default search action
Haotian Chi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Liquan Zhao, Haotian Chi, Tie Zhong, Yanfei Jia:
Perception-oriented generative adversarial network for retinal fundus image super-resolution. Comput. Biol. Medicine 168: 107708 (2024) - [j4]Siyuan Guo, Lixin Zou, Hechang Chen, Bohao Qu, Haotian Chi, Philip S. Yu, Yi Chang:
Sample Efficient Offline-to-Online Reinforcement Learning. IEEE Trans. Knowl. Data Eng. 36(3): 1299-1310 (2024) - 2023
- [c21]Shunrong Jiang, Guohuai Sang, Xuedan Jia, Fengjiao Li, Haotian Chi:
EAKM: Efficient Conditional Privacy-Preserving Authentication Scheme with On-Chain Key Management in VANETs. GLOBECOM 2023: 874-879 - [c20]Shunrong Jiang, Jingwei Chen, Fengjiao Li, Haijun Geng, Haotian Chi:
DCAMM: Dynamic Curve-Based Automated Market Maker. GLOBECOM 2023: 4491-4496 - [c19]Xiaoyue Ma, Qiang Zeng, Haotian Chi, Lannan Luo:
No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware. MobiSys 2023: 205-218 - [c18]Haotian Chi, Qiang Zeng, Xiaojiang Du:
Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes. USENIX Security Symposium 2023: 1559-1576 - 2022
- [c17]Chenglong Fu, Qiang Zeng, Haotian Chi, Xiaojiang Du, Siva Likitha Valluru:
IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors. DSN 2022: 428-440 - [c16]Haotian Chi, Luke Jakielaszek, Xiaojiang Du, E. Paul Ratazzi:
DICE-Enabled Distributed Security Schemes for the Air Force Internet of Things. ICC 2022: 2212-2217 - [c15]Haotian Chi, Chenglong Fu, Qiang Zeng, Xiaojiang Du:
Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks. SP 2022: 285-302 - 2021
- [c14]Haotian Chi, Qiang Zeng, Xiaojiang Du, Lannan Luo:
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. NDSS 2021 - [i6]Haotian Chi, Qiang Zeng, Xiaojiang Du, Lannan Luo:
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. CoRR abs/2101.10522 (2021) - 2020
- [c13]Haotian Chi, Qiang Zeng, Xiaojiang Du, Jiaping Yu:
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling. DSN 2020: 411-423
2010 – 2019
- 2019
- [j3]Rixin Xu, Qiang Zeng, Liehuang Zhu, Haotian Chi, Xiaojiang Du, Mohsen Guizani:
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study. IEEE Access 7: 63457-63471 (2019) - [i5]Rixin Xu, Qiang Zeng, Liehuang Zhu, Haotian Chi, Mohsen Guizani:
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study. CoRR abs/1902.03168 (2019) - [i4]Haotian Chi, Qiang Zeng, Xiaojiang Du, Lannan Luo:
PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems. CoRR abs/1910.07987 (2019) - 2018
- [c12]Haotian Chi, Longfei Wu, Xiaojiang Du, Qiang Zeng, E. Paul Ratazzi:
e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices. CNS 2018: 1-9 - [c11]Rixin Xu, Qiang Zeng, Liehuang Zhu, Haotian Chi, Xiaojiang Du:
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study. IPCCC 2018: 1-8 - [i3]Longfei Wu, Haotian Chi, Xiaojiang Du:
A Secure Proxy-based Access Control Scheme for Implantable Medical Devices. CoRR abs/1803.07751 (2018) - [i2]Haotian Chi, Longfei Wu, Xiaojiang Du, Qiang Zeng, E. Paul Ratazzi:
e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices. CoRR abs/1804.02447 (2018) - [i1]Haotian Chi, Qiang Zeng, Xiaojiang Du, Jiaping Yu:
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling. CoRR abs/1808.02125 (2018) - 2017
- [j2]Xiaoyan Zhu, Ripei Hao, Haotian Chi, Xiaojiang Du:
FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins. IEEE Trans. Veh. Technol. 66(11): 10461-10469 (2017) - 2016
- [c10]Xiaoyan Zhu, Ripei Hao, Haotian Chi, Xiaojiang Du:
Personalized Location Recommendations with Local Feature Awareness. GLOBECOM 2016: 1-6 - 2015
- [c9]Xiaoyan Zhu, Ripei Hao, Shunrong Jiang, Haotian Chi, Hongning Li:
Verification of Boolean Queries over Outsourced Encrypted Data Based on Counting Bloom Filter. GLOBECOM 2015: 1-6 - [c8]Shunrong Jiang, Xiaoyan Zhu, Ripei Hao, Haotian Chi, Hui Li, Liangmin Wang:
Lightweight and privacy-preserving agent data transmission for mobile Healthcare. ICC 2015: 7322-7327 - [c7]Xiaosan Lei, Xiaoyan Zhu, Haotian Chi, Shunrong Jiang:
Cloud-assisted privacy-preserving genetic paternity test. ICCC 2015: 1-6 - [c6]Xiaosan Lei, Xiaoyan Zhu, Haotian Chi, Shunrong Jiang:
Privacy-preserving use of genomic data on mobile devices. ICCC 2015: 1-6 - 2014
- [j1]Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li:
Privacy and Authentication Protocol for Mobile RFID Systems. Wirel. Pers. Commun. 77(3): 1713-1731 (2014) - [c5]Xiaoyan Zhu, Zengbao Chen, Haotian Chi, Jie Liu, Shunrong Jiang:
Two-party and multi-party private matching for proximity-based mobile social networks. ICC 2014: 926-931 - [c4]Xiaoyan Zhu, Haotian Chi, Shunrong Jiang, Xiaosan Lei, Hui Li:
Using dynamic pseudo-IDs to protect privacy in location-based services. ICC 2014: 2307-2312 - 2013
- [c3]Xiaoyan Zhu, Haotian Chi, Ben Niu, Weidong Zhang, Zan Li, Hui Li:
MobiCache: When k-anonymity meets cache. GLOBECOM 2013: 820-825 - [c2]Ben Niu, Xiaoyan Zhu, Tanran Zhang, Haotian Chi, Hui Li:
P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks. MASS 2013: 351-355 - [c1]Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li:
3PLUS: Privacy-preserving pseudo-location updating system in location-based services. WCNC 2013: 4564-4569
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint