Trending Publications

The following lists papers published since 2015 by Hume Center affiliated faculty with 20 or more citations. These represent the key areas of new research where the contributions of our faculty are getting noticed.

PaperCitations
  1. J Li, YK Li, X Chen, PPC Lee, W Lou, A hybrid cloud approach for secure authorized deduplication, IEEE Transactions on Parallel and Distributed Systems 26 (5), 1206-1216, 2015.
142
  1. J Li, J Li, X Chen, C Jia, W Lou, Identity-based encryption with outsourced revocation in cloud computing, Ieee Transactions on computers 64 (2), 425-437, 2015.
91
  1. B Wang, Y Zheng, W Lou, YT Hou, DDoS attack protection in the era of cloud computing and software-defined networking, Computer Networks 81, 308-319, 2015.
83
  1. A Sengupta, R Tandon, TC Clancy, Improved approximation of storage-rate tradeoff for caching via new outer bounds, Information Theory (ISIT), 2015 IEEE International Symposium on, 1691-1695, 2015.
46
  1. KO Elish, X Shu, DD Yao, BG Ryder, X Jiang, Profiling user-trigger dependence for Android malware detection, Computers & Security 49, 255-273, 2015.
45
  1. M Mozaffari, W Saad, M Bennis, M Debbah, Unmanned aerial vehicle with underlaid device-to-device communications: Performance and tradeoffs, IEEE Transactions on Wireless Communications 15 (6), 3949-3963, 2016.
45
  1. C Shahriar, M La Pan, M Lichtman, TC Clancy, R McGwier, R Tandon, ..., PHY-layer resiliency in OFDM communications: A tutorial, IEEE Communications Surveys & Tutorials 17 (1), 292-314, 2015.
42
  1. A Sengupta, R Tandon, TC Clancy, Fundamental limits of caching with secure delivery, IEEE Transactions on Information Forensics and Security 10 (2), 355-370, 2015.
40
  1. K Luther, JL Tolentino, W Wu, A Pavel, BP Bailey, M Agrawala, ..., Structuring, aggregating, and evaluating crowdsourced design critique, Proceedings of the 18th ACM Conference on Computer Supported Cooperative ..., 2015.
37
  1. X Chen, J Li, J Weng, J Ma, W Lou, Verifiable computation over large database with incremental updates, IEEE transactions on Computers 65 (10), 3184-3195, 2016.
37
  1. KO Elish, D Yao, BG Ryder, On the need of precise inter-app ICC classification for detecting Android malware collusions, Proceedings of IEEE mobile security technologies (MoST), in conjunction with ..., 2015.
34
  1. L Xie, Y Shi, YT Hou, W Lou, HD Sherali, SF Midkiff, Multi-node wireless energy charging in sensor networks, IEEE/ACM Transactions on Networking (ToN) 23 (2), 437-450, 2015.
33
  1. X Chen, X Huang, J Li, J Ma, W Lou, DS Wong, New algorithms for secure outsourcing of large-scale systems of linear equations, IEEE transactions on information forensics and security 10 (1), 69-78, 2015.
33
  1. I Ahmad, S Ranka, Handbook of Energy-Aware and Green Computing-Two Volume Set, CRC Press, 2016.
33
  1. M Mozaffari, W Saad, M Bennis, M Debbah, Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage, IEEE Communications Letters 20 (8), 1647-1650, 2016.
27
  1. A Khawar, A Abdelhadi, C Clancy, Target detection performance of spectrum sharing MIMO radars, IEEE Sensors Journal 15 (9), 4928-4940, 2015.
27
  1. W Sun, S Yu, W Lou, YT Hou, H Li, Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187-1198, 2016.
27
  1. X Chen, J Li, X Huang, J Ma, W Lou, New publicly verifiable databases with efficient updates, IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2015.
27
  1. X Shu, D Yao, E Bertino, Privacy-preserving detection of sensitive data exposure, IEEE transactions on information forensics and security 10 (5), 1092-1103, 2015.
25
  1. TJ O’Shea, J Corgan, TC Clancy, Convolutional radio modulation recognition networks, International Conference on Engineering Applications of Neural Networks, 213-226, 2016.
23
  1. TJ O'Shea, J Corgan, TC Clancy, Convolutional Radio Modulation Recognition Networks, Engineering Applications of Neural Networks: 17th International Conference ..., 2016.
23
  1. S Samarakoon, M Bennis, W Saad, M Debbah, M Latva-Aho, Ultra dense small cell networks: Turning density into energy efficiency, IEEE Journal on Selected Areas in Communications 34 (5), 1267-1280, 2016.
23
  1. W Sun, X Liu, W Lou, YT Hou, H Li, Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data, Computer Communications (INFOCOM), 2015 IEEE Conference on, 2110-2118, 2015.
21
  1. A Abdelhadi, C Clancy, An optimal resource allocation with joint carrier aggregation in 4G-LTE, Computing, Networking and Communications (ICNC), 2015 International ..., 2015.
21