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 31-42, 2010
Personalized privacy-preserving social recommendation
X Meng, S Wang, K Shu, J Li, B Chen, H Liu, Y Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018
Robust dynamic provable data possession
B Chen, R Curtmola
2012 32nd International Conference on Distributed Computing Systems …, 2012
Nfps: Adding undetectable secure deletion to flash translation layer
S Jia, L Xia, B Chen, P Liu
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
Deftl: Implementing plausibly deniable encryption in flash translation layer
S Jia, L Xia, B Chen, P Liu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Mobipluto: File system friendly deniable storage for mobile devices
B Chang, Z Wang, B Chen, F Zhang
Proceedings of the 31st annual computer security applications conference …, 2015
What if routers are malicious? mitigating content poisoning attack in ndn
D Wu, Z Xu, B Chen, Y Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 481-488, 2016
ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN
Z Xu, B Chen, N Wang, Y Zhang, Z Li
2015 IEEE 40th Conference on Local Computer Networks (LCN), 82-90, 2015
Towards self-repairing replication-based storage systems using untrusted clouds
B Chen, R Curtmola
Proceedings of the third ACM conference on Data and application security and …, 2013
Towards privacy preserving social recommendation under personalized privacy settings
X Meng, S Wang, K Shu, J Li, B Chen, H Liu, Y Zhang
World Wide Web 22, 2853-2881, 2019
Mobihydra: Pragmatic and multi-level plausibly deniable encryption storage for mobile devices
X Yu, B Chen, Z Wang, B Chang, WT Zhu, J Jing
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
Studying analysts’ data triage operations in cyber defense situational analysis
C Zhong, J Yen, P Liu, RF Erbacher, C Garneau, B Chen
Theory and models for cyber situation awareness, 128-169, 2017
Robust dynamic remote data checking for public clouds
B Chen, R Curtmola
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices
B Chang, F Zhang, B Chen, Y Li, WT Zhu, Y Tian, Z Wang, A Ching
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
Sanitizing data is not enough! Towards sanitizing structural artifacts in flash media
B Chen, S Jia, L Xia, P Liu
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
RDS3: Ransomware defense strategy by using stealthily spare space
KP Subedi, DR Budhathoki, B Chen, D Dasgupta
2017 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2017
Auditable Version Control Systems.
B Chen, R Curtmola
NDSS, 2014
Supporting transparent snapshot for bare-metal malware analysis on mobile devices
L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Internet protocol cameras with no password protection: An empirical investigation
H Xu, F Xu, B Chen
Passive and Active Measurement: 19th International Conference, PAM 2018 …, 2018
User-friendly deniable storage for mobile devices
B Chang, Y Cheng, B Chen, F Zhang, WT Zhu, Y Li, Z Wang
computers & security 72, 163-174, 2018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20