Year |
Citation |
Score |
2020 |
Ren K, Vallélian S. Characterizing Impacts of Model Uncertainties in Quantitative Photoacoustics Siam/Asa Journal On Uncertainty Quantification. 8: 636-667. DOI: 10.1137/18M1231341 |
0.315 |
|
2020 |
Ma Z, Yang Y, Liu X, Liu Y, Ma S, Ren K, Yao C. EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid Ieee Transactions On Industrial Informatics. 16: 6597-6606. DOI: 10.1109/Tii.2019.2946047 |
0.345 |
|
2020 |
He A, Bu K, Li Y, Chida E, Gu Q, Ren K. Atomos: Constant-Size Path Validation Proof Ieee Transactions On Information Forensics and Security. 15: 3832-3847. DOI: 10.1109/Tifs.2020.3001669 |
0.341 |
|
2020 |
Zhang F, Dong X, Yang B, Zhou Y, Ren K. A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures Ieee Transactions On Information Forensics and Security. 15: 1407-1422. DOI: 10.1109/Tifs.2019.2941774 |
0.326 |
|
2020 |
Zhou J, Cao Z, Qin Z, Dong X, Ren K. LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs Ieee Transactions On Information Forensics and Security. 15: 420-434. DOI: 10.1109/Tifs.2019.2923156 |
0.37 |
|
2020 |
Yuan D, Li Q, Li G, Wang Q, Ren K. PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing Ieee Transactions On Information Forensics and Security. 15: 299-314. DOI: 10.1109/Tifs.2019.2913232 |
0.306 |
|
2020 |
Zhang Y, Yu J, Hao R, Wang C, Ren K. Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data Ieee Transactions On Dependable and Secure Computing. 17: 608-619. DOI: 10.1109/Tdsc.2018.2829880 |
0.34 |
|
2020 |
Mohaisen A, Gu Z, Ren K, Li Z, Kamhoua CA, Njilla LL, Nyang D. Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation Ieee Transactions On Dependable and Secure Computing. 17: 745-759. DOI: 10.1109/Tdsc.2018.2816026 |
0.351 |
|
2020 |
Ren K, Zheng T, Qin Z, Liu X. Adversarial Attacks and Defenses in Deep Learning Engineering. 6: 346-360. DOI: 10.1016/J.Eng.2019.12.012 |
0.302 |
|
2020 |
Ma L, Bu K, Wu N, Luo T, Ren K. Atlas: A First Step Toward Multipath Validation Computer Networks. 173: 107224. DOI: 10.1016/J.Comnet.2020.107224 |
0.315 |
|
2019 |
Ma Z, Zhang T, Liu X, Li X, Ren K. Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory Ieee Transactions On Vehicular Technology. 68: 8091-8102. DOI: 10.1109/Tvt.2019.2924679 |
0.32 |
|
2019 |
Tian C, Yu J, Zhang H, Xue H, Wang C, Ren K. Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus Ieee Transactions On Services Computing. 1-1. DOI: 10.1109/Tsc.2019.2937486 |
0.341 |
|
2019 |
Cui Y, Dai N, Lai Z, Li M, Li Z, Hu Y, Ren K, Chen Y. TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints Ieee Acm Transactions On Networking. 27: 1612-1628. DOI: 10.1109/Tnet.2019.2926142 |
0.351 |
|
2019 |
Liu Y, Ma Z, Liu X, Ma S, Ren K. Privacy-Preserving Object Detection for Medical Images with Faster R-CNN Ieee Transactions On Information Forensics and Security. 1-1. DOI: 10.1109/Tifs.2019.2946476 |
0.329 |
|
2019 |
Ba Z, Qin Z, Fu X, Ren K. CIM: Camera in Motion for Smartphone Authentication Ieee Transactions On Information Forensics and Security. 14: 2987-3002. DOI: 10.1109/Tifs.2019.2911173 |
0.33 |
|
2019 |
Xu C, Ren J, Zhang D, Zhang Y, Qin Z, Ren K. GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy Ieee Transactions On Information Forensics and Security. 14: 2358-2371. DOI: 10.1109/Tifs.2019.2897874 |
0.302 |
|
2019 |
Zhang LY, Zheng Y, Weng J, Wang C, Shan Z, Ren K. You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center Ieee Transactions On Dependable and Secure Computing. 1-14. DOI: 10.1109/Tdsc.2018.2864748 |
0.307 |
|
2019 |
Ren K, Qin Z, Ba Z. Toward Hardware-Rooted Smartphone Authentication Ieee Wireless Communications. 26: 114-119. DOI: 10.1109/Mwc.2018.1700365 |
0.336 |
|
2019 |
Li F, Li H, Wang C, Ren K, Bertino E. Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT Ieee Internet of Things Journal. 6: 1446-1449. DOI: 10.1109/Jiot.2019.2908460 |
0.342 |
|
2019 |
Xu C, Ren J, She L, Zhang Y, Qin Z, Ren K. EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics Ieee Internet of Things Journal. 6: 5140-5151. DOI: 10.1109/Jiot.2019.2897005 |
0.335 |
|
2019 |
Zhang X, Liu J, Chen S, Kong Y, Ren K. PriWhisper+: An Enhanced Acoustic Short-Range Communication System for Smartphones Ieee Internet of Things Journal. 6: 614-627. DOI: 10.1109/Jiot.2018.2850524 |
0.339 |
|
2019 |
Ren K, Zhong Y. Imaging point sources in heterogeneous environments Inverse Problems. 35: 125003. DOI: 10.1088/1361-6420/Ab3497 |
0.329 |
|
2019 |
Ren K, Zhang R, Zhong Y. A fast algorithm for radiative transport in isotropic media Journal of Computational Physics. 399: 108958. DOI: 10.1016/J.Jcp.2019.108958 |
0.329 |
|
2019 |
Lin Y, Li J, Jia X, Ren K. Multiple‐replica integrity auditing schemes for cloud data storage Concurrency and Computation: Practice and Experience. DOI: 10.1002/Cpe.5356 |
0.305 |
|
2018 |
Bardsley P, Ren K, Zhang R. Quantitative photoacoustic imaging of two-photon absorption. Journal of Biomedical Optics. 23: 1-11. PMID 29297207 DOI: 10.1117/1.Jbo.23.1.016002 |
0.371 |
|
2018 |
Zhang F, Liang Z, Yang B, Zhao X, Guo S, Ren K. Survey of design and security evaluation of authenticated encryption algorithms in theCAESARcompetition Journal of Zhejiang University Science C. 19: 1475-1499. DOI: 10.1631/Fitee.1800576 |
0.326 |
|
2018 |
Shan Z, Ren K, Blanton M, Wang C. Practical Secure Computation Outsourcing: A Survey Acm Computing Surveys. 51: 31. DOI: 10.1145/3158363 |
0.352 |
|
2018 |
Frederick C, Ren K, Vallélian S. Image Reconstruction in Quantitative Photoacoustic Tomography with the Simplified P 2 Approximation. Siam Journal On Imaging Sciences. 11: 2847-2876. DOI: 10.1137/18M1195656 |
0.341 |
|
2018 |
Ren K, Zhang R. Nonlinear Quantitative Photoacoustic Tomography with Two-Photon Absorption Siam Journal On Applied Mathematics. 78: 479-503. DOI: 10.1137/16M1089228 |
0.344 |
|
2018 |
Sarker MR, Wang J, Li Z, Ren K. Security and Cloud Outsourcing Framework for Economic Dispatch Ieee Transactions On Smart Grid. 9: 5810-5819. DOI: 10.1109/Tsg.2017.2697430 |
0.336 |
|
2018 |
Zhao J, Liu J, Qin Z, Ren K. Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters Ieee Transactions On Smart Grid. 9: 3313-3320. DOI: 10.1109/Tsg.2016.2626317 |
0.316 |
|
2018 |
Zhu J, Li Q, Wang C, Yuan X, Wang Q, Ren K. Enabling Generic, Verifiable, and Secure Data Search in Cloud Services Ieee Transactions On Parallel and Distributed Systems. 29: 1721-1735. DOI: 10.1109/Tpds.2018.2808283 |
0.366 |
|
2018 |
Li Q, Chen Y, Lee PPC, Xu M, Ren K. Security Policy Violations in SDN Data Plane Ieee Acm Transactions On Networking. 26: 1715-1727. DOI: 10.1109/Tnet.2018.2853593 |
0.305 |
|
2018 |
Fan J, Guan C, Ren K, Qiao C. Middlebox-Based Packet-Level Redundancy Elimination Over Encrypted Network Traffic Ieee Acm Transactions On Networking. 26: 1742-1753. DOI: 10.1109/Tnet.2018.2846791 |
0.317 |
|
2018 |
Yuan X, Wang X, Wang C, Squicciarini AC, Ren K. Towards Privacy-Preserving and Practical Image-Centric Social Discovery Ieee Transactions On Dependable and Secure Computing. 15: 868-882. DOI: 10.1109/Tdsc.2016.2609930 |
0.351 |
|
2018 |
Wang Q, Zhang Y, Lu X, Wang Z, Qin Z, Ren K. Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy Ieee Transactions On Dependable and Secure Computing. 15: 591-606. DOI: 10.1109/Tdsc.2016.2599873 |
0.333 |
|
2018 |
Xia Z, Zhu Y, Sun X, Qin Z, Ren K. Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing Ieee Transactions On Cloud Computing. 6: 276-286. DOI: 10.1109/Tcc.2015.2491933 |
0.402 |
|
2018 |
Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K. A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks Ieee Network. 32: 184-192. DOI: 10.1109/Mnet.2018.1700269 |
0.327 |
|
2018 |
Wang C, Yuan X, Cui Y, Ren K. Toward Secure Outsourced Middlebox Services: Practices, Challenges, and Beyond Ieee Network. 32: 166-171. DOI: 10.1109/Mnet.2017.1700060 |
0.318 |
|
2018 |
Qin Z, Weng J, Cui Y, Ren K. Privacy-Preserving Image Processing in the Cloud Ieee Cloud Computing. 5: 48-57. DOI: 10.1109/Mcc.2018.022171667 |
0.382 |
|
2018 |
REN K, TRIKI F. A global stability estimate for the photo-acoustic inverse problem in layered media European Journal of Applied Mathematics. 30: 505-528. DOI: 10.1017/S0956792518000268 |
0.311 |
|
2018 |
Zhong Y, Ren K, Tsai R. An implicit boundary integral method for computing electric potential of macromolecules in solvent Journal of Computational Physics. 359: 199-215. DOI: 10.1016/J.Jcp.2018.01.021 |
0.302 |
|
2017 |
Fan J, Guan C, Ren K, Cui Y, Qiao C. SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox Ieee Acm Transactions On Networking. 25: 3753-3766. DOI: 10.1109/Tnet.2017.2753044 |
0.373 |
|
2017 |
Mohaisen A, Ren K. Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures Ieee Acm Transactions On Networking. 25: 3059-3072. DOI: 10.1109/Tnet.2017.2717965 |
0.301 |
|
2017 |
Li Q, Lee PPC, Zhang P, Su P, He L, Ren K. Capability-Based Security Enforcement in Named Data Networking Ieee Acm Transactions On Networking. 25: 2719-2730. DOI: 10.1109/Tnet.2017.2715822 |
0.359 |
|
2017 |
Xu C, Ren J, Zhang Y, Qin Z, Ren K. DPPro: Differentially Private High-Dimensional Data Release via Random Projection Ieee Transactions On Information Forensics and Security. 12: 3081-3093. DOI: 10.1109/Tifs.2017.2737966 |
0.307 |
|
2017 |
Fu Z, Wu X, Wang Q, Ren K. Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data Ieee Transactions On Information Forensics and Security. 12: 2986-2997. DOI: 10.1109/Tifs.2017.2730365 |
0.341 |
|
2017 |
Fu Z, Huang F, Ren K, Weng J, Wang C. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data Ieee Transactions On Information Forensics and Security. 12: 1874-1884. DOI: 10.1109/Tifs.2017.2692728 |
0.354 |
|
2017 |
Zhu L, Zhang Z, Qin Z, Weng J, Ren K. Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids Ieee Network. 31: 59-63. DOI: 10.1109/Mnet.2016.1500292Nm |
0.318 |
|
2017 |
Dou Y, Zeng K, Li H, Yang Y, Gao B, Ren K, Li S. $P^{2}$ -SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System Ieee Journal On Selected Areas in Communications. 35: 173-187. DOI: 10.1109/Jsac.2016.2633059 |
0.32 |
|
2016 |
Hu S, Wang Q, Wang J, Qin Z, Ren K. Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. PMID 28113422 DOI: 10.1109/Tip.2016.2568460 |
0.401 |
|
2016 |
Tang J, Cui Y, Li Q, Ren K, Liu J, Buyya R. Ensuring Security and Privacy Preservation for Cloud Data Services Acm Computing Surveys. 49: 13. DOI: 10.1145/2906153 |
0.36 |
|
2016 |
Wang Q, Ren K, Ning P, Hu S. Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks Ieee Transactions On Vehicular Technology. 65: 8331-8344. DOI: 10.1109/Tvt.2015.2511071 |
0.347 |
|
2016 |
Fu Z, Ren K, Shu J, Sun X, Huang F. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement Ieee Transactions On Parallel and Distributed Systems. 27: 2546-2559. DOI: 10.1109/Tpds.2015.2506573 |
0.335 |
|
2016 |
Yuan X, Wang X, Wang C, Weng J, Ren K. Enabling secure and fast indexing for privacy-assured healthcare monitoring via compressive sensing Ieee Transactions On Multimedia. 18: 2002-2014. DOI: 10.1109/Tmm.2016.2602758 |
0.367 |
|
2016 |
Qin Z, Ren K, Yu T, Weng J. DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud Ieee Transactions On Multimedia. 18: 929-939. DOI: 10.1109/Tmm.2016.2535729 |
0.341 |
|
2016 |
Zhang B, Ren K, Xing G, Fu X, Wang C. SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones Ieee Transactions On Mobile Computing. 15: 432-446. DOI: 10.1109/Tmc.2015.2413791 |
0.334 |
|
2016 |
Fu Z, Wu X, Guan C, Sun X, Ren K. Toward Efficient Multi-Keyword Fuzzy Search over Encrypted Outsourced Data with Accuracy Improvement Ieee Transactions On Information Forensics and Security. 11: 2706-2716. DOI: 10.1109/Tifs.2016.2596138 |
0.316 |
|
2016 |
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing Ieee Transactions On Information Forensics and Security. 11: 2594-2608. DOI: 10.1109/Tifs.2016.2590944 |
0.381 |
|
2016 |
Yu J, Ren K, Wang C. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates Ieee Transactions On Information Forensics and Security. 11: 1362-1375. DOI: 10.1109/Tifs.2016.2528500 |
0.356 |
|
2016 |
Pan X, Ling Z, Pingley A, Yu W, Zhang N, Ren K, Fu X. Password extraction via reconstructed wireless mouse trajectory Ieee Transactions On Dependable and Secure Computing. 13: 461-473. DOI: 10.1109/Tdsc.2015.2413410 |
0.336 |
|
2016 |
Mozaffari-Kermani M, Azarderakhsh R, Ren K, Beuchat J. Guest Editorial: Introduction to the Special Section on Emerging Security Trends for Biomedical Computations, Devices, and Infrastructures Ieee/Acm Transactions On Computational Biology and Bioinformatics. 13: 399-400. DOI: 10.1109/Tcbb.2016.2518874 |
0.339 |
|
2016 |
Wang C, Ren K, Wang J. Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming Ieee Transactions On Computers. 65: 216-229. DOI: 10.1109/Tc.2015.2417542 |
0.31 |
|
2016 |
Chow SSM, Hengartner U, Liu JK, Ren K. Special Issue on Security and Privacy in Mobile Clouds Pervasive and Mobile Computing. 28: 100-101. DOI: 10.1016/J.Pmcj.2016.04.003 |
0.313 |
|
2016 |
Harmon M, Gamba IM, Ren K. Numerical algorithms based on Galerkin methods for the modeling of reactive interfaces in photoelectrochemical (PEC) solar cells Journal of Computational Physics. 327: 140-167. DOI: 10.1016/J.Jcp.2016.08.026 |
0.311 |
|
2015 |
Yu ZL, Yang PH, Jing WL, Yuan DX, Ren K, Li LL. Characteristics and resources of fly ash particles in the snowpack of Jinfo Mountain, Chongqing Huanjing Kexue/Environmental Science. 36: 4381-4388. DOI: 10.13227/j.hjkx.2015.12.008 |
0.39 |
|
2015 |
Yang K, Jia X, Ren K. Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud Ieee Transactions On Parallel and Distributed Systems. 26: 3461-3470. DOI: 10.1109/Tpds.2014.2380373 |
0.353 |
|
2015 |
Yu J, Ren K, Wang C, Varadharajan V. Enabling Cloud Storage Auditing With Key-Exposure Resistance Ieee Transactions On Information Forensics and Security. 10: 1167-1179. DOI: 10.1109/Tifs.2015.2400425 |
0.358 |
|
2015 |
Guizani M, He D, Ren K, Rodrigues JJP, Chan S, Zhang Y. Security and privacy in emerging networks: Part II [Guest Editorial] Ieee Communications Magazine. 53: 40-41. DOI: 10.1109/Mcom.2015.7081098 |
0.306 |
|
2015 |
Ding T, Ren K, Vallélian S. A one-step reconstruction algorithm for quantitative photoacoustic imaging Inverse Problems. 31. DOI: 10.1088/0266-5611/31/9/095005 |
0.381 |
|
2015 |
Ren K, Zhang R, Zhong Y. Inverse transport problems in quantitative PAT for molecular imaging Inverse Problems. 31. DOI: 10.1088/0266-5611/31/12/125012 |
0.362 |
|
2014 |
Mamonov AV, Ren K. Quantitative photoacoustic imaging in the radiative transport regime Communications in Mathematical Sciences. 12: 201-234. DOI: 10.4310/Cms.2014.V12.N2.A1 |
0.391 |
|
2014 |
Cao N, Wang C, Li M, Ren K, Lou W. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Ieee Transactions On Parallel and Distributed Systems. 25: 222-233. DOI: 10.1109/Tpds.2013.45 |
0.376 |
|
2014 |
Xu Z, Wang C, Ren K, Wang L, Zhang B. Proof-carrying cloud computation: The case of convex optimization Ieee Transactions On Information Forensics and Security. 9: 1790-1803. DOI: 10.1109/Tifs.2014.2352457 |
0.341 |
|
2014 |
Liu WM, Wang L, Cheng P, Ren K, Zhu S, Debbabi M. PPTP: Privacy-preserving traffic padding in web-based applications Ieee Transactions On Dependable and Secure Computing. 11: 538-552. DOI: 10.1109/Tdsc.2014.2302308 |
0.377 |
|
2014 |
Ren K, Samarati P, Gruteser M, Ning P, Liu Y. Guest Editorial Special Issue on Security for IoT: The State of the Art Ieee Internet of Things Journal. 1: 369-371. DOI: 10.1109/Jiot.2014.2361608 |
0.322 |
|
2014 |
Zhang B, Zhan Q, Chen S, Li M, Ren K, Wang C, Ma D. ${\ssr{PriWhisper}}$ : Enabling Keyless Secure Acoustic Communication for Smartphones Ieee Internet of Things Journal. 1: 33-45. DOI: 10.1109/Jiot.2014.2297998 |
0.321 |
|
2014 |
Ding T, Ren K. Inverse transport calculations in optical imaging with subspace optimization algorithms Journal of Computational Physics. 273: 212-226. DOI: 10.1016/J.Jcp.2014.05.014 |
0.399 |
|
2013 |
Li M, Yu S, Guttman JD, Lou W, Ren K. Secure ad hoc trust initialization and key management in wireless body area networks Acm Transactions On Sensor Networks. 9: 18. DOI: 10.1145/2422966.2422975 |
0.312 |
|
2013 |
Ren K, Zhao H. Quantitative Fluorescence Photoacoustic Tomography Siam Journal On Imaging Sciences. 6: 2404-2429. DOI: 10.1137/130912323 |
0.353 |
|
2013 |
Ren K, Gao H, Zhao H. A Hybrid Reconstruction Method for Quantitative PAT Siam Journal On Imaging Sciences. 6: 32-55. DOI: 10.1137/120866130 |
0.365 |
|
2013 |
Li M, Yu S, Zheng Y, Ren K, Lou W. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Ieee Transactions On Parallel and Distributed Systems. 24: 131-143. DOI: 10.1109/Tpds.2012.97 |
0.364 |
|
2013 |
Wang C, Ren K, Wang J, Wang Q. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Ieee Transactions On Parallel and Distributed Systems. 24: 1172-1181. DOI: 10.1109/Tpds.2012.206 |
0.364 |
|
2013 |
Yang K, Jia X, Ren K, Zhang B, Xie R. DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems Ieee Transactions On Information Forensics and Security. 8: 1790-1801. DOI: 10.1109/Tifs.2013.2279531 |
0.358 |
|
2013 |
Wang C, Zhang B, Ren K, Roveda JM. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud Ieee Transactions On Emerging Topics in Computing. 1: 166-177. DOI: 10.1109/Tetc.2013.2273797 |
0.379 |
|
2013 |
Wang C, Chow SSM, Wang Q, Ren K, Lou W. Privacy-Preserving Public Auditing for Secure Cloud Storage Ieee Transactions On Computers. 62: 362-375. DOI: 10.1109/Tc.2011.245 |
0.362 |
|
2013 |
Li M, Yu S, Ren K, Lou W, Hou YT. Toward privacy-assured and searchable cloud data storage services Ieee Network. 27: 56-62. DOI: 10.1109/Mnet.2013.6574666 |
0.362 |
|
2012 |
Wan Z, Ren K, Gu M. USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks Ieee Transactions On Wireless Communications. 11: 1922-1932. DOI: 10.1109/Twc.2012.030512.111562 |
0.338 |
|
2012 |
Wang C, Wang Q, Ren K, Cao N, Lou W. Toward Secure and Dependable Storage Services in Cloud Computing Ieee Transactions On Services Computing. 5: 220-232. DOI: 10.1109/Tsc.2011.24 |
0.379 |
|
2012 |
Yuan Y, Li Z, Ren K. Quantitative Analysis of Load Redistribution Attacks in Power Systems Ieee Transactions On Parallel and Distributed Systems. 23: 1731-1738. DOI: 10.1109/Tpds.2012.58 |
0.348 |
|
2012 |
Zhang R, Zhang Y, Ren K. Distributed Privacy-Preserving Access Control in Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 23: 1427-1438. DOI: 10.1109/Tpds.2011.299 |
0.317 |
|
2012 |
Wang C, Cao N, Ren K, Lou W. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Ieee Transactions On Parallel and Distributed Systems. 23: 1467-1479. DOI: 10.1109/Tpds.2011.282 |
0.377 |
|
2012 |
Ren K, Wang C, Wang Q. Toward secure and effective data utilization in public cloud Ieee Network. 26: 69-74. DOI: 10.1109/Mnet.2012.6375896 |
0.352 |
|
2012 |
Ren K, Wang C, Wang Q. Security Challenges for the Public Cloud Ieee Internet Computing. 16: 69-73. DOI: 10.1109/Mic.2012.14 |
0.332 |
|
2012 |
Wang Q, Xu P, Ren K, Li X. Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication Ieee Journal On Selected Areas in Communications. 30: 16-30. DOI: 10.1109/Jsac.2012.120103 |
0.309 |
|
2012 |
Bal G, Ren K. On multi-spectral quantitative photoacoustic tomography in diffusive regime Inverse Problems. 28. DOI: 10.1088/0266-5611/28/2/025010 |
0.569 |
|
2011 |
Wang Q, Ren K, Yu S, Lou W. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance Acm Transactions On Sensor Networks. 8: 9. DOI: 10.1145/1993042.1993051 |
0.345 |
|
2011 |
Yuan Y, Li Z, Ren K. Modeling Load Redistribution Attacks in Power Systems Ieee Transactions On Smart Grid. 2: 382-390. DOI: 10.1109/Tsg.2011.2123925 |
0.312 |
|
2011 |
Wang Q, Wang C, Ren K, Lou W, Li J. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing Ieee Transactions On Parallel and Distributed Systems. 22: 847-859. DOI: 10.1109/Tpds.2010.183 |
0.369 |
|
2011 |
Yu S, Ren K, Lou W. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 22: 673-686. DOI: 10.1109/Tpds.2010.130 |
0.309 |
|
2011 |
Ren K, Su H, Wang Q. Secret key generation exploiting channel characteristics in wireless communications Ieee Wireless Communications. 18: 6-12. DOI: 10.1109/Mwc.2011.5999759 |
0.336 |
|
2011 |
Bal G, Ren K. Multi-source quantitative photoacoustic tomography in a diffusive regime Inverse Problems. 27. DOI: 10.1088/0266-5611/27/7/075003 |
0.582 |
|
2011 |
Bal G, Ren K, Uhlmann G, Zhou T. Quantitative thermo-acoustics and related problems Inverse Problems. 27. DOI: 10.1088/0266-5611/27/5/055007 |
0.579 |
|
2011 |
Cheng Y, Gamba IM, Ren K. Recovering doping profiles in semiconductor devices with the Boltzmann–Poisson model Journal of Computational Physics. 230: 3391-3412. DOI: 10.1016/J.Jcp.2011.01.034 |
0.338 |
|
2011 |
Li J, Wang Q, Wang C, Ren K. Enhancing Attribute-Based Encryption with Attribute Hierarchy Mobile Networks and Applications. 16: 553-561. DOI: 10.1007/S11036-010-0233-Y |
0.335 |
|
2010 |
Ren K. Recent Developments in Numerical Techniques for Transport-Based Medical Imaging Methods Communications in Computational Physics. 8: 1-50. DOI: 10.4208/Cicp.220509.200110A |
0.367 |
|
2010 |
Ren K, Yu S, Lou W, Zhang Y. PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks Ieee Transactions On Parallel and Distributed Systems. 21: 203-215. DOI: 10.1109/Tpds.2009.59 |
0.359 |
|
2010 |
Li M, Lou W, Ren K. Data security and privacy in wireless body area networks Ieee Wireless Communications. 17: 51-58. DOI: 10.1109/Mwc.2010.5416350 |
0.346 |
|
2010 |
Wang C, Ren K, Lou W, Li J. Toward publicly auditable secure cloud data storage services Ieee Network. 24: 19-24. DOI: 10.1109/Mnet.2010.5510914 |
0.34 |
|
2010 |
Zhu B, Ren K, Wang L, Debbabi M. PCM: A privacy-preserving detection mechanism in mobile ad hoc networks Security and Communication Networks. 3: 167-184. DOI: 10.1002/Sec.122 |
0.312 |
|
2009 |
Gu X, Ren K, Masciotti J, Hielscher AH. Parametric image reconstruction using the discrete cosine transform for optical tomography. Journal of Biomedical Optics. 14: 064003. PMID 20059241 DOI: 10.1117/1.3259360 |
0.664 |
|
2009 |
Ren K, Yu S, Lou W, Zhang Y. Multi-User Broadcast Authentication in Wireless Sensor Networks Ieee Transactions On Vehicular Technology. 58: 4554-4564. DOI: 10.1109/Tvt.2009.2019663 |
0.35 |
|
2009 |
Ren K, Lou W, Zhu B, Jajodia S. Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation Ieee Transactions On Vehicular Technology. 58: 2018-2029. DOI: 10.1109/Tvt.2008.2003961 |
0.324 |
|
2009 |
Lou W, Ren K. Security, privacy, and accountability in wireless access networks - [Accepted from open call] Ieee Wireless Communications. 16: 80-87. DOI: 10.1109/Mwc.2009.5281259 |
0.359 |
|
2009 |
Bal G, Ren K. Physics-based models for measurement correlations: Application to an inverse Sturm-Liouville problem Inverse Problems. 25. DOI: 10.1088/0266-5611/25/5/055006 |
0.544 |
|
2009 |
Lv J, Ren K, Chen X, Kim K. The ring authenticated encryption scheme - How to provide a clue wisely Information Sciences. 179: 161-168. DOI: 10.1016/J.Ins.2008.09.014 |
0.307 |
|
2008 |
Bal G, Ren K. Transport-based imaging in random media Siam Journal On Applied Mathematics. 68: 1738-1762. DOI: 10.1137/070690122 |
0.579 |
|
2008 |
Ren K, Zeng K, Lou W. Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks Ieee Transactions On Wireless Communications. 7: 354-363. DOI: 10.1109/Twc.2008.060550 |
0.311 |
|
2008 |
Ren K, Lou W, Zhang Y. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks Ieee Transactions On Mobile Computing. 7: 585-598. DOI: 10.1109/Tmc.2007.70753 |
0.326 |
|
2008 |
Yu S, Ren K, Lou W. Attribute-based content distribution with hidden policy Scopus. 39-44. DOI: 10.1109/Npsec.2008.4664879 |
0.302 |
|
2007 |
Ren K, Bal G, Hielscher AH. Transport- and diffusion-based optical tomography in small domains: a comparative study. Applied Optics. 46: 6669-79. PMID 17882287 DOI: 10.1364/Ao.46.006669 |
0.684 |
|
2007 |
Gu X, Ren K, Hielscher AH. Frequency-domain sensitivity analysis for small imaging domains using the equation of radiative transfer. Applied Optics. 46: 1624-32. PMID 17356604 DOI: 10.1364/Ao.46.001624 |
0.657 |
|
2007 |
Gu X, Ren K, Masciotti J, Hielscher AH. Parametric image reconstruction using the discrete cosine transform for optical tomograhy Progress in Biomedical Optics and Imaging - Proceedings of Spie. 6434. DOI: 10.1117/12.705556 |
0.662 |
|
2007 |
Ren K, Lou W, Zeng K, Moran PJ. On Broadcast Authentication in Wireless Sensor Networks Ieee Transactions On Wireless Communications. 6: 4136-4144. DOI: 10.1109/Twc.2007.060255 |
0.347 |
|
2007 |
Bal G, Carin L, Liu D, Ren K. Experimental validation of a transport-based imaging method in highly scattering environments Inverse Problems. 23: 2527-2539. DOI: 10.1088/0266-5611/23/6/015 |
0.558 |
|
2007 |
Ren K, Lou W. Privacy-enhanced, Attack-resilient access control in pervasive computing environments with optional context authentication capability Mobile Networks and Applications. 12: 79-92. DOI: 10.1007/S11036-006-0008-7 |
0.32 |
|
2006 |
Gu X, Ren K, Masciotti J, Hielscher AH. Parametric reconstruction method in optical tomography. Conference Proceedings : ... Annual International Conference of the Ieee Engineering in Medicine and Biology Society. Ieee Engineering in Medicine and Biology Society. Annual Conference. 1: 2667-70. PMID 17946972 DOI: 10.1109/IEMBS.2006.260084 |
0.643 |
|
2006 |
Ren K, Bal G, Hielscher AH. Comparison of frequency-domain transport-and diffusion-based reconstructions of small tissue volumes Optics Infobase Conference Papers. DOI: 10.1364/Bio.2006.Sh31 |
0.673 |
|
2006 |
Gu X, Netz UJ, Ren K, Beuthan J, Hielscher AH. Sensitivity analysis for frequency-domain optical tomography of small tissue volumes Optics Infobase Conference Papers. DOI: 10.1364/Bio.2006.Mh1 |
0.64 |
|
2006 |
Bal G, Ren K. Reconstruction of singular surfaces by shape sensitivity analysis and level set method Mathematical Models and Methods in Applied Sciences. 16: 1347-1373. DOI: 10.1142/S021820250600156X |
0.539 |
|
2006 |
Ren K, Bal G, Hielscher AH. Frequency domain optical tomography based on the equation of radiative transfer Siam Journal On Scientific Computing. 28: 1463-1489. DOI: 10.1137/040619193 |
0.692 |
|
2006 |
Ren K, Lou W, Kim K, Deng R. A novel privacy preserving authentication and access control scheme for pervasive computing environments Ieee Transactions On Vehicular Technology. 55: 1373-1384. DOI: 10.1109/Tvt.2006.877704 |
0.325 |
|
2006 |
Ren K, Lou W, Zeng K, Bao F, Zhou J, Deng RH. Routing optimization security in mobile IPv6 Computer Networks. 50: 2401-2419. DOI: 10.1016/J.Comnet.2005.09.019 |
0.353 |
|
2006 |
Ren K, Zeng K, Lou W. A new approach for random key pre‐distribution in large‐scale wireless sensor networks Wireless Communications and Mobile Computing. 6: 307-318. DOI: 10.1002/Wcm.397 |
0.333 |
|
2005 |
Ren K, Moa-Anderson B, Bal G, Gu X, Hielscher AH. Frequency domain tomography in small animals with the equation of radiative transfer Progress in Biomedical Optics and Imaging - Proceedings of Spie. 5693: 111-120. DOI: 10.1117/12.591113 |
0.717 |
|
2005 |
Abdoulaev GS, Ren K, Hielscher AH. Optical tomography as a PDE-constrained optimization problem Inverse Problems. 21: 1507-1530. DOI: 10.1088/0266-5611/21/5/002 |
0.57 |
|
2005 |
Bal G, Ren K. Atmospheric concentration profile reconstructions from radiation measurements Inverse Problems. 21: 153-168. DOI: 10.1088/0266-5611/21/1/010 |
0.534 |
|
2004 |
Ren K, Abdoulaev GS, Bal G, Hielscher AH. Algorithm for solving the equation of radiative transfer in the frequency domain. Optics Letters. 29: 578-80. PMID 15035476 DOI: 10.1364/Ol.29.000578 |
0.654 |
|
2004 |
Abdoulaev GS, Ren K, Bal G, Hielscher AH. Modeling photon density waves with the equation of radiative transfer Biosilico. DOI: 10.1364/Bio.2004.Wb1 |
0.649 |
|
2004 |
Ren K, Li T, Wan Z, Bao F, Deng RH, Kim K. Highly reliable trust establishment scheme in ad hoc networks Computer Networks. 45: 687-699. DOI: 10.1016/J.Comnet.2004.01.008 |
0.319 |
|
2003 |
Bal G, Ren K. Generalized diffusion model in optical tomography with clear layers. Journal of the Optical Society of America. a, Optics, Image Science, and Vision. 20: 2355-64. PMID 14686515 DOI: 10.1364/Josaa.20.002355 |
0.546 |
|
Show low-probability matches. |