Skip to the content of the web site.
an exploration to the future of secure and privacy systems ...

Publications

The documents are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each copyright.
    [J][C][B][T]

Journal Papers:

[2018 and beyond] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010]
  1. H. Yang, Q. Zhou, M. Yao, R. Lu, H. Li, and X. Zhang, "A Practical and Compatible Cryptographic Solution to ADS-B Security", IEEE Internet of Things Journal, to appear.
  2. Y. Rahulamathavan, S. Kunaraj, I. Ghosh, R. Lu, M. Rajarajan, "Privacy-preserving iVector based Speaker Verification", IEEE Transactions on Audio, Speech and Language Processing, to appear.
  3. X. Yang, R. Lu, J. Shao, X. Tang, and A. Ghorbani, "Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud", IEEE Transactions on Services Computing, to appear.
  4. X. Yang, R. Lu, J. Shao, X. Tang, and H. Yang, "An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare", IEEE Internet of Things Journal, to appear.
  5. G. Wang, R. Lu, and Y.L. Guan, "Enabling Efficient and Privacy-Preserving Health Query over Outsourced Cloud", IEEE Access. to appear.
  6. R. Lu, "A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT", IEEE Internet of Things Journal, to appear.
  7. C. Huang, R. Lu, X. Lin, and X. Shen, "Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles", IEEE Transactions on Vehicular Technology, to appear.
  8. H. Zhu, Q. Wei, X. Yang, R. Lu, H. Li, "Efficient and Privacy-preserving Online Fingerprint Authentication Scheme Over Outsourced Data", IEEE Transactions on Cloud Computing, to appear.
  9. F. Wang, H. Zhu, X. Liu, R. Lu, F. Li, H. Li, S. Zhang, "Efficient and Privacy-preserving Dynamic Spatial Query Scheme for Ride-hailing Services", IEEE Transactions on Vehicular Technology, to appear.
  10. S. Zhang, H. Li , Y. Dai , J. Li , M. He, and R. Lu, "Verifiable Outsourcing Computation for Matrix Multiplication with Improved Efficiency and Applicability", IEEE Internet of Things Journal, to appear.
  11. J. Hua, H. Zhu, F. Wang, X. Liu, R. Lu, H. Li, and Y. Zhang, "CINEMA: Efficient and Privacy-Preserving Online Medical Primary Diagnosis with Skyline Query", IEEE Internet of Things Journal, to appear.
  12. K. Thiyagarajan, R. Lu, K. El-Sankary, and H. Zhu, "Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things", IEEE Transactions on Circuits and Systems for Video Technology, to appear.
  13. X. Yang, R. Lu, K. Choo, F. Yin, and X. Tang, "Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud", IEEE Transactions on Big Data, to appear.
  14. Q. Kong, R. Lu, M. Ma, and H. Bao, "A privacy-preserving sensory data sharing scheme in Internet of Vehicles", Future Generation Computer Systems, to appear.
  15. C. Yan, Z. Ni, B. Cao, R. Lu, S. Wu, and Q. Zhang, "UMBRELLA: User Demand Privacy Preserving Framework Based on Association Rules and Differential Privacy in Social Networks", SCIENCE CHINA - Information Sciences, Vol. 62, No. 3, 2019, DOI:10.1007/s11432-018-9483-x.
  16. X. Yan, C. Lin, R. Lu, and C. Tang, "Design of Secret Reconstruction with Optimal Communication Efficiency", IEEE Communications Letters, Vol. 22, No. 8, pp. 1556 - 1559, 2018.
  17. D. Chen, N. Zhang, R. Lu, X. Fang, K. Zhang, Z. Qin, and X. Shen, "An LDPC Code based Physical layer Authentication Scheme with Prefect Security", IEEE J. Selected Areas of Communications, Vol. 36, No. 4, pp. 748 - 761, 2018.
  18. H. Zhu, F. Wang, R. Lu, F. Liu, G. Fu, and H. Li, "Efficient and Privacy-preserving Proximity Detection Schemes for Social Applications", IEEE Internet of Things Journal, Vol. 5, No. 4, pp. 2947 - 2957, 2018.
  19. B. Li, R. Lu, K. Choo, W. Wang, and S. Luo, "On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach", ACM Transactions on Cyber-Physical Systems, Vol. 3, No. 1, pp. 10:1-10:25, 2018.
  20. Z. Su, Q. Xu, J. Luo, H. Pu, Y. Peng, and R. Lu, "A Secure Content Caching Scheme for Disaster Backup in Fog Computing Enabled Mobile Social Networks", IEEE Transactions on Industrial Informatics, Vol. 14, No. 10, pp. 4579-4589, 2018.
  21. W. Guo, J. Shao, R. Lu, Y. Liu, and A. Ghorbani, A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment, IEEE Access, Vol. 6, pp. 48946-48957, 2018.
  22. H. Zhu, X. Liu, R. Lu and H. Li, "Efficient Privacy-Preserving Online Medical Primary Diagnosis Scheme on Naive Bayesian Classification", Peer-to-Peer Networking and Applications, Vol. 11, No. 2, pp. 334-347, 2018.
  23. S. Ge, P. Zeng, R. Lu and K.K. Choo, "FGDA: Fine-grained data analysis in privacy-preserving smart grid communications", Peer-to-Peer Networking and Applications, Vol. 11, No. 5, pp. 966-978, 2018.
  24. Q. Kong, R. Lu, H. Zhu, and M. Ma, "Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination", IEEE Access, Vol. 6, pp. 25040-25050, 2018.
  25. W. Meng, W. Li, C. Su, J. Zhou, and R. Lu , "Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data", IEEE Access, Vol. 6, pp. 7234-7243, 2018.
  26. C. Zhang, L. Zhu, C. Xu, and R. Lu, "PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system", Future Generation Computer Systems, Vol. 79, pp. 16-25, 2018.
  27. X. Liu, R. Choo, R. Deng, R. Lu, and J. Weng, "Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers", IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 1, pp. 27-39, 2018. [PDF]
  28. R. Jiang, R. Lu, and R. Choo, "Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data", Future Generation Computer Systems, Vol. 78, No. 1, pp.392-401, 2018. [PDF]
  29. M.H. Au, K. Liang, J.K. Liu, R. Lu, J. Ning, "Privacy-preserving personal data operation on mobile cloud - chances and challenges over advanced persistent threat", Future Generation Computer Systems, Vol. 79, No. 1, pp. 337-349, 2018.
  30. C. Huang, R. Lu, K.K Choo, "Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges", IEEE Communications Magazine, Vol.55, No. 11, pp. 105-111, 2017.
  31. C. Xu, R. Lu, H. Wang, L. Zhu, and C. Huang, "TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning", IEEE Access, Vol.5, pp. 26973 - 26989, 2017.
  32. C. Huang, R. Lu, and H. Zhu. "Privacy-Friendly Spatial Crowdsourcing in Vehicular Networks", Journal of Communications and Information Networks, Vol. 2, No. 2, pp. 59-74, 2017.
  33. O. Osanaiye, S. Chen, Z. Yan, R. Lu, R. Choo, and M. Dlodlo, "From Cloud to Fog computing: A Review and A Conceptual Live VM Migration Framework", IEEE Access, Vol 5, pp. 8284-8300, 2017.
  34. C. Huang, R. Lu, and R. Choo, "Secure and Flexible Cloud-Assisted Association Rule Mining over Horizontally Partitioned Databases", Journal of Computer and System Sciences, Vol. 89, pp. 51-63, 2017.
  35. H. Hu, R. Lu, C. Huang, and Z. Zhang, "PTRS: A Privacy-Preserving Trust-based Relay Selection Scheme in VANETs", Peer-to-Peer Networking and Applications, Vol. 10, No. 5, pp 1204–1218, 2017. [PDF]
  36. H. Zhu, X. Liu, R. Lu and H. Li, "Efficient and Privacy-Preserving Online Medical Pre-Diagnosis Framework Using Nonlinear SVM", IEEE Journal of Biomedical and Health Informatics, Vol. 21, No. 3, pp. 838-850, 2017. [PDF]
  37. C. Xu, R. Lu, H. Wang, L. Zhu, and C. Huang, "PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing System", Sensors, Vol. 17, No. 3, pp. 500, 2017.
  38. B. Li, R. Lu, W. Wang, and R. Choo, "Distributed Host-based Collaborative Detection for False Data Injection Attacks in Smart Grid Cyber-Physical System", Journal of Parallel and Distributed Computing, Vol. 103, pp. 32-41, 2017.
  39. C. Cheng, R. Lu, P. Albrecht, and T. Tsuyoshi, "Securing Internet of Things in a Quantum World", IEEE Communications Magazine, Vol. 55, No.2, pp. 116-120, 2017.
  40. M. Zhao, A. Kumar, P. Chong, and R. Lu, "A Reliable and Energy-efficient Opportunistic Routing Protocol for Dense Lossy Networks", IEEE Wireless Communications Letters, Vol. 6, No. 1, pp. 26-29, 2017.
  41. H. Hu, R. Lu, Z. Zhang, and J. Shao, "REPLACE: A Reliable Trust-based Platoon Service Recommendation Scheme in VANET", IEEE Transactions on Vehicular Technology, Vol. 66, No. 2, pp.1786-1797, 2017. [PDF]
  42. R. Deng, G. Xiao, R. Lu, H. Liang, and A. Vasilakos, "False Data Injection on State Estimation in Power Systems --- Attacks, Impacts, and Defense: A Survey", IEEE Transactions on Industrial Informatics, Vol. 13, No. 2, pp. 411-423, 2017.
  43. H. Hu, R. Lu, and Z. Zhang, " TPSQ: Trust-based Platoon Service Query via Vehicular Communications " , Peer-to-Peer Networking and Applications (PPNA) (Springer), Vol. 10, No. 1, pp. 262-277, 2017. [PDF]
  44. R. Deng, G. Xiao, and R. Lu, "Defending Against False Data Injection Attacks on Power System State Estimation", IEEE Transactions on Industrial Informatics, Vol. 13, No. 1, pp. 198-207, 2017. [PDF]
  45. H. Bao and R. Lu, "A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance", Peer-to-Peer Networking and Applications, Vol. 10, No. 1, pp. 106-121, 2017. [PDF]
  46. Q. Kong, R. Lu, S. Chen, and H. Zhu, "Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks", IEEE Internet of Things Journal, Vol. 4, No. 1, pp. 29-39, 2017.
  47. R. Lu, K. Heung, A. Lashkari, and A. Ghorbani, "A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT", IEEE Access, Vol. 5, pp. 3302-3312, 2017.
  48. C. J. Orazio, R. Lu, K. Choo, and A. Vasilakos, "A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps", Applied Mathematics and Computation, Vol.293, pp.523-544, 2017. [PDF]
  49. R. Deng, R. Lu, C. Lai, T. H. Luan, and H. Liang, "Optimal Workload Allocation in Fog-Cloud Computing Towards Balanced Delay and Power Consumption", IEEE Internet of Things Journal, Vol. 3, No. 6, pp. 1171 - 1181, 2016. [PDF]
  50. X. Liu, R. Deng, W. Ding, R. Lu, B. Qin, "Privacy-Preserving Outsourced Calculation on Floating Point Numbers", IEEE Transactions on Information Forensics and Security, Vol.11, No.11, pp.2513-2527, 2016. [PDF]
  51. H. Hu, R. Lu, C. Huang, and Z. Zhang, "TripSense: A Trust-based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs", Sensors, Vol.16, 2016. [PDF]
  52. B. Li, R. Lu, W. Wang, and R. Choo, "DDOA: A Dirichlet-based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-physical System", IEEE Transactions on Information Forensics & Security, Vol.11, No.11, pp.2415-2425, 2016. [PDF]
  53. L. Li, R. Lu, R. Choo, A. Datta and J. Shao, "Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases", IEEE Transactions on Information Forensics & Security, Vol.11, No.8, pp.1847-1861, 2016. [PDF]
  54. C. Lai, R. Lu, and D. Zheng, "SPGS: A Secure and Privacy-Preserving Group Setup Framework for Platoon-Based Vehicular Cyber-Physical Systems", Security and Communication Networks, Vol.9, pp.3857-3867, 2016. [PDF]
  55. X. Liu, B. Qin, R. Deng, R. Lu, and J. Ma, "A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains", IEEE Transactions on Computers, Vol.65, No.12, pp.3567-3579, 2016. [PDF]
  56. H. Zhu, R. Lu, C. Huang, L. Chen, and H. Li, "An Efficient Privacy-Preserving Location Based Services Query Scheme in Outsourced Cloud", IEEE Transactions on Vehicular Technology, Vol.65, No.9, pp.7729-7739, 2016. [PDF]
  57. X. Yang, R. Lu, H. Liang, and X. Tang, "SPFM: A Secure and Fine-grained Privacy-Preserving Matching Protocol for Mobile Social Networking", Big Data Research, Vol.3, pp.2-9, 2016. [PDF]
  58. J. Shao, R. Lu, X. Lin, and K. Liang, "Secure Bidirectional Proxy Re-Encryption for Cryptographic Cloud Storage", Pervasive and Mobile Computing, Vol.28, pp.113-121, 2016. [PDF]
  59. C. Lai, R. Lu, H. Li, D. Zheng and X. Shen, "Secure Machine-Type Communications in LTE Networks", Wireless Communications and Mobile Computing, Vol.16, pp. 1495-1509, 2016. [PDF]
  60. X. Liu, R. Lu, J. Ma, L. Chen, and H. Bao, "Efficient and Privacy-Preserving Skyline Computation Framework across Domains", Future Generation Computer Systems, Vol.62, pp.161-174, 2016. [PDF]
  61. H. Zhu, X. Liu, R. Lu, and H. Li, "EPCS: An Efficient and Privacy-Preserving Classification Service Query Framework for SVM", Security and Communication Networks, Vol.9, pp.1309-1320, 2016. [PDF]
  62. Y. Rahulamathavan, S. Veluru, J. Han, R. Lu, F. Li, and M. Rajarajan, "User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption", IEEE Transactions on Computers, Vol. 65, No. 9, pp.2939 - 2946, 2016. [PDF]
  63. N. Saxena, B. Choi, and R. Lu, "Authentication and Authorization Scheme for Various User-Roles and Devices in Smart Grid", IEEE Transactions on Information Forensics & Security, Vol. 11, No. 5, pp.907 - 921, 2016. [PDF]
  64. H. Zhu, C. Huang, R. Lu, and H. Li, "Modelling Information Dissemination under Privacy Concerns in Social Media", Physica A, Vol. 449, pp.53 - 65, 2016. [PDF]
  65. H. Bao and R. Lu, "Comment on "Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid"", IEEE Transactions on Industrial Informatics, Vol. 12, No. 1, pp.2 - 5, 2016. [PDF]
  66. L. Li, R. Lu, C. Huang, "EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data", IEEE Internet of Things Journal, Vol. 3, No. 2, pp.206 - 218, 2016. [PDF]
  67. H. Bao, R. Lu, B. Li, and R. Deng, "BLITHE: Behavior Rule Based Insider Threat Detection for Smart Grid", IEEE Internet of Things Journal, Vol. 3, No. 2, pp.190 - 205, 2016. [PDF]
  68. X. Liu, R. Lu, J. Ma, L. Chen, and B. Qin, "Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification", IEEE Journal of Biomedical and Health Informatics, Vol. 20, No. 2, pp.655 - 668, 2016. [PDF]
  69. C. Lai, R. Lu, H. Li, D. Zheng, and X. Shen, "GLARM: Group-based Lightweight Authentication Scheme for Resource-constrained Machine to Machine Communications", Computer Networks, Vol. 99, pp.66 - 81, 2016.
  70. J. Shao, X. Lin, R. Lu, and C. Zou, "A Threshold Anonymous Authentication Protocol for VANETs", IEEE Trans. on Vehicular Technology, Vol. 65, No. 3, pp.1711 - 1720, 2016. [PDF]
  71. K. Zhang, X. Liang, R. Lu, and X. Shen, "PIF: A Personalized Fine-grained Spam Filtering Scheme with Privacy Preservation in Mobile Social Networks", IEEE Transactions on Computational Social Systems, Vol. 2, No. 3, pp.41 - 52, 2015. [PDF]
  72. J. Liu, M. Au, X. Huang, R. Lu, and J. Li, "Fine-grained Two-factor Access Control for Web-based Cloud Computing Services", IEEE Transactions on Information Forensics & Security, Vol. 12, No. 3, pp.484 - 497, 2015. [PDF]
  73. C. Lai, R. Lu, D. Zheng, H. Li, and X. Shen, "Towards Secure Large-scale Machine-to-Machine Communications in 3GPP Networks: Challenges and Solutions", IEEE Communications Magazine, Vol. 53, No. 12, pp.12 - 19, 2015. [PDF]
  74. Z. Shi, R. Sun, R. Lu, L Chen, J. Chen, and X. Shen, "Diverse Grouping based Aggregation Protocol with Error Detection for Smart Grid Communications", IEEE Trans. on Smart Grid, Vol. 6, No. 6, pp.2856 - 2868, 2015. [PDF]
  75. R. Deng, G. Xiao, R. Lu, and J. Chen, "Fast Distributed Demand Response with Spatially- and Temporally-Coupled Constraints in Smart Grid", IEEE Transactions on Industrial Informatics, Vol. 11, No. 6, pp.1597-1606, 2015. [PDF]
  76. C. Li, R. Lu, H. Li, L. Chen, and J. Chen, "PDA: A Privacy-Preserving Dual-Functional Aggregation Scheme for Smart Grid Communications", Security and Communication Networks, Vol. 8, No. 15, pp.2494-2506, 2015. [PDF]
  77. X. Zhang, R. Lu, H. Zhang, and C. Xu, "A New Digital Signature Scheme from Layered Cellular Automata", International Journal of Network Security, Vol. 18, No. 3, pp.544-552, 2015. [PDF]
  78. L. Chen, R. Lu, and Z. Cao, " PDAFT: A Privacy-preserving Data Aggregation Scheme with Fault Tolerance for Smart Grid Communications " , Peer-to-Peer Networking and Applications (PPNA) (Springer), Vol. 8, No. 6, pp.1122-1132, 2015. [PDF]
  79. K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil Attacks and Their Defenses in the Internet of Things", IEEE Internet of Things Journal, Vol. 1, No. 5, pp.372-383, 2015. [PDF]
  80. L. Chen, R. Lu, Z. Cao, K. AlHarbi, and X. Lin, " MuDA: Multifunctional Data Aggregation in Privacy-preserving Smart Grid Communications " , Peer-to-Peer Networking and Applications (PPNA) (Springer), Vol. 8, No. 5, pp.777-792, 2015. [PDF]
  81. K. Liang, J. K. Liu, R. Lu, and D. S. Wong, "Privacy Concerns for Photo-Sharing in Online Social Networks", IEEE Internet Computing, Vol. 19, No. 2, pp.58-63, 2015. [PDF]
  82. H. Bao, and R. Lu, A New Differentially Private Data Aggregation with Fault Tolerance for Smart Grid Communications, IEEE Internet of Things Journal, Vol. 2, No. 3, pp.248-258, 2015.
  83. G. Wei, J. Shao, Y. Xiang, P. Zhu, and R. Lu, " Obtain Confidentiality or/and Authenticity in Big Data by ID-based Generalized Signcryption ", Information Sciences, Vol. 318, pp.111-122, 2015. [PDF]
  84. J.K. Liu, M.H. Au, W. Susilo, K. Liang, R. Lu, and B. Srinivasan, "Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud", IEEE Network Magazine, Vol. 29, No. 2, pp.46-50, 2015. [PDF]
  85. R. Jiang, R. Lu, J. Luo, C. Lai, and X. Shen, "Efficient Self-healing Group Key Management with Dynamic Revocation and Collusion Resistance for SCADA in Smart Grid ", Security and Communication Networks, Vol. 8, No. 6, pp.1026-1039, 2015. [PDF]
  86. H. Zhu, X. Lin, Y. Zhang, and R. Lu, "Duth: A user-friendly dual-factor authentication for android smartphone devices", Security and Communication Networks, Vol.8, No. 7, pp.1213-1222, 2015. [PDF]
  87. L. Chen, R. Lu, K. AlHarbi, X. Lin, and Z. Cao, " ReDD: Recommendation-based Data Dissemination in Privacy-preserving Mobile Social Networks ", Security and Communication Networks, Vol.8, No. 7, pp.1291-1305, 2015. [PDF]
  88. M. Wang, H. Shan, R. Lu, R. Zhang, and X. Shen, " Real-Time Path Planning Based on Hybird-VANET-Enhanced Transportation System", IEEE Trans. on Vehicular Technology, Vol. 64, No. 5, pp.1664-1678, 2015. [PDF]
  89. T. Luan, R. Lu, X. Shen, and F. Bai, "Social on the Road: Enabling Secure and Efficient Social Networking on Highway", IEEE Wireless Communications, Vol. 22, No. 1, pp.44-51, 2015. [PDF]
  90. Z. Shi, S. Bi, H. Zhang, R. Lu, and X. Shen, " Improved auxiliary particle filter-based synchronization of chaotic Colpitts circuit and its application to secure communication ", Wireless Communications and Mobile Computing (Wiley), Vol. 15, No. 10, pp.1456-1470, 2015. [PDF]
  91. C. Li, L. Chen, R. Lu, H. Li, "Comment on “An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding”", IEEE Transactions on Computers, Vol. 64, No. 3, pp. 882 - 883, 2015. [PDF]
  92. T. Yang, C. Lai, R. Lu, and R. Jiang, " EAPSG: Efficient Authentication Protocol for Secure Group Communications in Maritime Wideband Communication Networks " , Peer-to-Peer Networking and Applications (PPNA) (Springer), Vol. 8, No. 2, pp. 216-228, 2015. [PDF]
  93. C. Li, R. Lu, H. Li, L. Chen, and X. Li, "Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding"", IEEE Communications Letters, Vol. 18, No. 12, pp. 2129-2132, 2014. [PDF]
  94. X. Zhang, R. Lu, H. Zhang, and C. Xu, "A New Public Key Encryption Scheme based on Layered Cellular Automata", KSII Transactions on Internet and Information Systems, Vol. 8, No. 10, pp. 3572-3590, Oct. 2014. [PDF]
  95. H. Li, Y. Yang, M. Wen, H. Luo, and R. Lu, "EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market", KSII Transactions on Internet and Information Systems, Vol. 8, No. 11, pp. 3937-3954, Nov. 2014. [PDF]
  96. R. Lu, H. Zhu, X. Liu, J. Liu, and J. Shao, "Towards Efficient and Privacy-Preserving Computing in Big Data Era ", IEEE Network Magazine, Vol. 28, No. 4, pp.46-50, 2014. [PDF]
  97. J. He, P. Cheng, J. Chen, L. Shi, and R. Lu, "Time Synchronization for Random Mobile Sensor Networks ", IEEE Trans. on Vehicular Technology, Vol. 63, No. 8, pp. 3935-3946, 2014. [PDF]
  98. B. Cao, Q. Zhang, R. Lu, and J. W. Mark, "PEACE: Polarization Enabled Active Cooperation Scheme Between Primary and Secondary Networks", IEEE Trans. on Vehicular Technology, Vol. 63, No. 8, pp. 3677-3688, 2014. [PDF]
  99. G. Wei, R. Lu, J. Shao, " EFADS: Efficient, Flexible and Anonymous Data Sharing Protocol for Cloud Computing with Proxy Re-Encryption " , Journal of Computer and System Sciences (Elsevier), Vol. 80, No. 8, pp. 1549–1562, Dec. 2014. [PDF]
  100. C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen, " CPAL: A Conditional Privacy-Preserving Authentication with Access Linkability for Roaming Service ", IEEE Internet of Things Journal, Vol. 1, No. 1, pp. 46 - 57, Feb. 2014. [PDF]
  101. H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, "EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid", IEEE Trans. on Parallel and Distributed Systems, Vol. 25, No. 8, pp. 2053 - 2064, Aug. 2014. [PDF]
  102. M. Barua, X. Liang, R. Lu, and X. Shen, "RCare: Extending Secure Health Care to Rural Area Using VANETs", ACM Mobile Networks and Applications (MONET), Vol. 19, No. 3, pp. 318-330, June 2014. [PDF]
  103. K. Zhang, X. Liang, M. Bauray, R. Lu, and X. Shen, "PHDA: A Priority Based Health Data Aggregation with Privacy Preservation for Cloud Assisted WBANs", Information Sciences (Elsevier), Vol. 284, pp. 130-141, Nov. 2014. [PDF]
  104. H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, "An Efficient Merkle Tree Based Authentication Scheme for Smart Grid", IEEE Systems Journal, Vol. 8, No. 2, pp. 655-663, 2014. [PDF]
  105. K. Zhang, X. Liang, X. Shen, R. Lu, "Exploiting multimedia services in mobile social networks from security and privacy perspectives", IEEE Communications Magazine, Vol. 52, No. 3, pp. 58-65, 2014. [PDF]
  106. S. Chen, and R. Lu, " A Regular Expression Matching Engine with Hybrid Memories " , Computer Standards & Interfaces (Elsevier), Vol. 36, No. 5, pp. 880-888, 2014. [PDF]
  107. R. Jiang, R. Lu, Y. Wang, J. Luo, C. Shen, and X. Shen, “Energy-Theft Detection Issues for Advanced Metering Infrastructure in Smart Grid”, TSINGHUA SCIENCE AND TECHNOLOGY, Vol.19, No. 2, pp. 105-120, 2014. [PDF]
  108. S. Chen, R. Lu, and X. Shen, "SRC: A Multi-core NPU-based TCP Stream Reassembly Card for Deep Packet Inspection", Security and Communication Networks, Vol. 7, NO. 2, pp .265-278, 2014. [PDF]
  109. M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, "SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing", Security and Communication Networks, Vol. 7, No. 1, pp. 234–244, 2014. [PDF]
  110. Z. Shi, R. Sun, R. Lu, J. Qiao, J. Chen, and X. Shen, "A Wormhole Attack Resistant Neighbor Discovery Scheme with RDMA Protocol for 60 GHz Directional Network", IEEE Trans. on Emerging Topics in Computing, Vol. 1, No. 2, pp. 341-352, Dec. 2013. [PDF]
  111. C. Lai, H. Li, R. Lu, X. Shen, " SE-AKA: A Secure and Efficient Group Authentication and Key Agreement Protocol for LTE Networks " , Computer Networks (Elsevier), Vol. 67, No. 17, pp. 3492-3510, 2013. [PDF]
  112. M. Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, "PaRQ: A Privacy-preserving Range Query Scheme over Encrypted Metering Data for Smart Grid", IEEE Trans. on Emerging Topics in Computing, Vol. 1, No. 1, pp. 178-191, 2013. [PDF]
  113. R. Lu, X. Lin, Z. Shi, and X. Shen, " A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic Monitoring Systems ", IEEE Intellgient Systems, Vol. 28, No. 3, pp. 62-65, 2013. [PDF]
  114. X. Liang, K. Zhang, R. Lu, X. Lin, and X. Shen, "EPS: An Efficient and Privacy-Preserving Service Searching Scheme for Smart Community", IEEE Sensors Journal, Vol. 13, No. 10, pp. 3702-3710, 2013. [PDF]
  115. X. Liang, X. Li, K. Zhang, R. Lu, X. Lin, and X. Shen, "Fully Anonymous Profile Matching in Mobile Social Networks", IEEE J. Selected Areas of Communications, Vol. 31, No. 9, pp. 641-655, 2013. [PDF]
  116. Y. Zheng, Z. Shi, R. Lu, S. Hong, and X. Shen, "An Efficient Data-Driven Particle PHD Filter for Multi-Target Tracking", IEEE Trans. on Industrial Informatics, Vol. 9, No. 4, pp. 2318-2326, 2013. [PDF]
  117. R. Lu, X. Lin, and X. Shen, "SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency", IEEE Trans. on Parallel and Distributed Systems, Vol. 24, No. 3, pp. 614-624, 2013. [PDF]
  118. X. Liang, X. Li, R. Lu, X. Lin and X. Shen, "UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid", IEEE Trans. on Smart Grid, Vol. 4, No. 1, pp. 141-150, 2013. [PDF]
  119. X. Liang, X. Li, M. Barua, L. Chen, R. Lu, X. Shen, and H. Luo, "Enable Pervasive Healthcare through Continuous Remote Health Monitoring", IEEE Wireless Communications, Vol. 19, No. 6, pp. 10-18, 2012.
  120. R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications", IEEE Trans. on Parallel and Distributed Systems, Vol. 23, No. 9, pp. 1621-1631, 2012.
  121. X. Liang, M. Barua, R. Lu, X. Lin, and X. Shen, "HealthShare: Achieving Secure and Privacy-preserving Health Information Sharing through Health Social Networks", Computer Communications (Elsevier)- special issue on Smart and Interactive Ubiquitous Multimedia Services, Vol. 35, Issue 15, pp. 1910-1920, 2012.
  122. X. Li, X. Liang, R. Lu, X. Lin, H. Zhu, and X. Shen, "Securing Smart Grid: Cyber Attacks, Countermeasures and Challenges", IEEE Communications Magazine, Vol. 50, No. 8, pp. 38-45, 2012.
  123. X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, X. Shen, "Morality-driven Data Forwarding with Privacy Preservation in Mobile Social Networks", IEEE Trans. on Vehicular Technology, Vol. 61, Issue 7, pp. 3209-3221, 2012.
  124. Z. M. Fadlullah, N. Kato, R. Lu, X. Shen, and Y. Nozaki, "Towards Secure Targeted Broadcast in Smart Grid", IEEE Communications Magazine, Vol. 50, No. 5, pp. 150-156, 2012.
  125. R. Lu, X. Lin, X. Liang, and X. Shen, "A Dynamic Privacy-Preserving Key Management Scheme for Location Based Services in VANETs", IEEE Trans. on Intelligent Transportation Systems, Vol. 13, No. 1, pp. 127-139, 2012.
  126. R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, "Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs", IEEE Trans. on Vehicular Technology, Vol. 61, Issue 1, pp. 86-96, 2012.
  127. R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks", IEEE Trans. on Parallel and Distributed Systems, Vol. 23, No. 1, pp. 32-43, 2012.
  128. M. Fouda, Z. Md. Fadlullah, N. Kato, R. Lu and X. Shen, "A Light-weight Message Authentication Scheme for Smart Grid Communications", IEEE Trans. on Smart Grid, Vol. 2, No. 4, pp. 675-685, 2011.
  129. X. Li, R. Lu, X. Liang, X. Shen, J. Chen, and X. Lin, "Smart Community: an Internet of Things Application", IEEE Communications Magazine, Vol. 49, No. 11, pp. 68-75, 2011.
  130. R. Lu, X. Lin, X. Liang, and X. Shen, "A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network", ACM Mobile Networks and Applications (MONET), Vol. 16, Issue 6, pp. 683-694, 2011.
  131. X. Liang, M. Barua, R. Lu, and X. Shen, "Privacy-preserving Wireless Data Transmission for e-Healthcare Applications", IEEE COMSOC MMTC E-Letter - Special Issue on 3D DATA EVALUATION, RETRIEVAL AND PRIVACY, Vol. 6, No. 11, pp. 39-41, 2011.
  132. M. Barua, X. Liang, R. Lu, and X. Shen, "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in Cloud Computing", Int. J. of Security and Networks (IJSN). Vol. 6, Nos. 2/3, pp. 67-76, 2011.
  133. X. Liang, L. Chen, R. Lu, X. Lin, and X. Shen, "PEC: A Privacy-preserving Emergency Call Scheme for Mobile Healthcare Social Networks", IEEE/KICS J. Commu. and Networks (JCN), Vol. 13, No. 2, pp. 102-112, 2011.
  134. R. Lu, X. Lin, X. Liang, and X. Shen, "An Efficient and Provably Secure Public Key Encryption Scheme Based on Coding Theory", Security and Communication Networks (Wiley), Vol. 4, No. 12, pp. 1440-1447, 2011.
  135. R. Lu, X. Li, X. Liang, X. Lin, and X. Shen, "GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications", IEEE Communications Magazine - Feature Topic on Recent Progress in Machine to Machine Communications, Vol. 49, Issue 4, pp. 28-35, 2011.
  136. A. Wasef, R. Lu, X. Lin, and X. Shen, "Complementing Public Key Infrastructure to Secure Vehicular Ad Hoc Networks", IEEE Wireless Communications, Vol. 17, No. 5, pp. 22-28, 2010.
  137. X. Lin, R. Lu, D. Kwana, and X. Shen, "REACT: An RFID-based Privacy-preserving Children Tracking Scheme for Large Amusement Parks", Computer Networks (Elsevier), Vol. 54, Issue 15, pp. 2744-2755, 2010.
  138. R. Lu, X. Lin, H. Zhu, and X. Shen, and B. R. Preiss, "Pi: A Practical Incentive Protocol for Delay Tolerant Networks", IEEE Trans. on Wireless Communications, Vol. 9, No. 4, pp. 1483-1493, 2010.
  139. Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications", IEEE Trans. on Vehicular Technology, Vol. 59, Issue 7, pp. 3589-3603, 2010.
  140. R. Lu, X. Lin, H. Zhu, and X. Shen, "An Intelligent Secure and Privacy-Preserving Parking Scheme through Vehicular Communications", IEEE Trans. on Vehicular Technology, Vol. 59, No. 6, pp. 2772-2785, 2010.
  141. X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks", Wireless Communications and Mobile Computing (Wiley), Vol. 10, No. 6, pp. 843-856, 2010.

Conference Papers:

[2018 and beyond] [2017] [2016] [2015] [2014] [2013][2012] [2011] [2010]

  1. G. Xu, H. Li, and R. Lu, POSTER:Practical and Privacy‐Aware Truth Discovery in Mobile Crowd Sensing Systems (Poster), ACM CCS'18, Toronto, Canada, Oct. 14-19, 2018.
  2. B. Li, R. Lu, G. Xiao, Z. Su, A. Ghorbani, PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids, Proc. IEEE Globecom'18, Abu Dhabi, UAE, Dec. 9-13, 2018.
  3. W. Li, K. Zhang, Z. Su, R. Lu, and Y. Wang, Anomalous Path Detection for Spatial Crowdsourcing-based Indoor Navigation System, Proc. IEEE Globecom'18, Abu Dhabi, UAE, Dec. 9-13, 2018.
  4. J. Li, H. Ye, J. Liu, W. Wang, W. Lou, T. Hou, and R. Lu, Efficient and Secure Outsourcing of Differentially Private Data Publication, ESORICS 2018, Barcelona, Spain, September 3 - 7, 2018.
  5. Y. Zheng, and R. Lu, An Efficient and Privacy-Preserving k-NN Query Scheme for eHealthcare Data, Proc. IEEE GreenCom'18, Halifax, Canada, July 30 - Aug 03, 2018.
  6. X. Yang, H. Zhu, R. Lu, X. Liu, and H. Li, Efficient and Privacy-preserving Online Face Recognition over Encrypted Outsourced Data, Proc. IEEE GreenCom'18, Halifax, Canada, July 30 - Aug 03, 2018.
  7. W. Li, W. Meng, Y. Wang, L. F. Kwok, and R. Lu, Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks, Proc. IEEE TrustCom'18, New York, USA, July 31 - August 3, 2018.
  8. N. Yekta, and R. Lu, XRQuery: Achieving Communication-Efficient Privacy-Preserving Query for Fog-Enhanced IoT, Proc. IEEE ICC'18, Kansas City, MO, USA, May 20-24, 2018.
  9. M. Wen, D. Yao, B. Li, and R. Lu, State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid, Proc. IEEE ICC'18, Kansas City, MO, USA, May 20-24, 2018.
  10. C. Huang, D. Liu, J. Ni, R. Lu, and X. Shen, Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT, Proc. IEEE ICC'18, Kansas City, MO, USA, May 20-24, 2018.
  11. H. Mahdikhani, and R. Lu, Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT, Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  12. B. Li, R. Lu, and G. Xiao, HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure, Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  13. S. Zhang, H. Li, Y. Dai, M. He, and R. Lu, EPP-DMM: an Efficient and Privacy-Protected Delegation Scheme for Matrix Multiplication, Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  14. F. Wang, H. Zhu, R. Lu, F. Liu, C. Huang and H. Li, Achieve Efficient and Privacy-preserving Proximity Detection scheme for Social Applications, SECURECOMM 2017, Niagara Falls, Canada, Oct. 22-24, 2017.
  15. R. Lu, "How to Achieve Efficient Range Query over Encrypted Data in Cloud", the 2nd International Workshop on Mobile Communications and Networking (IWMCN) 2017, Waterloo, Canada, 23–24 September 2017.
  16. N. I. Yekta and R. Lu, "PQuery: Achieving Privacy-Preserving Query with Communication Efficiency in Internet of Things", IEEE VTC-Fall 2017, Toronto, Canada, 24–27 September 2017.
  17. Q. Kong, M. Ma, and R. Lu, "Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks", IEEE VTC-Fall 2017, Toronto, Canada, 24–27 September 2017.
  18. S. Chen, R. Lu, and J. Zhang, A Flexible Privacy-preserving Framework for Singular Value Decomposition under Internet of Things Environment, 11th IFIP WG 11.11 International Conference on Trust Management, Göteborg, June 12-16, 2017.
  19. C. Lai, R. Lu, and D. Zheng, Achieving Secure and Seamless IP Communications for Group-oriented Software Defined Vehicular Networks, WASA 2017, Guilin, China, June 19-21, 2017.
  20. Q. Wei, H. Zhu, R. Lu, and H. Li, Achieve Efficient and Privacy-preserving Online Fingerprint Authentication over Encrypted Outsourced Data, Proc. IEEE ICC’17, Paris France, May 21-25, 2017.
  21. C. Huang, R. Lu, H. Zhu, H. Hu, and X. Lin, "PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing", Proc. IEEE Globecom'16, Washington, DC USA, Dec. 4-8, 2016.
  22. Q. Kong, R. Lu, H. Zhu, A. Alamer, and X. Lin, "A Secure and Privacy-preserving Incentive Framework for Vehicular Cloud on the Road", Proc. IEEE Globecom'16, Washington, DC USA, Dec. 4-8, 2016.
  23. M. Zhao, G. Ali, R. Lu, and P. H. J. Chong, "An Energy-Efficient RPL using Self-Regioning for Point-to-Point Communication in LLNs", IEEE VTC-Fall 2016, Montréal, Canada, 18–21 September 2016.
  24. X. Lin and R. Lu, "Proxy Re-Encryption with Delegatable Verifiability", ACISP'16 (The 21st Australasian Conference on Information Security and Privacy), Melbourne, Australia, July 4 - 6, 2016.
  25. C. Huang, R. Lu, H. Zhu, J. Shao, X. Lin, "FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System", ACM AISACCS'16, Xi'an, China, May 30 - June 3, 2016.
  26. C. Huang, R. Lu, H. Zhu, J. Shao, A. Alamer, and X. Lin, "EPPD: Efficient and Privacy-Preserving Proximity Testing with Differential Privacy Techniques", IEEE ICC'16, Kuala Lumpur, Malaysia, May 23-27, 2016.
  27. P. Li, and R. Lu, "A Sybil Attack Detection Scheme for Privacy-Preserving Mobile Social Networks", ICICS'15, Singapore, December 2 - 4, 2015.
  28. G. Wang, R. Lu, and C. Huang, "PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare", ICICS'15, Singapore, December 2 - 4, 2015.
  29. C. Huang, and R. Lu, "EFPA: Efficient and Flexible Privacy-Preserving Mining of Association Rule in Cloud", IEEE/CIC ICCC'15, Shenzhen, China, November 2 - 4, 2015.
  30. J. Shao, R. Lu, X. Lin, and C. Zuo, "New Threshold Anonymous Authentication for VANET", IEEE/CIC ICCC'15, Shenzhen, China, November 2 - 4, 2015.
  31. G. Wang, R. Lu, and C. Huang, "PGuide: An Efficient and Privacy-Preserving Smartphone-Based Pre-Clinical Guidance Scheme", IEEE Globecom'15, San Diego, CA, USA, December 6 - 10, 2015.
  32. H. Hu, R. Lu, and Z. Zhang, "VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications", IEEE Globecom'15, San Diego, CA, USA, December 6 - 10, 2015.
  33. R. Lu, K. Alharbi, X. Lin, and C. Huang, "A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications", IEEE Globecom'15, San Diego, CA, USA, December 6 - 10, 2015.
  34. C. Lai, R. Lu, and D. Zheng, "SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems", Proc. WASA'15, Qufu, Shandong, China, August 10-12, 2015.
  35. H. Bao, and R. Lu, "DDPFT: Secure Data Aggregation Scheme with Differential Privacy and Fault Tolerance", Proc. IEEE ICC'15, London, UK, June 8-12, 2015.
  36. R. Deng, R. Lu, C. Lai, and T. H. Luan, "Towards Power Consumption-Delay Tradeoff by Workload Allocation in Cloud-Fog Computing", Proc. IEEE ICC'15, London, UK, June 8-12, 2015.
  37. J. Shao, X. Lin, and R. Lu, "Fine-Grained Data Sharing in Cloud Computing for Mobile Devices", Proc. IEEE INFOCOM'15, Hong Kong, China, April 26- May 1, 2015. (acceptance rate is 19%)
  38. K, Zhang, X. Liang, R. Lu, K. Yang, and X. Shen, "Exploiting Mobile Social Behaviors for Sybil Detection", Proc. IEEE INFOCOM'15, Hong Kong, China, April 26- May 1, 2015. (acceptance rate is 19%)
  39. P. Zhong and R. Lu, "PAD: Privacy-Preserving Data Dissemination in Mobile Social Networks", Proc. IEEE ICCS'14, Macau, Nov. 19-21, 2014.
  40. R. Lu, X. Lin, J. Shao, and K. Liang, "RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security", ProvSec 2014, Hongkong, China, Oct. 9-10, 2014.
  41. Q. Kong, J. Yu, R. Lu, and Q. Zhang, "Incentive Mechanism Design for Crowdsourcing-Based Cooperative Transmission", Proc. IEEE Globecom'14, Austin, USA, Dec. 8-12, 2014.
  42. R. Kaewpuang, D. Niyato, P. Wang, Z. Han, and R. Lu, "Optimal Decentralized Security Software Deployment in Multihop Wireless Networks", Proc. IEEE Globecom'14, Austin, USA, Dec. 8-12, 2014.
  43. C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, "SEGR: A Secure and Efficient Group Roaming Scheme for Machine to Machine Communications between 3GPP and WiMAX Networks", Proc. IEEE ICC'14, Sydney, Australia, June 10 - 14 2014.
  44. Y. Yang, H. Li, M. Wen, H. Luo, and R. Lu, "Achieving Ranked Range Query in Smart Grid Auction Market", Proc. IEEE ICC'14, Sydney, Australia, June 10 - 14 2014.
  45. R. Lu, X. Lin, Z. Shi, and J. Shao, "PLAM: A Privacy-Preserving Framework for Local-Area Mobile Social Networks", Proc. IEEE INFOCOM'14, Toronto, Canada, April 27- May 2, 2014. (acceptance rate is 19.4%)
  46. J. Shao, R. Lu, and X. Lin, "FINE: A Fine-Grained Privacy-Preserving Location-based Service Framework for Mobile Devices", Proc. IEEE INFOCOM'14, Toronto, Canada, April 27- May 2, 2014. (acceptance rate is 19.4%)
  47. J. Zhu, Z. Shi, R. Lu, and X. Shen, "Particle Filter based Grid Synchronization with Voltage Unbalance and Frequency Variation in Smart Grid", Proc. WCSP'13, Hangzhou, China, Oct. 24 - 26, 2013.
  48. M. Barua, R. Lu and X. Shen, "SPS: Secure Personal Health Information Sharing with Patient-centric Access Control in Cloud Computing", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  49. R. Jiang, R. Lu, C. Lai, J. Luo, and X. Shen, "Robust Group Key Management with Revocation and Collusion Resistance for SCADA in Smart Grid", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  50. M. Wen, R. Lu, J. Lei, X. Liang, H. Li, and X. Shen, "ECQ: An Efficient Conjunctive Query Scheme over Encrypted Multidimensional Data in Smart Grid", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  51. Z. Shi, R. Lu, J. Chen, and X. Shen, "Three-Dimensional Spatial Multiplexing for Directional Millimeter-Wave Communications in Multi-Cubicle Office Environments", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  52. R. Sun, Z. Shi, R. Lu, M. Lu, and X. Shen, "APED: An Efficient Aggregation Protocol with Error Detection for Smart Grid Communications", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  53. C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, "LGTH: A Lightweight Group Authentication Protocol for Machine-Type Communication in LTE Networks", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  54. S. Wang, Q. Kong, Q. Zhang, Z. Zhou, B. Cao, Y. Wang, and R. Lu, "Sum Throughput Maximization in Polarized-MIMO Based Cooperative Cognitive Radio Networks", Proc. IEEE Globecom'13, Atlanta, USA, Dec. 9-13, 2013.
  55. K. Zhang, R. Lu, X. Liang, J. Qiao, and X. Shen, "PARK: A Privacy-preserving Aggregation Scheme with Adaptive Key Management for Smart Grid", Proc. IEEE ICCC'13, Xi’an, China, August 12 - 14, 2013.
  56. M. Lu, Z. Shi, R. Lu, R. Sun, and X. Shen, "PPPA: A Practical Privacy-Preserving Aggregation Scheme for Smart Grid Communications", Proc. IEEE ICCC'13, Xi’an, China, August 12 - 14, 2013.
  57. C. Lai, H. Li, R. Lu, X. Shen, and J. Cao, "A Unified End-to-End Security Scheme for Machine-Type Communication in LTE Networks", Proc. IEEE ICCC'13, Xi’an, China, August 12 - 14, 2013.
  58. K. Zhang, X. Liang, R. Lu, and X. Shen, "SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks", Proc. IEEE ICC'13, Budapest, Hungary, June 9 - 13, 2013.
  59. B. Cao, J.W. Mark, Q. Zhang, R. Lu, X. Lin, and X. Shen, "On Optimal Communication Strategies for Cooperative Cognitive Radio Networking", Proc. IEEE INFOCOM'13, Turin, Italy, April 14-19, 2013. (acceptance rate is 17%)
  60. R. Lu, X. Lin, Z. Shi, B. Cao, and X. Shen, "IPAD: An Incentive and Privacy-Aware Data Dissemination Scheme in Opportunistic Networks", Proc. IEEE INFOCOM'13, Turin, Italy, April 14-19, 2013. (mini conference)
  61. Y. Liu, Z. Shi, K. Zhang, Y. Zheng, R. Lu, and X. Shen, "A Novel Low-Power Mixed-Mode Implementation of Weight Update in Particle PHD Filters", Proc. IEEE WCNC13, Shanghai, China, April 7-10, 2013.
  62. Z. Shi, R. Lu, J. Qiao, and X. Shen, "SND: Secure Neighbor Discovery for 60 GHz Network with Directional Antenna", Proc. IEEE WCNC13, Shanghai, China, April 7-10, 2013.
  63. R. Lu, X. Lin, Z. Shi, B. Cao, and X. Shen, "EATH: An Efficient Aggregate Authentication Protocol for Smart Grid Communications", Proc. IEEE WCNC13, Shanghai, China, April 7-10, 2013.
  64. K. Zhang, X. Liang, R. Lu, X. Shen, and H. Zhao, "VSLP: Voronoi-Socialspot-Aided Packet Forwarding Protocol with Receiver Location Privacy in MSNs", Proc. IEEE Globecom'12, Anaheim, California, USA, Dec. 3-7, 2012.
  65. H. Li, X. Liang, R. Lu, X. Lin, and X. Shen, "EDR: An Efficient Demand Response Scheme for Achieving Forward Secrecy in Smart Grid", Proc. IEEE Globecom'12, Anaheim, California, USA, Dec. 3-7, 2012.
  66. R. Sun, Z. Shi, R. Lu, J. Qiao, and X. Shen, "A Lightweight Key Management Scheme for 60 GHz WPAN", Proc. WCSP'12, Huangshan, China, Oct. 25-27, 2012.
  67. R. Wu, X. Deng, R. Lu, and X. Shen, "Trust-based Anomaly Detection in Wireless Sensor Networks"(Invited), Proc. IEEE ICCC'12, Beijing, China, August 15 - 17, 2012.
  68. X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks", Proc. ICDCS'12, Macau, China, June 18-21, 2012. (acceptance rate is 13%)
  69. N. Zhang, N. Lu, R. Lu, J.W. Mark, and X. Shen, "Energy-Efficient and Trust-aware Cooperation in Cognitive Radio Networks", Proc. IEEE ICC'12, Ottawa, Canada, June 10 - 15, 2012.
  70. X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "Enabling Pervasive Healthcare with Privacy Preservation in Smart Community", Proc. IEEE ICC'12, Ottawa, Canada, June 10 - 15, 2012.
  71. R. Lu, X. Lin, T.H. Luan, X. Liang, X. Li, L. Chen, and X. Shen, "PReFilter: An Efficient Privacy-preserving Relay Filtering Scheme for Delay Tolerant Networks", Proc. IEEE INFOCOM'12, Orlando, Florida, USA, March 25-30, 2012. (acceptance rate is 17.97%)
  72. X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, and W. Zhuang, "Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks", Proc. IEEE INFOCOM'12, Orlando, Florida, USA, March 25-30, 2012. (acceptance rate is 17.97%)
  73. X. Li, S. He, J. Chen, X. Liang, R. Lu, and X. Shen, "Coordinate-free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks", Proc. IEEE Globecom'11, Houston, Texas, USA, Dec. 5-9, 2011.
  74. X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "An Efficient and Secure User Revocation Scheme in Mobile Social Networks", Proc. IEEE Globecom'11, Houston, Texas, USA, Dec. 5-9, 2011.
  75. L. Chen, Z. Cao, R. Lu, X. Liang, and X. Shen, "EPF: An Event-aided Packet Forwarding Protocol for Privacy-preserving Mobile Healthcare Social Networks", Proc. IEEE Globecom'11, Houston, Texas, USA, Dec. 5-9, 2011.
  76. M. Barua, R. Lu, and X. Shen, "Health-Post: A Delay-Tolerant Secure Long-Term Health Care Scheme in Rural Area", Proc. IEEE Globecom'11, Houston, Texas, USA, Dec. 5-9, 2011.
  77. X. Li, X. Liang, R. Lu, S. He, J. Chen, and X. Shen, "Toward Reliable Actor Service in Wireless Sensor and Actor Networks", Proc. IEEE MASS'11, Valencia, Spain, October 17-22, 2011. (acceptance rate is 20%)
  78. X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "Fine-grained Identification with Real-time Fairness in Mobile Social Networks", Proc. IEEE ICC'11, Kyoto, Japan, June 5 - 9, 2011.
  79. X. Li, R. Lu, X. Liang, and X. Shen, "Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks", Proc. IEEE ICC'11, Kyoto, Japan, June 5 - 9, 2011.
  80. R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, "Anonymity Analysis on Social Spot based Pseudonym Changing for Location Privacy in VANETs", Proc. IEEE ICC'11, Kyoto, Japan, June 5 - 9, 2011.
  81. X. Lin, R. Lu, X. Liang and X. Shen, "STAP: A Social-Tier-Assisted Packet Forwarding Protocol for Achieving Receiver-Location Privacy Preservation in VANETs", Proc. IEEE INFOCOM'11, Shanghai, China, April 10-15, 2011. (acceptance rate is 15.96%)
  82. M. Barua, X. Liang, R. Lu, and X. Shen, "PEACE: An Efficient and Secure Patient-centric Access Control Scheme for eHealth Care System", Proc. IEEE INFOCOM'11-SCNC, Shanghai, China, April 10-15, 2011.
  83. M. Fouda, Z. Md. Fadlullah, N. Kato, R. Lu, and X. Shen, "Towards a Light-weight Message Authentication Mechanism Tailored for Smart Grid Communications", Proc. IEEE INFOCOM'11-SCNC, Shanghai, China, April 10-15, 2011.
  84. R. Lu, X. Lin, X. Liang, and X. Shen, "Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET", Proc. IEEE Globecom'10, Miami, Florida, USA, Dec. 6-10, 2010.
  85. R. Lu, X. Lin, X. Liang, and X. Shen, "FLIP: An Efficient Privacy-preserving Protocol for Finding Like-minded Vehicles on the Road", Proc. IEEE Globecom'10, Miami, Florida, USA, Dec. 6-10, 2010.
  86. X. Liang, R. Lu, X. Lin, and X. Shen, "Message Authentication with Non-transferability for Location Privacy in Mobile Ad hoc Networks", Proc. IEEE Globecom'10, Miami, Florida, USA, Dec. 6-10, 2010.
  87. R. Lu, X. Lin, X. Liang, and X. Shen, "Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network", Proc. BodyNets 2010, Corfu Island, Greece, Sept. 10-12, 2010.
  88. X. Liang, R. Lu, X. Lin, and X. Shen, "PPC: Privacy-preserving Chatting in Vehicular Peer-to-peer Networks", Proc. IEEE VTC'10 Fall, Ottawa, Ontario, Canada, Sept. 6-9, 2010.
  89. X. Liang, R. Lu, X. Lin, and X. Shen, "Patient Self-controllable Access Policy on PHI in eHealthcare Systems", Proc. Advances in Health Informatics Conference (AHIC 2010), Kitchener, Ontario, Canada, April 28-30, 2010.
  90. Y. Sun, X. Lin, R. Lu, X. Shen, and J. Su, "A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications", Proc. IEEE ICC'10, Cape Town, South Africa, May 23-27, 2010.
  91. R. Lu, X. Lin, H. Zhu, and X. Shen, "TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks", Proc. IEEE ICC'10, Cape Town, South Africa, May 23-27, 2010.
  92. Y. Sun, X. Lin, R. Lu, X. Shen, and J. Su, "Roadside Units Deployment for Efficient Short-time Certificate Updating in VANETs", Proc. IEEE ICC'10, Cape Town, South Africa, May 23-27, 2010.
  93. R. Lu, X. Lin, X. Liang, and X. Shen, "Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing", Proc. 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 13-16, 2010. (acceptance rate is 15%)
  94. R. Lu, X. Lin, and X. Shen, "SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks", Proc. IEEE INFOCOM'10, San Diego, California, USA, March 14 - 19, 2010. (acceptance rate is 17.5%)
  95. H. Zhu, X. Lin, R. Lu, X. Shen, D. Xing and Z. Cao, "An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs", Proc. IEEE INFOCOM'10, San Diego, California, USA, March 14 - 19, 2010. (acceptance rate is 17.5%)

Book & Book Chapters:

  1. R. Lu, Privacy-Enhancing Aggregation Techniques for Smart Grid Communications, Wireless Networks, Springer Verlag, 2016. (ISBN: 978-3-319-32899-7) [PDF]
  2. R. Lu, X. Lin, C. Huang, and H. Bao, Privacy-Preserving Time Series Data Aggregation for Internet of Things, Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, Editor Fei Hu, March 30, 2016 Forthcoming by CRC Press, (ISBN 9781498723183) [PDF]
  3. L. Li and R. Lu, Anonymous Communication for Big Data, Networking for Big Data, pp. 233 - 256, Editors S. Yu, X. Lin, J. Misic, and X. Shen, CRC Press, 2015. (ISBN 978-1-4822-720696349-7) [PDF]
  4. X. Lin and R. Lu, Vehicular Ad Hoc Network Security and Privacy, June 2015, Wiley-IEEE Press. (ISBN: 978-1-118-91390-1) [PDF]
  5. M. Wen, R. Lu, X. Liang, J. Lei, and X. Shen (authors), Querying over Encrypted Data in Smart Grids, SpringerBriefs in Computer Science, Springer Verlag, 2014. (ISBN: 978-3-319-06354-6, ISBN 978-3-319-06355-3 eBook) [PDF]
  6. X. Liang, R. Lu, X. Lin, and X. Shen (authors), Security and Privacy in Mobile Social Networks, SpringerBriefs in Computer Science, Springer Verlag, 2014. (ISBN: 978-1-4614-8857-6) [PDF]
  7. K. Zhang, X. Liang, R. Lu, and X. Shen, "Exploiting Private Profile Matching for Efficient Packet Forwarding in Mobile Social Networks", Handbook on Opportunistic Mobile Social Networks, to appear. Editors J. Wu and Y. Wang, CRC Press, Taylo & Francis Group, USA, 2013. [PDF]
  8. X. Lin, H. Zhu, M. Shi, R. Lu, P.H. Ho, X. Shen, "Universal Authentication and Billing Architecture for Wireless MANs", Emerging Wireless LANs, Wireless PANs, and Wireless MANs, pp. 555 - 584, Editors Y. Xiao and Y. Pan, John Wiley & Sons, Inc., 2009. (ISBN 978-0-471-72069-0) [PDF]

Technical Report:

  1. J. Shao, Z. Cao, L. Wang, and R. Lu, "Efficient Password-based Authenticated Key Exchange without Public Information", IACR Cryptology ePrint Archive 2007: 326, 2007. [PDF]
  2. R. Lu, Z. Cao, R. Su, and J. Shao, "Pairing-Based Two-Party Authenticated Key Agreement Protocol", IACR Cryptology ePrint Archive 2005: 354, 2005. [PDF]
  3. R. Lu and Z. Cao, "ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks", IACR Cryptology ePrint Archive 2005: 355, 2005. [PDF]