default search action
Xukai Zou
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c70]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao:
Subjective Logic-based Decentralized Federated Learning for Non-IID Data. ARES 2024: 12:1-12:11 - [c69]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao:
Toward Multimodal Vertical Federated Learning: A Traffic Analysis Case Study. ICCCN 2024: 1-9 - 2023
- [c68]Ryan Hosler, Agnideven Palanisamy Sundar, Xukai Zou, Feng Li, Tianchong Gao:
Unsupervised Deep Learning for an Image Based Network Intrusion Detection System. GLOBECOM 2023: 6825-6831 - [c67]Muwei Zheng, Nathan Swearingen, William Silva, Matt Bishop, Xukai Zou:
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula. HAISA 2023: 36-52 - [c66]Edwin Antonio Sanchez, Anthony Weyer, Joseph Palackal, Kai Wang, Tyler Phillips, Xukai Zou:
Advancing Active Authentication for User Privacy and Revocability with BioCapsules. MobiHoc 2023: 468-473 - [c65]Muwei Zheng, Nathan Swearingen, Steven Mills, Croix Gyurek, Matt Bishop, Xukai Zou:
Case Study: Mapping an E-Voting Based Curriculum to CSEC2017. SIGCSE (1) 2023: 514-520 - [i4]Lin Sun, Todd Rosenkrantz, Prathyusha Enganti, Huiyang Li, Zhijun Wang, Hao Che, Hong Jiang, Xukai Zou:
DSSP: A Distributed, SLO-aware, Sensing-domain-privacy-Preserving Architecture for Sensing-as-a-Service. CoRR abs/2308.11985 (2023) - [i3]Zhilin Wang, Qin Hu, Xukai Zou:
Can We Trust the Similarity Measurement in Federated Learning? CoRR abs/2311.03369 (2023) - 2022
- [j21]Qin Hu, Feng Li, Xukai Zou, Yinhao Xiao:
Solving the Federated Edge Learning Participation Dilemma: A Truthful and Correlated Perspective. IEEE Trans. Veh. Technol. 71(7): 7680-7690 (2022) - [c64]Kai Wang, Tyler Phillips, Xukai Zou:
An Experimental Evaluation of a Privacy-Preserving Authentication and Authorization Scheme. CSCI 2022: 948-952 - [c63]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao:
Distributed Swift and Stealthy Backdoor Attack on Federated Learning. NAS 2022: 1-8 - [i2]Qin Hu, Feng Li, Xukai Zou, Yinhao Xiao:
Solving the Federated Edge Learning Participation Dilemma: A Truthful and Correlated Perspective. CoRR abs/2203.12430 (2022) - 2021
- [c62]Saptarshi Purkayastha, Shreya Goyal, Bolu Oluwalade, Tyler Phillips, Huanmei Wu, Xukai Zou:
Usability and Security of Different Authentication Methods for an Electronic Health Records System. HEALTHINF 2021: 621-628 - [c61]Cheng Peng, Qin Hu, Jianan Chen, Kyubyung Kang, Feng Li, Xukai Zou:
Energy-Efficient Device Selection in Federated Edge Learning. ICCCN 2021: 1-9 - [c60]Ryan Hosler, Xukai Zou, Matt Bishop:
Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education. World Conference on Information Security Education 2021: 27-43 - [c59]Nathan Swearingen, Ryan Hosler, Xukai Zou:
Hardware Speculation Vulnerabilities and Mitigations. MASS 2021: 609-614 - [c58]Ryan Hosler, Tyler Phillips, Xiaoyuan Yu, Agnideven Palanisamy Sundar, Xukai Zou, Feng Li:
Learning Discriminative Features for Adversarial Robustness. MSN 2021: 303-310 - [i1]Saptarshi Purkayastha, Shreya Goyal, Bolu Oluwalade, Tyler Phillips, Huanmei Wu, Xukai Zou:
Usability and Security of Different Authentication Methods for an Electronic Health Records System. CoRR abs/2102.11849 (2021) - 2020
- [j20]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao, Evan D. Russomanno:
Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey. IEEE Access 8: 171703-171715 (2020) - [c57]Qin Hu, Feng Li, Xukai Zou, Yinhao Xiao:
Correlated Participation Decision Making for Federated Edge Learning. GLOBECOM 2020: 1-6 - [c56]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao:
Deep Dynamic Clustering of Spam Reviewers using Behavior-Anomaly-based Graph Embedding. GLOBECOM 2020: 1-6 - [c55]Xiaoyuan Yu, Brandon Haakenson, Tyler Phillips, Xukai Zou:
User-Friendly Design of Cryptographically-Enforced Hierarchical Role-based Access Control Models. ICCCN 2020: 1-9 - [c54]Saptarshi Purkayastha, Shreya Goyal, Tyler Phillips, Huanmei Wu, Brandon Haakenson, Xukai Zou:
Continuous Security through Integration Testing in an Electronic Health Records System. ICSSA 2020: 26-31 - [c53]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Qin Hu, Tianchong Gao:
Multi-Armed-Bandit-based Shilling Attack on Collaborative Filtering Recommender Systems. MASS 2020: 347-355 - [c52]Tyler Phillips, Xiaoyuan Yu, Brandon Haakenson, Shreya Goyal, Xukai Zou, Saptarshi Purkayastha, Huanmei Wu:
AuthN-AuthZ: Integrated, User-Friendly and Privacy-Preserving Authentication and Authorization. TPS-ISA 2020: 189-198
2010 – 2019
- 2019
- [c51]Huangyi Ge, Sze Yiu Chau, Victor E. Gonsalves, Huian Li, Tianhao Wang, Xukai Zou, Ninghui Li:
Koinonia: verifiable e-voting with long-term privacy. ACSAC 2019: 270-285 - [c50]Tyler Phillips, Xukai Zou, Feng Li, Ninghui Li:
Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning. SACMAT 2019: 141-146 - [c49]Tyler Phillips, Xiaoyuan Yu, Brandon Haakenson, Xukai Zou:
Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Control. TPS-ISA 2019: 46-55 - 2018
- [j19]Tianchong Gao, Feng Li, Yu Chen, Xukai Zou:
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model. IEEE Trans. Comput. Soc. Syst. 5(4): 1009-1020 (2018) - 2017
- [j18]Xukai Zou, Huian Li, Feng Li, Wei Peng, Yan Sui:
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election. Cryptogr. 1(2): 13 (2017) - [j17]Yefeng Ruan, Xukai Zou:
Receipt-freeness and coercion resistance in remote E-voting systems. Int. J. Secur. Networks 12(2): 120-133 (2017) - [c48]Tyler Phillips, Xukai Zou, Feng Li:
A Cancellable and Privacy-Preserving Facial Biometric Authentication Scheme. MASS 2017: 545-549 - [c47]Tianchong Gao, Feng Li, Yu Chen, Xukai Zou:
Preserving Local Differential Privacy in Online Social Networks. WASA 2017: 393-405 - 2016
- [j16]Sahana Shivaprasad, Huian Li, Xukai Zou:
Privacy Preservation in Location Based Services. J. Comput. 11(5): 411-422 (2016) - [j15]Yefeng Ruan, Sivapriya Kalyanasundaram, Xukai Zou:
Survey of return-oriented programming defense mechanisms. Secur. Commun. Networks 9(10): 1247-1265 (2016) - [c46]Tamara M. Dugan, Xukai Zou:
A Survey of Secure Multiparty Computation Protocols for Privacy Preserving Genetic Tests. CHASE 2016: 173-182 - 2015
- [j14]Qiang Wu, Hua Xu, Xukai Zou, Hongzhuan Lei:
A 3D modeling approach to complex faults with multi-source data. Comput. Geosci. 77: 126-137 (2015) - [c45]Wei Peng, Feng Li, Xukai Zou:
Temporal coverage based content distribution in heterogeneous smart device networks. ICC 2015: 3477-3482 - [c44]Kevin Butterfield, Huian Li, Xukai Zou, Feng Li:
Enhancing and Implementing Fully Transparent Internet Voting. ICCCN 2015: 1-6 - 2014
- [j13]Mohammed Rangwala, Ping Zhang, Xukai Zou, Feng Li:
A taxonomy of privilege escalation attacks in Android applications. Int. J. Secur. Networks 9(1): 40-55 (2014) - [j12]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
A Two-Stage Deanonymization Attack against Anonymized Social Networks. IEEE Trans. Computers 63(2): 290-303 (2014) - [j11]Yan Sui, Xukai Zou, Eliza Yingzi Du, Feng Li:
Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method. IEEE Trans. Computers 63(4): 902-916 (2014) - [j10]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
Behavioral Malware Detection in Delay Tolerant Networks. IEEE Trans. Parallel Distributed Syst. 25(1): 53-63 (2014) - [c43]Wei Peng, Feng Li, Chin-Tser Huang, Xukai Zou:
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces. ICC 2014: 804-809 - [c42]Huian Li, Abhishek Reddy Kankanala, Xukai Zou:
A taxonomy and comparison of remote voting schemes. ICCCN 2014: 1-8 - [c41]Xukai Zou, Huian Li, Yan Sui, Wei Peng, Feng Li:
Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties. INFOCOM 2014: 136-144 - [c40]Kevin Butterfield, Xukai Zou:
Analysis and Implementation of Internet Based Remote Voting. MASS 2014: 714-719 - 2013
- [c39]Wei Peng, Feng Li, Keesook J. Han, Xukai Zou, Jie Wu:
T-dominance: Prioritized defense deployment for BYOD security. CNS 2013: 37-45 - [c38]Huian Li, Yan Sui, Wei Peng, Xukai Zou, Feng Li:
A viewable e-voting scheme for environments with conflict of interest. CNS 2013: 251-259 - [c37]Feng Li, Wei Peng, Chin-Tser Huang, Xukai Zou:
Smartphone strategic sampling in defending enterprise network security. ICC 2013: 2155-2159 - [c36]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
The Virtue of Patience: Offloading Topical Cellular Content through Opportunistic Links. MASS 2013: 402-410 - 2012
- [c35]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
Seed and Grow: An attack against anonymized social networks. SECON 2012: 587-595 - [c34]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
A privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices. SECON 2012: 596-604 - [c33]Yan Sui, Xukai Zou, Eliza Yingzi Du, Feng Li:
Secure and privacy-preserving biometrics based active authentication. SMC 2012: 1291-1296 - [c32]Yan Sui, Xukai Zou, Feng Li, Eliza Yingzi Du:
Active User Authentication for Mobile Devices. WASA 2012: 540-548 - 2011
- [j9]Fengjun Li, Xukai Zou, Peng Liu, Jake Y. Chen:
New threats to health data privacy. BMC Bioinform. 12(S-12): S7 (2011) - [c31]Xukai Zou, Peng Liu, Jake Y. Chen:
Personal genome privacy protection with feature-based hierarchical dual-stage encryption. GENSiPS 2011: 178-181 - [c30]Xukai Zou, Mingrui Qi, Feng Li, Yan Sui, Kai Wang:
A New Scheme for Anonymous Secure Group Communication. HICSS 2011: 1-9 - [c29]Yan Sui, Xukai Zou, Eliza Yingzi Du:
Biometrics-Based Authentication: A New Approach. ICCCN 2011: 1-6 - [c28]Xukai Zou, Fabio Maino, Elisa Bertino, Yan Sui, Kai Wang, Feng Li:
A New Approach to Weighted Multi-Secret Sharing. ICCCN 2011: 1-6 - [c27]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks. MASS 2011: 411-420 - 2010
- [j8]Yong Wang, Byrav Ramamurthy, Xukai Zou, Yuyan Xue:
An efficient scheme for removing compromised sensor nodes from wireless sensor networks. Secur. Commun. Networks 3(4): 320-333 (2010) - [c26]Feng Li, Yinying Yang, Jie Wu, Xukai Zou:
Fuzzy Closeness-Based Delegation Forwarding in Delay Tolerant Networks. NAS 2010: 333-340
2000 – 2009
- 2009
- [j7]Li Bai, Xukai Zou:
A Proactive Secret Sharing Scheme in matrix projection method. Int. J. Secur. Networks 4(4): 201-209 (2009) - [c25]Kai Wang, Xukai Zou, Yan Sui:
A Multiple Secret Sharing Scheme based on Matrix Projection. COMPSAC (1) 2009: 400-405 - [c24]Yan Sui, Fabio Maino, Yudong Guo, Kai Wang, Xukai Zou:
An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy. MSN 2009: 279-286 - 2008
- [b1]Xukai Zou, Yuan-Shun Dai, Yi Pan:
Trust and Security in Collaborative Computing. Computer and Network Security 2, World Scientific 2008, ISBN 978-981-270-368-2, pp. 1-248 - [j6]Xukai Zou, Yogesh Karandikar:
A novel Conference Key Management solution for Secure Dynamic Conferencing. Int. J. Secur. Networks 3(1): 47-53 (2008) - [j5]Ravi K. Balachandran, Xukai Zou, Byrav Ramamurthy, Amandeep Thukral, N. Variyam Vinodchandran:
An efficient and attack-resistant key agreement scheme for secure group communications in mobile ad-hoc networks. Wirel. Commun. Mob. Comput. 8(10): 1297-1312 (2008) - [c23]Kai Wang, Yan Sui, Xukai Zou, Arjan Durresi, Shiaofen Fang:
Pervasive and Trustworthy Healthcare. AINA Workshops 2008: 750-755 - [c22]Yong Wang, Byrav Ramamurthy, Yuyan Xue, Xukai Zou:
A security framework for wireless sensor networks utilizing a unique session key. BROADNETS 2008: 487-494 - [c21]Spyros S. Magliveras, Wandi Wei, Xukai Zou:
Notes on the CRTDH Group Key Agreement Protocol. ICDCS Workshops 2008: 406-411 - [c20]Xukai Zou, Yuan-Shun Dai, Elisa Bertino:
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. INFOCOM 2008: 538-546 - 2007
- [j4]Xukai Zou, Yuan-Shun Dai, Xiang Ran:
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups. Future Gener. Comput. Syst. 23(6): 776-786 (2007) - [j3]Xukai Zou, Yogesh Karandikar, Elisa Bertino:
A dynamic key management solution to access hierarchy. Int. J. Netw. Manag. 17(6): 437-450 (2007) - [j2]Yuan-Shun Dai, Yi Pan, Xukai Zou:
A Hierarchical Modeling and Analysis for Grid Service Reliability. IEEE Trans. Computers 56(5): 681-691 (2007) - [c19]Xukai Zou, Yuan-Shun Dai, Bradley N. Doebbeling, Mingrui Qi:
Dependability and Security in Medical Information System. HCI (4) 2007: 549-558 - [c18]Yong Wang, Byrav Ramamurthy, Xukai Zou:
KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks. ICC 2007: 1260-1265 - 2006
- [c17]Yuan-Shun Dai, Michael G. Hinchey, Manish Madhusoodan, James L. Rash, Xukai Zou:
A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System. DASC 2006: 3-10 - [c16]Yuan-Shun Dai, Michael G. Hinchey, Mingrui Qi, Xukai Zou:
Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons. DASC 2006: 227-234 - [c15]Omkar J. Tilak, Rajeev R. Raje, Xukai Zou:
Composing Access Control Policies of Distributed Components. DASC 2006: 301-307 - [c14]Yong Wang, Byrav Ramamurthy, Xukai Zou:
The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks. ICC 2006: 2243-2248 - [c13]Sarang Deshpande, Ajay Kumar Todimala, Ravi K. Balachandran, Byrav Ramamurthy, Xukai Zou, N. V. Vinodchandran:
A New Cryptographic Scheme for Securing Dynamic Conferences in Data Networks. ICC 2006: 2310-2315 - [c12]Xukai Zou, Amandeep Thukral, Byrav Ramamurthy:
An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks. MSN 2006: 509-520 - 2005
- [j1]Qiang Wu, Hua Xu, Xukai Zou:
An effective method for 3D geological modeling with multi-source data integration. Comput. Geosci. 31(1): 35-43 (2005) - [c11]Ravi K. Balachandran, Byrav Ramamurthy, Xukai Zou, N. Variyam Vinodchandran:
CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks. ICC 2005: 1123-1127 - [c10]Geng Hao, N. V. Vinodchandran, Byrav Ramamurthy, Xukai Zou:
A balanced key tree approach for dynamic secure group communication. ICCCN 2005: 345-350 - [c9]Amandeep Thukral, Xukai Zou:
Secure Group Instant Messaging Using Cryptographic Primitives. ICCNMC 2005: 1002-1011 - [c8]Yogesh Karandikar, Xukai Zou, Yuan-Shun Dai:
Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments. ICPADS (2) 2005: 448-452 - [c7]Pratima Adusumilli, Xukai Zou:
KTDCKM-SDC: A Distributed Conference Key Management Scheme for Secure Dynamic Conferencing. ISCC 2005: 476-481 - 2004
- [c6]Xukai Zou, Byrav Ramamurthy:
A Simple Group Diffie-Hellman Key Agreement Protocol Without Member Serialization. CIS 2004: 725-731 - [c5]Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras:
A GCD attack resistant CRTHACS for secure group communications. ITCC (2) 2004: 153-154 - [c4]Xukai Zou, Byrav Ramamurthy:
A block-free TGDH key agreement protocol for secure group communications. Parallel and Distributed Computing and Networks 2004: 288-293 - 2002
- [c3]Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras:
Efficient Key Management for Secure Group Communications with Bursty Behavior. Communications, Internet, and Information Technology 2002: 148-153 - 2001
- [c2]Jean-Camille Birget, Xukai Zou, Guevara Noubir, Byrav Ramamurthy:
Hierarchy-based access control in distributed environments. ICC 2001: 229-233 - [c1]Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras:
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication. ICICS 2001: 381-385
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-12 02:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint