default search action
Kun He 0008
Person information
- affiliation: Wuhan University, China
Other persons with the same name
- Kun He — disambiguation page
- Kun He 0001 — Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China
- Kun He 0002 — Institute of Automation, Chinese Academy of Sciences, Beijing, China
- Kun He 0003 — Facebook Reality Labs, Redmond, WA, USA (and 1 more)
- Kun He 0004 — Beijing University of Chemical Technology, Beijing, China
- Kun He 0005 — Nanjing University of Aeronautics and Astronautics, Jiangsu, China
- Kun He 0006 — CentraleSupélec, France (and 1 more)
- Kun He 0007 — Sichuan University, School of Computer Science, Chengdu, China
- Kun He 0009 — The Australian National University, Canberra, Australia
- Kun He 0010 — National University of Defense Technology, Changsha, China
- Kun He 0011 — University of Chinese Academy of Sciences. Beijing, China
- Kun He 0012 — Peking University, Beijing, China
- Kun He 0013 — Tencent Corporation, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Qiao Li, Jing Chen, Kun He, Zijun Zhang, Ruiying Du, Jisi She, Xinxin Wang:
Model-agnostic adversarial example detection via high-frequency amplification. Comput. Secur. 141: 103791 (2024) - [j33]Qiao Li, Jing Chen, Kun He, Zijun Zhang, Ruiying Du, Jisi She, Xinxin Wang:
Corrigendum to "Model-agnostic Adversarial Example Detection via High-Frequency Amplification" [Computers & Security, Volume 141, June 2024, 103791]. Comput. Secur. 146: 104006 (2024) - [j32]Meng Jia, Jing Chen, Kun He, Min Shi, Yuanzheng Wang, Ruiying Du:
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation. IEEE Trans. Inf. Forensics Secur. 19: 2549-2564 (2024) - [j31]Cong Wu, Jing Chen, Qianru Fang, Kun He, Ziming Zhao, Hao Ren, Guowen Xu, Yang Liu, Yang Xiang:
Rethinking Membership Inference Attacks Against Transfer Learning. IEEE Trans. Inf. Forensics Secur. 19: 6441-6454 (2024) - [j30]Siqin Li, Kun He, Jing Chen, Min Shi, Meng Jia, Ruiying Du, Ling Han:
MaskAuct: Seller-Autonomous Auction With Bidder Anonymity and Bidding Confidentiality. IEEE Trans. Inf. Forensics Secur. 19: 7853-7865 (2024) - [j29]Xuanang Yang, Jing Chen, Yuqing Li, Kun He, Xiaojie Huang, Zikuan Jiang, Hao Bai, Ruiying Du:
Fregata: Fast Private Inference With Unified Secure Two-Party Protocols. IEEE Trans. Inf. Forensics Secur. 19: 8472-8484 (2024) - [j28]Yangyang Gu, Jing Chen, Kun He, Cong Wu, Ziming Zhao, Ruiying Du:
WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices. IEEE Trans. Mob. Comput. 23(6): 6997-7011 (2024) - [j27]Mei Wang, Jing Chen, Kun He, Ruozhou Yu, Ruiying Du, Zhihao Qian:
UFinAKA: Fingerprint-Based Authentication and Key Agreement With Updatable Blind Credentials. IEEE/ACM Trans. Netw. 32(2): 1110-1123 (2024) - [j26]Renli Zhang, Ruiting Zhou, Yufeng Wang, Haisheng Tan, Kun He:
Incentive Mechanisms for Online Task Offloading With Privacy-Preserving in UAV-Assisted Mobile Edge Computing. IEEE/ACM Trans. Netw. 32(3): 2646-2661 (2024) - [c14]Ruichao Liang, Jing Chen, Kun He, Yueming Wu, Gelei Deng, Ruiying Du, Cong Wu:
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG). ICSE 2024: 64:1-64:12 - [c13]Nan Yan, Yuqing Li, Jing Chen, Xiong Wang, Jianan Hong, Kun He, Wei Wang:
Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning. INFOCOM 2024: 791-800 - [i7]Xiping Sun, Jing Chen, Cong Wu, Kun He, Haozhe Xu, Yebo Feng, Ruiying Du, Xianhao Chen:
MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones. CoRR abs/2404.01106 (2024) - [i6]Xiping Sun, Jing Chen, Kun He, Zhixiang He, Ruiying Du, Yebo Feng, Qingchuan Zhao, Cong Wu:
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing. CoRR abs/2404.15000 (2024) - [i5]Haolin Wu, Jing Chen, Ruiying Du, Cong Wu, Kun He, Xingcan Shang, Hao Ren, Guowen Xu:
CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning. CoRR abs/2404.15854 (2024) - [i4]Haozhe Xu, Cong Wu, Yangyang Gu, Xingcan Shang, Jing Chen, Kun He, Ruiying Du:
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems. CoRR abs/2405.17100 (2024) - [i3]Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Weisong Sun, Ruiying Du, Qingchuan Zhao, Yang Liu:
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph. CoRR abs/2406.00921 (2024) - [i2]Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Ruochen Cao, Ruiying Du, Yang Liu, Ziming Zhao:
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing. CoRR abs/2408.10116 (2024) - [i1]Qiao Li, Cong Wu, Jing Chen, Zijun Zhang, Kun He, Ruiying Du, Xinxin Wang, Qingchuang Zhao, Yang Liu:
Privacy-preserving Universal Adversarial Defense for Black-box Models. CoRR abs/2408.10647 (2024) - 2023
- [j25]Yangyang Gu, Jing Chen, Cong Wu, Kun He, Ziming Zhao, Ruiying Du:
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(4): 160:1-160:24 (2023) - [j24]Xuanang Yang, Jing Chen, Kun He, Hao Bai, Cong Wu, Ruiying Du:
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks. IEEE Trans. Inf. Forensics Secur. 18: 4815-4829 (2023) - [c12]Ran Yan, Ruiying Du, Kun He, Jing Chen:
Efficient Adversarial Training with Membership Inference Resistance. PRCV (1) 2023: 474-486 - [c11]Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du:
Formal Analysis and Patching of BLE-SC Pairing. USENIX Security Symposium 2023: 37-52 - 2022
- [j23]Mei Wang, Kun He, Jing Chen, Ruiying Du, Bingsheng Zhang, Zengpeng Li:
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices. Future Gener. Comput. Syst. 131: 28-42 (2022) - [j22]Jing Chen, Xin Chen, Kun He, Ruiying Du, Weihang Chen, Yang Xiang:
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel. IEEE Trans. Dependable Secur. Comput. 19(5): 3286-3300 (2022) - [j21]Jing Chen, Zeyi Zhan, Kun He, Ruiying Du, Donghui Wang, Fei Liu:
XAuth: Efficient Privacy-Preserving Cross-Domain Authentication. IEEE Trans. Dependable Secur. Comput. 19(5): 3301-3311 (2022) - [j20]Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du:
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors. IEEE Trans. Dependable Secur. Comput. 19(6): 4002-4018 (2022) - [j19]Meng Jia, Jing Chen, Kun He, Ruiying Du, Li Zheng, Mingxi Lai, Donghui Wang, Fei Liu:
Redactable Blockchain From Decentralized Chameleon Hash Functions. IEEE Trans. Inf. Forensics Secur. 17: 2771-2783 (2022) - [c10]Cong Wu, Jing Chen, Kun He, Ziming Zhao, Ruiying Du, Chen Zhang:
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. CCS 2022: 2931-2945 - [c9]Ruiting Zhou, Renli Zhang, Yufeng Wang, Haisheng Tan, Kun He:
Online incentive mechanism for task offloading with privacy-preserving in UAV-assisted mobile edge computing. MobiHoc 2022: 211-220 - 2021
- [j18]Jing Chen, Jiong Chen, Kun He, Ruiying Du:
SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures. Future Gener. Comput. Syst. 115: 448-458 (2021) - [j17]Jing Chen, Chiheng Wang, Kun He, Ziming Zhao, Min Chen, Ruiying Du, Gail-Joon Ahn:
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps. IEEE Trans. Dependable Secur. Comput. 18(1): 15-29 (2021) - [j16]Kun He, Jing Chen, Quan Yuan, Shouling Ji, Debiao He, Ruiying Du:
Dynamic Group-Oriented Provable Data Possession in the Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1394-1408 (2021) - [j15]Kun He, Jing Chen, Qinxi Zhou, Ruiying Du, Yang Xiang:
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost. IEEE Trans. Inf. Forensics Secur. 16: 1538-1549 (2021) - [c8]Mei Wang, Kun He, Jing Chen, Zengpeng Li, Wei Zhao, Ruiying Du:
Biometrics-Authenticated Key Exchange for Secure Messaging. CCS 2021: 2618-2631 - [c7]Jing Chen, Peidong Jiang, Kun He, Cheng Zeng, Ruiying Du:
HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors. ICICS (1) 2021: 136-152 - [c6]Meng Jia, Kun He, Jing Chen, Ruiying Du, Weihang Chen, Zhihong Tian, Shouling Ji:
PROCESS: Privacy-Preserving On-Chain Certificate Status Service. INFOCOM 2021: 1-10 - 2020
- [j14]Wenna Song, Jiang Ming, Han Yan, Yi Xiang, Yuan Chen, Yuan Luo, Kun He, Guojun Peng:
Android Data-Clone Attack via Operating System Customization. IEEE Access 8: 199733-199746 (2020) - [j13]Cong Wu, Kun He, Jing Chen, Ruiying Du, Yang Xiang:
CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake. IEEE Internet Things J. 7(12): 11420-11430 (2020) - [j12]Jiong Chen, Kun He, Jing Chen, Yingying Fang, Ruiying Du:
PowerPrint: Identifying Smartphones through Power Consumption of the Battery. Secur. Commun. Networks 2020: 3893106:1-3893106:13 (2020) - [j11]Jing Chen, Kun He, Lan Deng, Quan Yuan, Ruiying Du, Yang Xiang, Jie Wu:
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data. IEEE Trans. Serv. Comput. 13(6): 1072-1085 (2020) - [c5]Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du:
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. USENIX Security Symposium 2020: 2219-2236
2010 – 2019
- 2019
- [j10]Shixiong Yao, Jing Chen, Kun He, Ruiying Du, Tianqing Zhu, Xin Chen:
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management. IEEE Access 7: 6117-6128 (2019) - [c4]Cong Wu, Kun He, Jing Chen, Ruiying Du:
ICAuth: Implicit and Continuous Authentication When the Screen Is Awake. ICC 2019: 1-6 - 2018
- [j9]Jing Chen, Kun He, Quan Yuan, Min Chen, Ruiying Du, Yang Xiang:
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services. IEEE Trans. Mob. Comput. 17(11): 2524-2535 (2018) - [c3]Jing Chen, Shixiong Yao, Quan Yuan, Kun He, Shouling Ji, Ruiying Du:
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections. INFOCOM 2018: 2060-2068 - 2017
- [j8]Kun He, Jing Chen, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure independent-update concise-expression access control for video on demand in cloud. Inf. Sci. 387: 75-89 (2017) - [j7]Jing Chen, Kun He, Quan Yuan, Guoliang Xue, Ruiying Du, Lina Wang:
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks. IEEE Trans. Mob. Comput. 16(6): 1530-1543 (2017) - [c2]Jing Chen, Yingying Fang, Kun He, Ruiying Du:
Charge-Depleting of the Batteries Makes Smartphones Recognizable. ICPADS 2017: 33-40 - 2016
- [j6]Jing Chen, Kun He, Quan Yuan, Ruiying Du, Lina Wang, Jie Wu:
Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks. Comput. Networks 105: 194-206 (2016) - [j5]Jing Chen, Kun He, Ruiying Du, Fajiang Yu, Quan Yuan, Lina Wang, Cai Fu:
A multi-objective optimization model based on immune algorithm in wireless mesh networks. Int. J. Commun. Syst. 29(1): 155-169 (2016) - [j4]Jing Chen, Lihong Zhang, Kun He, Min Chen, Ruiying Du, Lina Wang:
Message-locked proof of ownership and retrievability with remote repairing in cloud. Secur. Commun. Networks 9(16): 3452-3466 (2016) - [j3]Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang:
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments. IEEE Trans. Computers 65(12): 3631-3645 (2016) - 2015
- [j2]Jing Chen, Kun He, Ruiying Du, Minghui Zheng, Yang Xiang, Quan Yuan:
Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks. IEEE Trans. Parallel Distributed Syst. 26(2): 423-433 (2015) - 2014
- [c1]Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng:
Proofs of Ownership and Retrievability in Cloud Storage. TrustCom 2014: 328-335 - 2012
- [j1]Jianwei Liu, Ruiying Du, Jing Chen, Kun He:
A key distribution scheme using network coding for mobile ad hoc network. Secur. Commun. Networks 5(1): 59-67 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint