Author image not provided
 Wenjing Lou

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article9.18
Citation Count202
Publication count22
Publication years2012-2016
Available for download9
Average downloads per article362.33
Downloads (cumulative)3,261
Downloads (12 Months)751
Downloads (6 Weeks)68
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


30 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 30
Result page: 1 2

Sort by:

1
May 2017 Information Sciences: an International Journal: Volume 387 Issue C, May 2017
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 0

With the advent of cloud computing, outsourcing databases to remote cloud servers provide the elastic, flexible and affordable data management services for the Internet users. The cloud users can create, store, access and update the remote outsourced databases just as they are using the database system locally. However, unlike storing ...
Keywords: Public authentication, Outsourced database, Homomorphic verifiable tags

2
March 2017 IEEE Transactions on Information Forensics and Security: Volume 12 Issue 3, March 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Cross-client data deduplication has been widely used to eliminate redundant storage overhead in cloud storage system. Recently, Abadi et al. introduced the primitive of MLE2 with nice security properties for secure and efficient data deduplication. However, besides the computationally expensive non-interactive zero-knowledge proofs, their fully randomized scheme (R-MLE2) requires the ...

3
January 2017 IEEE Transactions on Mobile Computing: Volume 16 Issue 1, January 2017
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

There have been some rapid advances on the design of full duplex (FD) transceivers in recent years. Although the benefits of FD have been studied for single-hop wireless communications, its potential on throughput performance in a multi-hop wireless network remains unclear. As for multi-hop networks, a fundamental problem is to ...

4 published by ACM
October 2016 TrustED '16: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 16,   Downloads (12 Months): 155,   Downloads (Overall): 155

Full text available: PDFPDF
Augmented reality is poised to become a dominant computing paradigm over the next decade. With promises of three-dimensional graphics and interactive interfaces, augmented reality experiences will rival the very best science fiction novels. This breakthrough also brings in unique challenges on how users can authenticate one another to share rich ...
Keywords: device pairing, usability, wireless localization, augmented reality, usable security

5
October 2016 IEEE Journal on Selected Areas in Communications: Volume 34 Issue 10, October 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Cooperation has become an essential element in spectrum sharing between the primary and secondary networks. A new trend in cooperation is to allow the primary and secondary networks to cooperate on the node level for data forwarding. This new paradigm allows to pool network resources from both the primary and ...

6
October 2016 IEEE Transactions on Computers: Volume 65 Issue 10, October 2016
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it could later retrieve a database record and update a record by assigning a new value. Also, any attempt by the server to tamper with the data ...

7
September 2016 IEEE Transactions on Wireless Communications: Volume 15 Issue 9, September 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

The transparent coexistence (TC) paradigm allows simultaneous activation of the secondary users with the primary users as long as their interference to the primary users can be properly canceled. This paradigm has the potential to offer much more efficient spectrum sharing than the traditional interweave paradigm. In this paper, we ...

8
August 2016 IEEE Transactions on Wireless Communications: Volume 15 Issue 8, August 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

This paper studies the coexistence of heterogeneous multi-hop networks, which use different physical-layer technologies. We propose a new paradigm, called cooperative interference mitigation (CIM), which exploits recent advancement in interference cancellation (IC), such as technology-independent multiple output. CIM makes it possible for disparate networks to cooperatively mitigate the interference to/from ...

9
August 2016 IEEE Transactions on Wireless Communications: Volume 15 Issue 8, August 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

The classical approach to interference management in wireless medium access is based on avoidance. Recently, there is a growing interest in exploiting interference (rather than avoiding it) to increase network throughput. This was made possible by a number of advances at the physical layer. In particular, the so-called successive interference ...

10 published by ACM
July 2016 WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 12,   Downloads (12 Months): 125,   Downloads (Overall): 125

Full text available: PDFPDF
Physical layer security for wireless communication is broadly considered as a promising approach to protect data confidentiality against eavesdroppers. However, despite its ample theoretical foundation, the transition to practical implementations of physical-layer security still lacks success. A close inspection of proven vulnerable physical-layer security designs reveals that the flaws are ...
Keywords: cryptanalysis, ciphertext-only attack, information-theoretic security analysis, orthogonal blinding, physical-layer security

11
July 2016 Proceedings, Part I, of the 21st Australasian Conference on Information Security and Privacy - Volume 9722
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 2

Cross-user data deduplication will greatly reduce the storage cost of storage service provider. Motivated by secure data deduplication, Abadi et al. extended the work Message-Locked Encryption MLE and introduced the primitive of MLE2 with nice security properties. However, their fully randomized scheme R-MLE2 requires the inefficient equality-testing algorithm to identify ...
Keywords: Deduplication, Convergent encryption, Interactive protocol, Message-locked encryption

12
July 2016 IEEE Network: The Magazine of Global Internetworking: Volume 30 Issue 4, July 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

The rapid proliferation of personal wearable as well as embedded devices point to the emergence of networks of unprecedented size and complexity in the near future. Unfortunately, traditional network security solutions fall short of addressing the unique security requirements of the emerging environment given their general emphasis on administratively managed, ...

13
July 2016 IEEE Transactions on Information Forensics and Security: Volume 11 Issue 7, July 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Jamming attack is a serious threat to the wireless communications. Reactive jamming maximizes the attack efficiency by jamming only when the targets are communicating, which can be readily implemented using software-defined radios. In this paper, we explore the use of the multi-input multi-output (MIMO) technology to achieve jamming resilient orthogonal ...

14
February 2016 International Journal of Information Security: Volume 15 Issue 1, February 2016
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

In this work, we have put forth two different protocols to address a concrete secure multi-party computational (MPC) problem related to a triangle, of which the coordinates of the three vertices are confidentially kept by the three participants, respectively. The three parties wish to collaboratively compute the area of this ...
Keywords: Stronger proof, Weaker assumption, Pseudorandom generator, IND-CPA encryption scheme, Secure multi-party computation

15
February 2016 IEEE Transactions on Mobile Computing: Volume 15 Issue 2, February 2016
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

Recently, a new MIMO degree-of-freedom (DoF) model was proposed to allocate DoF resources for spatial multiplexing (SM) and interference cancellation (IC) in a multi-hop network. Although this DoF model promises many benefits, it hinges upon a global node ordering to keep track of IC responsibilities among all the nodes. An ...

16
January 2016 IEEE Transactions on Mobile Computing: Volume 15 Issue 1, January 2016
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

Interference alignment (IA) is a powerful technique to handle interference in wireless networks. Since its inception, IA has become a central research theme in the wireless communications community. Due to its intrinsic nature of being a physical layer technique, IA has been mainly studied for point-to-point or single-hop scenario. There ...

17
April 2015 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 81 Issue C, April 2015
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 12

Cloud computing has become the real trend of enterprise IT service model that offers cost-effective and scalable processing. Meanwhile, Software-Defined Networking (SDN) is gaining popularity in enterprise networks for flexibility in network management service and reduced operational cost. There seems a trend for the two technologies to go hand-in-hand in ...
Keywords: Graphical model, DDoS mitigation, Software-Defined Networking

18
April 2015 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 81 Issue C, April 2015
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 1

Direct Anonymous Attestation (DAA) is a complex cryptographic protocol for remote attestation and provides both signer authentication and privacy. It was adopted by the Trusted Computing Group (TCG) as a technical standard. However, the DAA scheme in TCG specifications is designed for the single trusted domain attestation, and cannot be ...
Keywords: Delegation, Cross trusted domain, DAA, Trusted computing, Remote attestation

19 published by ACM
April 2015 ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 8,   Downloads (12 Months): 92,   Downloads (Overall): 298

Full text available: PDFPDF
With the growing complexity of computing systems, memory based forensic techniques are becoming instrumental in digital investigations. Digital forensic examiners can unravel what happened on a system by acquiring and inspecting in-memory data. Meanwhile, attackers have developed numerous anti-forensic mechanisms to defeat existing memory forensic techniques by manipulation of system ...
Keywords: memory acquisition, system security, digital forensics, rootkits

20
April 2015 IEEE/ACM Transactions on Networking (TON): Volume 23 Issue 2, April 2015
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 10,   Downloads (12 Months): 79,   Downloads (Overall): 163

Full text available: PDFPDF
Wireless energy transfer based on magnetic resonant coupling is a promising technology to replenish energy to a wireless sensor network (WSN). However, charging sensor nodes one at a time poses a serious scalability problem. Recent advances in magnetic resonant coupling show that multiple nodes can be charged at the same ...
Keywords: wireless energy transfer, Optimization, scalability, wireless sensor network



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us