Trending Publications

The following lists papers published since 2015 by Hume Center affiliated faculty with 20 or more citations. These represent the key areas of new research where the contributions of our faculty are getting noticed.

PaperCitations
  1. J Li, YK Li, X Chen, PPC Lee, W Lou, A hybrid cloud approach for secure authorized deduplication, IEEE Transactions on Parallel and Distributed Systems 26 (5), 1206-1216, 2015.
171
  1. FP An, AB Balantekin, HR Band, M Bishai, S Blyth, I Butorov, GF Cao, ..., New measurement of antineutrino oscillation with the full detector configuration at Daya Bay, Physical review letters 115 (11), 111802, 2015.
150
  1. J Li, J Li, X Chen, C Jia, W Lou, Identity-based encryption with outsourced revocation in cloud computing, Ieee Transactions on computers 64 (2), 425-437, 2015.
108
  1. FP An, AB Balantekin, HR Band, M Bishai, S Blyth, I Butorov, D Cao, ..., Measurement of the reactor antineutrino flux and spectrum at Daya Bay, Physical review letters 116 (6), 061801, 2016.
108
  1. B Wang, Y Zheng, W Lou, YT Hou, DDoS attack protection in the era of cloud computing and software-defined networking, Computer Networks 81, 308-319, 2015.
102
  1. KO Elish, X Shu, DD Yao, BG Ryder, X Jiang, Profiling user-trigger dependence for Android malware detection, Computers & Security 49, 255-273, 2015.
53
  1. A Sengupta, R Tandon, TC Clancy, Improved approximation of storage-rate tradeoff for caching via new outer bounds, Information Theory (ISIT), 2015 IEEE International Symposium on, 1691-1695, 2015.
52
  1. C Shahriar, M La Pan, M Lichtman, TC Clancy, R McGwier, R Tandon, ..., PHY-layer resiliency in OFDM communications: A tutorial, IEEE Communications Surveys & Tutorials 17 (1), 292-314, 2015.
50
  1. M Mozaffari, W Saad, M Bennis, M Debbah, Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage, IEEE Communications Letters 20 (8), 1647-1650, 2016.
49
  1. X Chen, J Li, J Weng, J Ma, W Lou, Verifiable computation over large database with incremental updates, IEEE transactions on Computers 65 (10), 3184-3195, 2016.
44
  1. A Sengupta, R Tandon, TC Clancy, Fundamental limits of caching with secure delivery, IEEE Transactions on Information Forensics and Security 10 (2), 355-370, 2015.
44
  1. P Adamson, FP An, I Anghel, A Aurisano, AB Balantekin, HR Band, G Barr, ..., Limits on active to sterile neutrino oscillations from disappearance searches in the MINOS, Daya Bay, and Bugey-3 experiments, Physical review letters 117 (15), 151801, 2016.
42
  1. X Chen, X Huang, J Li, J Ma, W Lou, DS Wong, New algorithms for secure outsourcing of large-scale systems of linear equations, IEEE transactions on information forensics and security 10 (1), 69-78, 2015.
42
  1. K Luther, JL Tolentino, W Wu, A Pavel, BP Bailey, M Agrawala, ..., Structuring, aggregating, and evaluating crowdsourced design critique, Proceedings of the 18th ACM Conference on Computer Supported Cooperative…, 2015.
42
  1. KO Elish, D Yao, BG Ryder, On the need of precise inter-app ICC classification for detecting Android malware collusions, Proceedings of IEEE mobile security technologies (MoST), in conjunction with…, 2015.
41
  1. Z Dawy, W Saad, A Ghosh, JG Andrews, E Yaacoub, Toward massive machine type cellular communications, IEEE Wireless Communications 24 (1), 120-128, 2017.
40
  1. X Chen, J Li, X Huang, J Ma, W Lou, New publicly verifiable databases with efficient updates, IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2015.
39
  1. L Xie, Y Shi, YT Hou, W Lou, HD Sherali, SF Midkiff, Multi-node wireless energy charging in sensor networks, IEEE/ACM Transactions on Networking (ToN) 23 (2), 437-450, 2015.
39
  1. DV Forero, P Huber, Hints for Leptonic C P Violation or New Physics?, Physical review letters 117 (3), 031801, 2016.
38
  1. W Sun, S Yu, W Lou, YT Hou, H Li, Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187-1198, 2016.
36
  1. I Ahmad, S Ranka, Handbook of Energy-Aware and Green Computing-Two Volume Set, CRC Press, 2016.
35
  1. FP An, AB Balantekin, HR Band, W Beriguete, M Bishai, S Blyth, ..., The muon system of the Daya Bay Reactor antineutrino experiment, Nuclear Instruments and Methods in Physics Research Section A: Accelerators…, 2015.
35
  1. X Shu, D Yao, E Bertino, Privacy-preserving detection of sensitive data exposure, IEEE transactions on information forensics and security 10 (5), 1092-1103, 2015.
35
  1. TJ O'Shea, J Corgan, TC Clancy, Convolutional Radio Modulation Recognition Networks, Engineering Applications of Neural Networks: 17th International Conference…, 2016.
33
  1. FP An, JZ Bai, AB Balantekin, HR Band, D Beavis, W Beriguete, M Bishai, ..., The detector system of the Daya Bay reactor neutrino experiment, Nuclear Instruments and Methods in Physics Research Section A: Accelerators…, 2016.
33
  1. TJ O’Shea, J Corgan, TC Clancy, Convolutional radio modulation recognition networks, International Conference on Engineering Applications of Neural Networks, 213-226, 2016.
33
  1. FP An, AB Balantekin, HR Band, M Bishai, S Blyth, D Cao, GF Cao, J Cao, ..., Measurement of electron antineutrino oscillation based on 1230 days of operation of the Daya Bay experiment, Physical Review D 95 (7), 072006, 2017.
31
  1. FP An, AB Balantekin, HR Band, M Bishai, S Blyth, D Cao, GF Cao, J Cao, ..., New measurement of θ 13 via neutron capture on hydrogen at Daya Bay, Physical Review D 93 (7), 072011, 2016.
28
  1. A Khawar, A Abdelhadi, C Clancy, Target detection performance of spectrum sharing MIMO radars, IEEE Sensors Journal 15 (9), 4928-4940, 2015.
27
  1. W Sun, X Liu, W Lou, YT Hou, H Li, Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data, Computer Communications (INFOCOM), 2015 IEEE Conference on, 2110-2118, 2015.
27
  1. FP An, AB Balantekin, HR Band, M Bishai, S Blyth, D Cao, GF Cao, J Cao, ..., Improved measurement of the reactor antineutrino flux and spectrum at Daya Bay, Chinese physics C 41 (1), 013002, 2017.
26
  1. A Abdelhadi, C Clancy, An optimal resource allocation with joint carrier aggregation in 4G-LTE, Computing, Networking and Communications (ICNC), 2015 International…, 2015.
25
  1. FP An, AB Balantekin, HR Band, M Bishai, S Blyth, D Cao, GF Cao, J Cao, ..., Improved search for a light sterile neutrino with the full configuration of the Daya Bay experiment, Physical review letters 117 (15), 151802, 2016.
24
  1. B Wang, W Song, W Lou, YT Hou, Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee, Computer Communications (INFOCOM), 2015 IEEE Conference on, 2092-2100, 2015.
24
  1. S Shekhar, Z Jiang, RY Ali, E Eftelioglu, X Tang, V Gunturi, X Zhou, Spatiotemporal data mining: a computational perspective, ISPRS International Journal of Geo-Information 4 (4), 2306-2338, 2015.
24
  1. F Liu, X Shu, D Yao, AR Butt, Privacy-preserving scanning of big content for sensitive data exposure with MapReduce, Proceedings of the 5th ACM Conference on Data and Application Security and…, 2015.
23
  1. CJ White, TC Clancy III, B Dougherty, Systems and methods for enforcing security in mobile computing, US Patent 9,712,530, 2017.
23
  1. M Ghorbanzadeh, E Visotsky, P Moorut, W Yang, C Clancy, Radar inband and out-of-band interference into LTE macro and small cell uplinks in the 3.5 GHz band, Wireless Communications and Networking Conference (WCNC), 2015 IEEE, 1829-1834, 2015.
23
  1. M Ghorbanzadeh, A Abdelhadi, C Clancy, A utility proportional fairness radio resource block allocation in cellular networks, Computing, Networking and Communications (ICNC), 2015 International…, 2015.
22
  1. MM Sohul, M Yao, T Yang, JH Reed, Spectrum access system for the citizen broadband radio service, IEEE Communications Magazine 53 (7), 18-25, 2015.
22
  1. A Aysu, E Gulcan, D Moriyama, P Schaumont, M Yung, End-to-end design of a PUF-based privacy preserving authentication protocol, International Workshop on Cryptographic Hardware and Embedded Systems, 556-576, 2015.
21
  1. X Shu, D Yao, N Ramakrishnan, Unearthing stealthy program attacks buried in extremely long execution paths, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications…, 2015.
21
  1. T Erpek, A Abdelhadi, TC Clancy, An optimal application-aware resource block scheduling in LTE, Computing, Networking and Communications (ICNC), 2015 International…, 2015.
21
  1. J Schloemann, HS Dhillon, RM Buehrer, Toward a tractable analysis of localization fundamentals in cellular networks, IEEE Transactions on Wireless Communications 15 (3), 1768-1782, 2016.
21
  1. M Khalilikhah, K Heaslip, Z Song, Can daytime digital imaging be used for traffic sign retroreflectivity compliance?, Measurement 75, 147-160, 2015.
21
  1. A Kumar, A Abdelhadi, C Clancy, An online delay efficient packet scheduler for M2M traffic in industrial automation, 2016 Annual IEEE Systems Conference (SysCon), 2016.
21
  1. AM Ankowski, O Benhar, P Coloma, P Huber, CM Jen, C Mariani, ..., Comparison of the calorimetric and kinematic methods of neutrino energy reconstruction in disappearance experiments, Physical Review D 92 (7), 073014, 2015.
21
  1. M Lichtman, RP Jover, M Labib, R Rao, V Marojevic, JH Reed, LTE/LTE-A jamming, spoofing, and sniffing: threat assessment and mitigation, IEEE Communications Magazine 54 (4), 54-61, 2016.
21