Suivre
Kai Zhou
Titre
Citée par
Citée par
Année
PassBio: Privacy-preserving user-centric biometric authentication
K Zhou, J Ren
IEEE Transactions on Information Forensics and Security 13 (12), 3050-3063, 2018
942018
Attacking similarity-based link prediction in social networks
K Zhou, TP Michalak, M Waniek, T Rahwan, Y Vorobeychik
Proceedings of the 18th International Conference on Autonomous Agents and …, 2019
852019
ExpSOS: Secure and verifiable outsourcing of exponentiation operations for mobile cloud computing
K Zhou, MH Afifi, J Ren
IEEE Transactions on Information Forensics and Security 12 (11), 2518-2531, 2017
582017
How to hide one’s relationships from link prediction algorithms
M Waniek, K Zhou, Y Vorobeychik, E Moro, TP Michalak, T Rahwan
Scientific reports 9 (1), 12208, 2019
41*2019
P-MOD: Secure privilege-based multilevel organizational data-sharing in cloud computing
E Zaghloul, K Zhou, J Ren
IEEE Transactions on Big Data 6 (4), 804-815, 2019
412019
Structural attack against graph based android malware detection
K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li, L Yu, W Yuan, X Luo
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
372021
Adversarial Robustness of Similarity-Based Link Prediction
K Zhou, TP Michalak, Y Vorobeychik
ICDM, 2019
332019
CDMA system design and capacity analysis under disguised jamming
T Song, K Zhou, T Li
IEEE Transactions on Information Forensics and Security 11 (11), 2487-2498, 2016
332016
Computing equilibria in binary networked public goods games
S Yu, K Zhou, J Brantingham, Y Vorobeychik
Proceedings of the AAAI Conference on Artificial Intelligence 34 (02), 2310-2317, 2020
292020
Privacy characterization and quantification in data publishing
MH Afifi, K Zhou, J Ren
IEEE Transactions on Knowledge and Data Engineering 30 (9), 1756-1769, 2018
262018
Binarizedattack: Structural poisoning attacks to graph-based anomaly detection
Y Zhu, Y Lai, K Zhao, X Luo, M Yuan, J Ren, K Zhou
2022 IEEE 38th International Conference on Data Engineering (ICDE), 14-26, 2022
212022
Blocking adversarial influence in social networks
F Jia, K Zhou, C Kamhoua, Y Vorobeychik
Decision and Game Theory for Security: 11th International Conference …, 2020
112020
Robust collective classification against structural attacks
K Zhou, Y Vorobeychik
Conference on Uncertainty in Artificial Intelligence, 250-259, 2020
102020
CASO: Cost-aware secure outsourcing of general computational problems
K Zhou, J Ren
IEEE Transactions on Services Computing 14 (2), 386-399, 2018
102018
Secure outsourcing of scalar multiplication on elliptic curves
K Zhou, J Ren
2016 IEEE International Conference on Communications (ICC), 1-5, 2016
102016
Strategic evasion of centrality measures
M Waniek, J Woźnica, K Zhou, Y Vorobeychik, T Rahwan, T Michalak
AAMAS '21: Proceedings of the 20th International Conference on Autonomous …, 2021
92021
Attacking similarity-based sign prediction
MT Godziszewski, TP Michalak, M Waniek, T Rahwan, K Zhou, Y Zhu
2021 IEEE International Conference on Data Mining (ICDM), 1072-1077, 2021
82021
Secure fine-grained access control of mobile user data through untrusted cloud
K Zhou, J Ren
2016 25th International Conference on Computer Communication and Networks …, 2016
72016
LinSOS: Secure outsourcing of linear computations based on affine mapping
K Zhou, J Ren
2016 IEEE International Conference on Communications (ICC), 1-5, 2016
72016
Hiding from centrality measures: A stackelberg game perspective
M Waniek, J Woźnica, K Zhou, Y Vorobeychik, TP Michalak, T Rahwan
IEEE Transactions on Knowledge and Data Engineering, 2023
32023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20