Skip to the content of the web site.
an exploration to the future of secure and privacy systems ...

Publications

The documents are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each copyright.

All IEEE publications: “© IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.”
    [J][C][B][T]

Journal Papers:

[2023 and beyond][2022][2021][2020][2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010]
  1. Y. Zheng, H. Zhu, R. Lu, Y. Guan, S. Zhang, F. Wang, J. Shao, and H. Li, "Efficient and Privacy-Preserving Aggregated Reverse kNN Query over Crowd-sensed Data", IEEE Transactions on Information Forensics and Security, to appear.
  2. Y. Zheng, H. Zhu, R. Lu, Y. Guan, S. Zhang, F. Wang, J. Shao, and H. Li, "PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query over High-Dimensional Data in Cloud", IEEE Transactions on Dependable and Secure Computing, to appear.
  3. Y. Bao, R. Lu, S. Zhang, X. Cheng, H. Lian, Y. Guan and W. Qiu, "Lightweight and Bilateral Controllable Data Sharing for Secure Autonomous Vehicles Platooning Service", IEEE Transactions on Vehicular Technology, to appear.
  4. L. Wu, C. Qin, Z. Xu, Y. Guan and R. Lu, "TCPP: Achieving Privacy-preserving Trajectory Correlation with Differential Privacy", IEEE Transactions on Information Forensics & Security, to appear.
  5. X.Shen, C. Xu, L. Zhu, R. Lu, Y. Guan, and X.Zhang, "Blockchain-based Lightweight and Privacy-preserving Quality Assurance Framework in Crowdsensing Systems", IEEE Internet of Things Journal, to appear.
  6. E. Neto, S. Dadkhah, R. Ferreira, A. Zohourian, R. Lu and A. Ghorbani, “CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment”, Sensors, to appear.
  7. G. Tang, R. Lu, and M. Mamun, "WeightedSim: Privacy-Preserving Weighted Similarity Query over Encrypted Healthcare Data", International Journal of Applied Cryptography, to appear.
  8. X. Jia, Z. Yu, J. Shao, R. Lu, G. Wei, and Z. Liu, "Cross-Chain Virtual Payment Channels", IEEE Transactions on Information Forensics & Security, accepted.
  9. B. Li, Y. Shi, Q. Kong, Q. Du, and R. Lu, "Incentive-Based Federated Learning for Digital Twin Driven Industrial Mobile Crowdsensing", IEEE Internet of Things Journal, to appear.
  10. F. Wang, H. Zhu, G. He, R. Lu, Y. Zheng, and H. Li, “Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme over Dynamic and Time-series Location Data”, IEEE Transactions on Information Forensics and Security, to appear.
  11. Y. Li, C. Dou, Y. Wu, W. Jia, and R. Lu, “NOMA Assisted Two-Tier VR Content Transmission: A Tile-based Approach for QoE Optimization”, IEEE Transactions on Mobile Computing, to appear.
  12. C. Xu, H. Zhang, L. Zhu, C. Zhang, R. Lu, Y. Guan, and K. Sharif, “Non-Interactive DSSE for Medical Data Sharing with Forward and Backward Privacy", IEEE Transactions on Sustainable Computing, to appear.
  13. C. Tan, X. Li, L. Gao, T. H. Luan, Y. Qu, Y. Xiang, and R. Lu, "Digital Twin Enabled Remote Data Sharing for Internet of Vehicles: System and Incentive Design", IEEE Transactions on Vehicular Technology, to appear.
  14. J. Huang, J. Jiao, Y. Wang, S. Wu, R. Lu, and Q. Zhang, "Age-Critical Long Erasure Coding-CCSDS File Delivery Protocol for Dual-Hop S-IoT", IEEE Internet of Things Journal, to appear.
  15. Y. Huang, J. Jiao, Y. Wang, S. Wu, R. Lu, and Q. Zhang, "Age of Information Minimization for Frameless ALOHA in Grant-Free Massive Access", IEEE Transactions on Wireless Communications, to appear.
  16. H. Yang, M. Ge, D. Xue, K. Xiang, H. Li, and R. Lu, "Gradient Leakage Attacks in Federated Learning: Research Frontiers, Taxonomy and Future Directions", IEEE Network, to appear.
  17. C. Xu, Z. Chan, L. Zhu, C. Zhang, R. Lu, Y. Guan, and K. Sharif. "Efficient and Privacy-Preserving Similar Electronic Medical Records Query for Large-scale eHealthcare Systems", Computer Standards & Interfaces, to appear.
  18. J. Jiao, H. Hong, S. Wu, Y. Wang, R. Lu, and Q. Zhang, "Age-Optimal Downlink NOMA Resource Allocation for Satellite-based IoT Network", IEEE Transactions on Vehicular Technology, to appear.
  19. Z. Zhang, L. Zhang, Z. Wang, Y. Li, R. Lu, Y. Yu, "Chronos: an Efficient Asynchronous Byzantine Ordered Consensus", The Computer Journal, to appear.
  20. D. Zhu, H. Zhu, C. Huang, R. Lu, D. Feng, and X. Shen, "Efficient and Accurate Cloud-Assisted Medical Pre-diagnosis with Privacy Preservation", IEEE Transactions on Dependable and Secure Computing, to appear.
  21. M. Wu, G. Chen, P. Li, R. Yu, Y. Wu, M. Pan, and R. Lu, “Split Learning with Differential Privacy for Integrated Terrestrial and Non-Terrestrial Networks,” IEEE Wireless Communications Magazine, to appear.
  22. Y. Zhang, X. Jia, B. Pan, J. Shao, L. Fang, R. Lu, and G. Wei, "Anonymous Multi-Hop Payment for Payment Channel Networks", IEEE Transactions on Dependable and Secure Computing, to appear.
  23. W. Jiang, H. Li, G. Xu, T. Zhang, and R. Lu, "A Comprehensive Defense Framework against Model Extraction Attacks", IEEE Transactions on Dependable and Secure Computing, to appear.
  24. S. Zhang, S. Ray, R. Lu, Y. Guan, Y. Zheng, and J. Shao, "SecBerg: Secure and Practical Iceberg Queries in Cloud", IEEE Transactions on Service Computing, to appear.
  25. X. Du, H. Zhu, Y. Zheng, R. Lu, F. Wang, and H. Li, "A Semantic-Preserving Scheme to Trajectory Synthesis Using Differential Privacy", IEEE Internet of Things Journal, to appear.
  26. R. Li, X. Jia, Z. Zhang, J. Shao, R. Lu, J. Lin, X. Jia, and G. Wei, "A Longitudinal and Comprehensive Measurement of DNS Strict Privacy", IEEE/ACM Transactions on Networking, to appear.
  27. L. Sun, Y. Zhang, Y. Zheng, W. Song, and R. Lu, "Towards Efficient and Privacy-Preserving High-Dimensional Range Query in Cloud", IEEE Transactions on Services Computing, to appear.
  28. Y. Zheng, H. Zhu, R. Lu, Y. Guan, S. Zhang, F. Wang, J. Shao, and H. Li, "PGSim: Efficient and Privacy-Preserving Graph Similarity Query over Encrypted Data in Cloud", IEEE Transactions on Information Forensics and Security, to appear.
  29. P. Victor, A.H. Lashkari, R. Lu, T. Sasi, P. Xiong and S. Iqbal, "IoT Malware: An Attribute-based Taxonomy, Detection Mechanisms and Challenges", Peer-to-Peer Networking and Applications, to appear.
  30. C. Xu, Z. Chan, L. Zhu, C. Zhang, R. Lu, and Y. Guan, "EPPFM: Efficient and Privacy-Preserving Querying of Electronic Medical Records with Forward Privacy in Multi-User Setting", IEEE Transactions on Sustainable Computing, to appear.
  31. J. Zhao, H. Zhu, F. Wang, R. Lu, E. Wang, L. Li, and H. Li, "VFLR: An Efficient and Privacy-Preserving Vertical Federated Framework for Logistic Regression", IEEE Transactions on Cloud Computing, to appear.
  32. R Li, Z Zhang, J Shao, R. Lu, X Jia, and G Wei, "The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services", IEEE Transactions on Dependable and Secure Computing, to appear.
  33. C. Huang, D. Liu, A. Yang, R. Lu, and X. Shen, "Multi-client Secure and Efficient DPF-based Keyword Search for Cloud Storage", IEEE Transactions on Dependable and Secure Computing, to appear.
  34. Y. Huang, J. Jiao, Y. Wang, S. Wu, R. Lu, and Q. Zhang, "G-SC-IRSA: Graph-based spatially coupled IRSA for age-critical grant-free massive access", IEEE Internet of Things Journal, to appear. [PDF]
  35. W. Jiang, H. Li, G. Xu, T. Zhang, and R. Lu, "Physical Black-box Adversarial Attacks through Transformations", IEEE Transactions on Big Data, to appear. [PDF]
  36. S. Zhang, S. Ray, R. Lu, Y. Guan, Y. Zheng, and J. Shao, "Efficient and Privacy-Preserving Spatial Keyword Similarity Query over Encrypted Data", IEEE Transactions on Dependable and Secure Computing, to appear. [PDF]
  37. K. Zhang, X. Wang, J. Ning, M. Wen and R. Lu, "Multi-Client Boolean File Retrieval with Adaptable Authorization Switching for Secure Cloud Search Services", IEEE Transactions on Dependable and Secure Computing, to appear. [PDF]
  38. Z. Rao, J. Jiao, Y. Wang, S. Wu, R. Lu, and Q. Zhang, "Code-domain collision resolution grant-free random access for massive access in IoT", IEEE Transactions on Wireless Communications, to appear. [PDF]
  39. Z. Xu, L. Wu, C. Qin, S. Li, S. Zhang and R. Lu, "PriTAEC: Privacy-Preserving Task Assignment Based on Oblivious Transfer and Edge Computing in VANET", IEEE Transactions on Vehicular Technology, to appear. [PDF]
  40. H. Tan, W. Zheng, Y. Guan, and R. Lu, "A Privacy-Preserving Attribute-Based Authenticated Key Management Scheme for Accountable Vehicular Communications", IEEE Transactions on Vehicular Technology, to appear. [PDF]
  41. Y. Zheng, R. Lu, Y. Guan, S. Zhang, J. Shao, F. Wang, and H. Zhu, “Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query”, IEEE Transactions on Services Computing, to appear. [PDF]
  42. M. Zhang, X. Fan, R. Lu, C. Shen, and X. Guan, “Extended Moving Target Defense for AC State Estimation in Smart Grids”, IEEE Transactions on Smart Grid, to appear. [PDF]
  43. Q. Hu, J. Jiao, Y. Wang, S. Wu, R. Lu, and Q. Zhang, "Multi-type services coexistence in uplink NOMA for dual-layer LEO satellite constellation", IEEE Internet of Things Journal, to appear. [PDF]
  44. Y. Ming, P. Yang, H. Mahdikhani, and R. Lu, "A Secure One-to-Many Authentication and Key Agreement Scheme for Industrial IoT", IEEE Systems, to appear. [PDF]
  45. Y. Zheng, R. Lu, S. Zhang, Y. Guan, F. Wang, J. Shao, and H. Zhu, "PRkNN: Efficient and Privacy-Preserving Reverse kNN Query over Encrypted Data", IEEE Transactions on Dependable and Secure Computing, to appear. [PDF]
  46. C. Huang, W. Wang, D. Liu, R. Lu, and X. Shen, "Blockchain-assisted Personalized Car Insurance with Privacy Preservation and Fraud Resistanc", IEEE Transactions on Vehicular Technology, to appear. [PDF]
  47. C. Xu, R. Wang, L. Zhu, C. Zhang, R. Lu, and K. Sharif. "Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data", IEEE Transactions on Big Data, to appear. [PDF]
  48. Y. Yang, J. Weng, Y. Tong, Y. Yi, Y. Zheng, L. Zhang, and R. Lu, "PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data", IEEE Transactions on Cloud Computing, to appear. [PDF]
  49. C. He, T. H. Luan, R. Lu, Z. Su, M. Dong, "Security and Privacy in Vehicular Digital Twin Networks: Challenges and Solutions", IEEE Wireless Communications, to appear. [PDF]
  50. C. Lai, Y. Ma, R. Lu, Y. Zhang, D. Zheng, "A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond", IEEE Transactions on Dependable and Secure Computing, to appear. [PDF]
  51. S. Zhang, S. Ray, R. Lu, and Y. Zheng, "Efficient Learned Spatial Index with Interpolation Function based Learned Model", IEEE Transactions on Big Data, to appear. [PDF]
  52. B. Li, Y. Guo, Q. Du, Z. Zhu, X. Li, and R. Lu, “P^3: Privacy-Preserving Prediction of Real-time Energy Demands in EV Charging Networks”, IEEE Transactions on Industrial Informatics, to appear. [PDF]
  53. Y. Guan, R. Lu, Y. Zheng, S. Zhang, J. Shao, and G. Wei, "Achieving Privacy-Preserving Discrete Fréchet Distance Range Queries", IEEE Transactions on Dependable and Secure Computing, to appear. [PDF]
  54. Y. Guan, R. Lu, Y. Zheng, S. Zhang, J. Shao, and G. Wei, "Achieving Efficient and Privacy-Preserving (α,β)-Core Query over Bipartite Graphs in Cloud", IEEE Transactions on Dependable and Secure Computing, to appear. [PDF]
  55. S. Zhang, S. Ray, R. Lu, Y. Zheng, Y. Guan, and J. Shao, "Towards Efficient and Privacy-Preserving User-Defined Skyline Query over Single Cloud", IEEE Transactions on Dependable and Secure Computing, to appear. [PDF]
  56. S. Zhang, S. Ray, R. Lu, Y. Zheng, Y. Guan, and J. Shao, "Towards Efficient and Privacy-Preserving Interval Skyline Queries over Time Series Data", IEEE Transactions on Dependable and Secure Computing, to appear. [PDF]
  57. D. Zhu, H. Zhu, X. Wang, R. Lu, and D. Feng, "An Accurate and Privacy-preserving Retrieval Scheme over Outsourced Medical Images", IEEE Transactions on Services Computing, to appear. [PDF]
  58. D. Zhu, H. Zhu, X. Wang, R. Lu, and D. Feng, "Efficient and Privacy-preserving Similar Patients Query Scheme over Outsourced Genomic Data" IEEE Transactions on Cloud Computing, to appear. [PDF]
  59. F. Yin, R. Lu, Y. Zheng, and X. Tang, "Achieve Efficient and Privacy-Preserving Compound Substring Query over Cloud", Security and Communication Networks, to appear. [PDF]
  60. Q. Wang, C. Lai, R. Lu, and D. Zheng, "Searchable Encryption with Autonomous Path Delegation Function and Its Application in Healthcare Cloud", IEEE Transactions on Cloud Computing, to appear. [PDF]
  61. Y. Zheng, R. Lu, H. Zhu, S. Zhang, Y. Guan, J. Shao, F. Wang, and H. Li, "SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud", IEEE Transactions on Information Forensics & Security, Vol. 18, pp. 888-903, 2023. [PDF]
  62. J. Zhao, H. Zhu, W. Xu, F. Wang, R. Lu, and H. Li, "SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework", IEEE Transactions on Information Forensics & Security, Vol. 18, pp. 1022-1036, 2023. [PDF]
  63. L. Han, W. Luo, A. Yang, Y. Zheng, R. Lu, J. Lai, and Y. Cheng, "Fully Privacy-preserving Location Recommendation in Outsourced Environments", Ad Hoc Networks, Vol. 141, pp. 103077, 2023. [PDF]
  64. C. Zhang, L. Zhu, C. Xu, Z. Zhang,and R. Lu, "EBDL: Effective Blockchain-based Covert Storage Channel with Dynamic Labels", Journal of Network and Computer Applications, Vol. 210, pp. 103541, 2023. [PDF]
  65. Z. Xu, L. Wu, C. Qin, S. Li, S. Zhang, and R. Lu, "PPTA: Privacy-Preserving Task Assignment Based on Inner-Product Functional Encryption in SAM", IEEE Internet of Things Journal, Vol. 10, No. 1, pp. 254-267, 2023. [PDF]
  66. Y. Liu, J. Liu, M. Salles, Z. Zhang, T. Li, B. Hu, F. Henglein, and R. Lu, "Building Blocks of Sharding Blockchain Systems: Concepts, Approaches, and Open Problems", Computer Science Review, Vol. 46, pp. 100513, 2022. [PDF]
  67. K. Zhao, M. Zhang, R. Lu, and C. Shen, "A Secure Intra-Regional-Inter-Regional Peer-to-Peer Electricity Trading System for Electric Vehicles", IEEE Transactions on Vehicular Technology, Vol. 71, No. 12, pp. 12576-12587, 2022. [PDF]
  68. C. Zhang, L. Zhu, C. Xu, K. Sharif, R. Lu, and Y. Chen, "APPB: Anti-Counterfeiting and Privacy-Preserving Blockchain-based Vehicle Supply Chains", IEEE Transactions on Vehicular Technology, Vol. 71, No. 12, pp. 13152-13164, 2022. [PDF]
  69. J. Jiao, S. Liu, J. Ding, J. Huang, S. Wu, R. Lu, and Q. Zhang, "Age-optimal network coding HARQ transmission scheme for dual-hop satellite-integrated Internet", IEEE Transactions on Vehicular Technology, Vol. 71, No. 10, pp. 10666-10682, 2022. [PDF]
  70. S. Zhang, S. Ray, R. Lu, Y. Guan, Y. Zheng and J. Shao, "Towards Privacy-Preserving Aggregate Reverse Skyline Query with Strong Security", IEEE Transactions on Information Forensics & Security, Vol. 17, pp. 2538-2552, 2022. [PDF]
  71. J. Ding, J. Jiao, J. Huang, S. Wu, R. Lu, and Q. Zhang, "Age-optimal network coding HARQ scheme for satellite-based Internet of Things", IEEE Internet of Things Journal, Vol. 9, No. 21, pp. 21984-21998, 2022. [PDF]
  72. B. Wang, J. Jiao, S. Wu, R. Lu, and Q. Zhang, "Age-critical and secure blockchain sharding scheme for satellite-based Internet of Things", IEEE Transactions on Wireless Communications, Vol. 21, No. 11, pp. 9432-9446, 2022. [PDF]
  73. Y. Guan, R. Lu, Y. Zheng, S. Zhang, J. Shao, and G. Wei, "EPGQ: Efficient and Private Feature-based Group Nearest Neighbor Query over Road Networks", IEEE Internet of Things Journal, Vol. 9, No. 20, pp. 20492-20502, 2022. [PDF]
  74. J. Zhao, H. Zhu, F. Wang, R. Lu, Z. Liu, and H. Li, "PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework", IEEE Transactions on Information Forensics & Security, Vol. 17, pp. 2059-2073, 2022. [PDF]
  75. S. Zhang, S. Ray, R. Lu, Y. Zheng, Y. Guan, and J. Shao, "PPAQ: Privacy-Preserving Aggregate Queries for Optimal Location Selection in Road Networks", IEEE Internet of Things Journal, Vol. 9, No. 20, pp. 20178-20188, 2022. [PDF]
  76. T. Yang, J. Jiao, S. Wu, R. Lu, and Q. Zhang, "Grant free age-optimal random access protocol for satellite-based Internet of Things", IEEE Transactions on Communications, Vol. 70, No. 6, pp. 3947-3961, 2022. [PDF]
  77. Q. Xu, H. Zhu, Y. Zheng, J. Zhao, R. Lu, and H. Li, "An Efficient and Privacy-Preserving Route Matching Scheme for Carpooling Services", IEEE Internet of Things Journal, Vol. 9, No. 20, pp. 19890-19902, 2022. [PDF]
  78. Q. Xu, Z. Su, R. Lu, and S. Yu, "Ubiquitous Transmission Service: Hierarchical Wireless Data Rate Provisioning in Space-Air-Ocean Integrated Networks", IEEE Transactions on Wireless Communications, Vol. 21, No. 9, pp. 7821-7836, 2022. [PDF]
  79. Y. Zheng, R. Lu, S. Zhang, Y. Guan, J. Shao, F. Wang, and H. Zhu, "PMRQ: Achieving Efficient and Privacy-Preserving Multi-Dimensional Range Query in eHealthcae", IEEE Internet of Things Journal, Vol. 9, No. 18, pp. 17468-17479, 2022. [PDF]
  80. S. Shang, X. Li, R. Lu, J. Niu, X. Zhang, and M. Guizani, "A Privacy-Preserving Multi-Dimensional Range Query Scheme for Edge-Supported Industrial IoT", IEEE Internet of Things Journal, Vol. 9, No. 16, pp. 15285-15296, 2022. [PDF]
  81. J. Zhao, H. Zhu, F. Wang, R. Lu, H. Li, Z. Zhou, and H. Wan, "ACCEL: An Efficient and Privacy-Preserving Federated Logistic Regression Scheme over Vertically Partitioned Data", SCIENCE CHINA Information Sciences, Vol. 65, No. 7, pp. 1-2, 2022. [PDF]
  82. G. Li, C. Lai, R. Lu, and D. Zheng, "SecCDV: A Security Reference Architecture for Cybertwin-driven 6G V2X", IEEE Transactions on Vehicular Technology, Vol. 71, No. 5, pp. 4535-4550, 2022. [PDF]
  83. L. Zhu, X. Liu, Y. Li, X. Yang, S. Xia, and R. Lu, "A Fine-grained Differentially Private Federated Learning against Leakage from Gradients", IEEE Internet of Things Journal, Vol. 9, No. 13, pp. 11500-11512, 2022. [PDF]
  84. Y. Li, H. Li, G. Xu, X. Huang, and R. Lu, "Efficient Privacy-Preserving Federated Learning with Unreliable Users" IEEE Internet of Things Journal, Vol. 9, No. 13, pp. 11590-11603, 2022. [PDF]
  85. B. Li, R. Lu, G. Xiao, T. Li, and K. Choo, "Detection of False Data Injection Attacks on Smart Grids: A Resilience-Enhanced Scheme", IEEE Transactions on Power Systems, Vol. 37, No. 4, pp. 2679-2692, 2022. [PDF]
  86. Q. Wu, R. Wang, X. Yan, C. Wu and R. Lu, "Intrinsic security: a robust framework for cloud-native network slicing via a proactive defense paradigm", IEEE Wireless Communications, Vol. 29, No. 2, pp. 146-153, 2022. [PDF]
  87. Y. Zheng, R. Lu, Y. Guan, J. Shao and H. Zhu, "Towards Practical and Privacy-Preserving Multi-dimensional Range Query over Cloud", IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 5, pp. 3478-3493, 2022. [PDF]
  88. S. Zhang, S. Ray, and R. Lu, "SOREL: Efficient and Secure ORE-based Range Query over Outsourced Data", IEEE Transactions on Big Data, Vol. 8, No. 6, pp. 1702-1715, 2022. [PDF]
  89. Y. Zheng, R. Lu, Y. Guan, J. Shao, and H. Zhu, "Efficient Privacy-Preserving Similarity Range Query with Quadsector Tree in eHealthcare", IEEE Transactions on Services Computing, Vol. 15, No. 5, pp. 2742-2754, 2022. [PDF]
  90. Y. Zheng, R. Lu, Y. Guan, J. Shao, and H. Zhu, "Efficient and Privacy-Preserving Similarity Range Query over Encrypted Time Series Data", IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 4, pp. 2501-2516, 2022. [PDF]
  91. Y. Guan, H. Zheng, J. Shao, R. Lu, and G. Wei, "Fair Outsourcing Polynomial Computation Based on the Blockchain", IEEE Transactions on Services Computing, Vol. 15, No. 5, pp. 2795-2808, 2022. [PDF]
  92. Y. Zheng, R. Lu, F. Yin, J. Shao, and H. Zhu, "Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud", IEEE Transactions on Services Computing, Vol. 15, No. 3, pp. 1358-1370, 2022. [PDF]
  93. Y. Zheng, R. Lu, Y. Guan, J. Shao, and H. Zhu, "Achieving Efficient and Privacy-Preserving Set Containment Search over Encrypted Data", IEEE Transactions on Services Computing, Vol. 15, No. 5, pp. 2604-2618, 2022. [PDF]
  94. X. Zhang, S. Dadkhak, S. Mahdavifar, R. Lu, A. Ghorbani, "An Entity Matching based Image Topic Verification Framework for Online Fact-checking", Int. J. Multimedia Intelligence and Security, Vol. 4, No. 1, pp. 65-85, 2022.
  95.  H. Li, H. Zhu, X. Lin, R. Lu, Z. Yu, and  W. Lan, "Everything You Control is Not Everything: Achieving Intention-concealed Visit on Social Networks", Computers & Security, Vol. 119, pp. 102778, 2022. [PDF]
  96. J. Zhao, H. Zhu, F. Wang, R. Lu, H. Li, J. Tu, and J. Shen, "CORK: A Privacy-preserving and Lossless Federated Learning Scheme for Deep Neural Network", Information Sciences, Vol. 603, pp. 190-209, 2022. [PDF]
  97. M. Zhang, Z. Wu, J. Yan, R. Lu, and X. Guan, "Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids", IEEE Transactions on Information Forensics & Security, Vol. 17, pp. 1919-1929, 2022. [PDF]
  98. Y. Zheng, R. Lu, Y. Guan, S. Zhang, J. Shao, and H. Zhu, "Efficient and Privacy-Preserving Similarity Query with Access Control in eHealthcare", IEEE Transactions on Information Forensics and Security, Vol. 17, pp. 880-893, 2022. [PDF]
  99. Y. Li, H, Li, G. Xu, T. Xiang, and R. Lu, "Practical Privacy-Preserving Federated Learning in Vehicular Fog Computing", IEEE Transactions on Vehicular Technology, Vol. 71, No. 5, pp. 4692-4705, 2022. [PDF]
  100. X. Li, S. Liu, R. Lu, M. Khan, K. Gu, X. Zhang. "An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-based Medical Storage System", IEEE Journal of Biomedical and Health Informatics, Vol. 26, No. 5, pp. 2020-2031, 2022. [PDF]
  101. Q. Kong, R. Lu, and F. Yin, "Achieving Efficient and Secure Handover in LEO Constellation-assisted beyond 5G Networks", IEEE Open Journal of the Communications Society, Vol. 3, pp. 641-653, 2022. [PDF]
  102. S. Zhang, S. Ray, R. Lu, Y. Zheng, Y. Guan, and J. Shao, "Achieving Efficient and Privacy-Preserving Dynamic Skyline Query in Online Medical Diagnosis", IEEE Internet of Things Journal, Vol. 9, No. 12, pp. 9973-9986, 2022. [PDF]
  103. J. Tang, H. Zhu, R. Lu, X. Lin, H. Li, F. Wang, "DLP: Achieve Customizable Location Privacy with Deceptive Dummy Techniques in LBS Applications", IEEE Internet of Things Journal, Vol. 9, No. 9, pp. 6969-6984, 2022. [PDF]
  104. X. Zhang, R. Lu, J. Shao, F. Wang, H. Zhu, A. Ghorbani, "FedSky: An Efficient and Privacy-preserving Scheme for Federated Mobile Crowdsensing", IEEE Internet of Things Journal, Vol. 9, No. 7, pp. 5344-5356, 2022. [PDF]
  105. Y. Zheng, R. Lu, S. Zhang, Y. Guan, J. Shao, and H. Zhu, "Toward Privacy-Preserving Healthcare Monitoring based on Time-Series Activities over Cloud", IEEE Internet of Things Journal, Vol. 9, No. 2, pp. 1276-1288, 2022. [PDF]
  106. F. Wang, H. Zhu, R. Lu, Y. Zheng, and H. Li, "Achieve Efficient and Privacy-preserving Disease Risk Assessment over Multi-outsourced Vertical Datasets", IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 3, pp. 1492-1504, 2022. [PDF]
  107. J. Li, H. Ye, W. Wang, W. Lou, Y. T. Hou, J. Liu, and R. Lu, "Efficient and Secure Outsourcing of Differentially Private Data Publishing with Multiple Evaluators", IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 1, pp. 67-76, 2022. [PDF]
  108. Y. Zheng, R. Lu, Y. Guan, J. shao, and H. Zhu, "Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data", IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 2, pp. 1090-1103, 2022. [PDF]
  109. X. Yang, R. Lu, J. Shao, X. Tang, and A. Ghorbani, "Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud", IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 1, pp. 591-606, 2022. [PDF]
  110. X. Yang, R. Lu, K. Choo, F. Yin, and X. Tang, "Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud", IEEE Transactions on Big Data, Vol. 8, No. 1, pp. 73-84, 2022. [PDF]
  111. J. Shao, R. Lu, Y. Guan, and G. Wei, "Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud", IEEE Transactions on Services Computing, Vol. 15, No. 1, pp. 124-137, 2022. [PDF]
  112. F. Yin, R. Lu, Y. Zheng, J. Shao, X. Yang, and X. Tang, "Achieve Efficient Position-Heap-based Privacy-Preserving Substring-of-Keyword Query over Cloud", Computers & Security, Vol. 110, pp. 102432, 2021. [PDF]
  113. X. Liu, H. Li, G. Xu, Z. Chen, X. Huang, and R. Lu, "Privacy-Enhanced Federated Learning against Poisoning Adversaries", IEEE Transactions on Information Forensics & Security, Vol. 16, pp. 4574-4588, 2021. [PDF]
  114. G. Wei, X. Mao, R. Lu, J. Shao, Y. Guan and G. Lu, "Achieve Space-Efficient Key Management in Lightning Network", Computer Networks, Vol. 197, pp. 108346, 2021. [PDF]
  115. Y. Guan, R. Lu, Y. Zheng, S. Zhang, J. Shao, and G. Wei, "Toward Privacy-Preserving Cybertwin-Based Spatio-Temporal Keyword Query for ITS in 6G Era", IEEE Internet of Things Journal, Vol. 8, No. 22, pp. 16243-16255, 2021. [PDF]
  116. J. Jiao, S. Wu, R. Lu, and Q. Zhang, "Massive Access in Space-based Internet of Things: Challenges, Opportunities, and Future Directions,” IEEE Wireless Communications, Vol. 28, No. 5, pp. 118-125, 2021. [PDF]
  117. M. Zhou, Y. Zheng, Y. Guan, L. Peng, and R. Lu, "Efficient and Privacy-Preserving Range-Max Query In Fog-based Agriculture IoT", Peer-to-Peer Networking and Applications, Vol. 14, No. 4, pp. 2156-2170, 2021. [PDF]
  118. J. Jiao, L. Xu, S. Wu, R. Lu, and Q. Zhang, "MSPA: Multi-Slot Pilot Allocation Random Access Protocol for mMTC-enabled IoT System", IEEE Internet of Things Journal, Vol. 8, No. 24, pp. 17403-17416, 2021. [PDF]
  119. Q. Kong, F. Yin, R. Lu, B. Li, X. Wang, S. Cui, and P. Zhang, "Privacy-Preserving Aggregation for Federated Learning-Based Navigation in Vehicular Fog", IEEE Transactions on Industrial Informatics, Vol. 17, No. 12, pp. 8453-8463, 2021. [PDF]
  120. H. Lv, M. Wen, R. Lu, and J. Li, "An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes", IEEE Transactions on Vehicular Technology, Vol. 70, No. 6, pp. 5254-5264, 2021. [PDF]
  121. X. Yang, H. Zhu, F. Wang, S. Zhang, R. Lu, and H. Li, "MASK: Efficient and Privacy-Preserving M-tree Based Biometric Identification over Cloud", Peer-to-Peer Networking and Applications, Vol. 14, No. 4, pp. 2171-2186, 2021. [PDF]
  122. X. Zhang, R. Lu, J. Shao, H. Zhu, and A. Ghorbani, "Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing", IEEE Internet of Things Journal, Vol. 8, No. 14, pp. 11758-11772, 2021. [PDF]
  123. P. Zeng, Z. Zhang, R. Lu, and K. Choo, "Efficient Policy-Hiding and Large Universe Attribute-Based Encryption with Public Traceability for Internet of Medical Things", IEEE Internet of Things Journal, Vol. 8, No. 13, pp. 10963-10972, 2021. [PDF]
  124. X. Li, S. Liu, R. Lu, and X. Zhang, "On Security of An Identity-Based Dynamic Data Auditing Protocol for Big Data Storage", IEEE Transactions on Big Data, Vol. 7, No. 6, pp. 975-977, 2021. [PDF]
  125. Q. Kong, R. Lu, Y. Feng, and S. Cui, "Privacy-Preserving Continuous Data Collection for Predictive Maintenance in Vehicular Fog-Cloud", IEEE Transactions on Intelligent Transportation Systems, Vol. 22, No. 8, pp. 5060-5070, 2021. [PDF]
  126. K. Zhang, M. Wen, R. Lu, and K. Chen, "Multi-client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization", Transactions on Dependable and Secure Computing, Vol. 18, No. 6, pp. 2875-2887, 2021. [PDF]
  127. X. Yang, R. Lu, J. Shao, X. Tang, and A. Ghorbani, "Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud", IEEE Transactions on Services Computing, Vol. 14, No. 5, pp. 1292-1305, 2021. [PDF]
  128. H. Zhu, Q. Wei, X. Yang, R. Lu, and H. Li, "Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data", IEEE Transactions on Cloud Computing, Vol. 9, No. 2, pp. 576-586, 2021. [PDF]
  129. D.-P. Le, R. Lu, and A. Ghorbani, "Improved Fault Analysis on SIMECK Ciphers", Journal of Cryptographic Engineering, pp. 1-12, 2021. [PDF]
  130. W. Xu, B. Wang, R. Lu, Q. Qu, Y. Chen, and Y. Hu, "Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials", Security and Communication Networks, Vol. 2021, 2021. [PDF]
  131. Q. Kong, R. Lu, F. Yin, and S. Cui, "Blockchain-Based Privacy-Preserving Driver Monitoring for MaaS in the Vehicular IoT", IEEE Transactions on Vehicular Technology, Vol. 70, No. 4, pp. 3788-3799, 2021. [PDF]
  132. Y. Zhan, B. Wang, R. Lu, and Y. Yu, "DRBFT: Delegated Randomization Byzantine Fault Tolerance Consensus Protocol for Blockchains", Information Science, Vol. 559, pp. 8-21, 2021. [PDF]
  133. S. Zhang, S. Ray, R. Lu, Y. Zheng, and J. Shao, "Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing", IEEE Internet of Things Journal, Vol. 8, No. 11, pp. 9139-9150, 2021. [PDF]
  134. F. Wang, H. Zhu, R. Lu, Y. Zheng, and H. Li, "A Privacy-preserving and Non-interactive Federated Learning Scheme for Regression Training with Gradient Descent", Information Sciences, Vol. 552, pp. 183-200, 2021. [PDF]
  135. B. Hu, Z. Zhang, J. Liu, Y. Liu, J. Yin, R. Lu, and X. Lin, "A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms, Tools and Systems", Patterns, Vol. 2, No. 2, pp. 100179, 2021. [PDF]
  136. Y. Zhan, B. Wang, and R. Lu, "Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks", IEEE Internet of Things Journal, Vol. 8, No. 7, pp. 5973-5984, 2021. [PDF]
  137. M. Mamun, A. Miyaji, R. Lu, and C. Su, "A Lightweight Multi-party Authentication in Insecure Reader-Server Channel in RFID-based IoT", Peer-to-Peer Networking and Applications, Vol. 14, No. 2, pp. 708-721, 2021. [PDF]
  138. H. Mahdikhani, R. Lu, J. Shao, and A. Ghorbani, "Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT", IEEE Internet of Things Journal, Vol. 8, No. 6, pp. 4762-4774, 2021. [PDF]
  139. B. Li, Y. Wu, J. Song, R. Lu, T. Li, and L. Zhao, "DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems", IEEE Transactions on Industrial Informatics, Vol. 17, No. 8, pp. 5615-5624, 2021. [PDF]
  140. Y. Rahulamathavan, S. Dogan, X. Shi, R. Lu, M. Rajarajan, and A. Kondoz, "Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems", IEEE Internet of Things Journal, Vol. 8, No. 3, pp. 1417-1427, 2021. [PDF]
  141. J. Wang, S. Hao, R. Wen, B. Zhang, H. Hu, and R. Lu, "IoT-Praetor: Undesired Behaviors Detection for IoT Devices", IEEE Internet of Things Journal, Vol. 8, No. 2, pp. 927-940, 2021. [PDF]
  142. C. Huang, D. Liu, J. Ni, R. Lu, and X. Shen, "Achieving Accountable and Efficient Data Sharing in Industrial Internet of Things", IEEE Transactions on Industrial Informatics, Vol. 17, No. 2, pp. 1416-1427, 2021. [PDF]
  143. Y. Guan, R. Lu, Y. Zheng, J. Shao, and G. Wei, "Toward Oblivious Location-Based k-Nearest Neighbor Query in Smart Cities", IEEE Internet Things Journal, Vol. 8, No. 18, pp. 14219-14231, 2021. [PDF]
  144. J. Zhang, R. Lu, B. Wang, and X. Wang, "Comment on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage"", IEEE Transactions on Information Forensics \& Security, Vol. 16, pp. 1288-1289, 2020. [PDF]
  145. X. Zhang, R. Lu, J. Shao, H. Zhu, and A. Ghorbani, "Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS", IEEE Internet of Things Journal, Vol. 7, No. 12, pp. 11524-11535, 2020. [PDF]
  146. M. Firrozjaei, R. Lu, and A. Ghorbani, "An Evaluation Framework for Privacy-Preserving Solutions Applicable for Blockchain-based Internet-of-Things Platforms", Security and Privacy, Vol. 3, No. 6, pp. e131, 2020. [PDF]
  147. Y. Li, H. Li, G. Xu, T. Xiang, X. Huang, and R. Lu, "Towards Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing", IEEE Internet of Things Journal, Vol. 7, No. 12, pp. 11460-11472, 2020. [PDF]
  148. P. Mishra, A. Biswal, S. Garg, R. Lu, M. Tiwary, and D. Puthal, "Software Defined Internet of Things Security: Properties, State-of-the-Art, and Future Research", IEEE Wireless Communications, Vol. 27, No. 3, pp. 10-16, 2020. [PDF]
  149. X. Liu, H. Li, G. Xu, S. Liu, Z. Liu, and R. Lu, "PADL: Privacy-Aware and Asynchronous Deep Learning for IoT Applications", IEEE Internet of Things Journal, Vol. 7, No. 8, pp. 6955-6969, 2020. [PDF]
  150. Q. Xu, Z. Su, and R. Lu, "Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks", IEEE Transactions on Information Forensics \& Security, Vol. 15, pp. 3415-3429, 2020. [PDF]
  151. X. Li, S. Liu, and R. Lu, "Comment on "A Public Auditing Protocol with Novel Dynamic Structure for Cloud Data"", IEEE Transactions on Information Forensics \& Security, Vol. 15, pp. 2881-2883, 2020. [PDF]
  152. W. Jiang, H. Li, S. Liu, X. Luo, and R. Lu, "Poisoning and Evasion Attacks Against Deep Learning Algorithms in Autonomous Vehicles", IEEE Transactions on Vehicular Technology, Vol. 69, No. 4, pp. 4439-4449, 2020. [PDF]
  153. H. Mahdikhani, R. Lu, Y. Zheng, J. Shao, and A. Ghorbani, "Achieving ${O(\log^3n)}$ Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT", IEEE Internet of Things Journal, Vol. 7, No. 6, pp. 5220-5232, 2020. [PDF]
  154. C. Huang, R. Lu, J. Ni, and X. Shen, "DAPA: A Decentralized, Accountable, and Privacy-preserving Architecture for Car Sharing Services", IEEE Transactions on Vehicular Technology, Vol. 69, No. 5, pp. 4869-4882, 2020. [PDF]
  155. C. Lai, R. Lu, D. Zheng, and X. Shen, "Security and Privacy Challenges in 5G-Enabled Vehicular Networks", IEEE Network, Vol. 34, No. 2, pp. 37-45, 2020. [PDF]
  156. R. Lu, L. Zhang, J. Ni, and Y. Fang, "5G Vehicle-to-Everything (V2X) Services: Gearing Up for Security and Privacy," Proceedings of the IEEE, Vol. 108, No. 2, pp. 373-389, 2020. [PDF]
  157. X. Shen, L. Zhu, C. Xu, K. Sharif, and R. Lu, "A Privacy-Preserving Data Aggregation Scheme for Dynamic Groups in Fog Computing", Information Science, Vol. 514, pp. 118-130, 2020. [PDF]
  158. B. Li, G. Xiao, R. Lu, R. Deng, and H. Bao, "On Feasibility and Limitations of Detecting False Data Injection Attacks on Smart Grids Using D-FACTS Devices". IEEE Transactions on Industrial Informatics, Vol. 16, No. 2, pp. 854-864, 2020. [PDF]
  159. H. Mahdikhani, R. Shahsavarifar, R. Lu, and D. Bremner, "Achieve Privacy-Preserving Simplicial Depth Query Over Collaborative Cloud Servers", Peer-to-Peer Networking and Applications, Vol. 13, No. 1, pp. 412-423, 2020. [PDF]
  160. J. Wu, M. Wen, R. Lu, B. Li, and J. Li, "Toward Efficient and Effective Bullying Detection in Online Social Network", Peer-to-Peer Networking and Applications, Vol. 13, No. 5, pp. 1567-1576, 2020. [PDF]
  161. C. Cheng, Y. Qin, R. Lu, T. Jiang, and T. Takagi, "Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era", IEEE Transactions on Smart Grid, Vol. 10, Issue 9, pp. 6386-6395, 2019. [PDF]
  162. D. Negi, S. Ray, and R. Lu, "Pystin: Enabling Secure LBS in Smart Cities with Privacy-Preserving Top-k Spatial-Textual Query", IEEE Internet of Things Journal, Vol. 6, Issue 5, pp. 7788-7799, 2019. [PDF]
  163. S. Han, M. Xie, B. Yang, R. Lu, H. Bao, J. Lin, H. Hong, M. Gu, S. Han, "A Certificateless Verifiable Strong Designated Verifier Signature Scheme", IEEE Access, Vol. 7, pp. 126391-126408, 2019. [PDF]
  164. M. Wen, S. Chen, R. Lu, B. Li, and S. Chen, "Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System", IEEE Access, Vol. 7, pp. 137968-137981, 2019. [PDF]
  165. F. Wang, H. Zhu, X. Liu, R. Lu, J. Hua, H. Li, and H. Li, "Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare", IEEE Access, Vol. 7, pp.166054-166065, 2019. [PDF]
  166. F. Yin, Y. Zheng, R. Lu, X. Tang, "Achieving Efficient and Privacy-Preserving Multi-Keyword Conjunctive Query Over Cloud", IEEE Access, Vol. 165862-165872, 2019. [PDF]
  167. B. Li, R. Lu, G. Xiao, H. Bao, and A. Ghorbani, "Towards Insider Threats Detection in Smart Grid Communication Systems", IET Communications, Vol. 13, Issue 12, pp. 1728-1736, 2019. [PDF]
  168. L. Zhu, H. Wang, C. Xu, K. Sharif, and R. Lu, "Efficient Group Proof of Storage with Malicious-Member Distinction and Revocation", IEEE Access, Vol. 7, pp. 75476-75489, 2019. [PDF]
  169. C. Yang, L. Feng, Z. Shi, R. Lu, and R. Choo, "A Crowdsensing-based Cyber-physical System for Drone Surveillance Using Random Finite Set Theory", ACM Transactions on Cyber-Physical Systems, Vol. 3, No. 4, pp. 42:1-22, 2019.[PDF]
  170. Y. Zheng, R. Lu, B. Li, J. Shao, H. Yang, and K. Choo, "Efficient Privacy-Preserving Data Merging and Skyline Computation over Multi-source Encrypted Data", Information Sciences, Vol. 498, pp. 91-105, 2019. [PDF]
  171. G. Wang, R. Lu, C. Huang, and Y.L. Guan, "An Efficient and Privacy-Preserving Pre-Clinical Guide Scheme for Mobile eHealthcare", Journal of Information Security and Applications, Vol. 46, pp. 271-280, 2019. [PDF]
  172. Y. Zheng, R. Lu, and J. Shao, "Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data", Journal of Medical Systems, Vol. 43, No. 5, pp. 1-13, 2019. [PDF]
  173. G. Xu, H. Li, S. Liu, M. Wen, and R. Lu, "Efficient and Privacy-preserving Truth Discovery in Mobile Crowd Sensing Systems", IEEE Transactions on Vehicular Technologies, Vol. 68, No. 4, pp. 3854-3865, 2019 [PDF]
  174. G. Wang, R. Lu, and Y.L. Guan, "Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System", IEEE Access. Vol. 7, pp. 33565-33576, 2019. [PDF]
  175. Q. Kong, R. Lu, M. Ma, and H. Bao, "A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination", IEEE Transactions on Vehicular Technology, Vol. 68, No. 2, pp. 1877-1887, 2019. [PDF]
  176. Y. Zhang, R. Lu, B. Cao, and Q. Zhang, "Cooperative jamming-based physical-layer security of cooperative cognitive radio networks: system model and enabling techniques", IET Communications, Vol. 13, No. 5, pp. 539-544, 2019. [PDF]
  177. H. Yang, Q. Zhou, M. Yao, R. Lu, H. Li, and X. Zhang, "A Practical and Compatible Cryptographic Solution to ADS-B Security", IEEE Internet of Things Journal, Vol. 6, No. 2, pp. 3322-3334, 2019. [PDF]
  178. Y. Rahulamathavan, S. Kunaraj, I. Ghosh, R. Lu, M. Rajarajan, "Privacy-preserving iVector based Speaker Verification", IEEE Transactions on Audio, Speech and Language Processing, Vol. 27, No. 3, pp. 496-506, 2019. [PDF]
  179. X. Yang, R. Lu, J. Shao, X. Tang, and H. Yang, "An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare", IEEE Internet of Things Journal, Vol. 6, No. 2, pp. 3284-3297, 2019. [PDF]
  180. R. Lu, "A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT", IEEE Internet of Things Journal, Vol. 6, No. 2, pp. 2497-2505, 2019. [PDF]
  181. J. Hua, H. Zhu, F. Wang, X. Liu, R. Lu, H. Li, and Y. Zhang, "CINEMA: Efficient and Privacy-Preserving Online Medical Primary Diagnosis with Skyline Query", IEEE Internet of Things Journal, Vol. 6, No. 2, pp. 1450-1461, 2019. [PDF]
  182. K. Thiyagarajan, R. Lu, K. El-Sankary, and H. Zhu, "Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things", IEEE Transactions on Circuits and Systems for Video Technology, Vol. 29, No. 3, pp. 610-624, 2019. [PDF]
  183. Q. Kong, R. Lu, M. Ma, and H. Bao, "A privacy-preserving sensory data sharing scheme in Internet of Vehicles", Future Generation Computer Systems, Vol. 92, pp. 644-655, 2019. [PDF]
  184. C. Yan, Z. Ni, B. Cao, R. Lu, S. Wu, and Q. Zhang, "UMBRELLA: User Demand Privacy Preserving Framework Based on Association Rules and Differential Privacy in Social Networks", SCIENCE CHINA - Information Sciences, Vol. 62, No. 3, 2019, DOI:10.1007/s11432-018-9483-x. [PDF]
  185. G. Wang, R. Lu, and Y.L. Guan, "Enabling Efficient and Privacy-Preserving Health Query over Outsourced Cloud", IEEE Access. Vol. 6, pp. 70831-70842, 2018. [PDF]
  186. C. Huang, R. Lu, X. Lin, and X. Shen, "Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles", IEEE Transactions on Vehicular Technology, Vol. 67, No. 11, pp. 11169-11180, 2018. [PDF]
  187. F. Wang, H. Zhu, X. Liu, R. Lu, F. Li, H. Li, S. Zhang, "Efficient and Privacy-preserving Dynamic Spatial Query Scheme for Ride-hailing Services", IEEE Transactions on Vehicular Technology, Vol. 67, No. 11, pp. 11084-11097, 2018. [PDF]
  188. S. Zhang, H. Li , Y. Dai , J. Li , M. He, and R. Lu, "Verifiable Outsourcing Computation for Matrix Multiplication with Improved Efficiency and Applicability", IEEE Internet of Things Journal, Vol. 5, No. 6, pp. 5076-5088, 2018. [PDF]
  189. X. Yan, C. Lin, R. Lu, and C. Tang, "Design of Secret Reconstruction with Optimal Communication Efficiency", IEEE Communications Letters, Vol. 22, No. 8, pp. 1556-1559, 2018. [PDF]
  190. D. Chen, N. Zhang, R. Lu, X. Fang, K. Zhang, Z. Qin, and X. Shen, "An LDPC Code based Physical layer Authentication Scheme with Prefect Security", IEEE J. Selected Areas of Communications, Vol. 36, No. 4, pp. 748-761, 2018. [PDF]
  191. H. Zhu, F. Wang, R. Lu, F. Liu, G. Fu, and H. Li, "Efficient and Privacy-preserving Proximity Detection Schemes for Social Applications", IEEE Internet of Things Journal, Vol. 5, No. 4, pp. 2947-2957, 2018. [PDF]
  192. B. Li, R. Lu, K. Choo, W. Wang, and S. Luo, "On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach", ACM Transactions on Cyber-Physical Systems, Vol. 3, No. 1, pp. 10:1-10:25, 2018. [PDF]
  193. Z. Su, Q. Xu, J. Luo, H. Pu, Y. Peng, and R. Lu, "A Secure Content Caching Scheme for Disaster Backup in Fog Computing Enabled Mobile Social Networks", IEEE Transactions on Industrial Informatics, Vol. 14, No. 10, pp. 4579-4589, 2018. [PDF]
  194. W. Guo, J. Shao, R. Lu, Y. Liu, and A. Ghorbani, A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment, IEEE Access, Vol. 6, pp. 48946-48957, 2018. [PDF]
  195. X. Liu, H. Zhu, R. Lu and H. Li, "Efficient Privacy-Preserving Online Medical Primary Diagnosis Scheme on Naive Bayesian Classification", Peer-to-Peer Networking and Applications, Vol. 11, No. 2, pp. 334-347, 2018. [PDF]
  196. S. Ge, P. Zeng, R. Lu and K.K. Choo, "FGDA: Fine-grained data analysis in privacy-preserving smart grid communications", Peer-to-Peer Networking and Applications, Vol. 11, No. 5, pp. 966-978, 2018. [PDF]
  197. Q. Kong, R. Lu, H. Zhu, and M. Ma, "Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination", IEEE Access, Vol. 6, pp. 25040-25050, 2018. [PDF]
  198. W. Meng, W. Li, C. Su, J. Zhou, and R. Lu , "Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data", IEEE Access, Vol. 6, pp. 7234-7243, 2018. [PDF]
  199. C. Zhang, L. Zhu, C. Xu, and R. Lu, "PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system", Future Generation Computer Systems, Vol. 79, pp. 16-25, 2018. [PDF]
  200. X. Liu, R. Choo, R. Deng, R. Lu, and J. Weng, "Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers", IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 1, pp. 27-39, 2018. [PDF]
  201. R. Jiang, R. Lu, and R. Choo, "Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data", Future Generation Computer Systems, Vol. 78, No. 1, pp.392-401, 2018. [PDF]
  202. M.H. Au, K. Liang, J.K. Liu, R. Lu, J. Ning, "Privacy-preserving personal data operation on mobile cloud - chances and challenges over advanced persistent threat", Future Generation Computer Systems, Vol. 79, No. 1, pp. 337-349, 2018. [PDF]
  203. C. Huang, R. Lu, K.K Choo, "Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges", IEEE Communications Magazine, Vol.55, No. 11, pp. 105-111, 2017. [PDF]
  204. C. Xu, R. Lu, H. Wang, L. Zhu, and C. Huang, "TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning", IEEE Access, Vol.5, pp. 26973-26989, 2017. [PDF]
  205. C. Huang, R. Lu, and H. Zhu. "Privacy-Friendly Spatial Crowdsourcing in Vehicular Networks", Journal of Communications and Information Networks, Vol. 2, No. 2, pp. 59-74, 2017. [PDF]
  206. O. Osanaiye, S. Chen, Z. Yan, R. Lu, R. Choo, and M. Dlodlo, "From Cloud to Fog computing: A Review and A Conceptual Live VM Migration Framework", IEEE Access, Vol 5, pp. 8284-8300, 2017. [PDF]
  207. C. Huang, R. Lu, and R. Choo, "Secure and Flexible Cloud-Assisted Association Rule Mining over Horizontally Partitioned Databases", Journal of Computer and System Sciences, Vol. 89, pp. 51-63, 2017. [PDF]
  208. H. Hu, R. Lu, C. Huang, and Z. Zhang, "PTRS: A Privacy-Preserving Trust-based Relay Selection Scheme in VANETs", Peer-to-Peer Networking and Applications, Vol. 10, No. 5, pp 1204–1218, 2017. [PDF]
  209. H. Zhu, X. Liu, R. Lu and H. Li, "Efficient and Privacy-Preserving Online Medical Pre-Diagnosis Framework Using Nonlinear SVM", IEEE Journal of Biomedical and Health Informatics, Vol. 21, No. 3, pp. 838-850, 2017. [PDF]
  210. C. Xu, R. Lu, H. Wang, L. Zhu, and C. Huang, "PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing System", Sensors, Vol. 17, No. 3, pp. 500, 2017. [PDF]
  211. B. Li, R. Lu, W. Wang, and R. Choo, "Distributed Host-based Collaborative Detection for False Data Injection Attacks in Smart Grid Cyber-Physical System", Journal of Parallel and Distributed Computing, Vol. 103, pp. 32-41, 2017. [PDF]
  212. C. Cheng, R. Lu, P. Albrecht, and T. Tsuyoshi, "Securing Internet of Things in a Quantum World", IEEE Communications Magazine, Vol. 55, No.2, pp. 116-120, 2017. [PDF]
  213. M. Zhao, A. Kumar, P. Chong, and R. Lu, "A Reliable and Energy-efficient Opportunistic Routing Protocol for Dense Lossy Networks", IEEE Wireless Communications Letters, Vol. 6, No. 1, pp. 26-29, 2017. [PDF]
  214. H. Hu, R. Lu, Z. Zhang, and J. Shao, "REPLACE: A Reliable Trust-based Platoon Service Recommendation Scheme in VANET", IEEE Transactions on Vehicular Technology, Vol. 66, No. 2, pp.1786-1797, 2017. [PDF]
  215. R. Deng, G. Xiao, R. Lu, H. Liang, and A. Vasilakos, "False Data Injection on State Estimation in Power Systems --- Attacks, Impacts, and Defense: A Survey", IEEE Transactions on Industrial Informatics, Vol. 13, No. 2, pp. 411-423, 2017. [PDF]
  216. H. Hu, R. Lu, and Z. Zhang, " TPSQ: Trust-based Platoon Service Query via Vehicular Communications " , Peer-to-Peer Networking and Applications (PPNA) (Springer), Vol. 10, No. 1, pp. 262-277, 2017. [PDF]
  217. R. Deng, G. Xiao, and R. Lu, "Defending Against False Data Injection Attacks on Power System State Estimation", IEEE Transactions on Industrial Informatics, Vol. 13, No. 1, pp. 198-207, 2017. [PDF]
  218. H. Bao and R. Lu, "A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance", Peer-to-Peer Networking and Applications, Vol. 10, No. 1, pp. 106-121, 2017. [PDF]
  219. Q. Kong, R. Lu, S. Chen, and H. Zhu, "Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks", IEEE Internet of Things Journal, Vol. 4, No. 1, pp. 29-39, 2017. [PDF]
  220. R. Lu, K. Heung, A. Lashkari, and A. Ghorbani, "A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT", IEEE Access, Vol. 5, pp. 3302-3312, 2017. [PDF]
  221. C. J. Orazio, R. Lu, K. Choo, and A. Vasilakos, "A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps", Applied Mathematics and Computation, Vol.293, pp.523-544, 2017. [PDF]
  222. R. Deng, R. Lu, C. Lai, T. H. Luan, and H. Liang, "Optimal Workload Allocation in Fog-Cloud Computing Towards Balanced Delay and Power Consumption", IEEE Internet of Things Journal, Vol. 3, No. 6, pp. 1171 - 1181, 2016. [PDF]
  223. X. Liu, R. Deng, W. Ding, R. Lu, B. Qin, "Privacy-Preserving Outsourced Calculation on Floating Point Numbers", IEEE Transactions on Information Forensics and Security, Vol.11, No.11, pp.2513-2527, 2016. [PDF]
  224. H. Hu, R. Lu, C. Huang, and Z. Zhang, "TripSense: A Trust-based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs", Sensors, Vol.16, 2016. [PDF]
  225. B. Li, R. Lu, W. Wang, and R. Choo, "DDOA: A Dirichlet-based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-physical System", IEEE Transactions on Information Forensics & Security, Vol.11, No.11, pp.2415-2425, 2016. [PDF]
  226. L. Li, R. Lu, R. Choo, A. Datta and J. Shao, "Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases", IEEE Transactions on Information Forensics & Security, Vol.11, No.8, pp.1847-1861, 2016. [PDF]
  227. C. Lai, R. Lu, and D. Zheng, "SPGS: A Secure and Privacy-Preserving Group Setup Framework for Platoon-Based Vehicular Cyber-Physical Systems", Security and Communication Networks, Vol.9, pp.3857-3867, 2016. [PDF]
  228. X. Liu, B. Qin, R. Deng, R. Lu, and J. Ma, "A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains", IEEE Transactions on Computers, Vol.65, No.12, pp.3567-3579, 2016. [PDF]
  229. H. Zhu, R. Lu, C. Huang, L. Chen, and H. Li, "An Efficient Privacy-Preserving Location Based Services Query Scheme in Outsourced Cloud", IEEE Transactions on Vehicular Technology, Vol.65, No.9, pp.7729-7739, 2016. [PDF]
  230. X. Yang, R. Lu, H. Liang, and X. Tang, "SPFM: A Secure and Fine-grained Privacy-Preserving Matching Protocol for Mobile Social Networking", Big Data Research, Vol.3, pp.2-9, 2016. [PDF]
  231. J. Shao, R. Lu, X. Lin, and K. Liang, "Secure Bidirectional Proxy Re-Encryption for Cryptographic Cloud Storage", Pervasive and Mobile Computing, Vol.28, pp.113-121, 2016. [PDF]
  232. C. Lai, R. Lu, H. Li, D. Zheng and X. Shen, "Secure Machine-Type Communications in LTE Networks", Wireless Communications and Mobile Computing, Vol.16, pp. 1495-1509, 2016. [PDF]
  233. X. Liu, R. Lu, J. Ma, L. Chen, and H. Bao, "Efficient and Privacy-Preserving Skyline Computation Framework across Domains", Future Generation Computer Systems, Vol.62, pp.161-174, 2016. [PDF]
  234. H. Zhu, X. Liu, R. Lu, and H. Li, "EPCS: An Efficient and Privacy-Preserving Classification Service Query Framework for SVM", Security and Communication Networks, Vol.9, pp.1309-1320, 2016. [PDF]
  235. Y. Rahulamathavan, S. Veluru, J. Han, R. Lu, F. Li, and M. Rajarajan, "User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption", IEEE Transactions on Computers, Vol. 65, No. 9, pp.2939 - 2946, 2016. [PDF]
  236. N. Saxena, B. Choi, and R. Lu, "Authentication and Authorization Scheme for Various User-Roles and Devices in Smart Grid", IEEE Transactions on Information Forensics & Security, Vol. 11, No. 5, pp.907 - 921, 2016. [PDF]
  237. H. Zhu, C. Huang, R. Lu, and H. Li, "Modelling Information Dissemination under Privacy Concerns in Social Media", Physica A, Vol. 449, pp.53 - 65, 2016. [PDF]
  238. H. Bao and R. Lu, "Comment on "Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid"", IEEE Transactions on Industrial Informatics, Vol. 12, No. 1, pp.2 - 5, 2016. [PDF]
  239. L. Li, R. Lu, C. Huang, "EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data", IEEE Internet of Things Journal, Vol. 3, No. 2, pp.206 - 218, 2016. [PDF]
  240. H. Bao, R. Lu, B. Li, and R. Deng, "BLITHE: Behavior Rule Based Insider Threat Detection for Smart Grid", IEEE Internet of Things Journal, Vol. 3, No. 2, pp.190 - 205, 2016. [PDF]
  241. X. Liu, R. Lu, J. Ma, L. Chen, and B. Qin, "Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification", IEEE Journal of Biomedical and Health Informatics, Vol. 20, No. 2, pp.655 - 668, 2016. [PDF]
  242. C. Lai, R. Lu, H. Li, D. Zheng, and X. Shen, "GLARM: Group-based Lightweight Authentication Scheme for Resource-constrained Machine to Machine Communications", Computer Networks, Vol. 99, pp.66 - 81, 2016.
  243. J. Shao, X. Lin, R. Lu, and C. Zou, "A Threshold Anonymous Authentication Protocol for VANETs", IEEE Trans. on Vehicular Technology, Vol. 65, No. 3, pp.1711 - 1720, 2016. [PDF]
  244. K. Zhang, X. Liang, R. Lu, and X. Shen, "PIF: A Personalized Fine-grained Spam Filtering Scheme with Privacy Preservation in Mobile Social Networks", IEEE Transactions on Computational Social Systems, Vol. 2, No. 3, pp.41 - 52, 2015. [PDF]
  245. J. Liu, M. Au, X. Huang, R. Lu, and J. Li, "Fine-grained Two-factor Access Control for Web-based Cloud Computing Services", IEEE Transactions on Information Forensics & Security, Vol. 12, No. 3, pp.484 - 497, 2015. [PDF]
  246. C. Lai, R. Lu, D. Zheng, H. Li, and X. Shen, "Towards Secure Large-scale Machine-to-Machine Communications in 3GPP Networks: Challenges and Solutions", IEEE Communications Magazine, Vol. 53, No. 12, pp.12 - 19, 2015. [PDF]
  247. Z. Shi, R. Sun, R. Lu, L Chen, J. Chen, and X. Shen, "Diverse Grouping based Aggregation Protocol with Error Detection for Smart Grid Communications", IEEE Trans. on Smart Grid, Vol. 6, No. 6, pp.2856 - 2868, 2015. [PDF]
  248. R. Deng, G. Xiao, R. Lu, and J. Chen, "Fast Distributed Demand Response with Spatially- and Temporally-Coupled Constraints in Smart Grid", IEEE Transactions on Industrial Informatics, Vol. 11, No. 6, pp.1597-1606, 2015. [PDF]
  249. C. Li, R. Lu, H. Li, L. Chen, and J. Chen, "PDA: A Privacy-Preserving Dual-Functional Aggregation Scheme for Smart Grid Communications", Security and Communication Networks, Vol. 8, No. 15, pp.2494-2506, 2015. [PDF]
  250. X. Zhang, R. Lu, H. Zhang, and C. Xu, "A New Digital Signature Scheme from Layered Cellular Automata", International Journal of Network Security, Vol. 18, No. 3, pp.544-552, 2015. [PDF]
  251. L. Chen, R. Lu, and Z. Cao, " PDAFT: A Privacy-preserving Data Aggregation Scheme with Fault Tolerance for Smart Grid Communications " , Peer-to-Peer Networking and Applications (PPNA) (Springer), Vol. 8, No. 6, pp.1122-1132, 2015. [PDF]
  252. K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil Attacks and Their Defenses in the Internet of Things", IEEE Internet of Things Journal, Vol. 1, No. 5, pp.372-383, 2015. [PDF]
  253. L. Chen, R. Lu, Z. Cao, K. AlHarbi, and X. Lin, " MuDA: Multifunctional Data Aggregation in Privacy-preserving Smart Grid Communications " , Peer-to-Peer Networking and Applications (PPNA) (Springer), Vol. 8, No. 5, pp.777-792, 2015. [PDF]
  254. K. Liang, J. K. Liu, R. Lu, and D. S. Wong, "Privacy Concerns for Photo-Sharing in Online Social Networks", IEEE Internet Computing, Vol. 19, No. 2, pp.58-63, 2015. [PDF]
  255. H. Bao, and R. Lu, A New Differentially Private Data Aggregation with Fault Tolerance for Smart Grid Communications, IEEE Internet of Things Journal, Vol. 2, No. 3, pp.248-258, 2015.
  256. G. Wei, J. Shao, Y. Xiang, P. Zhu, and R. Lu, " Obtain Confidentiality or/and Authenticity in Big Data by ID-based Generalized Signcryption ", Information Sciences, Vol. 318, pp.111-122, 2015. [PDF]
  257. J.K. Liu, M.H. Au, W. Susilo, K. Liang, R. Lu, and B. Srinivasan, "Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud", IEEE Network Magazine, Vol. 29, No. 2, pp.46-50, 2015. [PDF]
  258. R. Jiang, R. Lu, J. Luo, C. Lai, and X. Shen, "Efficient Self-healing Group Key Management with Dynamic Revocation and Collusion Resistance for SCADA in Smart Grid ", Security and Communication Networks, Vol. 8, No. 6, pp.1026-1039, 2015. [PDF]
  259. H. Zhu, X. Lin, Y. Zhang, and R. Lu, "Duth: A user-friendly dual-factor authentication for android smartphone devices", Security and Communication Networks, Vol.8, No. 7, pp.1213-1222, 2015. [PDF]
  260. L. Chen, R. Lu, K. AlHarbi, X. Lin, and Z. Cao, " ReDD: Recommendation-based Data Dissemination in Privacy-preserving Mobile Social Networks ", Security and Communication Networks, Vol.8, No. 7, pp.1291-1305, 2015. [PDF]
  261. M. Wang, H. Shan, R. Lu, R. Zhang, and X. Shen, " Real-Time Path Planning Based on Hybird-VANET-Enhanced Transportation System", IEEE Trans. on Vehicular Technology, Vol. 64, No. 5, pp.1664-1678, 2015. [PDF]
  262. T. Luan, R. Lu, X. Shen, and F. Bai, "Social on the Road: Enabling Secure and Efficient Social Networking on Highway", IEEE Wireless Communications, Vol. 22, No. 1, pp.44-51, 2015. [PDF]
  263. Z. Shi, S. Bi, H. Zhang, R. Lu, and X. Shen, " Improved auxiliary particle filter-based synchronization of chaotic Colpitts circuit and its application to secure communication ", Wireless Communications and Mobile Computing (Wiley), Vol. 15, No. 10, pp.1456-1470, 2015. [PDF]
  264. C. Li, L. Chen, R. Lu, H. Li, "Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding"", IEEE Transactions on Computers, Vol. 64, No. 3, pp. 882 - 883, 2015. [PDF]
  265. T. Yang, C. Lai, R. Lu, and R. Jiang, " EAPSG: Efficient Authentication Protocol for Secure Group Communications in Maritime Wideband Communication Networks " , Peer-to-Peer Networking and Applications (PPNA) (Springer), Vol. 8, No. 2, pp. 216-228, 2015. [PDF]
  266. C. Li, R. Lu, H. Li, L. Chen, and X. Li, "Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding"", IEEE Communications Letters, Vol. 18, No. 12, pp. 2129-2132, 2014. [PDF]
  267. X. Zhang, R. Lu, H. Zhang, and C. Xu, "A New Public Key Encryption Scheme based on Layered Cellular Automata", KSII Transactions on Internet and Information Systems, Vol. 8, No. 10, pp. 3572-3590, Oct. 2014. [PDF]
  268. H. Li, Y. Yang, M. Wen, H. Luo, and R. Lu, "EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market", KSII Transactions on Internet and Information Systems, Vol. 8, No. 11, pp. 3937-3954, Nov. 2014. [PDF]
  269. R. Lu, H. Zhu, X. Liu, J. Liu, and J. Shao, "Towards Efficient and Privacy-Preserving Computing in Big Data Era ", IEEE Network Magazine, Vol. 28, No. 4, pp.46-50, 2014. [PDF]
  270. J. He, P. Cheng, J. Chen, L. Shi, and R. Lu, "Time Synchronization for Random Mobile Sensor Networks ", IEEE Trans. on Vehicular Technology, Vol. 63, No. 8, pp. 3935-3946, 2014. [PDF]
  271. B. Cao, Q. Zhang, R. Lu, and J. W. Mark, "PEACE: Polarization Enabled Active Cooperation Scheme Between Primary and Secondary Networks", IEEE Trans. on Vehicular Technology, Vol. 63, No. 8, pp. 3677-3688, 2014. [PDF]
  272. G. Wei, R. Lu, J. Shao, " EFADS: Efficient, Flexible and Anonymous Data Sharing Protocol for Cloud Computing with Proxy Re-Encryption " , Journal of Computer and System Sciences (Elsevier), Vol. 80, No. 8, pp. 1549–1562, Dec. 2014. [PDF]
  273. C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen, " CPAL: A Conditional Privacy-Preserving Authentication with Access Linkability for Roaming Service ", IEEE Internet of Things Journal, Vol. 1, No. 1, pp. 46 - 57, Feb. 2014. [PDF]
  274. H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, "EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid", IEEE Trans. on Parallel and Distributed Systems, Vol. 25, No. 8, pp. 2053 - 2064, Aug. 2014. [PDF]
  275. M. Barua, X. Liang, R. Lu, and X. Shen, "RCare: Extending Secure Health Care to Rural Area Using VANETs", ACM Mobile Networks and Applications (MONET), Vol. 19, No. 3, pp. 318-330, June 2014. [PDF]
  276. K. Zhang, X. Liang, M. Bauray, R. Lu, and X. Shen, "PHDA: A Priority Based Health Data Aggregation with Privacy Preservation for Cloud Assisted WBANs", Information Sciences (Elsevier), Vol. 284, pp. 130-141, Nov. 2014. [PDF]
  277. H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, "An Efficient Merkle Tree Based Authentication Scheme for Smart Grid", IEEE Systems Journal, Vol. 8, No. 2, pp. 655-663, 2014. [PDF]
  278. K. Zhang, X. Liang, X. Shen, R. Lu, "Exploiting multimedia services in mobile social networks from security and privacy perspectives", IEEE Communications Magazine, Vol. 52, No. 3, pp. 58-65, 2014. [PDF]
  279. S. Chen, and R. Lu, " A Regular Expression Matching Engine with Hybrid Memories " , Computer Standards & Interfaces (Elsevier), Vol. 36, No. 5, pp. 880-888, 2014. [PDF]
  280. R. Jiang, R. Lu, Y. Wang, J. Luo, C. Shen, and X. Shen, "Energy-Theft Detection Issues for Advanced Metering Infrastructure in Smart Grid", TSINGHUA SCIENCE AND TECHNOLOGY, Vol.19, No. 2, pp. 105-120, 2014. [PDF]
  281. S. Chen, R. Lu, and X. Shen, "SRC: A Multi-core NPU-based TCP Stream Reassembly Card for Deep Packet Inspection", Security and Communication Networks, Vol. 7, NO. 2, pp .265-278, 2014. [PDF]
  282. M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, "SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing", Security and Communication Networks, Vol. 7, No. 1, pp. 234–244, 2014. [PDF]
  283. Z. Shi, R. Sun, R. Lu, J. Qiao, J. Chen, and X. Shen, "A Wormhole Attack Resistant Neighbor Discovery Scheme with RDMA Protocol for 60 GHz Directional Network", IEEE Trans. on Emerging Topics in Computing, Vol. 1, No. 2, pp. 341-352, Dec. 2013. [PDF]
  284. C. Lai, H. Li, R. Lu, X. Shen, " SE-AKA: A Secure and Efficient Group Authentication and Key Agreement Protocol for LTE Networks " , Computer Networks (Elsevier), Vol. 67, No. 17, pp. 3492-3510, 2013. [PDF]
  285. M. Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, "PaRQ: A Privacy-preserving Range Query Scheme over Encrypted Metering Data for Smart Grid", IEEE Trans. on Emerging Topics in Computing, Vol. 1, No. 1, pp. 178-191, 2013. [PDF]
  286. R. Lu, X. Lin, Z. Shi, and X. Shen, " A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic Monitoring Systems ", IEEE Intellgient Systems, Vol. 28, No. 3, pp. 62-65, 2013. [PDF]
  287. X. Liang, K. Zhang, R. Lu, X. Lin, and X. Shen, "EPS: An Efficient and Privacy-Preserving Service Searching Scheme for Smart Community", IEEE Sensors Journal, Vol. 13, No. 10, pp. 3702-3710, 2013. [PDF]
  288. X. Liang, X. Li, K. Zhang, R. Lu, X. Lin, and X. Shen, "Fully Anonymous Profile Matching in Mobile Social Networks", IEEE J. Selected Areas of Communications, Vol. 31, No. 9, pp. 641-655, 2013. [PDF]
  289. Y. Zheng, Z. Shi, R. Lu, S. Hong, and X. Shen, "An Efficient Data-Driven Particle PHD Filter for Multi-Target Tracking", IEEE Trans. on Industrial Informatics, Vol. 9, No. 4, pp. 2318-2326, 2013. [PDF]
  290. R. Lu, X. Lin, and X. Shen, "SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency", IEEE Trans. on Parallel and Distributed Systems, Vol. 24, No. 3, pp. 614-624, 2013. [PDF]
  291. X. Liang, X. Li, R. Lu, X. Lin and X. Shen, "UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid", IEEE Trans. on Smart Grid, Vol. 4, No. 1, pp. 141-150, 2013. [PDF]
  292. X. Liang, X. Li, M. Barua, L. Chen, R. Lu, X. Shen, and H. Luo, "Enable Pervasive Healthcare through Continuous Remote Health Monitoring", IEEE Wireless Communications, Vol. 19, No. 6, pp. 10-18, 2012.
  293. R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications", IEEE Trans. on Parallel and Distributed Systems, Vol. 23, No. 9, pp. 1621-1631, 2012.
  294. X. Liang, M. Barua, R. Lu, X. Lin, and X. Shen, "HealthShare: Achieving Secure and Privacy-preserving Health Information Sharing through Health Social Networks", Computer Communications (Elsevier)- special issue on Smart and Interactive Ubiquitous Multimedia Services, Vol. 35, Issue 15, pp. 1910-1920, 2012.
  295. X. Li, X. Liang, R. Lu, X. Lin, H. Zhu, and X. Shen, "Securing Smart Grid: Cyber Attacks, Countermeasures and Challenges", IEEE Communications Magazine, Vol. 50, No. 8, pp. 38-45, 2012.
  296. X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, X. Shen, "Morality-driven Data Forwarding with Privacy Preservation in Mobile Social Networks", IEEE Trans. on Vehicular Technology, Vol. 61, Issue 7, pp. 3209-3221, 2012.
  297. Z. M. Fadlullah, N. Kato, R. Lu, X. Shen, and Y. Nozaki, "Towards Secure Targeted Broadcast in Smart Grid", IEEE Communications Magazine, Vol. 50, No. 5, pp. 150-156, 2012.
  298. R. Lu, X. Lin, X. Liang, and X. Shen, "A Dynamic Privacy-Preserving Key Management Scheme for Location Based Services in VANETs", IEEE Trans. on Intelligent Transportation Systems, Vol. 13, No. 1, pp. 127-139, 2012.
  299. R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, "Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs", IEEE Trans. on Vehicular Technology, Vol. 61, Issue 1, pp. 86-96, 2012.
  300. R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks", IEEE Trans. on Parallel and Distributed Systems, Vol. 23, No. 1, pp. 32-43, 2012.
  301. M. Fouda, Z. Md. Fadlullah, N. Kato, R. Lu and X. Shen, "A Light-weight Message Authentication Scheme for Smart Grid Communications", IEEE Trans. on Smart Grid, Vol. 2, No. 4, pp. 675-685, 2011.
  302. X. Li, R. Lu, X. Liang, X. Shen, J. Chen, and X. Lin, "Smart Community: an Internet of Things Application", IEEE Communications Magazine, Vol. 49, No. 11, pp. 68-75, 2011.
  303. R. Lu, X. Lin, X. Liang, and X. Shen, "A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network", ACM Mobile Networks and Applications (MONET), Vol. 16, Issue 6, pp. 683-694, 2011.
  304. X. Liang, M. Barua, R. Lu, and X. Shen, "Privacy-preserving Wireless Data Transmission for e-Healthcare Applications", IEEE COMSOC MMTC E-Letter - Special Issue on 3D DATA EVALUATION, RETRIEVAL AND PRIVACY, Vol. 6, No. 11, pp. 39-41, 2011.
  305. M. Barua, X. Liang, R. Lu, and X. Shen, "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in Cloud Computing", Int. J. of Security and Networks (IJSN). Vol. 6, Nos. 2/3, pp. 67-76, 2011.
  306. X. Liang, L. Chen, R. Lu, X. Lin, and X. Shen, "PEC: A Privacy-preserving Emergency Call Scheme for Mobile Healthcare Social Networks", IEEE/KICS J. Commu. and Networks (JCN), Vol. 13, No. 2, pp. 102-112, 2011.
  307. R. Lu, X. Lin, X. Liang, and X. Shen, "An Efficient and Provably Secure Public Key Encryption Scheme Based on Coding Theory", Security and Communication Networks (Wiley), Vol. 4, No. 12, pp. 1440-1447, 2011.
  308. R. Lu, X. Li, X. Liang, X. Lin, and X. Shen, "GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications", IEEE Communications Magazine - Feature Topic on Recent Progress in Machine to Machine Communications, Vol. 49, Issue 4, pp. 28-35, 2011.
  309. A. Wasef, R. Lu, X. Lin, and X. Shen, "Complementing Public Key Infrastructure to Secure Vehicular Ad Hoc Networks", IEEE Wireless Communications, Vol. 17, No. 5, pp. 22-28, 2010.
  310. X. Lin, R. Lu, D. Kwana, and X. Shen, "REACT: An RFID-based Privacy-preserving Children Tracking Scheme for Large Amusement Parks", Computer Networks (Elsevier), Vol. 54, Issue 15, pp. 2744-2755, 2010.
  311. R. Lu, X. Lin, H. Zhu, and X. Shen, and B. R. Preiss, "Pi: A Practical Incentive Protocol for Delay Tolerant Networks", IEEE Trans. on Wireless Communications, Vol. 9, No. 4, pp. 1483-1493, 2010.
  312. Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications", IEEE Trans. on Vehicular Technology, Vol. 59, Issue 7, pp. 3589-3603, 2010.
  313. R. Lu, X. Lin, H. Zhu, and X. Shen, "An Intelligent Secure and Privacy-Preserving Parking Scheme through Vehicular Communications", IEEE Trans. on Vehicular Technology, Vol. 59, No. 6, pp. 2772-2785, 2010.
  314. X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks", Wireless Communications and Mobile Computing (Wiley), Vol. 10, No. 6, pp. 843-856, 2010.

Conference Papers:

[2023 and beyond][2022][2021][2020 and beyond] [2019] [2018] [2017] [2016] [2015] [2014] [2013][2012] [2011] [2010]

  1. E. Z. Zhang, Y. Guan, R. Lu, and H. Zhang, An Efficient Bloom Filter-Based Range Query Scheme Under Local Differential Privacy, Proc. IEEE PIMRC’23, Toronto, Ontario, Canada, Sept. 5-8, 2023.
  2. Y. Guan, R. Lu, S. Zhang, and S. Lalla, Efficient and Privacy-Preserving Subgraph Matching Queries in Graph Federation, IEEE ICC'23, Rome, Italy, 28 May - 01 June 2023.
  3. Q. Xu, H. Zhu, Y. Zheng, F. Wang, R. Lu, and L. Gao, Efficient and Privacy-Preserving Geo-Social-Based POI Recommendation over Encrypted Data, IEEE ICC'23, Rome, Italy, 28 May - 01 June 2023.
  4. L. Sun, Y. Zhang, Y. Zheng, R. Lu, and H. Zhu, PLPR: Towards Efficient and Privacy-Preserving LBSNs-Based POI Recommendation in Cloud, IEEE ICC'23, Rome, Italy, 28 May - 01 June 2023.
  5. S. Zhang, S. Ray, R. Lu, Y. Guan, S. Lalla, Traceable and Privacy-Preserving Worker Selection Scheme with Arbitrary Spatial Ranges in MCS, IEEE ICC'23, Rome, Italy, 28 May - 01 June 2023.
  6. Z. Liu, Y. Jin, B. Cao, and R. Lu, RISAC: Rate-splitting Multiple Access Enabled Integrated Sensing and Communication Systems, IEEE ICC'23, Rome, Italy, 28 May - 01 June 2023.
  7. T. Yang, J. Jiao, Y. Wang, S. Wu, R. Lu, and Q. Zhang, Unequal Timeliness Protection Random Access Scheme for Satellite Internet of Things, IEEE ICC'23, Rome, Italy, 28 May - 01 June 2023.
  8. J. Huang, J. Jiao, Y. Wang, S. Wu, R. Lu, and Q. Zhang, An Age-Critical LEC-CFDP Scheme for Dual-Hop Space-Air-Ground Integrated Networks, IEEE ICC'23, Rome, Italy, 28 May - 01 June 2023.
  9. Y. Zheng, H. Zhu, R. Lu, and F. Wang, PRRkNN: Efficient and Privacy-Preserving Range-Based Reverse kNN over Encrypted Data, IEEE ICC'23, Rome, Italy, 28 May - 01 June 2023.
  10. S. Zhang, S. Ray, R. Lu, and Y. Guan, PPsky: Privacy-Preserving Skyline Queries with Secret Sharing in eHealthcare, Proc. IEEE Globecom'22, Rio de Janeiro, Brazil, Dec. 4-8, 2022.
  11. Y. Guan, P. Xiong, S. Zhang, and R. Lu, Privacy-Preserving Outsourced Task Scheduling in Mobile Crowdsourcing, Proc. IEEE Globecom'22, Rio de Janeiro, Brazil, Dec. 4-8, 2022.
  12. L. Li, H. Zhu, Y. Zheng, F. Wang, R. Lu, and H. Li, Efficient and Privacy-Preserving Fusion Based Multi-Biometric Recognition, Proc. IEEE Globecom'22, Rio de Janeiro, Brazil, Dec. 4-8, 2022.
  13. Y. Zheng, R. Lu, S. Zhang, H. Zhu, and F. Wang, Efficiency-Improved Privacy-Preserving Weighted Similarity Query over Outsourced eHealthcare Data, Proc. IEEE Globecom'22, Rio de Janeiro, Brazil, Dec. 4-8, 2022.
  14. D. Zhu, H. Zhu, C. Huang, R. Lu, X. Shen, and D. Feng, Efficient Server-Aided Personalized Treatment Recommendation with Privacy Preservation, Proc. IEEE Globecom'22, Rio de Janeiro, Brazil, Dec. 4-8, 2022.
  15. Q. Hu, J. Jiao, S. Wu, R. Lu, and Q. Zhang, LoS-Aware Handover Uplink NOMA Transmissions for Multi-Layer LEO Satellite Constellation, Proc. IEEE Globecom'22, Rio de Janeiro, Brazil, Dec. 4-8, 2022.
  16. D. Zhai, Q. Shi, H. Cao, S. Garg, X. Chen, and R. Lu, Resource Management for Heterogeneous Aerial Networks with Backhaul Constraints, Proc. IEEE Globecom'22, Rio de Janeiro, Brazil, Dec. 4-8, 2022.
  17. X. Yang, Y. Feng, W. Fang, J. Shao, X. Tang, S.-T. Xia, and R. Lu, An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning, The Web Conference 2022 (formerly known as WWW), Online, Lyon, France, April 25-29, 2022. (acceptance rate 17.7%)
  18. Y. Zheng, R. Lu, S. Zhang, Achieving Privacy-Preserving Weighted Similarity Range Query over Outsourced eHealthcare Data, IEEE ICC'22, Seoul, South Korea, 16 - 20 May 2022.
  19. X. Zhang, R. Lu, S. Zhang, S. Ray, and A. Ghorbani, Privacy-preserving Worker Selection in Mobile Crowdsensing over Spatial-temporal Constraints, IEEE ICC'22, Seoul, South Korea, 16 - 20 May 2022.
  20. Y. Guan, P. Xiong, and R. Lu, EVRQ: Achieving Efficient and Verifiable Range Query over Encrypted Traffic Data, IEEE ICC'22, Seoul, South Korea, 16 - 20 May 2022.
  21. Q. Liu, J. Jiao, S. Wu, R. Lu, and Q. Zhang, Deep reinforcement learning-assisted NOMA age-optimal power allocation for S-IoT network, IEEE ICC'22, Seoul, South Korea, 16 - 20 May 2022.
  22. Y. Huang, J. Jiao, S. Wu, R. Lu, and Q. Zhang, Graph-based space coupling IRSA random access for age-critical grant-free massive access, IEEE ICC'22, Seoul, South Korea, 16 - 20 May 2022.
  23. Z. Rao, J. Jiao, S. Wu, R. Lu, and Q. Zhang, Code-domain NOMA scheme based on T-fold protocol for grant-free massive random access, IEEE ICC'22, Seoul, South Korea, 16 - 20 May 2022.
  24. Q. Hu, J. Jiao, S. Wu, R. Lu, and Q. Zhang, QoS-aware uplink NOMA with multi-type service coexistence for LEO satellite constellation, IEEE ICC'22, Seoul, South Korea, 16 - 20 May 2022.
  25. Z. Liu, J. Jiao, S. Wu, R. Lu, and Q. Zhang. Non-orthogonal superimposed pilot grant-free random access scheme in satellite-based IoT. IEEE WCNC'22, Austin, TX, USA, Apr. 10-13, 2022.
  26. S. Zhang, R. Lu, and Y. Zheng, Towards Privacy-Preserving Online Medical Monitoring with Reverse Skyline Query, Proc. IEEE Globecom'21, Madrid, Spain, Dec. 7-11, 2021.
  27. Y. Guan, P. Xiong, and R. Lu, Privacy-Preserving Fog-Based Multi-Location Task Allocation in Mobile Crowdsourcing, Proc. IEEE Globecom'21, Madrid, Spain, Dec. 7-11, 2021.
  28. X. Zhang, R. Lu, S. Ray, J. Shao, and A. Ghorbani, Spatio-temporal Similarity based Privacy-preserving Worker Selection in Mobile Crowdsensing, Proc. IEEE Globecom'21, Madrid, Spain, Dec. 7-11, 2021.
  29. S. Yuan, H. Li, R. Zhang, M. Hao, Y. Li, and R. Lu, Towards Lightweight and Efficient Distributed Intrusion Detection Framework, Proc. IEEE Globecom'21, Madrid, Spain, Dec. 7-11, 2021.
  30. T. Yang, J. Jiao, S. Wu, R. Lu, and Q. Zhang, Age-Critical Pilot Allocation Random Access Protocol for Space-Air-Ground Integrated Networks, Proc. IEEE Globecom'21, Madrid, Spain, Dec. 7-11, 2021.
  31. Y. Huang, J. Jiao, S. Wu, R. Lu, and Q. Zhang, Age-Critical Frameless ALOHA Protocol for Grant-Free Massive Access, Proc. IEEE Globecom'21, Madrid, Spain, Dec. 7-11, 2021.
  32. S. Zhang, S. Ray, R. Lu, Y. Zheng, "SPRIG: A Learned Spatial Index for Range and kNN Queries", 17th International Symposium on Spatial and Temporal Databases (SSTD'21), August 23-25, 2021
  33. Y. Zheng, R. Lu, Y. Guan, S. Zhang, and J. Shao, Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform, IWQoS 2021, Tokyo, Japan, Jun. 25-28, 2021.
  34. X. Zhang, S. Ray, F. Shoeleh, and R. Lu, Efficient Contact Similarity Query over Uncertain Trajectories, 24th International Conference on Extending Database Technology (EDBT'21), March 23-26, 2021
  35. X. Ma, B. Li, Q. Kong, Y. Ouyang, and R. Lu, On Secure and Efficient Data Sharing for Smart Grids: An Anti-Collusion Scheme, Proc. IEEE ICC'21, Montreal, Quebec, Canada, June 14-23, 2021.
  36. S. Liao, J. Jiao, S. Wu, R. Lu, and Q. Zhang, Age-Optimal Power Allocation Scheme for NOMA-based S-IoT Downlink Network, Proc. IEEE ICC'21, Montreal, Quebec, Canada, June 14-23, 2021.
  37. Y. Zheng, and R. Lu, Efficient Privacy-Preserving Similarity Range Query based on Pre-computed Distances in eHealthcare, Proc. IEEE Globecom'20, Taipei, Taiwan, Dec. 7-11, 2020.
  38. Y. Guan, R. Lu, Y. Zheng, J. Shao, and G. Wei, Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities, Proc. IEEE Globecom'20, Taipei, Taiwan, Dec. 7-11, 2020.
  39. W. Fan, H. Li, W. Jiang, G. Xu, and R. Lu, A Practical Black-Box Attack Against Autonomous Speech Recognition Model, Proc. IEEE Globecom'20, Taipei, Taiwan, Dec. 7-11, 2020.
  40. Y. Wang, S. Wu, J. Jiao, Y. Wang, R. Lu, and Q. Zhang, Age-optimal Transmission Policy for Markov Source with Differential Encoding, Proc. IEEE Globecom'20, Taipei, Taiwan, Dec. 7-11, 2020.
  41. H. Lv, M. Wen, R. Lu, X. Wang, and J. Li, An Adversarial Attack with Fusion of Polarization for Unmanned Scenes, Proc. IEEE VTC'20 Fall, Victoria, Canada, Oct. 4-7, 2020.
  42. W. Jiang, H. Li, L. Gong, H. Yang, and R. Lu, Accelerating Poisoning Attack Through Momentum and Adam Algorithms, Proc. IEEE VTC'20 Fall, Victoria, Canada, Oct. 4-7, 2020.
  43. F. Yang, K. Xu, Q. Li, R. Lu, B. Wu, T. Zhang, Y. Zhao, M. Shen, I Know If the Journey Changes: Flexible Source and Path Validation, IEEE/ACM IWQoS'20, June 15-17, 2020. (Short Paper, Virtual Conference)
  44. Y. Zheng, R. Lu, and M. Mamun, Privacy-Preserving Computation Offloading for Time-Series Activities Classification in eHealthcare, Proc. IEEE ICC'20, Dublin, Ireland, Jun. 7-11, 2020.
  45. H. Mahdikhani, R. Lu, Y. Zheng, and A. Ghorbani, Achieving Efficient and Privacy-Preserving Range Query in Fog-enhanced IoT with Bloom Filter, Proc. IEEE ICC'20, Dublin, Ireland, Jun. 7-11, 2020.
  46. Y. Guan, R. Lu, Y. Zheng, J. Shao, and G. Wei, Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data, Proc. IEEE ICC'20, Dublin, Ireland, Jun. 7-11, 2020.
  47. M. Mamun, R. Lu, M. Gaudet, " Tell Them From Me: an Encrypted Application Profiler ", Proc. of NSS 2019, Sapporo, Japan, December 15-18, 2019,
  48. Y. Li, H. Li, G. Xu, S. Liu, and R. Lu, EPPS: Efficient Privacy-Preserving Scheme in Distributed Deep Learning, Proc. IEEE Globecom'19, Waikoloa, HI, USA, Dec. 9-13, 2019.
  49. L. Chen, B. Cao, R. Lu, and Y. Zhang, Joint Resource Allocation in NOMA Systems with Imperfect SIC, Proc. IEEE Globecom'19, Waikoloa, HI, USA, Dec. 9-13, 2019.
  50. C. Huang, J. Ni, R. Lu, and X. Shen, Exploring Anonymous User Review: Linkability Analysis with Machine Learning, Proc. IEEE Globecom'19, Waikoloa, HI, USA, Dec. 9-13, 2019.
  51. X. Zhang, R. Lu, J. Shao, H. Zhu, and A. Ghorbani, " Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing", Proc. WCSP'19, Xian, China, Oct. 23-25, 2019.
  52. Y. Zheng, R. Lu, J. Shao, Y. Zhang, and H. Zhu, " Efficient and Privacy-Preserving Edit Distance Query over Encrypted Genomic Data", Proc. WCSP'19, Xian, China, Oct. 23-25, 2019.
  53. Y. Xu, B. Cao, R. Lu, and Q. Zhang, "APRNET: Achieving Privacy-Preserving Real-Name Authentication over Blockchain for Online Services ", Proc. WCSP'19, Xian, China, Oct. 23-25, 2019.
  54. S. Chen, M. Wen, R. Lu, J. Li, and S. Chen, Achieve Revocable Access Control for Fog-based Smart Grid System, Proc. IEEE VTC F'19, Honolulu, Hawaii, USA, Sept. 22-25, 2019.
  55. J. Chang and R. Lu, "Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application to Genomic Data", 17th Annual Conference on Privacy, Security and Trust, PST 2019, Fredericton, Canada, August 26-28, 2019.
  56. X. Wang, M. Wen, J. Li, Z. Fu, R. Lu, and K. Chen, Adversarial Attack Against Scene Recognition System for Unmanned Vehicles, ACM TURC 2019, Chengdu, China, May 18-19, 2019.
  57. Y. Zheng, R. Lu, X. Yang, and J. Shao, Achieving Efficient and Privacy-Preserving Top-k Query over Vertically Distributed Data Sources, Proc. IEEE ICC'19, Shanghai, China, May 20-24, 2019.
  58. Q. Lee, H. Zhu, Z. Zhang, R. Lu, F. Wang, H. Li, Spoofing Attacks on Speaker Verification Systems Based Generated Voice Using Genetic Algorithm, Proc. IEEE ICC'19, Shanghai, China, May 20-24, 2019.
  59. C. Huang, J. Ni, R. Lu, and X. Shen, Online Advertising with Verifiable Fairness, Proc. IEEE ICC'19, Shanghai, China, May 20-24, 2019.
  60. G. Xu, H. Li, and R. Lu, POSTER:Practical and Privacy‐Aware Truth Discovery in Mobile Crowd Sensing Systems (Poster), ACM CCS'18, Toronto, Canada, Oct. 14-19, 2018.
  61. B. Li, R. Lu, G. Xiao, Z. Su, A. Ghorbani, PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids, Proc. IEEE Globecom'18, Abu Dhabi, UAE, Dec. 9-13, 2018.
  62. W. Li, K. Zhang, Z. Su, R. Lu, and Y. Wang, Anomalous Path Detection for Spatial Crowdsourcing-based Indoor Navigation System, Proc. IEEE Globecom'18, Abu Dhabi, UAE, Dec. 9-13, 2018.
  63. J. Li, H. Ye, J. Liu, W. Wang, W. Lou, T. Hou, and R. Lu, Efficient and Secure Outsourcing of Differentially Private Data Publication, ESORICS 2018, Barcelona, Spain, September 3 - 7, 2018.
  64. Y. Zheng, and R. Lu, An Efficient and Privacy-Preserving k-NN Query Scheme for eHealthcare Data, Proc. IEEE GreenCom'18, Halifax, Canada, July 30 - Aug 03, 2018.
  65. X. Yang, H. Zhu, R. Lu, X. Liu, and H. Li, Efficient and Privacy-preserving Online Face Recognition over Encrypted Outsourced Data, Proc. IEEE GreenCom'18, Halifax, Canada, July 30 - Aug 03, 2018.
  66. W. Li, W. Meng, Y. Wang, L. F. Kwok, and R. Lu, Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks, Proc. IEEE TrustCom'18, New York, USA, July 31 - August 3, 2018.
  67. N. Yekta, and R. Lu, XRQuery: Achieving Communication-Efficient Privacy-Preserving Query for Fog-Enhanced IoT, Proc. IEEE ICC'18, Kansas City, MO, USA, May 20-24, 2018.
  68. M. Wen, D. Yao, B. Li, and R. Lu, State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid, Proc. IEEE ICC'18, Kansas City, MO, USA, May 20-24, 2018.
  69. C. Huang, D. Liu, J. Ni, R. Lu, and X. Shen, Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT, Proc. IEEE ICC'18, Kansas City, MO, USA, May 20-24, 2018.
  70. H. Mahdikhani, and R. Lu, Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT, Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  71. B. Li, R. Lu, and G. Xiao, HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure, Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  72. S. Zhang, H. Li, Y. Dai, M. He, and R. Lu, EPP-DMM: an Efficient and Privacy-Protected Delegation Scheme for Matrix Multiplication, Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  73. F. Wang, H. Zhu, R. Lu, F. Liu, C. Huang and H. Li, Achieve Efficient and Privacy-preserving Proximity Detection scheme for Social Applications, SECURECOMM 2017, Niagara Falls, Canada, Oct. 22-24, 2017.
  74. R. Lu, "How to Achieve Efficient Range Query over Encrypted Data in Cloud", the 2nd International Workshop on Mobile Communications and Networking (IWMCN) 2017, Waterloo, Canada, 23–24 September 2017.
  75. N. I. Yekta and R. Lu, "PQuery: Achieving Privacy-Preserving Query with Communication Efficiency in Internet of Things", IEEE VTC-Fall 2017, Toronto, Canada, 24–27 September 2017.
  76. Q. Kong, M. Ma, and R. Lu, "Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks", IEEE VTC-Fall 2017, Toronto, Canada, 24–27 September 2017.
  77. S. Chen, R. Lu, and J. Zhang, A Flexible Privacy-preserving Framework for Singular Value Decomposition under Internet of Things Environment, 11th IFIP WG 11.11 International Conference on Trust Management, Göteborg, June 12-16, 2017.
  78. C. Lai, R. Lu, and D. Zheng, Achieving Secure and Seamless IP Communications for Group-oriented Software Defined Vehicular Networks, WASA 2017, Guilin, China, June 19-21, 2017.
  79. Q. Wei, H. Zhu, R. Lu, and H. Li, Achieve Efficient and Privacy-preserving Online Fingerprint Authentication over Encrypted Outsourced Data, Proc. IEEE ICC’17, Paris France, May 21-25, 2017.
  80. C. Huang, R. Lu, H. Zhu, H. Hu, and X. Lin, "PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing", Proc. IEEE Globecom'16, Washington, DC USA, Dec. 4-8, 2016.
  81. Q. Kong, R. Lu, H. Zhu, A. Alamer, and X. Lin, "A Secure and Privacy-preserving Incentive Framework for Vehicular Cloud on the Road", Proc. IEEE Globecom'16, Washington, DC USA, Dec. 4-8, 2016.
  82. M. Zhao, G. Ali, R. Lu, and P. H. J. Chong, "An Energy-Efficient RPL using Self-Regioning for Point-to-Point Communication in LLNs", IEEE VTC-Fall 2016, Montréal, Canada, 18–21 September 2016.
  83. X. Lin and R. Lu, "Proxy Re-Encryption with Delegatable Verifiability", ACISP'16 (The 21st Australasian Conference on Information Security and Privacy), Melbourne, Australia, July 4 - 6, 2016.
  84. C. Huang, R. Lu, H. Zhu, J. Shao, X. Lin, "FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System", ACM AISACCS'16, Xi'an, China, May 30 - June 3, 2016.
  85. C. Huang, R. Lu, H. Zhu, J. Shao, A. Alamer, and X. Lin, "EPPD: Efficient and Privacy-Preserving Proximity Testing with Differential Privacy Techniques", IEEE ICC'16, Kuala Lumpur, Malaysia, May 23-27, 2016.
  86. P. Li, and R. Lu, "A Sybil Attack Detection Scheme for Privacy-Preserving Mobile Social Networks", ICICS'15, Singapore, December 2 - 4, 2015.
  87. G. Wang, R. Lu, and C. Huang, "PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare", ICICS'15, Singapore, December 2 - 4, 2015.
  88. C. Huang, and R. Lu, "EFPA: Efficient and Flexible Privacy-Preserving Mining of Association Rule in Cloud", IEEE/CIC ICCC'15, Shenzhen, China, November 2 - 4, 2015.
  89. J. Shao, R. Lu, X. Lin, and C. Zuo, "New Threshold Anonymous Authentication for VANET", IEEE/CIC ICCC'15, Shenzhen, China, November 2 - 4, 2015.
  90. G. Wang, R. Lu, and C. Huang, "PGuide: An Efficient and Privacy-Preserving Smartphone-Based Pre-Clinical Guidance Scheme", IEEE Globecom'15, San Diego, CA, USA, December 6 - 10, 2015.
  91. H. Hu, R. Lu, and Z. Zhang, "VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications", IEEE Globecom'15, San Diego, CA, USA, December 6 - 10, 2015.
  92. R. Lu, K. Alharbi, X. Lin, and C. Huang, "A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications", IEEE Globecom'15, San Diego, CA, USA, December 6 - 10, 2015.
  93. C. Lai, R. Lu, and D. Zheng, "SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems", Proc. WASA'15, Qufu, Shandong, China, August 10-12, 2015.
  94. H. Bao, and R. Lu, "DDPFT: Secure Data Aggregation Scheme with Differential Privacy and Fault Tolerance", Proc. IEEE ICC'15, London, UK, June 8-12, 2015.
  95. R. Deng, R. Lu, C. Lai, and T. H. Luan, "Towards Power Consumption-Delay Tradeoff by Workload Allocation in Cloud-Fog Computing", Proc. IEEE ICC'15, London, UK, June 8-12, 2015.
  96. J. Shao, X. Lin, and R. Lu, "Fine-Grained Data Sharing in Cloud Computing for Mobile Devices", Proc. IEEE INFOCOM'15, Hong Kong, China, April 26- May 1, 2015. (acceptance rate is 19%)
  97. K, Zhang, X. Liang, R. Lu, K. Yang, and X. Shen, "Exploiting Mobile Social Behaviors for Sybil Detection", Proc. IEEE INFOCOM'15, Hong Kong, China, April 26- May 1, 2015. (acceptance rate is 19%)
  98. P. Zhong and R. Lu, "PAD: Privacy-Preserving Data Dissemination in Mobile Social Networks", Proc. IEEE ICCS'14, Macau, Nov. 19-21, 2014.
  99. R. Lu, X. Lin, J. Shao, and K. Liang, "RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security", ProvSec 2014, Hongkong, China, Oct. 9-10, 2014.
  100. Q. Kong, J. Yu, R. Lu, and Q. Zhang, "Incentive Mechanism Design for Crowdsourcing-Based Cooperative Transmission", Proc. IEEE Globecom'14, Austin, USA, Dec. 8-12, 2014.
  101. R. Kaewpuang, D. Niyato, P. Wang, Z. Han, and R. Lu, "Optimal Decentralized Security Software Deployment in Multihop Wireless Networks", Proc. IEEE Globecom'14, Austin, USA, Dec. 8-12, 2014.
  102. C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, "SEGR: A Secure and Efficient Group Roaming Scheme for Machine to Machine Communications between 3GPP and WiMAX Networks", Proc. IEEE ICC'14, Sydney, Australia, June 10 - 14 2014.
  103. Y. Yang, H. Li, M. Wen, H. Luo, and R. Lu, "Achieving Ranked Range Query in Smart Grid Auction Market", Proc. IEEE ICC'14, Sydney, Australia, June 10 - 14 2014.
  104. R. Lu, X. Lin, Z. Shi, and J. Shao, "PLAM: A Privacy-Preserving Framework for Local-Area Mobile Social Networks", Proc. IEEE INFOCOM'14, Toronto, Canada, April 27- May 2, 2014. (acceptance rate is 19.4%)
  105. J. Shao, R. Lu, and X. Lin, "FINE: A Fine-Grained Privacy-Preserving Location-based Service Framework for Mobile Devices", Proc. IEEE INFOCOM'14, Toronto, Canada, April 27- May 2, 2014. (acceptance rate is 19.4%)
  106. J. Zhu, Z. Shi, R. Lu, and X. Shen, "Particle Filter based Grid Synchronization with Voltage Unbalance and Frequency Variation in Smart Grid", Proc. WCSP'13, Hangzhou, China, Oct. 24 - 26, 2013.
  107. M. Barua, R. Lu and X. Shen, "SPS: Secure Personal Health Information Sharing with Patient-centric Access Control in Cloud Computing", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  108. R. Jiang, R. Lu, C. Lai, J. Luo, and X. Shen, "Robust Group Key Management with Revocation and Collusion Resistance for SCADA in Smart Grid", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  109. M. Wen, R. Lu, J. Lei, X. Liang, H. Li, and X. Shen, "ECQ: An Efficient Conjunctive Query Scheme over Encrypted Multidimensional Data in Smart Grid", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  110. Z. Shi, R. Lu, J. Chen, and X. Shen, "Three-Dimensional Spatial Multiplexing for Directional Millimeter-Wave Communications in Multi-Cubicle Office Environments", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  111. R. Sun, Z. Shi, R. Lu, M. Lu, and X. Shen, "APED: An Efficient Aggregation Protocol with Error Detection for Smart Grid Communications", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  112. C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, "LGTH: A Lightweight Group Authentication Protocol for Machine-Type Communication in LTE Networks", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  113. S. Wang, Q. Kong, Q. Zhang, Z. Zhou, B. Cao, Y. Wang, and R. Lu, "Sum Throughput Maximization in Polarized-MIMO Based Cooperative Cognitive Radio Networks", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  114. K. Zhang, R. Lu, X. Liang, J. Qiao, and X. Shen, "PARK: A Privacy-preserving Aggregation Scheme with Adaptive Key Management for Smart Grid", Proc. IEEE ICCC'13, Xi’an, China, August 12 - 14, 2013.
  115. M. Lu, Z. Shi, R. Lu, R. Sun, and X. Shen, "PPPA: A Practical Privacy-Preserving Aggregation Scheme for Smart Grid Communications", Proc. IEEE ICCC'13, Xi’an, China, August 12 - 14, 2013.
  116. C. Lai, H. Li, R. Lu, X. Shen, and J. Cao, "A Unified End-to-End Security Scheme for Machine-Type Communication in LTE Networks", Proc. IEEE ICCC'13, Xi’an, China, August 12 - 14, 2013.
  117. K. Zhang, X. Liang, R. Lu, and X. Shen, "SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks", Proc. IEEE ICC'13, Budapest, Hungary, June 9 - 13, 2013.
  118. B. Cao, J.W. Mark, Q. Zhang, R. Lu, X. Lin, and X. Shen, "On Optimal Communication Strategies for Cooperative Cognitive Radio Networking", Proc. IEEE INFOCOM'13, Turin, Italy, April 14-19, 2013. (acceptance rate is 17%)
  119. R. Lu, X. Lin, Z. Shi, B. Cao, and X. Shen, "IPAD: An Incentive and Privacy-Aware Data Dissemination Scheme in Opportunistic Networks", Proc. IEEE INFOCOM'13, Turin, Italy, April 14-19, 2013. (mini conference)
  120. Y. Liu, Z. Shi, K. Zhang, Y. Zheng, R. Lu, and X. Shen, "A Novel Low-Power Mixed-Mode Implementation of Weight Update in Particle PHD Filters", Proc. IEEE WCNC13, Shanghai, China, April 7-10, 2013.
  121. Z. Shi, R. Lu, J. Qiao, and X. Shen, "SND: Secure Neighbor Discovery for 60 GHz Network with Directional Antenna", Proc. IEEE WCNC13, Shanghai, China, April 7-10, 2013.
  122. R. Lu, X. Lin, Z. Shi, B. Cao, and X. Shen, "EATH: An Efficient Aggregate Authentication Protocol for Smart Grid Communications", Proc. IEEE WCNC13, Shanghai, China, April 7-10, 2013.
  123. K. Zhang, X. Liang, R. Lu, X. Shen, and H. Zhao, "VSLP: Voronoi-Socialspot-Aided Packet Forwarding Protocol with Receiver Location Privacy in MSNs", Proc. IEEE Globecom'12, Anaheim, California, USA, Dec. 3-7, 2012.
  124. H. Li, X. Liang, R. Lu, X. Lin, and X. Shen, "EDR: An Efficient Demand Response Scheme for Achieving Forward Secrecy in Smart Grid", Proc. IEEE Globecom'12, Anaheim, California, USA, Dec. 3-7, 2012.
  125. R. Sun, Z. Shi, R. Lu, J. Qiao, and X. Shen, "A Lightweight Key Management Scheme for 60 GHz WPAN", Proc. WCSP'12, Huangshan, China, Oct. 25-27, 2012.
  126. R. Wu, X. Deng, R. Lu, and X. Shen, "Trust-based Anomaly Detection in Wireless Sensor Networks"(Invited), Proc. IEEE ICCC'12, Beijing, China, August 15 - 17, 2012.
  127. X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks", Proc. ICDCS'12, Macau, China, June 18-21, 2012. (acceptance rate is 13%)
  128. N. Zhang, N. Lu, R. Lu, J.W. Mark, and X. Shen, "Energy-Efficient and Trust-aware Cooperation in Cognitive Radio Networks", Proc. IEEE ICC'12, Ottawa, Canada, June 10 - 15, 2012.
  129. X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "Enabling Pervasive Healthcare with Privacy Preservation in Smart Community", Proc. IEEE ICC'12, Ottawa, Canada, June 10 - 15, 2012.
  130. R. Lu, X. Lin, T.H. Luan, X. Liang, X. Li, L. Chen, and X. Shen, "PReFilter: An Efficient Privacy-preserving Relay Filtering Scheme for Delay Tolerant Networks", Proc. IEEE INFOCOM'12, Orlando, Florida, USA, March 25-30, 2012. (acceptance rate is 17.97%)
  131. X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, and W. Zhuang, "Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks", Proc. IEEE INFOCOM'12, Orlando, Florida, USA, March 25-30, 2012. (acceptance rate is 17.97%)
  132. X. Li, S. He, J. Chen, X. Liang, R. Lu, and X. Shen, "Coordinate-free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks", Proc. IEEE Globecom'11, Houston, Texas, USA, Dec. 5-9, 2011.
  133. X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "An Efficient and Secure User Revocation Scheme in Mobile Social Networks", Proc. IEEE Globecom'11, Houston, Texas, USA, Dec. 5-9, 2011.
  134. L. Chen, Z. Cao, R. Lu, X. Liang, and X. Shen, "EPF: An Event-aided Packet Forwarding Protocol for Privacy-preserving Mobile Healthcare Social Networks", Proc. IEEE Globecom'11, Houston, Texas, USA, Dec. 5-9, 2011.
  135. M. Barua, R. Lu, and X. Shen, "Health-Post: A Delay-Tolerant Secure Long-Term Health Care Scheme in Rural Area", Proc. IEEE Globecom'11, Houston, Texas, USA, Dec. 5-9, 2011.
  136. X. Li, X. Liang, R. Lu, S. He, J. Chen, and X. Shen, "Toward Reliable Actor Service in Wireless Sensor and Actor Networks", Proc. IEEE MASS'11, Valencia, Spain, October 17-22, 2011. (acceptance rate is 20%)
  137. X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "Fine-grained Identification with Real-time Fairness in Mobile Social Networks", Proc. IEEE ICC'11, Kyoto, Japan, June 5 - 9, 2011.
  138. X. Li, R. Lu, X. Liang, and X. Shen, "Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks", Proc. IEEE ICC'11, Kyoto, Japan, June 5 - 9, 2011.
  139. R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, "Anonymity Analysis on Social Spot based Pseudonym Changing for Location Privacy in VANETs", Proc. IEEE ICC'11, Kyoto, Japan, June 5 - 9, 2011.
  140. X. Lin, R. Lu, X. Liang and X. Shen, "STAP: A Social-Tier-Assisted Packet Forwarding Protocol for Achieving Receiver-Location Privacy Preservation in VANETs", Proc. IEEE INFOCOM'11, Shanghai, China, April 10-15, 2011. (acceptance rate is 15.96%)
  141. M. Barua, X. Liang, R. Lu, and X. Shen, "PEACE: An Efficient and Secure Patient-centric Access Control Scheme for eHealth Care System", Proc. IEEE INFOCOM'11-SCNC, Shanghai, China, April 10-15, 2011.
  142. M. Fouda, Z. Md. Fadlullah, N. Kato, R. Lu, and X. Shen, "Towards a Light-weight Message Authentication Mechanism Tailored for Smart Grid Communications", Proc. IEEE INFOCOM'11-SCNC, Shanghai, China, April 10-15, 2011.
  143. R. Lu, X. Lin, X. Liang, and X. Shen, "Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET", Proc. IEEE Globecom'10, Miami, Florida, USA, Dec. 6-10, 2010.
  144. R. Lu, X. Lin, X. Liang, and X. Shen, "FLIP: An Efficient Privacy-preserving Protocol for Finding Like-minded Vehicles on the Road", Proc. IEEE Globecom'10, Miami, Florida, USA, Dec. 6-10, 2010.
  145. X. Liang, R. Lu, X. Lin, and X. Shen, "Message Authentication with Non-transferability for Location Privacy in Mobile Ad hoc Networks", Proc. IEEE Globecom'10, Miami, Florida, USA, Dec. 6-10, 2010.
  146. R. Lu, X. Lin, X. Liang, and X. Shen, "Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network", Proc. BodyNets 2010, Corfu Island, Greece, Sept. 10-12, 2010.
  147. X. Liang, R. Lu, X. Lin, and X. Shen, "PPC: Privacy-preserving Chatting in Vehicular Peer-to-peer Networks", Proc. IEEE VTC'10 Fall, Ottawa, Ontario, Canada, Sept. 6-9, 2010.
  148. X. Liang, R. Lu, X. Lin, and X. Shen, "Patient Self-controllable Access Policy on PHI in eHealthcare Systems", Proc. Advances in Health Informatics Conference (AHIC 2010), Kitchener, Ontario, Canada, April 28-30, 2010.
  149. Y. Sun, X. Lin, R. Lu, X. Shen, and J. Su, "A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications", Proc. IEEE ICC'10, Cape Town, South Africa, May 23-27, 2010.
  150. R. Lu, X. Lin, H. Zhu, and X. Shen, "TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks", Proc. IEEE ICC'10, Cape Town, South Africa, May 23-27, 2010.
  151. Y. Sun, X. Lin, R. Lu, X. Shen, and J. Su, "Roadside Units Deployment for Efficient Short-time Certificate Updating in VANETs", Proc. IEEE ICC'10, Cape Town, South Africa, May 23-27, 2010.
  152. R. Lu, X. Lin, X. Liang, and X. Shen, "Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing", Proc. 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 13-16, 2010. (acceptance rate is 15%)
  153. R. Lu, X. Lin, and X. Shen, "SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks", Proc. IEEE INFOCOM'10, San Diego, California, USA, March 14 - 19, 2010. (acceptance rate is 17.5%)
  154. H. Zhu, X. Lin, R. Lu, X. Shen, D. Xing and Z. Cao, "An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs", Proc. IEEE INFOCOM'10, San Diego, California, USA, March 14 - 19, 2010. (acceptance rate is 17.5%)

Book & Book Chapters:

  1. B. Li, R. Lu, and G. Xiao, Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems, Wireless Networks, Springer Verlag, 2020. (ISBN: 978-3-030-58671-3) [PDF]
  2. R. Lu, Privacy-Enhancing Aggregation Techniques for Smart Grid Communications, Wireless Networks, Springer Verlag, 2016. (ISBN: 978-3-319-32899-7) [PDF]
  3. R. Lu, X. Lin, C. Huang, and H. Bao, Privacy-Preserving Time Series Data Aggregation for Internet of Things, Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, Editor Fei Hu, March 30, 2016 Forthcoming by CRC Press, (ISBN 9781498723183) [PDF]
  4. L. Li and R. Lu, Anonymous Communication for Big Data, Networking for Big Data, pp. 233 - 256, Editors S. Yu, X. Lin, J. Misic, and X. Shen, CRC Press, 2015. (ISBN 978-1-4822-720696349-7) [PDF]
  5. X. Lin and R. Lu, Vehicular Ad Hoc Network Security and Privacy, June 2015, Wiley-IEEE Press. (ISBN: 978-1-118-91390-1) [PDF]
  6. M. Wen, R. Lu, X. Liang, J. Lei, and X. Shen (authors), Querying over Encrypted Data in Smart Grids, SpringerBriefs in Computer Science, Springer Verlag, 2014. (ISBN: 978-3-319-06354-6, ISBN 978-3-319-06355-3 eBook) [PDF]
  7. X. Liang, R. Lu, X. Lin, and X. Shen (authors), Security and Privacy in Mobile Social Networks, SpringerBriefs in Computer Science, Springer Verlag, 2014. (ISBN: 978-1-4614-8857-6) [PDF]
  8. K. Zhang, X. Liang, R. Lu, and X. Shen, "Exploiting Private Profile Matching for Efficient Packet Forwarding in Mobile Social Networks", Handbook on Opportunistic Mobile Social Networks, to appear. Editors J. Wu and Y. Wang, CRC Press, Taylo & Francis Group, USA, 2013. [PDF]
  9. X. Lin, H. Zhu, M. Shi, R. Lu, P.H. Ho, X. Shen, "Universal Authentication and Billing Architecture for Wireless MANs", Emerging Wireless LANs, Wireless PANs, and Wireless MANs, pp. 555 - 584, Editors Y. Xiao and Y. Pan, John Wiley & Sons, Inc., 2009. (ISBN 978-0-471-72069-0) [PDF]

Technical Report:

  1. J. Shao, Z. Cao, L. Wang, and R. Lu, "Efficient Password-based Authenticated Key Exchange without Public Information", IACR Cryptology ePrint Archive 2007: 326, 2007. [PDF]
  2. R. Lu, Z. Cao, R. Su, and J. Shao, "Pairing-Based Two-Party Authenticated Key Agreement Protocol", IACR Cryptology ePrint Archive 2005: 354, 2005. [PDF]
  3. R. Lu and Z. Cao, "ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks", IACR Cryptology ePrint Archive 2005: 355, 2005. [PDF]