List of Publications in Network/System Security Area

2024

  1. Jin Wang, Wei Jiang, Jingya Zhou, Zhaobo Lu, Kejie Lu, and Jianping Wang, "Partial Decode and Compare: An Efficient Verification Scheme for Coded Edge Computing," Published online, IEEE Transactions on Cloud Computing, Mar. 2024. [bib]

2023

  1. Jin Wang, Zhaobo Lu, Mingjia Fu, Jianping Wang, Kejie Lu, and Admela Jukan, "Decode-and-Compare: An Efficient Verification Scheme for Coded Distributed Edge Computing," IEEE Transactions on Cloud Computing, Vol. 11, No. 3, pp. 2784-2802, Jul 2023. [bib]

2019

  1. Jin Wang, Kejie Lu, Jianping Wang, Chuan Wu, and Naijie Gu, "Enhancing The Anonymity in Information Diffusion Based on Obfuscated Coded Data," IEEE Transactions on Network Science and Engineering, Vol. 6, No. 4, pp. 968-982, Oct. 2019. [bib]
  2. Jinguo Li, Mi Wen, Kui Wu, Kejie Lu, Fengyong Li, Hongjiao Li, "Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds," Springer Peer-to-Peer Networking and Applications, Vol. 12, No. 4, pp. 893-911, Jul 2019. [bib]
  3. Chunming Cao, Jin Wang, Jianping Wang, Kejie Lu, Jingya Zhou, Admela Jukan, and Wei Zhao, "Optimal Task Allocation and Coding Design for Secure Coded Edge Computing," in Proc. IEEE ICDCS 2019, Dallas, Texas, Jul 2019. [bib]

2018

  1. Ruimin Zhao, Jin Wang, Kejie Lu, Xiangmao Chang, Juncheng Jia, and Shukui Zhang, "Optimal Transmission Topology Construction and Secure Linear Network Coding Design for Virtual-source Multicast with Integral Link Rates," IEEE Transactions on Multimedia, Vol. 20, No. 11, pp. 3069-3083, Nov. 2018. [bib]
  2. Weiwei Ding, Jin Wang, Xiumin Wang, Kejie Lu, Ruimin Zhao, Yanqin Zhu, "On the optimal flow allocation and information theoretically secure network coding design for multiple multicasts," International Journal of Communication Systems, Vol. 31, No. 6, Apr. 2018. [bib]
  3. Hermine Hovhannisyan, Wen Qi, Kejie Lu, Rongwei Yang, Jianping Wang, "Whispers in the cloud storage: A novel cross-user deduplication-based covert channel design," Peer-to-Peer Networking and Applications, Vol. 11, No. 2, pp. 277-286, Mar. 2018. [bib]
  4. Wen Qi, Wanfu Ding, Xinyu Wang, Yonghang Jiang, Yichen Xu, Jianping Wang, Kejie Lu, "Construction and Mitigation of User-Behavior-Based Covert Channels on Smartphones," IEEE Transactions on Mobile Computing, Vol. 17, No. 1, pp. 44-57, Jan. 2018. [bib]
  5. Ruimin Zhao, Jin Wang, Kejie Lu, Jianping Wang, Xiumin Wang, Jingya Zhou, and Chunming Cao, "Weakly Secure Coded Distributed Computing," in Proc. of the 15th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC), Oct. 2018. [bib]

2017

  1. Xu Zhang, Mi Wen, Kejie Lu, and Jingsheng Lei, "A privacy-aware data dissemination scheme for smart grid with abnormal data traceability," Computer Networks, Vol. 117, pp. 32-41, Apr. 2017. [bib]

2016

  1. Jinguo Li, Mi Wen, Kejie Lu, and Chunhua Gu, "PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data," Security and Communication Networks, Vol. 9, No. 16, pp. 3765-3776, Nov. 2016. [bib]
  2. Jin Wang, Kejie Lu, Jianping Wang, Junda Zhu, and Chunming Qiao, "ULNC: An Untraceable Linear Network Coding Mechanism for Mobile Devices in Wireless Mesh Networks," IEEE Transactions on Vehicular Technology, Vol. 65, No. 9, pp. 7621-7633, Sept. 2016. [bib]
  3. Jin Wang, Jianping Wang, Kejie Lu, Yi Qian, and Naijie Gu, "On the Optimal Linear Network Coding Design for Information Theoretically Secure Unicast Streaming," IEEE Transactions on Multimedia, Vol. 18, No. 6, Jun. 2016. [bib]
  4. Xiangmao Chang, Jin Wang, Jianping Wang, Kejie Lu, Yi Zhuang, "On the optimal design of secure network coding against wiretapping attack," Computer Networks, Vol. 99, pp. 82-98, Apr. 2016. [bib]
  5. Ruimin Zhao, Jin Wang, Kejie Lu, Xiangmao Chang, Lingzhi Li, and Yanqin Zhu, "Optimal Transmission Topology Construction and Secure Linear Network Coding Design for Multicast with Integral Link Rates," in Proc. IEEE HPCC 2016, Dec. 2016. [bib]
  6. Zhengqing Wen, Jin Wang, Kejie Lu, Jingya Zhou, Zhenguo Gao, and Yanqin Zhu, "Optimal Rate Allocation and Linear Network Coding Design for Secure Multicast with Multiple Streams," in Proc. IEEE HPCC 2016, Dec. 2016. [bib]
  7. Wen Qi, Jin Wang, Hermine Hovhannisyan, Kejie Lu, Jianping Wang, Junda Zhu, "A Generic Mitigation Framework against Cross - VM Covert Channels," in Proc. IEEE ICCCN 2016, Aug. 2016. [bib]
  8. Mi Wen, Shui Yu, Jinguo Li, Hongwei Li, and Kejie Lu, "Big Data Storage Security," Big Data Concepts, Theories and Applications, pp. 237-255, 2016. [bib]

2015

  1. Wen Qi, Yichen Xu, Wanfu Ding, Yonghang Jiang, Jianping Wang, Kejie Lu, "Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones," in Proc. IEEE ICNP 2015, Nov. 2015. [bib]
  2. Hermine Hovhannisyan, Kejie Lu, Jianping Wang, "A Novel High-Speed IP-Timing Covert Channel: Design and Evaluation," in Proc. IEEE ICC 2015, Jun. 2015. [bib]
  3. Mi Wen, Kejie Lu, Jingsheng Lei, Fengyong Li, Jing Li, "BDO-SD: An Efficient Scheme for Big Data Outsourcing with Secure Deduplication," in Proc. IEEE INFOCOM 2015, Workshop on BigData Security (BigSecurity), Apr. 2015. [bib]

2014

  1. Huan Li, Zhefeng Sun, and Kejie Lu, "Real-Time Tracking for Moving Target in WSN with Uncovered Holes," Human Behavior Understanding in Networked Sensing, Editors: Paolo Spagnolo, Pier Luigi Mazzeo, Cosimo Distante, pp. 75-97, Nov. 2014. [bib]

2013

  1. Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, and Naijie Gu, "Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams," IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 10, pp. 2025-2035, Oct. 2013. [bib]
  2. Junsheng Wang, Jin Wang, Yanqin Zhu and Kejie Lu, "SNKC: An Efficient On-the-fly Pollution Detection Scheme for Content Distribution with Network Coding," in Proc. IEEE/IFIP EUC 2013, Nov. 2013. [bib]
  3. Jin Wang, Kejie Lu, Jianping Wang, Chunming Qiao, "Untraceability of mobile devices in wireless mesh networks using linear network coding," in Proc. IEEE INFOCOM 2013, Apr. 2013. [bib]

2011

  1. Hector M Lugo-Cordero, Ratan Guha, and Kejie Lu, "A Secure Service-Oriented Routing Algorithm for Heterogeneous Wireless Mesh Networks," in Proc. of IEEE Globecom 2011, Dec. 2011. [bib]
  2. Jin Wang, Jianping Wang, Kejie Lu, Yi Qian, Bin Xiao, and Naijie Gu, "Optimal Design of Linear Network Coding for Information Theoretically Secure Unicast," in Proc. IEEE INFOCOM 2011, Shanghai, China, Mar. 2011. [bib]
  3. Jin Wang, Jianping Wang, Chuan Wu, Kejie Lu, and Naijie Gu, "Anonymous Communication with Network Coding against Traffic Analysis Attack," in Proc. IEEE INFOCOM 2011, Shanghai, China, Mar. 2011. [bib]

2010

  1. Shengli Fu, Kejie Lu, Tao Zhang, Yi Qian, and Haisao-Hwa Chen, "Cooperative wireless networks based on physical layer network coding," IEEE Wireless Communications, Vol. 17, No. 6, pp. 86-95, Dec. 2010. [bib]
  2. Xiangmao Chang, Jin Wang, Jianping Wang, Victor Lee, Kejie Lu and Yixian Yang, "On Achieving Maximum Secure Throughput Using Network Coding Against Wiretap Attack," in Proc. IEEE ICDCS 2010, Genoa, Italy, Jun. 2010. [bib]
  3. Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, and Naijie Gu, "Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams," in Proc. IEEE INFOCOM 2010, San Diego, CA, Mar. 2010. [bib]

2009

  1. Bo Rong, Hsiao-Hwa Chen, Yi Qian, Kejie Lu, R. Q. Hu, and S. Guizani, "A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: the Key Management Study," IEEE Transactions on Vehicular Technology, Vol. 58, No. 1, pp. 398-408, Jan. 2009. [bib]
  2. Kejie Lu, Shengli Fu, Yi Qian, and Tao Zhang, "On The Security Performance of Physical-Layer Network Coding," in Proc. IEEE ICC 2009, Dresden, Germany, Jun. 2009. [bib]

2008

  1. Kejie Lu, Yi Qian, Mohsen Guizani, and Hsiao-Hwa Chen, "A Framework for a Distributed Key Management Scheme in Heterogeneous Wireless Sensor Networks," IEEE Transactions on Wireless Communications, Vol. 7, No. 2, pp. 639-647, Feb. 2008. [bib]
  2. Jieyan Fan, Dapeng Wu, Kejie Lu, and Antonio Nucci, "An Efficient Data Structure for Network Anomaly Detection," Security and Communication Networks, Vol. 1, No. 2, pp. 107-124, Feb. 2008. [bib]
  3. Yi Qian, Kejie Lu, Bo Rong, and David Tipper, "A Design of Optimal Key Management Scheme for Secure and Survivable Wireless Sensor Networks," Security and Communication Networks, Vol. 1, No. 1, pp. 75-82, Jan. 2008. [bib]
  4. Yi Qian, Kejie Lu, and Nader Moayeri, "A Secure VANET MAC Protocol for DSRC Applications," in Proc. IEEE Globecom 2008, New Orleans, Nov. 2008. [bib]

2007

  1. Kejie Lu, Dapeng Wu, Jieyan Fan, S. Todorovic, and A. Nucci, "Robust and Efficient Detection of DDoS Attacks for Large-Scale Internet," Computer Networks, Vol. 51, No. 18, pp. 5036-5056, Dec. 2007. [bib]
  2. Yi Qian, Kejie Lu, and David Tipper, "A design for secure and survivable wireless sensor networks," IEEE Wireless Communications Magazine, Vol. 14, No. 5, pp. 30-37, Oct. 2007. [bib]
  3. Kejie Lu, Yi Qian, and Hsiao-Hwa Chen, "A Secure and Service-Oriented Network Control Framework for WiMAX Networks," IEEE Communications Magazine, Vol. 45, No. 5, pp. 124-130, May 2007. [bib]
  4. Yi Qian, Kejie Lu, Bo Rong, and Hua Zhu, "Optimal Key Management for Secure and Survivable Heterogeneous Wireless Sensor," in Proc. of IEEE Globecom 2007, Washington DC, USA, Nov. 2007. [bib]
  5. Yi Qian, Kejie Lu, Bo Rong, Hector Lugo, and David Tipper, "An Optimal Key Management Scheme for Wireless Sensor Networks," in Proc. IEEE Milcom 2007, Orlando, FL, USA, Oct. 2007. [bib]
  6. Yi Qian, Kejie Lu, and David Tipper, "Towards Survivable and Secure Wireless Sensor Networks," in Proc. of IEEE IPCCC 2007 (WIA'07), New Orleans, LA, USA, Apr. 2007. [bib]

2006

  1. Jieyan Fan, Dapeng Wu, Kejie Lu, and Antonio Nucci, "Design of Bloom Filter Array for Network Anomaly Detection," in Proc. of IEEE Globecom 2006, San Francisco, CA, USA, Nov. 2006. [bib]
  2. Kejie Lu and Yi Qian, "On The Performance Of A Distributed Key Management Scheme In Heterogeneous Wireless Sensor Networks," in Proc. of IEEE MILCOM 2006, Washington DC, USA, Oct. 2006. [bib]
  3. Kejie Lu, Yi Qian, and Jiankun Hu, "A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks," in Proc. of IEEE International Performance Computing and Communications Conference (IPCCC), Workshop on Information Assurance 20, pp. 513-519, Phoenix, Arizona, USA, Apr. 2006. [bib]

2005

  1. Kejie Lu, Jieyan Fan, James Greco, Dapeng Wu, S. Todorovic, and Antonio Nucci, "A Novel Anti-DDoS System for Large-Scale Internet," ACM SIGCOMM 2005, Work-in-Progress Session, Philadelphia, PA, USA, Aug. 2005. [bib]