Trending Publications

The following lists papers published since 2015 by Hume Center affiliated faculty with 20 or more citations. These represent the key areas of new research where the contributions of our faculty are getting noticed.

PaperCitations
  1. J Li, YK Li, X Chen, PPC Lee, W Lou, A hybrid cloud approach for secure authorized deduplication, IEEE Transactions on Parallel and Distributed Systems 26 (5), 1206-1216, 2015.
159
  1. J Li, J Li, X Chen, C Jia, W Lou, Identity-based encryption with outsourced revocation in cloud computing, Ieee Transactions on computers 64 (2), 425-437, 2015.
104
  1. B Wang, Y Zheng, W Lou, YT Hou, DDoS attack protection in the era of cloud computing and software-defined networking, Computer Networks 81, 308-319, 2015.
93
  1. M Mozaffari, W Saad, M Bennis, M Debbah, Unmanned aerial vehicle with underlaid device-to-device communications: Performance and tradeoffs, IEEE Transactions on Wireless Communications 15 (6), 3949-3963, 2016.
56
  1. KO Elish, X Shu, DD Yao, BG Ryder, X Jiang, Profiling user-trigger dependence for Android malware detection, Computers & Security 49, 255-273, 2015.
51
  1. A Sengupta, R Tandon, TC Clancy, Improved approximation of storage-rate tradeoff for caching via new outer bounds, Information Theory (ISIT), 2015 IEEE International Symposium on, 1691-1695, 2015.
49
  1. C Shahriar, M La Pan, M Lichtman, TC Clancy, R McGwier, R Tandon, ..., PHY-layer resiliency in OFDM communications: A tutorial, IEEE Communications Surveys & Tutorials 17 (1), 292-314, 2015.
46
  1. A Sengupta, R Tandon, TC Clancy, Fundamental limits of caching with secure delivery, IEEE Transactions on Information Forensics and Security 10 (2), 355-370, 2015.
42
  1. KO Elish, D Yao, BG Ryder, On the need of precise inter-app ICC classification for detecting Android malware collusions, Proceedings of IEEE mobile security technologies (MoST), in conjunction with ..., 2015.
42
  1. X Chen, J Li, J Weng, J Ma, W Lou, Verifiable computation over large database with incremental updates, IEEE transactions on Computers 65 (10), 3184-3195, 2016.
41
  1. X Chen, X Huang, J Li, J Ma, W Lou, DS Wong, New algorithms for secure outsourcing of large-scale systems of linear equations, IEEE transactions on information forensics and security 10 (1), 69-78, 2015.
39
  1. K Luther, JL Tolentino, W Wu, A Pavel, BP Bailey, M Agrawala, ..., Structuring, aggregating, and evaluating crowdsourced design critique, Proceedings of the 18th ACM Conference on Computer Supported Cooperative ..., 2015.
38
  1. M Mozaffari, W Saad, M Bennis, M Debbah, Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage, IEEE Communications Letters 20 (8), 1647-1650, 2016.
36
  1. L Xie, Y Shi, YT Hou, W Lou, HD Sherali, SF Midkiff, Multi-node wireless energy charging in sensor networks, IEEE/ACM Transactions on Networking (ToN) 23 (2), 437-450, 2015.
36
  1. I Ahmad, S Ranka, Handbook of Energy-Aware and Green Computing-Two Volume Set, CRC Press, 2016.
35
  1. X Chen, J Li, X Huang, J Ma, W Lou, New publicly verifiable databases with efficient updates, IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2015.
33
  1. W Sun, S Yu, W Lou, YT Hou, H Li, Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187-1198, 2016.
31
  1. X Shu, D Yao, E Bertino, Privacy-preserving detection of sensitive data exposure, IEEE transactions on information forensics and security 10 (5), 1092-1103, 2015.
30
  1. Z Dawy, W Saad, A Ghosh, JG Andrews, E Yaacoub, Toward massive machine type cellular communications, IEEE Wireless Communications 24 (1), 120-128, 2017.
29
  1. TJ O'Shea, J Corgan, TC Clancy, Convolutional Radio Modulation Recognition Networks, Engineering Applications of Neural Networks: 17th International Conference ..., 2016.
29
  1. TJ O’Shea, J Corgan, TC Clancy, Convolutional radio modulation recognition networks, International Conference on Engineering Applications of Neural Networks, 213-226, 2016.
29
  1. A Khawar, A Abdelhadi, C Clancy, Target detection performance of spectrum sharing MIMO radars, IEEE Sensors Journal 15 (9), 4928-4940, 2015.
27
  1. M Mozaffari, W Saad, M Bennis, M Debbah, Optimal transport theory for power-efficient deployment of unmanned aerial vehicles, Communications (ICC), 2016 IEEE International Conference on, 1-6, 2016.
25
  1. W Sun, X Liu, W Lou, YT Hou, H Li, Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data, Computer Communications (INFOCOM), 2015 IEEE Conference on, 2110-2118, 2015.
25
  1. A Abdelhadi, C Clancy, An optimal resource allocation with joint carrier aggregation in 4G-LTE, Computing, Networking and Communications (ICNC), 2015 International ..., 2015.
23
  1. F Liu, X Shu, D Yao, AR Butt, Privacy-preserving scanning of big content for sensitive data exposure with MapReduce, Proceedings of the 5th ACM Conference on Data and Application Security and ..., 2015.
23
  1. M Ghorbanzadeh, E Visotsky, P Moorut, W Yang, C Clancy, Radar inband and out-of-band interference into LTE macro and small cell uplinks in the 3.5 GHz band, Wireless Communications and Networking Conference (WCNC), 2015 IEEE, 1829-1834, 2015.
22
  1. B Wang, W Song, W Lou, YT Hou, Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee, Computer Communications (INFOCOM), 2015 IEEE Conference on, 2092-2100, 2015.
21