Kui Ren, Ph.D. - Publications

Affiliations: 
2006 Columbia University, New York, NY 
Area:
Mathematics, Optics Physics

141 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Ren K, Vallélian S. Characterizing Impacts of Model Uncertainties in Quantitative Photoacoustics Siam/Asa Journal On Uncertainty Quantification. 8: 636-667. DOI: 10.1137/18M1231341  0.315
2020 Ma Z, Yang Y, Liu X, Liu Y, Ma S, Ren K, Yao C. EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid Ieee Transactions On Industrial Informatics. 16: 6597-6606. DOI: 10.1109/Tii.2019.2946047  0.345
2020 He A, Bu K, Li Y, Chida E, Gu Q, Ren K. Atomos: Constant-Size Path Validation Proof Ieee Transactions On Information Forensics and Security. 15: 3832-3847. DOI: 10.1109/Tifs.2020.3001669  0.341
2020 Zhang F, Dong X, Yang B, Zhou Y, Ren K. A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures Ieee Transactions On Information Forensics and Security. 15: 1407-1422. DOI: 10.1109/Tifs.2019.2941774  0.326
2020 Zhou J, Cao Z, Qin Z, Dong X, Ren K. LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs Ieee Transactions On Information Forensics and Security. 15: 420-434. DOI: 10.1109/Tifs.2019.2923156  0.37
2020 Yuan D, Li Q, Li G, Wang Q, Ren K. PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing Ieee Transactions On Information Forensics and Security. 15: 299-314. DOI: 10.1109/Tifs.2019.2913232  0.306
2020 Zhang Y, Yu J, Hao R, Wang C, Ren K. Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data Ieee Transactions On Dependable and Secure Computing. 17: 608-619. DOI: 10.1109/Tdsc.2018.2829880  0.34
2020 Mohaisen A, Gu Z, Ren K, Li Z, Kamhoua CA, Njilla LL, Nyang D. Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation Ieee Transactions On Dependable and Secure Computing. 17: 745-759. DOI: 10.1109/Tdsc.2018.2816026  0.351
2020 Ren K, Zheng T, Qin Z, Liu X. Adversarial Attacks and Defenses in Deep Learning Engineering. 6: 346-360. DOI: 10.1016/J.Eng.2019.12.012  0.302
2020 Ma L, Bu K, Wu N, Luo T, Ren K. Atlas: A First Step Toward Multipath Validation Computer Networks. 173: 107224. DOI: 10.1016/J.Comnet.2020.107224  0.315
2019 Ma Z, Zhang T, Liu X, Li X, Ren K. Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory Ieee Transactions On Vehicular Technology. 68: 8091-8102. DOI: 10.1109/Tvt.2019.2924679  0.32
2019 Tian C, Yu J, Zhang H, Xue H, Wang C, Ren K. Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus Ieee Transactions On Services Computing. 1-1. DOI: 10.1109/Tsc.2019.2937486  0.341
2019 Cui Y, Dai N, Lai Z, Li M, Li Z, Hu Y, Ren K, Chen Y. TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints Ieee Acm Transactions On Networking. 27: 1612-1628. DOI: 10.1109/Tnet.2019.2926142  0.351
2019 Liu Y, Ma Z, Liu X, Ma S, Ren K. Privacy-Preserving Object Detection for Medical Images with Faster R-CNN Ieee Transactions On Information Forensics and Security. 1-1. DOI: 10.1109/Tifs.2019.2946476  0.329
2019 Ba Z, Qin Z, Fu X, Ren K. CIM: Camera in Motion for Smartphone Authentication Ieee Transactions On Information Forensics and Security. 14: 2987-3002. DOI: 10.1109/Tifs.2019.2911173  0.33
2019 Xu C, Ren J, Zhang D, Zhang Y, Qin Z, Ren K. GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy Ieee Transactions On Information Forensics and Security. 14: 2358-2371. DOI: 10.1109/Tifs.2019.2897874  0.302
2019 Zhang LY, Zheng Y, Weng J, Wang C, Shan Z, Ren K. You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center Ieee Transactions On Dependable and Secure Computing. 1-14. DOI: 10.1109/Tdsc.2018.2864748  0.307
2019 Ren K, Qin Z, Ba Z. Toward Hardware-Rooted Smartphone Authentication Ieee Wireless Communications. 26: 114-119. DOI: 10.1109/Mwc.2018.1700365  0.336
2019 Li F, Li H, Wang C, Ren K, Bertino E. Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT Ieee Internet of Things Journal. 6: 1446-1449. DOI: 10.1109/Jiot.2019.2908460  0.342
2019 Xu C, Ren J, She L, Zhang Y, Qin Z, Ren K. EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics Ieee Internet of Things Journal. 6: 5140-5151. DOI: 10.1109/Jiot.2019.2897005  0.335
2019 Zhang X, Liu J, Chen S, Kong Y, Ren K. PriWhisper+: An Enhanced Acoustic Short-Range Communication System for Smartphones Ieee Internet of Things Journal. 6: 614-627. DOI: 10.1109/Jiot.2018.2850524  0.339
2019 Ren K, Zhong Y. Imaging point sources in heterogeneous environments Inverse Problems. 35: 125003. DOI: 10.1088/1361-6420/Ab3497  0.329
2019 Ren K, Zhang R, Zhong Y. A fast algorithm for radiative transport in isotropic media Journal of Computational Physics. 399: 108958. DOI: 10.1016/J.Jcp.2019.108958  0.329
2019 Lin Y, Li J, Jia X, Ren K. Multiple‐replica integrity auditing schemes for cloud data storage Concurrency and Computation: Practice and Experience. DOI: 10.1002/Cpe.5356  0.305
2018 Bardsley P, Ren K, Zhang R. Quantitative photoacoustic imaging of two-photon absorption. Journal of Biomedical Optics. 23: 1-11. PMID 29297207 DOI: 10.1117/1.Jbo.23.1.016002  0.371
2018 Zhang F, Liang Z, Yang B, Zhao X, Guo S, Ren K. Survey of design and security evaluation of authenticated encryption algorithms in theCAESARcompetition Journal of Zhejiang University Science C. 19: 1475-1499. DOI: 10.1631/Fitee.1800576  0.326
2018 Shan Z, Ren K, Blanton M, Wang C. Practical Secure Computation Outsourcing: A Survey Acm Computing Surveys. 51: 31. DOI: 10.1145/3158363  0.352
2018 Frederick C, Ren K, Vallélian S. Image Reconstruction in Quantitative Photoacoustic Tomography with the Simplified P 2 Approximation. Siam Journal On Imaging Sciences. 11: 2847-2876. DOI: 10.1137/18M1195656  0.341
2018 Ren K, Zhang R. Nonlinear Quantitative Photoacoustic Tomography with Two-Photon Absorption Siam Journal On Applied Mathematics. 78: 479-503. DOI: 10.1137/16M1089228  0.344
2018 Sarker MR, Wang J, Li Z, Ren K. Security and Cloud Outsourcing Framework for Economic Dispatch Ieee Transactions On Smart Grid. 9: 5810-5819. DOI: 10.1109/Tsg.2017.2697430  0.336
2018 Zhao J, Liu J, Qin Z, Ren K. Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters Ieee Transactions On Smart Grid. 9: 3313-3320. DOI: 10.1109/Tsg.2016.2626317  0.316
2018 Zhu J, Li Q, Wang C, Yuan X, Wang Q, Ren K. Enabling Generic, Verifiable, and Secure Data Search in Cloud Services Ieee Transactions On Parallel and Distributed Systems. 29: 1721-1735. DOI: 10.1109/Tpds.2018.2808283  0.366
2018 Li Q, Chen Y, Lee PPC, Xu M, Ren K. Security Policy Violations in SDN Data Plane Ieee Acm Transactions On Networking. 26: 1715-1727. DOI: 10.1109/Tnet.2018.2853593  0.305
2018 Fan J, Guan C, Ren K, Qiao C. Middlebox-Based Packet-Level Redundancy Elimination Over Encrypted Network Traffic Ieee Acm Transactions On Networking. 26: 1742-1753. DOI: 10.1109/Tnet.2018.2846791  0.317
2018 Yuan X, Wang X, Wang C, Squicciarini AC, Ren K. Towards Privacy-Preserving and Practical Image-Centric Social Discovery Ieee Transactions On Dependable and Secure Computing. 15: 868-882. DOI: 10.1109/Tdsc.2016.2609930  0.351
2018 Wang Q, Zhang Y, Lu X, Wang Z, Qin Z, Ren K. Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy Ieee Transactions On Dependable and Secure Computing. 15: 591-606. DOI: 10.1109/Tdsc.2016.2599873  0.333
2018 Xia Z, Zhu Y, Sun X, Qin Z, Ren K. Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing Ieee Transactions On Cloud Computing. 6: 276-286. DOI: 10.1109/Tcc.2015.2491933  0.402
2018 Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K. A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks Ieee Network. 32: 184-192. DOI: 10.1109/Mnet.2018.1700269  0.327
2018 Wang C, Yuan X, Cui Y, Ren K. Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond Ieee Network. 32: 166-171. DOI: 10.1109/Mnet.2017.1700060  0.318
2018 Qin Z, Weng J, Cui Y, Ren K. Privacy-Preserving Image Processing in the Cloud Ieee Cloud Computing. 5: 48-57. DOI: 10.1109/Mcc.2018.022171667  0.382
2018 REN K, TRIKI F. A global stability estimate for the photo-acoustic inverse problem in layered media European Journal of Applied Mathematics. 30: 505-528. DOI: 10.1017/S0956792518000268  0.311
2018 Zhong Y, Ren K, Tsai R. An implicit boundary integral method for computing electric potential of macromolecules in solvent Journal of Computational Physics. 359: 199-215. DOI: 10.1016/J.Jcp.2018.01.021  0.302
2017 Fan J, Guan C, Ren K, Cui Y, Qiao C. SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox Ieee Acm Transactions On Networking. 25: 3753-3766. DOI: 10.1109/Tnet.2017.2753044  0.373
2017 Mohaisen A, Ren K. Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures Ieee Acm Transactions On Networking. 25: 3059-3072. DOI: 10.1109/Tnet.2017.2717965  0.301
2017 Li Q, Lee PPC, Zhang P, Su P, He L, Ren K. Capability-Based Security Enforcement in Named Data Networking Ieee Acm Transactions On Networking. 25: 2719-2730. DOI: 10.1109/Tnet.2017.2715822  0.359
2017 Xu C, Ren J, Zhang Y, Qin Z, Ren K. DPPro: Differentially Private High-Dimensional Data Release via Random Projection Ieee Transactions On Information Forensics and Security. 12: 3081-3093. DOI: 10.1109/Tifs.2017.2737966  0.307
2017 Fu Z, Wu X, Wang Q, Ren K. Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data Ieee Transactions On Information Forensics and Security. 12: 2986-2997. DOI: 10.1109/Tifs.2017.2730365  0.341
2017 Fu Z, Huang F, Ren K, Weng J, Wang C. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data Ieee Transactions On Information Forensics and Security. 12: 1874-1884. DOI: 10.1109/Tifs.2017.2692728  0.354
2017 Zhu L, Zhang Z, Qin Z, Weng J, Ren K. Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids Ieee Network. 31: 59-63. DOI: 10.1109/Mnet.2016.1500292Nm  0.318
2017 Dou Y, Zeng K, Li H, Yang Y, Gao B, Ren K, Li S. $P^{2}$ -SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System Ieee Journal On Selected Areas in Communications. 35: 173-187. DOI: 10.1109/Jsac.2016.2633059  0.32
2016 Hu S, Wang Q, Wang J, Qin Z, Ren K. Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. PMID 28113422 DOI: 10.1109/Tip.2016.2568460  0.401
2016 Tang J, Cui Y, Li Q, Ren K, Liu J, Buyya R. Ensuring Security and Privacy Preservation for Cloud Data Services Acm Computing Surveys. 49: 13. DOI: 10.1145/2906153  0.36
2016 Wang Q, Ren K, Ning P, Hu S. Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks Ieee Transactions On Vehicular Technology. 65: 8331-8344. DOI: 10.1109/Tvt.2015.2511071  0.347
2016 Fu Z, Ren K, Shu J, Sun X, Huang F. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement Ieee Transactions On Parallel and Distributed Systems. 27: 2546-2559. DOI: 10.1109/Tpds.2015.2506573  0.335
2016 Yuan X, Wang X, Wang C, Weng J, Ren K. Enabling secure and fast indexing for privacy-assured healthcare monitoring via compressive sensing Ieee Transactions On Multimedia. 18: 2002-2014. DOI: 10.1109/Tmm.2016.2602758  0.367
2016 Qin Z, Ren K, Yu T, Weng J. DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud Ieee Transactions On Multimedia. 18: 929-939. DOI: 10.1109/Tmm.2016.2535729  0.341
2016 Zhang B, Ren K, Xing G, Fu X, Wang C. SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones Ieee Transactions On Mobile Computing. 15: 432-446. DOI: 10.1109/Tmc.2015.2413791  0.334
2016 Fu Z, Wu X, Guan C, Sun X, Ren K. Toward Efficient Multi-Keyword Fuzzy Search over Encrypted Outsourced Data with Accuracy Improvement Ieee Transactions On Information Forensics and Security. 11: 2706-2716. DOI: 10.1109/Tifs.2016.2596138  0.316
2016 Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing Ieee Transactions On Information Forensics and Security. 11: 2594-2608. DOI: 10.1109/Tifs.2016.2590944  0.381
2016 Yu J, Ren K, Wang C. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates Ieee Transactions On Information Forensics and Security. 11: 1362-1375. DOI: 10.1109/Tifs.2016.2528500  0.356
2016 Pan X, Ling Z, Pingley A, Yu W, Zhang N, Ren K, Fu X. Password extraction via reconstructed wireless mouse trajectory Ieee Transactions On Dependable and Secure Computing. 13: 461-473. DOI: 10.1109/Tdsc.2015.2413410  0.336
2016 Mozaffari-Kermani M, Azarderakhsh R, Ren K, Beuchat J. Guest Editorial: Introduction to the Special Section on Emerging Security Trends for Biomedical Computations, Devices, and Infrastructures Ieee/Acm Transactions On Computational Biology and Bioinformatics. 13: 399-400. DOI: 10.1109/Tcbb.2016.2518874  0.339
2016 Wang C, Ren K, Wang J. Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming Ieee Transactions On Computers. 65: 216-229. DOI: 10.1109/Tc.2015.2417542  0.31
2016 Chow SSM, Hengartner U, Liu JK, Ren K. Special Issue on Security and Privacy in Mobile Clouds Pervasive and Mobile Computing. 28: 100-101. DOI: 10.1016/J.Pmcj.2016.04.003  0.313
2016 Harmon M, Gamba IM, Ren K. Numerical algorithms based on Galerkin methods for the modeling of reactive interfaces in photoelectrochemical (PEC) solar cells Journal of Computational Physics. 327: 140-167. DOI: 10.1016/J.Jcp.2016.08.026  0.311
2015 Yu ZL, Yang PH, Jing WL, Yuan DX, Ren K, Li LL. Characteristics and resources of fly ash particles in the snowpack of Jinfo Mountain, Chongqing Huanjing Kexue/Environmental Science. 36: 4381-4388. DOI: 10.13227/j.hjkx.2015.12.008  0.39
2015 Yang K, Jia X, Ren K. Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud Ieee Transactions On Parallel and Distributed Systems. 26: 3461-3470. DOI: 10.1109/Tpds.2014.2380373  0.353
2015 Yu J, Ren K, Wang C, Varadharajan V. Enabling Cloud Storage Auditing With Key-Exposure Resistance Ieee Transactions On Information Forensics and Security. 10: 1167-1179. DOI: 10.1109/Tifs.2015.2400425  0.358
2015 Guizani M, He D, Ren K, Rodrigues JJP, Chan S, Zhang Y. Security and privacy in emerging networks: Part II [Guest Editorial] Ieee Communications Magazine. 53: 40-41. DOI: 10.1109/Mcom.2015.7081098  0.306
2015 Ding T, Ren K, Vallélian S. A one-step reconstruction algorithm for quantitative photoacoustic imaging Inverse Problems. 31. DOI: 10.1088/0266-5611/31/9/095005  0.381
2015 Ren K, Zhang R, Zhong Y. Inverse transport problems in quantitative PAT for molecular imaging Inverse Problems. 31. DOI: 10.1088/0266-5611/31/12/125012  0.362
2014 Mamonov AV, Ren K. Quantitative photoacoustic imaging in the radiative transport regime Communications in Mathematical Sciences. 12: 201-234. DOI: 10.4310/Cms.2014.V12.N2.A1  0.391
2014 Cao N, Wang C, Li M, Ren K, Lou W. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Ieee Transactions On Parallel and Distributed Systems. 25: 222-233. DOI: 10.1109/Tpds.2013.45  0.376
2014 Xu Z, Wang C, Ren K, Wang L, Zhang B. Proof-carrying cloud computation: The case of convex optimization Ieee Transactions On Information Forensics and Security. 9: 1790-1803. DOI: 10.1109/Tifs.2014.2352457  0.341
2014 Liu WM, Wang L, Cheng P, Ren K, Zhu S, Debbabi M. PPTP: Privacy-preserving traffic padding in web-based applications Ieee Transactions On Dependable and Secure Computing. 11: 538-552. DOI: 10.1109/Tdsc.2014.2302308  0.377
2014 Ren K, Samarati P, Gruteser M, Ning P, Liu Y. Guest Editorial Special Issue on Security for IoT: The State of the Art Ieee Internet of Things Journal. 1: 369-371. DOI: 10.1109/Jiot.2014.2361608  0.322
2014 Zhang B, Zhan Q, Chen S, Li M, Ren K, Wang C, Ma D. ${\ssr{PriWhisper}}$ : Enabling Keyless Secure Acoustic Communication for Smartphones Ieee Internet of Things Journal. 1: 33-45. DOI: 10.1109/Jiot.2014.2297998  0.321
2014 Ding T, Ren K. Inverse transport calculations in optical imaging with subspace optimization algorithms Journal of Computational Physics. 273: 212-226. DOI: 10.1016/J.Jcp.2014.05.014  0.399
2013 Li M, Yu S, Guttman JD, Lou W, Ren K. Secure ad hoc trust initialization and key management in wireless body area networks Acm Transactions On Sensor Networks. 9: 18. DOI: 10.1145/2422966.2422975  0.312
2013 Ren K, Zhao H. Quantitative Fluorescence Photoacoustic Tomography Siam Journal On Imaging Sciences. 6: 2404-2429. DOI: 10.1137/130912323  0.353
2013 Ren K, Gao H, Zhao H. A Hybrid Reconstruction Method for Quantitative PAT Siam Journal On Imaging Sciences. 6: 32-55. DOI: 10.1137/120866130  0.365
2013 Li M, Yu S, Zheng Y, Ren K, Lou W. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Ieee Transactions On Parallel and Distributed Systems. 24: 131-143. DOI: 10.1109/Tpds.2012.97  0.364
2013 Wang C, Ren K, Wang J, Wang Q. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Ieee Transactions On Parallel and Distributed Systems. 24: 1172-1181. DOI: 10.1109/Tpds.2012.206  0.364
2013 Yang K, Jia X, Ren K, Zhang B, Xie R. DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems Ieee Transactions On Information Forensics and Security. 8: 1790-1801. DOI: 10.1109/Tifs.2013.2279531  0.358
2013 Wang C, Zhang B, Ren K, Roveda JM. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud Ieee Transactions On Emerging Topics in Computing. 1: 166-177. DOI: 10.1109/Tetc.2013.2273797  0.379
2013 Wang C, Chow SSM, Wang Q, Ren K, Lou W. Privacy-Preserving Public Auditing for Secure Cloud Storage Ieee Transactions On Computers. 62: 362-375. DOI: 10.1109/Tc.2011.245  0.362
2013 Li M, Yu S, Ren K, Lou W, Hou YT. Toward privacy-assured and searchable cloud data storage services Ieee Network. 27: 56-62. DOI: 10.1109/Mnet.2013.6574666  0.362
2012 Wan Z, Ren K, Gu M. USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks Ieee Transactions On Wireless Communications. 11: 1922-1932. DOI: 10.1109/Twc.2012.030512.111562  0.338
2012 Wang C, Wang Q, Ren K, Cao N, Lou W. Toward Secure and Dependable Storage Services in Cloud Computing Ieee Transactions On Services Computing. 5: 220-232. DOI: 10.1109/Tsc.2011.24  0.379
2012 Yuan Y, Li Z, Ren K. Quantitative Analysis of Load Redistribution Attacks in Power Systems Ieee Transactions On Parallel and Distributed Systems. 23: 1731-1738. DOI: 10.1109/Tpds.2012.58  0.348
2012 Zhang R, Zhang Y, Ren K. Distributed Privacy-Preserving Access Control in Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 23: 1427-1438. DOI: 10.1109/Tpds.2011.299  0.317
2012 Wang C, Cao N, Ren K, Lou W. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Ieee Transactions On Parallel and Distributed Systems. 23: 1467-1479. DOI: 10.1109/Tpds.2011.282  0.377
2012 Ren K, Wang C, Wang Q. Toward secure and effective data utilization in public cloud Ieee Network. 26: 69-74. DOI: 10.1109/Mnet.2012.6375896  0.352
2012 Ren K, Wang C, Wang Q. Security Challenges for the Public Cloud Ieee Internet Computing. 16: 69-73. DOI: 10.1109/Mic.2012.14  0.332
2012 Wang Q, Xu P, Ren K, Li X. Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication Ieee Journal On Selected Areas in Communications. 30: 16-30. DOI: 10.1109/Jsac.2012.120103  0.309
2012 Bal G, Ren K. On multi-spectral quantitative photoacoustic tomography in diffusive regime Inverse Problems. 28. DOI: 10.1088/0266-5611/28/2/025010  0.569
2011 Wang Q, Ren K, Yu S, Lou W. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance Acm Transactions On Sensor Networks. 8: 9. DOI: 10.1145/1993042.1993051  0.345
2011 Yuan Y, Li Z, Ren K. Modeling Load Redistribution Attacks in Power Systems Ieee Transactions On Smart Grid. 2: 382-390. DOI: 10.1109/Tsg.2011.2123925  0.312
2011 Wang Q, Wang C, Ren K, Lou W, Li J. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing Ieee Transactions On Parallel and Distributed Systems. 22: 847-859. DOI: 10.1109/Tpds.2010.183  0.369
2011 Yu S, Ren K, Lou W. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 22: 673-686. DOI: 10.1109/Tpds.2010.130  0.309
2011 Ren K, Su H, Wang Q. Secret key generation exploiting channel characteristics in wireless communications Ieee Wireless Communications. 18: 6-12. DOI: 10.1109/Mwc.2011.5999759  0.336
2011 Bal G, Ren K. Multi-source quantitative photoacoustic tomography in a diffusive regime Inverse Problems. 27. DOI: 10.1088/0266-5611/27/7/075003  0.582
2011 Bal G, Ren K, Uhlmann G, Zhou T. Quantitative thermo-acoustics and related problems Inverse Problems. 27. DOI: 10.1088/0266-5611/27/5/055007  0.579
2011 Cheng Y, Gamba IM, Ren K. Recovering doping profiles in semiconductor devices with the Boltzmann–Poisson model Journal of Computational Physics. 230: 3391-3412. DOI: 10.1016/J.Jcp.2011.01.034  0.338
2011 Li J, Wang Q, Wang C, Ren K. Enhancing Attribute-Based Encryption with Attribute Hierarchy Mobile Networks and Applications. 16: 553-561. DOI: 10.1007/S11036-010-0233-Y  0.335
2010 Ren K. Recent Developments in Numerical Techniques for Transport-Based Medical Imaging Methods Communications in Computational Physics. 8: 1-50. DOI: 10.4208/Cicp.220509.200110A  0.367
2010 Ren K, Yu S, Lou W, Zhang Y. PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks Ieee Transactions On Parallel and Distributed Systems. 21: 203-215. DOI: 10.1109/Tpds.2009.59  0.359
2010 Li M, Lou W, Ren K. Data security and privacy in wireless body area networks Ieee Wireless Communications. 17: 51-58. DOI: 10.1109/Mwc.2010.5416350  0.346
2010 Wang C, Ren K, Lou W, Li J. Toward publicly auditable secure cloud data storage services Ieee Network. 24: 19-24. DOI: 10.1109/Mnet.2010.5510914  0.34
2010 Zhu B, Ren K, Wang L, Debbabi M. PCM: A privacy-preserving detection mechanism in mobile ad hoc networks Security and Communication Networks. 3: 167-184. DOI: 10.1002/Sec.122  0.312
2009 Gu X, Ren K, Masciotti J, Hielscher AH. Parametric image reconstruction using the discrete cosine transform for optical tomography. Journal of Biomedical Optics. 14: 064003. PMID 20059241 DOI: 10.1117/1.3259360  0.664
2009 Ren K, Yu S, Lou W, Zhang Y. Multi-User Broadcast Authentication in Wireless Sensor Networks Ieee Transactions On Vehicular Technology. 58: 4554-4564. DOI: 10.1109/Tvt.2009.2019663  0.35
2009 Ren K, Lou W, Zhu B, Jajodia S. Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation Ieee Transactions On Vehicular Technology. 58: 2018-2029. DOI: 10.1109/Tvt.2008.2003961  0.324
2009 Lou W, Ren K. Security, privacy, and accountability in wireless access networks - [Accepted from open call] Ieee Wireless Communications. 16: 80-87. DOI: 10.1109/Mwc.2009.5281259  0.359
2009 Bal G, Ren K. Physics-based models for measurement correlations: Application to an inverse Sturm-Liouville problem Inverse Problems. 25. DOI: 10.1088/0266-5611/25/5/055006  0.544
2009 Lv J, Ren K, Chen X, Kim K. The ring authenticated encryption scheme - How to provide a clue wisely Information Sciences. 179: 161-168. DOI: 10.1016/J.Ins.2008.09.014  0.307
2008 Bal G, Ren K. Transport-based imaging in random media Siam Journal On Applied Mathematics. 68: 1738-1762. DOI: 10.1137/070690122  0.579
2008 Ren K, Zeng K, Lou W. Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks Ieee Transactions On Wireless Communications. 7: 354-363. DOI: 10.1109/Twc.2008.060550  0.311
2008 Ren K, Lou W, Zhang Y. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks Ieee Transactions On Mobile Computing. 7: 585-598. DOI: 10.1109/Tmc.2007.70753  0.326
2008 Yu S, Ren K, Lou W. Attribute-based content distribution with hidden policy Scopus. 39-44. DOI: 10.1109/Npsec.2008.4664879  0.302
2007 Ren K, Bal G, Hielscher AH. Transport- and diffusion-based optical tomography in small domains: a comparative study. Applied Optics. 46: 6669-79. PMID 17882287 DOI: 10.1364/Ao.46.006669  0.684
2007 Gu X, Ren K, Hielscher AH. Frequency-domain sensitivity analysis for small imaging domains using the equation of radiative transfer. Applied Optics. 46: 1624-32. PMID 17356604 DOI: 10.1364/Ao.46.001624  0.657
2007 Gu X, Ren K, Masciotti J, Hielscher AH. Parametric image reconstruction using the discrete cosine transform for optical tomograhy Progress in Biomedical Optics and Imaging - Proceedings of Spie. 6434. DOI: 10.1117/12.705556  0.662
2007 Ren K, Lou W, Zeng K, Moran PJ. On Broadcast Authentication in Wireless Sensor Networks Ieee Transactions On Wireless Communications. 6: 4136-4144. DOI: 10.1109/Twc.2007.060255  0.347
2007 Bal G, Carin L, Liu D, Ren K. Experimental validation of a transport-based imaging method in highly scattering environments Inverse Problems. 23: 2527-2539. DOI: 10.1088/0266-5611/23/6/015  0.558
2007 Ren K, Lou W. Privacy-enhanced, Attack-resilient access control in pervasive computing environments with optional context authentication capability Mobile Networks and Applications. 12: 79-92. DOI: 10.1007/S11036-006-0008-7  0.32
2006 Gu X, Ren K, Masciotti J, Hielscher AH. Parametric reconstruction method in optical tomography. Conference Proceedings : ... Annual International Conference of the Ieee Engineering in Medicine and Biology Society. Ieee Engineering in Medicine and Biology Society. Annual Conference. 1: 2667-70. PMID 17946972 DOI: 10.1109/IEMBS.2006.260084  0.643
2006 Ren K, Bal G, Hielscher AH. Comparison of frequency-domain transport-and diffusion-based reconstructions of small tissue volumes Optics Infobase Conference Papers. DOI: 10.1364/Bio.2006.Sh31  0.673
2006 Gu X, Netz UJ, Ren K, Beuthan J, Hielscher AH. Sensitivity analysis for frequency-domain optical tomography of small tissue volumes Optics Infobase Conference Papers. DOI: 10.1364/Bio.2006.Mh1  0.64
2006 Bal G, Ren K. Reconstruction of singular surfaces by shape sensitivity analysis and level set method Mathematical Models and Methods in Applied Sciences. 16: 1347-1373. DOI: 10.1142/S021820250600156X  0.539
2006 Ren K, Bal G, Hielscher AH. Frequency domain optical tomography based on the equation of radiative transfer Siam Journal On Scientific Computing. 28: 1463-1489. DOI: 10.1137/040619193  0.692
2006 Ren K, Lou W, Kim K, Deng R. A novel privacy preserving authentication and access control scheme for pervasive computing environments Ieee Transactions On Vehicular Technology. 55: 1373-1384. DOI: 10.1109/Tvt.2006.877704  0.325
2006 Ren K, Lou W, Zeng K, Bao F, Zhou J, Deng RH. Routing optimization security in mobile IPv6 Computer Networks. 50: 2401-2419. DOI: 10.1016/J.Comnet.2005.09.019  0.353
2006 Ren K, Zeng K, Lou W. A new approach for random key pre‐distribution in large‐scale wireless sensor networks Wireless Communications and Mobile Computing. 6: 307-318. DOI: 10.1002/Wcm.397  0.333
2005 Ren K, Moa-Anderson B, Bal G, Gu X, Hielscher AH. Frequency domain tomography in small animals with the equation of radiative transfer Progress in Biomedical Optics and Imaging - Proceedings of Spie. 5693: 111-120. DOI: 10.1117/12.591113  0.717
2005 Abdoulaev GS, Ren K, Hielscher AH. Optical tomography as a PDE-constrained optimization problem Inverse Problems. 21: 1507-1530. DOI: 10.1088/0266-5611/21/5/002  0.57
2005 Bal G, Ren K. Atmospheric concentration profile reconstructions from radiation measurements Inverse Problems. 21: 153-168. DOI: 10.1088/0266-5611/21/1/010  0.534
2004 Ren K, Abdoulaev GS, Bal G, Hielscher AH. Algorithm for solving the equation of radiative transfer in the frequency domain. Optics Letters. 29: 578-80. PMID 15035476 DOI: 10.1364/Ol.29.000578  0.654
2004 Abdoulaev GS, Ren K, Bal G, Hielscher AH. Modeling photon density waves with the equation of radiative transfer Biosilico. DOI: 10.1364/Bio.2004.Wb1  0.649
2004 Ren K, Li T, Wan Z, Bao F, Deng RH, Kim K. Highly reliable trust establishment scheme in ad hoc networks Computer Networks. 45: 687-699. DOI: 10.1016/J.Comnet.2004.01.008  0.319
2003 Bal G, Ren K. Generalized diffusion model in optical tomography with clear layers. Journal of the Optical Society of America. a, Optics, Image Science, and Vision. 20: 2355-64. PMID 14686515 DOI: 10.1364/Josaa.20.002355  0.546
Show low-probability matches.