Kai Zhou
Title
Cited by
Cited by
Year
PassBio: Privacy-preserving user-centric biometric authentication
K Zhou, J Ren
IEEE Transactions on Information Forensics and Security 13 (12), 3050-3063, 2018
422018
ExpSOS: secure and verifiable outsourcing of exponentiation operations for mobile cloud computing
K Zhou, MH Afifi, J Ren
IEEE Transactions on Information Forensics and Security 12 (11), 2518-2531, 2017
382017
Attacking similarity-based link prediction in social networks
K Zhou, TP Michalak, M Waniek, T Rahwan, Y Vorobeychik
Proceedings of the 18th International Conference on Autonomous Agents and …, 2019
35*2019
CDMA system design and capacity analysis under disguised jamming
T Song, K Zhou, T Li
IEEE Transactions on Information Forensics and Security 11 (11), 2487-2498, 2016
242016
How to hide one’s relationships from link prediction algorithms
M Waniek, K Zhou, Y Vorobeychik, E Moro, TP Michalak, T Rahwan
Scientific reports 9 (1), 1-10, 2019
19*2019
Adversarial Robustness of Similarity-Based Link Prediction
K Zhou, TP Michalak, Y Vorobeychik
ICDM, 2019
162019
Privacy characterization and quantification in data publishing
MH Afifi, K Zhou, J Ren
IEEE Transactions on Knowledge and Data Engineering 30 (9), 1756-1769, 2018
132018
Computing equilibria in binary networked public goods games
S Yu, K Zhou, J Brantingham, Y Vorobeychik
Proceedings of the AAAI Conference on Artificial Intelligence 34 (02), 2310-2317, 2020
112020
P-mod: Secure privilege-based multilevel organizational data-sharing in cloud computing
E Zaghloul, K Zhou, J Ren
IEEE Transactions on Big Data 6 (4), 804-815, 2019
112019
CASO: Cost-aware secure outsourcing of general computational problems
K Zhou, J Ren
IEEE Transactions on Services Computing 14 (2), 386-399, 2018
82018
Secure fine-grained access control of mobile user data through untrusted cloud
K Zhou, J Ren
2016 25th International Conference on Computer Communication and Networks …, 2016
82016
LinSOS: Secure outsourcing of linear computations based on affine mapping
K Zhou, J Ren
2016 IEEE International Conference on Communications (ICC), 1-5, 2016
62016
Secure outsourcing of scalar multiplication on elliptic curves
K Zhou, J Ren
2016 IEEE International Conference on Communications (ICC), 1-5, 2016
52016
Robust Collective Classification against Structural Attacks
K Zhou, Y Vorobeychik
Conference on Uncertainty in Artificial Intelligence, 250-259, 2020
42020
Blocking adversarial influence in social networks
F Jia, K Zhou, C Kamhoua, Y Vorobeychik
International Conference on Decision and Game Theory for Security, 257-276, 2020
22020
Robust CDMA receiver design under disguised jamming
K Zhou, T Song, J Ren, T Li
2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016
22016
Security and efficiency trade-offs for cloud computing and storage
J Li, K Zhou, J Ren
2015 Resilience Week (RWS), 1-6, 2015
22015
Strategic Evasion of Centrality Measures
M Waniek, J Woźnica, K Zhou, Y Vorobeychik, T Rahwan, T Michalak
arXiv preprint arXiv:2101.10648, 2021
12021
BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection
Y Zhu, Y Lai, K Zhao, X Luo, M Yuan, J Ren, K Zhou
arXiv preprint arXiv:2106.09989, 2021
2021
Cost-aware secure outsourcing
J Ren, K Zhou
US Patent 10,901,693, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20