Bo Chen
Cited by
Cited by
Remote data checking for network coding-based distributed storage systems
B Chen, R Curtmola, G Ateniese, R Burns
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 31-42, 2010
Personalized privacy-preserving social recommendation
X Meng, S Wang, K Shu, J Li, B Chen, H Liu, Y Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018
Robust dynamic provable data possession
B Chen, R Curtmola
2012 32nd International Conference on Distributed Computing Systems …, 2012
Deftl: Implementing plausibly deniable encryption in flash translation layer
S Jia, L Xia, B Chen, P Liu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Nfps: Adding undetectable secure deletion to flash translation layer
S Jia, L Xia, B Chen, P Liu
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
Mobipluto: File system friendly deniable storage for mobile devices
B Chang, Z Wang, B Chen, F Zhang
Proceedings of the 31st annual computer security applications conference …, 2015
What if routers are malicious? mitigating content poisoning attack in ndn
D Wu, Z Xu, B Chen, Y Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 481-488, 2016
ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN
Z Xu, B Chen, N Wang, Y Zhang, Z Li
2015 IEEE 40th Conference on Local Computer Networks (LCN), 82-90, 2015
Mobihydra: Pragmatic and multi-level plausibly deniable encryption storage for mobile devices
X Yu, B Chen, Z Wang, B Chang, WT Zhu, J Jing
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
Towards privacy preserving social recommendation under personalized privacy settings
X Meng, S Wang, K Shu, J Li, B Chen, H Liu, Y Zhang
World Wide Web 22, 2853-2881, 2019
Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices
B Chang, F Zhang, B Chen, Y Li, WT Zhu, Y Tian, Z Wang, A Ching
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
Towards self-repairing replication-based storage systems using untrusted clouds
B Chen, R Curtmola
Proceedings of the third ACM conference on Data and application security and …, 2013
Studying analysts’ data triage operations in cyber defense situational analysis
C Zhong, J Yen, P Liu, RF Erbacher, C Garneau, B Chen
Theory and models for cyber situation awareness, 128-169, 2017
RDS3: Ransomware defense strategy by using stealthily spare space
KP Subedi, DR Budhathoki, B Chen, D Dasgupta
2017 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2017
Sanitizing data is not enough! Towards sanitizing structural artifacts in flash media
B Chen, S Jia, L Xia, P Liu
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Robust dynamic remote data checking for public clouds
B Chen, R Curtmola
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Auditable Version Control Systems.
B Chen, R Curtmola
NDSS, 2014
Supporting transparent snapshot for bare-metal malware analysis on mobile devices
L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Internet protocol cameras with no password protection: An empirical investigation
H Xu, F Xu, B Chen
Passive and Active Measurement: 19th International Conference, PAM 2018 …, 2018
Enabling blockchain applications over named data networking
J Guo, M Wang, B Chen, S Yu, H Zhang, Y Zhang
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
The system can't perform the operation now. Try again later.
Articles 1–20