Trending Publications

The following lists papers published since 2015 by Hume Center affiliated faculty with 20 or more citations. These represent the key areas of new research where the contributions of our faculty are getting noticed.

  1. J Li, YK Li, X Chen, PPC Lee, W Lou, A hybrid cloud approach for secure authorized deduplication, IEEE Transactions on Parallel and Distributed Systems 26 (5), 1206-1216, 2015.
  1. J Li, J Li, X Chen, C Jia, W Lou, Identity-based encryption with outsourced revocation in cloud computing, Ieee Transactions on computers 64 (2), 425-437, 2015.
  1. B Wang, Y Zheng, W Lou, YT Hou, DDoS attack protection in the era of cloud computing and software-defined networking, Computer Networks 81, 308-319, 2015.
  1. A Sengupta, R Tandon, TC Clancy, Improved approximation of storage-rate tradeoff for caching via new outer bounds, Information Theory (ISIT), 2015 IEEE International Symposium on, 1691-1695, 2015.
  1. KO Elish, X Shu, DD Yao, BG Ryder, X Jiang, Profiling user-trigger dependence for Android malware detection, Computers & Security 49, 255-273, 2015.
  1. M Mozaffari, W Saad, M Bennis, M Debbah, Unmanned aerial vehicle with underlaid device-to-device communications: Performance and tradeoffs, IEEE Transactions on Wireless Communications 15 (6), 3949-3963, 2016.
  1. A Sengupta, R Tandon, TC Clancy, Fundamental limits of caching with secure delivery, IEEE Transactions on Information Forensics and Security 10 (2), 355-370, 2015.
  1. C Shahriar, M La Pan, M Lichtman, TC Clancy, R McGwier, R Tandon, ..., PHY-layer resiliency in OFDM communications: A tutorial, IEEE Communications Surveys & Tutorials 17 (1), 292-314, 2015.
  1. X Chen, J Li, J Weng, J Ma, W Lou, Verifiable computation over large database with incremental updates, IEEE Transactions on Computers 65 (10), 3184-3195, 2016.
  1. KO Elish, D Yao, BG Ryder, On the need of precise inter-app ICC classification for detecting Android malware collusions, Proceedings of IEEE Mobile Security Technologies (MoST), in conjunction with ..., 2015.
  1. X Chen, X Huang, J Li, J Ma, W Lou, DS Wong, New algorithms for secure outsourcing of large-scale systems of linear equations, IEEE Transactions on Information Forensics and Security 10 (1), 69-78, 2015.
  1. L Xie, Y Shi, YT Hou, W Lou, HD Sherali, SF Midkiff, Multi-node wireless energy charging in sensor networks, IEEE/ACM Transactions on Networking (ToN) 23 (2), 437-450, 2015.
  1. M Mozaffari, W Saad, M Bennis, M Debbah, Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage, IEEE Communications Letters 20 (8), 1647-1650, 2016.
  1. CJ White, TC Clancy III, , TC Clancy III, Systems and methods to enforce security policies on the loading, linking, and execution of native code by mobile applications running inside of virtual machines, US Patent 9,609,020, 2017.
  1. X Shu, D Yao, E Bertino, Privacy-preserving detection of sensitive data exposure, IEEE transactions on information forensics and security 10 (5), 1092-1103, 2015.
  1. X Chen, J Li, X Huang, J Ma, W Lou, New publicly verifiable databases with efficient updates, IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2015.
  1. A Khawar, A Abdelhadi, C Clancy, Target detection performance of spectrum sharing MIMO radars, IEEE Sensors Journal 15 (9), 4928-4940, 2015.
  1. TJ O'Shea, J Corgan, TC Clancy, Convolutional Radio Modulation Recognition Networks, Engineering Applications of Neural Networks: 17th International Conference ..., 2016.
  1. TJ O’Shea, J Corgan, TC Clancy, Convolutional radio modulation recognition networks, International Conference on Engineering Applications of Neural Networks, 213-226, 2016.