default search action
Ye Zhu 0001
Person information
- affiliation: Cleveland State University, Department of Electrical Engineering and Computer Science, OH, USA
- affiliation (PhD): Texas A&M University, College Station, TX, USA
Other persons with the same name
- Ye Zhu — disambiguation page
- Ye Zhu 0002 — Deakin University, School of Information Technology, Burwood, VIC, Australia (and 1 more)
- Ye Zhu 0003 — South China University of Technology, School of Computer Science and Engineering, Guangzhou , China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Jafar Pourbemany, Ye Zhu, Riccardo Bettati:
A Survey of Wearable Devices Pairing Based on Biometric Signals. IEEE Access 11: 26070-26085 (2023) - [j16]Sean W. Caldwell, Ye Zhu, Yong Guan, Riccardo Bettati:
On Account Association With Assistance From Mobile Networks. IEEE Trans. Dependable Secur. Comput. 20(4): 3421-3433 (2023) - [c40]Jafar Pourbemany, Ye Zhu:
Cross Body Signal Pairing (CBSP): A Key Generation Protocol for Pairing Wearable Devices with Cardiac and Respiratory Sensors. ACSAC 2023: 424-438 - [c39]Sravya Bethu, Ye Zhu:
Compromising Random Linear Network Coding as A Cipher. VTC2023-Spring 2023: 1-6 - 2022
- [c38]Avinash Kumar, Ye Zhu:
Generalizing Direct Sequence Spread-Spectrum to Mitigate Autocorrelation-Based Attacks. ISNCC 2022: 1-6 - [c37]Jafar Pourbemany, Ye Zhu, Riccardo Bettati:
Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices. WISEC 2022: 188-200 - 2021
- [j15]Ye Zhu, Nicholas Ruffing, Jonathan Gurary, Yong Guan, Riccardo Bettati:
Towards Smartphone Operating System Identification. IEEE Trans. Dependable Secur. Comput. 18(1): 411-425 (2021) - [c36]Sean W. Caldwell, Ye Zhu, Yong Guan, Riccardo Bettati:
Identifying Account Association with Assistance from Mobile Networks using Cross-Service Attacks. ICC 2021: 1-6 - [c35]Avinash Kumar, Ye Zhu:
Extending Direct Sequence Spread-Spectrum for Secure Communication. ISNCC 2021: 1-5 - [i3]Jafar Pourbemany, Almabrok Essa, Ye Zhu:
Real Time Video based Heart and Respiration Rate Monitoring. CoRR abs/2106.02669 (2021) - [i2]Jafar Pourbemany, Ye Zhu, Riccardo Bettati:
Breath to Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices. CoRR abs/2107.11677 (2021) - [i1]Jafar Pourbemany, Ye Zhu, Riccardo Bettati:
A Survey of Wearable Devices Pairing Based on Biometric Signals. CoRR abs/2107.11685 (2021)
2010 – 2019
- 2019
- [c34]Saikrishna Gumudavally, Ye Zhu, Huirong Fu, Yong Guan:
HECTor: Homomorphic Encryption Enabled Onion Routing. ICC 2019: 1-6 - 2018
- [j14]Ye Zhu, Jonathan Gurary, George P. Corser, Jared Oluoch, Nahed Alnahash, Huirong Fu, Junhua Tang:
CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices. IEEE Access 6: 54795-54810 (2018) - [c33]Ali Alshehri, Hani Alshahrani, Abdulrahman Alzahrani, Raed Alharthi, Huirong Fu, Anyi Liu, Ye Zhu:
DOPA: Detecting Open Ports in Android OS. CNS 2018: 1-2 - [c32]Raed Alharthi, Abdelnasser Banihani, Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Huirong Fu, Anyi Liu, Ye Zhu:
Location Privacy Challenges in Spatial Crowdsourcing. EIT 2018: 564-569 - [c31]Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Raed Alharthi, Huirong Fu, Anyi Liu, Ye Zhu:
RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform. EIT 2018: 892-897 - 2017
- [c30]Richard Bassous, Huirong Fu, Ye Zhu:
Ambiguous Multi-symmetric Cryptography Proof of Concept and Experiments. BigDataSecurity/HPSC/IDS 2017: 231-236 - [c29]Abdulrahman Alzahrani, Ali Alqazzaz, Ye Zhu, Huirong Fu, Nabil Almashfi:
Web Application Security Tools Analysis. BigDataSecurity/HPSC/IDS 2017: 237-242 - [c28]George P. Corser, Abdelnasser Banihani, Johnathan Cox, Risalatul Hoque, Huirong Fu, Ye Zhu:
Location Privacy, Application Overhead and Congestion in VANET Location Based Services. BigDataSecurity/HPSC/IDS 2017: 243-248 - [c27]Ahmad Mansour, Andrew Davis, Matthew Wagner, Richard Bassous, Huirong Fu, Ye Zhu:
Multi-asymmetric cryptographic RSA scheme. CISRC 2017: 9:1-9:8 - 2016
- [c26]Nicholas Ruffing, Ye Zhu, Rudy Libertini, Yong Guan, Riccardo Bettati:
Smartphone reconnaissance: Operating system identification. CCNC 2016: 1086-1091 - [c25]Jonathan Gurary, Ye Zhu, Nahed Alnahash, Huirong Fu:
Implicit Authentication for Mobile Devices Using Typing Behavior. HCI (20) 2016: 25-36 - [p1]Jonathan Gurary, Ye Zhu, Riccardo Bettati, Yong Guan:
Operating System Fingerprinting. Digital Fingerprinting 2016: 115-139 - 2015
- [c24]Richard Bassous, Roger Bassous, Huirong Fu, Ye Zhu:
Ambiguous Multi-Symmetric Cryptography. ICC 2015: 7394-7399 - [c23]Jonathan Gurary, Ye Zhu, George P. Corser, Jared Oluoch, Nahed Alnahash, Huirong Fu:
MAPS: A Multi-Dimensional Password Scheme for Mobile Authentication. ITS 2015: 409-412 - 2014
- [j13]Ye Zhu, Anil Vikram, Huirong Fu:
On Topology of Sensor Networks Deployed for Multitarget Tracking. IEEE Trans. Intell. Transp. Syst. 15(4): 1489-1498 (2014) - [j12]Ye Zhu, Anil Vikram, Huirong Fu, Yong Guan:
On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 13(11): 6496-6510 (2014) - [c22]Kiran Penna, Venkatesh Yalavarthi, Huirong Fu, Ye Zhu:
Evaluation of active position detection in Vehicular Ad Hoc Networks. IJCNN 2014: 2234-2239 - [c21]George P. Corser, Huirong Fu, Tao Shu, Patrick D'Errico, Warren Ma, Supeng Leng, Ye Zhu:
Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services. Intelligent Vehicles Symposium 2014: 1030-1036 - 2013
- [j11]Eralda Caushaj, Huirong Fu, Ishwar K. Sethi, Haissam Badih, Dion Watson, Ye Zhu, Supeng Leng:
Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications. Int. J. Interdiscip. Telecommun. Netw. 5(2): 66-82 (2013) - 2012
- [j10]Ye Zhu, Yuanchao Lu, Anil Vikram:
On Privacy of Encrypted Speech Communications. IEEE Trans. Dependable Secur. Comput. 9(4): 470-481 (2012) - [c20]Jared Oluoch, Huirong Fu, Astrid Younang, Ye Zhu, Bao Tri-Tran:
A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs). InfoSecCD 2012: 40-45 - [c19]Eralda Caushaj, Huirong Fu, Haissam Badih, Ishwar K. Sethi, Ye Zhu, Supeng Leng:
Attacks and countermeasures in wireless cellular networks. InfoSecCD 2012: 46-52 - [c18]Ye Zhu, Anil Vikram, Huirong Fu:
On tracking multiple indistinguishable targets. MASS 2012: 1-9 - 2011
- [j9]Ye Zhu, Huirong Fu:
Traffic analysis attacks on Skype VoIP calls. Comput. Commun. 34(10): 1202-1212 (2011) - [j8]Ye Zhu, Yongjian Fu, Huirong Fu:
Preserving Privacy in Time Series Data Mining. Int. J. Data Warehous. Min. 7(4): 64-85 (2011) - [c17]Hesiri Weerasinghe, Huirong Fu, Supeng Leng, Ye Zhu:
Enhancing unlinkability in Vehicular Ad Hoc Networks. ISI 2011: 161-166 - [c16]Ye Zhu, Anil Vikram, Huirong Fu:
On Topology of Sensor Networks Deployed for Tracking. WASA 2011: 60-71 - 2010
- [j7]Ye Zhu, Yongjian Fu, Huirong Fu:
A new class of attacks on time series data mining\m{1}. Intell. Data Anal. 14(3): 405-418 (2010) - [j6]Ye Zhu, Yongjian Fu, Huirong Fu:
On privacy-preserving time series data classification. Int. J. Data Min. Model. Manag. 2(2): 117-136 (2010) - [j5]Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
Correlation-Based Traffic Analysis Attacks on Anonymity Networks. IEEE Trans. Parallel Distributed Syst. 21(7): 954-967 (2010) - [c15]Ye Zhu:
On Privacy Leakage through Silence Suppression. ISC 2010: 276-282
2000 – 2009
- 2009
- [b1]Ye Zhu:
On traffic analysis in anonymous communication networks. Texas A&M University, College Station, USA, 2009 - [j4]Ye Zhu, Riccardo Bettati:
Compromising anonymous communication systems using blind source separation. ACM Trans. Inf. Syst. Secur. 13(1): 8:1-8:31 (2009) - [j3]Ye Zhu, Riccardo Bettati:
Information Leakage as a Model for Quality of Anonymity Networks. IEEE Trans. Parallel Distributed Syst. 20(4): 540-552 (2009) - [c14]David Wampler, Huirong Fu, Ye Zhu:
Security Threats and Countermeasures for Intra-vehicle Networks. IAS 2009: 153-157 - [c13]Deepa Susan Rajan, Chetan Yeole, Harsha Nakade, Huirong Fu, Ye Zhu:
Position Verification in Multi-hop Vehicular Networks. IAS 2009: 580-584 - [c12]Ye Zhu, Yuanchao Lu, Anil Vikram, Huirong Fu:
On Privacy of Skype VoIP Calls. GLOBECOM 2009: 1-6 - [c11]Ye Zhu, Yongjian Fu, Huirong Fu:
Preserving Privacy in Time Series Data Classification by Discretization. MLDM 2009: 53-67 - 2008
- [j2]Ye Zhu, Xinwen Fu, Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. Int. J. Netw. Secur. 7(1): 130-140 (2008) - [c10]Ye Zhu, Yongjian Fu, Huirong Fu:
On Privacy in Time Series Data Mining. PAKDD 2008: 479-493 - 2007
- [j1]Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Analysis of flow-correlation attacks in anonymity network. Int. J. Secur. Networks 2(1/2): 137-153 (2007) - [c9]Ye Zhu, Riccardo Bettati:
Compromising Location Privacy inWireless Networks Using Sensors with Limited Information. ICDCS 2007: 24 - 2005
- [c8]Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Anonymity analysis of mix networks against flow-correlation attacks. GLOBECOM 2005: 5 - [c7]Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, Wei Zhao:
SAS: A Scalar Anonymous Communication System. ICCNMC 2005: 452-461 - [c6]Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Flow Marking Attacks in Wireless Anonymous Communication Networks. ICDCS 2005: 493-503 - [c5]Ye Zhu, Riccardo Bettati:
Anonymity vs. Information Leakage in Anonymity Systems. ICDCS 2005: 514-524 - [c4]Bryan Graham, Ye Zhu, Xinwen Fu, Riccardo Bettati:
Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures. ICPADS (1) 2005: 57-63 - [c3]Ye Zhu, Xinwen Fu, Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. NCA 2005: 215-218 - [c2]Ye Zhu, Riccardo Bettati:
Unmixing Mix Traffic. Privacy Enhancing Technologies 2005: 110-127 - 2004
- [c1]Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Flow Correlation Attacks and Countermeasures in Mix Networks. Privacy Enhancing Technologies 2004: 207-225
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint