Selected Publications


Prof. Thomas Hou's Google Scholar Profile

Prof. Wenjing Lou's Google Scholar Profile


2024

Refereed conference papers:

  • H. Yu, C. Du, Y. Xiao, A. Keromytis, C. Wang, R. Gazda, Y. T. Hou, W. Lou, "AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials", NDSS , Feb. 26-March 1, 2024, San Diego, CA, USA.(PDF)(BibTex)

2023

Refereed journal papers:

  • N. Jai, Y. Shi, S. Li, C. Li, Y. T. Hou, W. Lou, J. H. Reed, M. Olfat, S. Kompella, L. DaSilva, "Modeling and Optimization of Channel Allocation for PAL and GAA Users in the CBRS Band", IEEE Transactions on Cognitive Communications and Networking.(PDF)(BibTex)
  • Y. Chen, Y. T. Hou, W. Lou, J. H. Reed, S. Kompella, "M3: Real-Time Multi-Cell MIMO Scheduling in 5G O-RAN", IEEE Journal of Selected Areas in Communications.(PDF)(BibTex)
  • M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou, "CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level", IEEE Internet of Things Journal.(PDF)(BibTex)
  • Q. Liu, C. Li, Y. T. Hou, W. Lou, J.H. Reed, M. Olfat, "Aion: A Bandwidth Conserving Scheduler with Data Freshness Guarantee", IEEE Transactions on Mobile Computing.(PDF)(BibTex)
  • Y. Chen, Y. Wu, Y. T. Hou, W. Lou, "mCore+: A Real-Time Design Achieving ∼500 µs Scheduling for 5G MU-MIMO Systems", IEEE Transactions on Mobile Computing.(PDF)(BibTex)
  • Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y. T. Hou, J.H. Reed, "BD-SAS: Enabling Dynamic Spectrum Sharing in Low-trust Environment", IEEE Transactions on Cognitive Communications and Networking, vol. 9, issue 4, pp. 842-856, August 2023.(PDF)(BibTex)
  • Z. Liu, B. Li, Z. Zheng, Y. T. Hou, B. Ji, "Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update Systems", IEEE Internet of Things Journal, vol. 10, issue 16, pp. 13988-14002, August, 2023.(PDF)(BibTex)
  • Y. Chen, Y. Huang, C. Li, Y. T. Hou, W. Lou, "Turbo-HB: A Sub-millisecond Hybrid Beamforming Design for 5G mmWave Systems", IEEE Transactions on Mobile Computing, vol. 22, issue 7, pp. 4332-4346, July 2023.(PDF)(BibTex)
  • P. K. Sangdeh, C. Li, H. Pirayesh, S. Zhang, H. Zeng, Y. T. Hou, "CF4FL: A Communication Framework for Federated Learning in Transportation Systems", IEEE Transactions on Wireless Communications, vol. 22, issue 6, pp. 3821- 3836, June 2023.(PDF)(BibTex)
  • Y. Chen, S. Li, C. Li, H. Zeng, B. Jalaian, Y. T. Hou, W. Lou, "On DoF Conservation in MIMO Interference Cancellation based on Signal Strength in the Eigenspace", IEEE Transactions on Mobile Computing, vol. 22, issue 5, pp. 2862-2877, May 2023.(PDF)(BibTex)
  • S. Li, Y. Huang, C. Li, Y. T. Hou, W. Lou, B. A. Jalaian, S. Russell, "Achieving Real-Time Spectrum Sharing in 5G UnderlayCoexistence with Channel Uncertainty", IEEE Transactions on Mobile Computing, vol. 22, issue 4, pp. 1922-1937, April 2023.(PDF)(BibTex)
  • Q. Liu, C. Li, Y. T. Hou, W. Lou, J.H. Reed, M. Olfat, "Wireless Scheduling to Optimize Age of Information based on Earliest Update Time", IEEE Internet of Things Journal, vol. 10, issue 7, pp. 6352-6366, April 2023.(PDF)(BibTex)
  • N. Wang, Y. Chen, Y. Xiao, Yang Hu, W. Lou, Y. T. Hou, "MANDA: On Adversarial Example Detection for Network Intrusion Detection System", IEEE Transactions on Dependable and Secure Computing, vol. 20, issue 2, pp. 1139-1153, March-April 2023.(PDF)(BibTex)
  • S. Li, C. Li, Y. Huang, B. Jalaian, Y. T. Hou, W. Lou, "Enhancing Resilience in Mobile Edge Computing under Processing Uncertainty", IEEE Journal on Selected Areas in Communications, vol. 41, issue 3, pp. 659-674, March 2023.(PDF)(BibTex)

Refereed conference papers:

  • C. Zhang, N. Wang, S. Shi, C. Du, W. Lou, Y. T. Hou, "MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection", IEEE MILCOM , October 30 - November 3, 2023, Boston, MA, USA.(PDF)(BibTex)
  • Q. Liu, C. Li, Y. T. Hou, W. Lou, S. Kompella, "Age of Critical Information: Optimizing Data Freshness Based on Content Criticality", IEEE MILCOM , October 30 - November 3, 2023, Boston, MA, USA.(PDF)(BibTex)
  • S. Li, S. Shi, Y. Xiao, C. Zhang, Y. T. Hou, W. Lou, "Bijack: Breaking Bitcoin Network with TCP Vulnerabilities", ESORICS , September 25 - 29, 2023, Hague, Netherlands.(PDF)(BibTex)
  • C. Du, H. Yu, Y. Xiao, Y. T. Hou, Angelos D. Keromytis, W. Lou "UCBlocker: Unwanted Call Blocking Using Anonymous Authentication", USENIX Security , August 9-11, 2023, Anaheim, CA, USA.(PDF)(BibTex)
  • J. Wang, Y. Wang, A. Li, Y. Xiao, R. Zhang, W. Lou, Y. T. Hou, N. Zhang, "ARI: Attestation of Real-time Mission Execution Integrity", USENIX Security , August 9-11, 2023, Anaheim, CA, USA.(PDF)(BibTex)
  • S. Acharya, S. Li, Nan Jiang, Y. Wu, Y. T. Hou, W. Lou, W. Xie, "Mitra: An O-RAN based Real-Time Solution for Coexistence between General and Priority Users in CBRS", MASS , September 25-27, 2023, Toronto, Canada.(PDF)(BibTex)
  • S. Shi, Y. Xiao, C. Du, M. H. Shahriar, A. Li, N. Zhang, Y. T. Hou, W. Lou, "MS-PTP: Protecting Network Timing from Byzantine Attacks", ACM WiSec , May 29-June 1, 2023, Guildford, UK.(PDF)(BibTex)
  • Y. Xiao, N. Zhang, W. Lou, Y.T.Hou",A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem", IEEE INFOCOM, May 17-20, 2023, New York Area, USA.(PDF)(BibTex)
  • C. Li, S. Li, Q. Liu, Y. T. Hou, W. Lou, S. Kompella, "Eywa: A General Approach for Scheduler Design in AoI Optimization", IEEE INFOCOM, May 17-20, 2023, New York Area, USA.(PDF)(BibTex)
  • Y. Wu, Y. T. Hou, Alexander Li, W. Lou, "Real-time Interference Mitigation for Automotive Radar", RadarConf, May 1-5, 2023, San Antonio, TX, USA.(PDF)(BibTex)
  • M. H. Shahriar, W. Lou, Y. T. Hou, "CANtropy: Time Series Feature Extraction-Based Intrusion Detection Systems for Controller Area Networks", VehicleSec 2023, Feb 27, 2023, San Diego, CA, USA. (Zoox Best Paper Award Runner-Up)(PDF)(BibTex)

2022

Refereed magazine papers:

  • Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y.T. Hou, J.H. Reed, "Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution," IEEE Wireless Communications, vol. 29, issue 1, pp. 220-228, Feb 2022. (PDF)(BibTex)

Refereed journal papers:

  • Y. Chen, Y. Huang, C. Li, Y. T. Hou, W. Lou, "Turbo-HB: A Sub-millisecond Hybrid Beamforming Design for 5G mmWave Systems," IEEE Transactions on Mobile Computing, accepted, 2022.(PDF)(BibTex)
  • J. Li, H. Ye, T. Li, W. Wang, W. Lou, Y. T. Hou, J. Liu, R. Lu, "Efficient and secure outsourcing of differentially private data publishing with multiple evaluators", IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 1, pp. 67-76, 1 Jan.-Feb. 2022.(PDF)(BibTex)
  • Y. Huang, Y.T. Hou, W. Lou, "DELUXE: A DL-Based Link Adaptation for URLLC/eMBB Multiplexing in 5G NR", IEEE Journal on Selected Areas in Communications, vol. 40, no. 1, pp. 143-162, Jan. 2022.(PDF)(BibTex)
  • X. Ma, Q. Jiang, X. Liu, Q. Pei, J. Ma, W. Lou, "Learning in Your "Pocket": Secure Collaborative Deep Learning with Membership Privacy", IEEE Transactions on Dependable and Secure Computing, accepted, 2022.(PDF)(BibTex)
  • Y. Chen, Y. Wu, Y. T. Hou. W. Lou, "mCore+: A Real-Time Design Achieving ~500 us Scheduling for 5G MU-MIMO Systems", IEEE Transactions on Mobile Computing, accepted, 2022.(PDF)(BibTex)
  • Q. Liu, C. Li, Y. T. Hou, W. Lou, J. H. Reed. S. Kompella, "Aion: A Bandwidth Conserving Scheduler With Data Freshness Guarantee", IEEE Transactions on Mobile Computing, accepted, 2022.(PDF)(BibTex)
  • D.A. Ravi, V.K. Shah, C. Li, Y.T. Hou and J.H. Reed, "RAN Slicing in Multi-MVNO Environment under Dynamic Channel Conditions," IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4748-4757, 15 March, 2022.(PDF)(BibTex)
  • Y. Huang, S. Li, Y.T. Hou, W. Lou, "GPF+: A Novel Ultrafast GPU-Based Proportional Fair Scheduler for 5G NR," IEEE/ACM Transactions on Networking, vol. 30, no. 2, pp. 601-615, April 2022.(PDF)(BibTex)
  • C. Li, Q. Liu, S. Li, Y. Chen, Y.T. Hou, W. Lou, S. Kompella, "Scheduling With Age of Information Guarantee," IEEE/ACM Transactions on Networking, vol. 30, no. 5, pp. 2046-2059, Oct. 2022.(PDF)(BibTex)
  • X. Yuan, M. Sun, W. Lou, "A Dynamic Deep-Learning-Based Virtual Edge Node Placement Scheme for Edge Cloud Systems in Mobile Environment", IEEE Transactions on Cloud Computing, vol. 10, no. 2, pp. 1317-1328, 1 April-June 2022.(PDF)(BibTex)
  • C. Gao, J. Li, S. Xia, K. R. Choo, W. Lou, C. Dong, "MAS-Encryption and its Applications in Privacy-Preserving Classifiers", IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 5, pp. 2306-2323, 1 May 2022.(PDF)(BibTex)
  • S. Li, Y.T. Hou, W. Lou, B.A. Jalaian, S. Russell, "Maximizing Energy Efficiency with Channel Uncertainty under Mutual Interference," IEEE Transactions on Wireless Communications, vol. 21, no. 10, pp. 8476-8488, Oct. 2022.(PDF)(BibTex)

Refereed conference papers:

  • Y. Wu, C. Li, Y. T. Hou, W. Lou, "Real-time DoA Estimation for Automotive Radar," EuRAD 2022, April 2022, London, United Kingdom.(PDF)(BibTex)
  • Q. Liu, C. Li, Y. T. Hou, W. Lou, J.H. Reed, S. Kompella, " Ao2I: Minimizing Age of Outdated Information to Improve Freshness in Data Collection," IEEE INFOCOM 2022, May 2022, Virtual Conference.(PDF)(PDF)(BibTex)
  • S. Li, N. Jiang, Y. Chen, Y. T. Hou, W. Lou, W. Xie, "D2BF-Data-Driven Beamforming in MU-MIMO with Channel Estimation Uncertainty", IEEE INFOCOM 2022, May 2022, Virtual Conference.(PDF)(BibTex)
  • Y. Chen, Y. T. Hou, W. Lou, J. H. Reed, S. Kompella, "M3: A Sub-Millisecond Scheduler for Multi-Cell MIMO Networks under C-RAN Architecture", IEEE INFOCOM 2022, May 2022, Virtual Conference.(PDF)(BibTex)
  • N. Wang, Y. Chen, Y. Hu, W. Lou, Y. T. Hou, "FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning," IEEE INFOCOM 2022, May 2022, Virtual conference, USA.(PDF)(PDF)(BibTex)
  • N. Wang, Y. Xiao, Y. Chen, Y. Hu, W. Lou, Y. T. Hou, "FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations," ACM ASIACCS 2022, May 2022, Nagasaki, Japan.(PDF)(PDF)(BibTex)
  • M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou " CANShield: Signal-based Intrusion Detection for Controller Area Networks," escar USA 2022, June 2022.(PDF)(BibTex)
  • Y. Hu, N. Wang, Y. Chen, W. Lou, Y. T. Hou, "Transferability of Adversarial Examples in Machine Learning-Based Malware Detection," IEEE CNS 2022, October 2022, Austin, TX, USA.(PDF)(BibTex)
  • C. Li, Q. Liu, Y. T. Hou, W. Lou and S. Kornpella, "Aequitas: A Uniformly Fair 5G Scheduler for Minimizing Outdated Information," IEEE MASS 2022, October 2022, Denver, CO, USA.(PDF)(BibTex)
  • C. Du, H. Yu, Y. Xiao, W. Lou, C. Wang, R. Gazda, Y. T. Hou. "Mobile Tracking in 5G and Beyond Networks: Problems, Challenges, and New Directions," IEEE MASS 2022, October 2022, Denver, CO, USA.(PDF)(BibTex)
  • H. Jin, Q. Liu, C. Li, Y. T. Hou, W. Lou, S. Kompella, "Hector: A Reinforcement Learning-based Scheduler for Minimizing Casualties of a Military Drone Swarm," IEEE MILCOM 2022, November 2022, Rockville, MD, USA.(PDF)(BibTex)
  • N. Wang, Y. Xiao, Y. Chen, N. Zhang, W. Lou, Y. T. Hou. "Squeezing More Utility via Adaptive Clipping on Deferentially Private Gradients in Federated Meta-Learning," ACSAC 2022, Dec 2022, Austin, TX, USA.(PDF)(PDF)(BibTex)

2021

Refereed journal papers:

  • T. Li, J. Li, X. Chen, Z. Liu, W. Lou, Y.T. Hou, "NPMML: A Framework for Non-interactive Privacy-preserving Multi-party Machine Learning," IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 6, pp. 2969-2982, 1 Nov.-Dec. 2021.(PDF)(BibTex)
  • C. Li, Y. Huang, S. Li, Y. Chen, B.A. Jalaian, Y.T. Hou, W. Lou, J.H. Reed, S. Kompella, "Minimizing AoI in a 5G-Based IoT Network Under Varying Channel Conditions," IEEE Internet of Things Journal, vol. 8, no. 19, pp. 14543-14558, 1 Oct, 2021.(PDF)(BibTex)
  • S. Shi, Y. Xiao, W. Lou, C. Wang, X. Li, Y.T. Hou, J.H. Reed, "Challenges and New Directions in Securing Spectrum Access Systems," IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6498-6518, 15 April, 2021.(PDF)(BibTex)
  • S. Li, Y. Huang, C. Li, B. A. Jalaian, Y.T. Hou, W. Lou, S. Russell, "Maximize Spectrum Efficiency in Underlay Coexistence With Channel Uncertainty," IEEE/ACM Transactions on Networking, vol. 29, no. 2, pp. 764-778, April 2021.(PDF)(BibTex)
  • J. Li, Y. Huang, Y. Wei, S. Lv, Z. Liu, C. Dong, W. Lou, "Searchable Symmetric Encryption with Forward Search Privacy," IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 1, pp. 460-474, 1 Jan.-Feb. 2021.(PDF)(BibTex)

Refereed conference papers:

  • B. Choudhury, V.K. Shah, A. Ferdowsi, J.H. Reed, Y.T. Hou. "AoI-minimizing Scheduling in UAV-relayed IoT Networks," IEEE MASS 2021, October 2021, Denver, CO, USA.(PDF)(BibTex)
  • N. Jai, S. Li, C. Li, Y.T. Hou, W. Lou, J.H. Reed, S. Kompella. "Optimal Channel Allocation in the CBRS Band with Shipborne Radar Incumbents," IEEE DySPAN 2021, December 2021, Los Angeles, CA, USA.(PDF)(BibTex)
  • S. Li, C. Li, Y. Huang, B.A. Jalaian, Y.T. Hou, W. Lou. "Task Offloading with Uncertain Processing Cycles," ACM MobiHoc 2021, July 26-29, Shanghai, China. (Acceptance rate: 20.1%).(PDF)(BibTex)
  • Q. Liu, C. Li, Y.T. Hou, W. Lou, S. Kompella, "Aion: A Bandwidth Optimized Scheduler with AoI Guarantee," IEEE INFOCOM 2021, May 2021, Vancouver, BC, Canada.(PDF)(BibTex)
  • N. Wang, Y. Chen, Y. Hu, W. Lou, Y.T. Hou, "MANDA: On Adversarial Example Detection for Network Intrusion Detection System, " IEEE INFOCOM 2021, May 2021, Vancouver, BC, Canada.(PDF)(BibTex)
  • C. Li, Q. Liu, S. Li, Y. Chen, Y.T. Hou, W. Lou, "On Scheduling with AoI Violation Tolerance," IEEE INFOCOM 2021, May 2021, Vancouver, BC, Canada.(PDF)(BibTex)
  • Y. Chen, Y. Wu, Y.T. Hou, W. Lou, "mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO Systems," IEEE INFOCOM 2021, May 2021, Vancouver, BC, Canada.(PDF)(BibTex)
  • Y. Huang, Y.T. Hou, W. Lou, "A Deep-Learning-based Link Adaptation Design for eMBB/URLLC Multiplexing in 5G NR," IEEE INFOCOM 2021, May 2021, Vancouver, BC, Canada.(PDF)(BibTex)

2020

Book chapter:

  • H. Zeng, Y.T. Hou, and W. Lou, "Interference Alignment in Wireless Networks," in Encyclopedia of Wireless Networks, edited by Sherman Shen, Xiaodong Lin and Kuan Zhang. Springer, 2020.(PDF)(BibTex)

Refereed magazine papers:

  • Y. Huang, S. Li, Y. Chen, Y.T. Hou, W. Lou, J. Delfeld, V. Ditya, "GPU: A New Enabling Platform for Real-Time Optimization in Wireless Networks," IEEE Networks, vol. 34, no. 6, pp. 77-83, November/December 2020.(PDF)(BibTex)

Refereed journal papers:

  • W. Chang, Y. Xiao, W. Lou, G. Shou, "Offloading Decision in Edge Computing for Continuous Applications under Uncertainty," IEEE Transactions on Wireless Communications, vol. 19, no. 9, pp. 6196-6209, Sept. 2020.(PDF)(BibTex)
  • C. Li, S. Li, Y. Chen, Y.T. Hou, W. Lou, "Minimizing Age of Information under General Models for IoT Data Collection," IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp. 2256-2270, 1 Oct.-Dec. 2020.(PDF)(BibTex)
  • Y. Huang, S. Li, C. Li, Y.T. Hou, W. Lou, "A Deep-Reinforcement-Learning-Based Approach to Dynamic eMBB/URLLC Multiplexing in 5G NR," IEEE Internet of Things Journal, vol. 7, issue 7, pp. 6439-6456, July 2020.(PDF)(BibTex)
  • Y. Chen, Y. Huang, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, "On DoF-Based Interference Cancellation Under General Channel Rank Conditions," IEEE/ACM Transactions on Networking, vol. 28, Issue 3, pp. 1002-1016, June 2020.(PDF)(BibTex)
  • P. K. Sangdeh, H. Pirayesh, Q. Yan, K. Zeng, W. Lou, H. Zeng, "A Practical Downlink NOMA Scheme for Wireless LANs," IEEE Transactions on Communications, vol. 68, issue 4, pp. 2236-2250, April 2020.(PDF)(BibTex)
  • Y. Xiao, N. Zhang, W. Lou, Y. T. Hou, "A Survey of Distributed Consensus Protocols for Blockchain Networks," IEEE Communications Surveys & Tutorials, vol. 22, issue 2, pp. 1432-1465, second quarter 2020. (PDF)(BibTex)
  • Y. Huang, Y. Chen, Y.T. Hou, W. Lou, "Achieving Fair LTE/WiFi Coexistence with Real-time Scheduling," IEEE Transactions on Cognitive Communications and Networking, vol.6, issue 1, pp. 366-380, March 2020.(PDF)(BibTex)

Refereed conference papers:

  • Y. Xiao, S. Shi, N. Zhang, W. Lou, Y.T. Hou, "Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication," Annual Computer Security Applications Conference (ACSAC) 2020, December 7-11, 2020, Online. (PDF)(BibTex)
  • R. Zhang, N. Zhang, A. Moini, W. Lou and Y.T. Hou, "PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications," IEEE ICDCS 2020, December 2-4, 2020, Singapore. (PDF)(BibTex)
  • Y. Xiao, N. Zhang, W. Lou, and Y. T. Hou, "PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution," ESORICS 2020, Sep 14-18, 2020, Guildford, UK. (PDF)(BibTex)
  • C. Li, S. Li, Y. Chen, Y.T. Hou, W. Lou, "AoI Scheduling with Maximum Thresholds," IEEE INFOCOM 2020, April 2020, Beijing, China. (PDF)(BibTex)
  • Y. Chen, Y. Huang, C. Li, Y.T. Hou, W. Lou, "Turbo-HB: A Novel Design and Implementation to Achieve Ultra-Fast Hybrid Beamforming," IEEE INFOCOM 2020, April 2020, Beijing, China. (PDF)(BibTex)
  • Y. Xiao, N. Zhang, W. Lou, Y.T. Hou, "Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain," IEEE INFOCOM 2020, April 2020, Beijing, China. (PDF)(BibTex)
  • L. Wang, H. -D. Chiang and W. Lou, "Bus-bar Splitting on Enhancing Static Voltage Stability for The Base and Contingency Cases," 2020 IEEE 4th Conference on Energy Internet and Energy System Integration (EI2), 2020, pp. 68-73.(PDF)(BibTex)

2019

Book chapter:

  • Y. Xiao, N. Zhang, J. Li, W. Lou, Y.T. Hou, "Distributed consensus protocols and algorithms," book chapter in Blockchain for Distributed Systems Security, Wiley & Sons, 2019. (PDF)(BibTex)
  • X. Yuan, C. Gao, F. Tian, Y. Shi, Y. T Hou, W. Lou, W. Trappe, S.F. Midkiff, J.H. Reed, and S. Kompella, "MIMO-empowered secondary networks for efficient spectrum sharing," in Handbook of Cognitive Radio, edited by W. Zhang, Springer, 2018. (PDF)(BibTex)

Refereed journal papers:

  • X. Liang, Z. Yan, X. Chen, L.T. Yang, W. Lou, Y.T. Hou, "Game Theoretical Analysis on Encrypted Cloud Data Deduplication," IEEE Transactions on Industrial Informatics, vol. 15, issue 10, Oct. 2019.(PDF)(BibTex)
  • Y. Chen, W. Sun, N. Zhang, Q. Zheng, W. Lou, and Y.T. Hou, "Towards Efficient Fine-grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT," IEEE Transactions on Information Forensics & Security, vol. 14, issue 7, July 2019.(PDF)(BibTex)
  • X. Qin, X. Yuan, Z. Zhang, T. Feng, Y.T. Hou, W. Lou, "Joint User-AP Association and Resource Allocation in Multi-AP 60-GHz WLAN," IEEE Transactions on Vehicular Technology, vol. 68, issue 6, pp. 5696-5709, June 2019. (PDF)(BibTex)
  • C. Jiang, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, and S.F. Midkiff, "A General Method to Determine Asymptotic Capacity Upper Bounds for Wireless Networks under the Protocol Model," IEEE Transactions on Network Science and Engineering, vol. 6, issue 1, Jan 2019(PDF)(BibTex)

Refereed conference papers:

  • S. Li, Y. Huang, C. Li, Y.T. Hou, W. Lou, B. Jalaian, S. Russel, and B. MacCall, "A Real-Time Solution for Underlay Coexistence with Channel Uncertainty," IEEE GLOBECOM 2019, Dec 9-13, 2019, Waikoloa, HI, USA(PDF)(BibTex)
  • S. Li, Y.T. Hou, W. Lou, B. Jalaian, S. Russel, and B. MacCall, "Optimal power control with Channel uncertainty in ad hoc networks," IEEE/AFCEA Military Communications Conference (MILCOM 2019), Nov 12-14, 2019, Norfolk, VA. (Best Paper Award)(PDF)(BibTex)
  • R. Zhang, N. Wang, N. Zhang, Z. Yan, W. Lou, and Y.T. Hou, “PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Networks,” IEEE DySPAN, Nov 2019, Newark, NJ. (PDF)(BibTex)
  • C. Li, Y. Huang, Y. Chen, B. Jalaian, Y.T. Hou, and W. Lou, "Kronos: A 5G Scheduler for AoI Minimization under Dynamic Channel Conditions," IEEE ICDCS 2019, July 7-9, 2019, Dallas, TX, USA. (PDF)(BibTex)
  • S. Li, Y. Huang, C. Li, B. Jalaian, Y. T. Hou, W. Lou, "Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation," ACM MobiHoc 2019, July 2-5, 2019, Catania, Italy. (Acceptance rate: 37/156=23.7%) (PDF)(BibTex)
  • Y. Chen, S. Li, C. Li, Y. T. Hou and B. Jalaian, "To Cancel or Not to Cancel: Exploiting Interference Signal Strength in the Eigenspace for Efficient MIMO DoF Utilization," IEEE INFOCOM 2019, Apr 29-May 2, 2019, Paris, France. (PDF)(BibTex)
  • C. Li, S. Li, and Y. T. Hou, "A General Model for Minimizing Age of Information at Network Edge," IEEE INFOCOM 2019, Apr 29-May 2, 2019, Paris, France. (PDF)(BibTex)

2018

Refereed magazine papers:

  • Y. Huang, Y. Chen, Y.T. Hou, W. Lou, and J.H. Reed, “Recent Advances of LTE/WiFi Coexistence in Unlicensed Spectrum,” IEEE Network, vol. 32, no. 2, pp. 107–113, March–April, 2018. (PDF)(BibTex)

Refereed journal papers:

  • W. Feng, Z. Yan, H. Zhang, K. Zeng, Y. Xiao, and Y. T. Hou, “A Survey on Security, Privacy and Trust in Mobile Crowdsourcing,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2971–2992, Aug. 2018. (PDF)(BibTex)
  • N. Zhang, R. Zhang, K. Sun, W. Lou, Y. T. Hou and S. Jajodia, "Memory Forensic Challenges under Misused Architectural Features," in IEEE Transactions on Information Forensics & Security (TIFS), pp. 1-1, Mar 23, 2018. (PDF)(BibTex)
  • C. Jiang, Y. Shi, Y.T. Hou, W. Lou, S. Kompella and S.F. Midkiff, "A General Method to Determine Asymptotic Capacity Upper Bounds for Wireless Networks", IEEE Transactions on Network Science and Engineering, vol. PP, no. 99, pp. 1–1, Nov 3. 2017. (PDF)(BibTex)
  • H. Zeng, X. Qin, X. Yuan, Y. Shi, Y.T. Hou, and W. Lou, "Cooperative Interference Neutralization in Multi-hop Wireless Networks," IEEE Transactions on Communications, vol. PP, no. 99, pp. 1–1, Oct 30. 2017. (PDF)(BibTex)

Refereed conference papers:

  • Y. Huang, S. Li, Y. T. Hou and W. Lou, "GPF: A GPU-based Design to Achieve ~100 us Scheduling for 5G NR," ACM MobiCom 2018, Oct 29-Nov 2, 2018, New Delhi, India. (Acceptance rate: 42/187=22%) (PDF) (URL)(BibTex)
  • Y. Huang, Y. Chen, Y.T. Hou, and W. Lou, "CURT: A Real-Time Scheduling Algorithm for Coexistence of LTE and Wi-Fi in Unlicensed Spectrum," in Proc. IEEE DySPAN 2018, Seoul, Korea, October 22-24, 2018. (PDF)(BibTex)
  • C. Cao, L. Guan, N. Zhang, N. Gao, J. Lin, B. Luo, P. Liu, J. Xiang and W. Lou, "CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices," 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018), Sep 10-12, 2018, Heraklion, Crete, Greece (PDF)(BibTex)
  • N. Zhang, J. Li, W. Lou, and Y. T. Hou, "PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution," 13th International Workshop on Data Privacy Management (DPM 2018), co-located with ESORICS 2018, Sep 6-7, 2018, Barcelona, Spain (PDF)(BibTex)
  • J. Li, H. Ye, W. Wang, W. Lou, Y.T. Hou, J. Liu and R. Lu, "Efficient and Secure Outsourcing of Differentially Private Data Publication," 23th European Symposium on Research in Computer Security (ESORICS 2018), Sep 3-5, 2018, Barcelona, Spain. (Acceptance rate: 56/283=20%)(PDF)(BibTex)
  • Y. Chen, W. Sun, N. Zhang, Q. Zheng, W. Lou and Y.T. Hou. “Secure Remote Monitoring Framework Supporting Efficient Fine-grained Access Control and Data Processing in IoT,” 14th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2018), Singapore, Aug 8-10, 2018. (PDF)(BibTex)
  • C. Du, X. Yuan, W. Lou, and Y.T. Hou, “Context-Free Fine-Grained Motion Sensing using WiFi,” 15th IEEE International Conference on Sensing, Communication and Networking (IEEE SECON 2018),  Hong Kong, China, June 11-13, 2018. (PDF)(BibTex)
  • N. Zhang, W. Sun, W. Lou, Y.T. Hou, and W. Trappe, "ROSTER: Radio Context Attestation in Cognitive Radio Network," IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 30-Jun 1, 2018. (PDF)(BibTex)
  • W. Sun, N. Zhang, W. Lou, and Y.T. Hou, " Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup," IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 30-Jun 1, 2018. (PDF)(BibTex)
  • W. Sun, R. Zhang, W. Lou and Y.T. Hou, "REARGUARD: Secure Keyword Search Using Trusted Hardware," IEEE INFOCOM 2018, 15-19 April 2018, Honolulu, HI, USA. (Acceptance rate: 309/1606=19%) (PDF)(BibTex)
  • Y. Chen, Y. Huang, Y. Shi, Y.T. Hou, W. Lou and S. Kompella, "A General Model for DoF-based Interference Cancellation in MIMO Networks with Rank-deficient Channels," IEEE INFOCOM 2018, 15-19 April 2018, Honolulu, HI, USA. (Acceptance rate: 309/1606=19%) (PDF)(BibTex)
  • N. Zhang, K. Sun, D. Shands, W. Lou and Y.T. Hou, "TruSense: Information Leakage from TrustZone," IEEE INFOCOM 2018, 15-19 April 2018, Honolulu, HI, USA. (Acceptance rate: 309/1606=19%) (PDF)(BibTex)
  • Y. Huang, Y. Chen, Y.T. Hou, W. Lou, and J.H. Reed, “Recent Advances of LTE/WiFi Coexistence in Unlicensed Spectrum,” IEEE Network, vol. 32, no. 2, pp. 107–113, March–April, 2018. (PDF)(BibTex)

2017

Refereed journal papers:

  • H. Zeng, Y. Shi, Y.T. Hou, W. Lou, X. Yuan, R. Zhu, J. Cao. “OFDM-Based Interference Alignment in Single-Antenna Cellular Wireless Networks,” IEEE Transactions on Communications, vol. 65, no. 10, pp. 4492–4506, Oct. 2017. (PDF)(BibTex)
  • W. Song, B. Wang, Q. Wang, C. Shi, W. Lou and Z. Peng " Publicly Verifiable Computation of Polynomials over Outsourced Data with Multiple Sources ," IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2334-2347, Oct. 2017.(PDF)(BibTex)
  • R. Zhang, N. Zhang, C. Du, W. Lou, Y.T. Hou, Y. Kawamoto "From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality," ACM Transactions on Intelligent Systems and Technology (TIST), vol. 9, no. 1, pp. 1-20, Oct. 2017 (PDF)(BibTex)
  • X. Liu, W. Sun, H. Quan, W. Lou, Y. Zhang, and H. Li, "Publicly Verifiable Inner Product Evaluation  over Outsourced Data Streams under Multiple Keys," IEEE Transactions on Service Computing (TSC), vol. 10, no. 5, pp. 826–838, Sep. 2017. (PDF)(BibTex)
  • Y. Zheng, M. Li, W. Lou and Y.T. Hou, "Location Based Handshake and Private Proximity Test with Location Tags," IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 14, no. 4, pp. 406–419, Jul. 2017. (PDF)(BibTex)
  • W. Song, B. Wang, Q. Wang, Z. Peng, W. Lou, "Tell me the truth: Practically public authentication for outsourced databases with multi-user modification " Information Sciences, vol. 387, pp. 221–237, May. 2017. (PDF)(BibTex)
  • X. Yuan, X. Qin, F. Tian, Y.T. Hou, W. Lou, S.F. Midkiff, J.H. Reed. “Coexistence Between Wi-Fi and LTE on Unlicensed Spectrum: A Human-Centric Approach,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 4, pp. 964–977, Apr. 2017. (PDF)(BibTex)
  • T. Jiang, X. Chen, Q. Wu, J. Ma, W. Susilo, and W. Lou, “Secure and Efficient Cloud Data Deduplication With Randomized Tag,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 532–543, Mar. 2017. (PDF)(BibTex)
  • H. Zeng, Y.T. Hou, Y. Shi, W. Lou, S. Kompella, and S.F. Midkiff, “A Distributed Scheduling Algorithm for Underwater Acoustic Networks With Large Propagation Delays,” IEEE Transactions on Communications, vol. 65, no. 3, pp. 1131–1145, Mar. 2017. (PDF)(BibTex)
  • X. Qin, H. Zeng, X. Yuan, B. Jalaian, Y.T. Hou, W. Lou, S.F. Midkiff, "Impact of Full Duplex Scheduling on End-to-end Throughput in Multi-hop Wireless Networks," IEEE Transactions on Mobile Computing, vol. 16, no. 1, pp. 158–171, Jan. 2017. (PDF)(BibTex)
  • X. Yuan, Y. Shi, X. Qin, YT. Hou, W. Lou, S. Kompella, S.F. Midkiff , J.H. Reed . “Beyond Overlay: Reaping Mutual Benefits for Primary and Secondary Networks Through Node-Level Cooperation,” IEEE Transactions on Mobile Computing, vol. 16, no. 1, pp. 2–15, Jan. 2017. (PDF)(BibTex)

Refereed conference papers:

  • X. Qin, X. Yuan, Z. Zhang, F. Tian, Y.T. Hou, and W. Lou, "On AP Assignment and Transmission Scheduling for Multi-AP 60 GHz WLAN", 14th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2017), Orlando, FL, USA, October 23-25, 2017. (invited paper) (PDF)(BibTex)
  • N. Zhang, R. Zhang, Q. Yan, W. Lou, Y.T. Hou, and D. Yao, "Black Penguin: On the Feasibility of Detecting Intrusion with Homogeneous Memory," Network and Cloud Forensics Workshop, Las Vegas, NV, USA, Oct 11, 2017. Collocated with IEEE CNS 2017. (PDF)(BibTex)
  • B. Wang, W. Song, W. Lou, and Y.T. Hou, "Privacy-Preserving Pattern Matching over Encrypted Genetic Data in Cloud Computing," IEEE INFOCOM 2017, 1-4 May 2017, Atlanta, GA, USA. (Acceptance rate: 292/1395=21%) (PDF)(BibTex) (Best-in-Session-Presentation Award)
  • W. Sun, N. Zhang, W. Lou, and Y.T. Hou, "When Gene Meets Cloud: Enabling Scalable and Efficient Range Query on Encrypted Genomic Data," IEEE INFOCOM 2017, 1-4 May 2017, Atlanta, GA, USA. (Acceptance rate: 292/1395=21%) (PDF)(BibTex)
  • X. Liu, W. Sun, W. Lou, Q. Pei, and Y. Zhang, "One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage," IEEE INFOCOM 2017, 1-4 May 2017, Atlanta, GA, USA. (Acceptance rate: 292/1395=21%) (PDF)(BibTex)
  • R. Zhang, N. Zhang, C. Du, W. Lou, Y.T. Hou, Y. Kawamoto "AugAuth: Shoulder-Surfing Resistant Authentication for Augmented Reality," IEEE International Conference on Communications (ICC 2017), 21-25 May 2017, Paris, France. (PDF)(BibTex)
  • A. Garnaev, W. Trappe, Y.T. Hou, and W. Lou, “Spectrum attacks aimed at minimizing spectrum opportunities,” in 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2092–2096.MARCH 5-9, 2017,NEW ORLEANS, USA (PDF)(BibTex)

2016

    Refereed magazine papers:

  • B. Li and Y.T. Hou, “The new automated IEEE INFOCOM review assignment system,”  IEEE Network, vol. 30, no. 5, pp. 18–24, Sep. 2016. (PDF)(BibTex)
  • Y. Zheng, A. Moini, W. Lou, Y.T Hou, and Y. Kawamoto, "Cognitive Security: Securing the Burgeoning Landscape of Mobile Network," IEEE Network, vol. 30, no. 4, pp. 66-71, 2016. (PDF)(BibTex)
  • H. Zeng, F. Tian, Y.T. Hou, W. Lou, and S.F. Midkiff, "Interference alignment for multi-hop wireless networks: Challenges and research directions," IEEE Network. vol. 30, issue 2, pp. 74-80, March/April 2016 (PDF)(BibTex)

Refereed journal papers:

  • X. Yuan, X. Qin, F. Tian, B. Jalaian, Y. Shi, Y.T. Hou, W. Lou, W. Trappe.  “An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm,” IEEE Transactions on Cognitive Communications and Networking, vol. 2, no. 4, pp. 411–426, Dec. 2016. (PDF)(BibTex)
  • X. Chen, J. Li, J. Weng, J. Ma, W. Lou, “Verifiable computation over large database with incremental updates,” IEEE Transactions on Computers (TC), vol. 65, no. 10, pp. 3184–3195, Oct. 2016. (PDF)(BibTex)
  • X. Yuan, F. Tian, Y.T. Hou, W. Lou, H.D. Sherali, S. Kompella, J.H. Reed. “On Throughput Region for Primary and Secondary Networks With Node-Level Cooperation,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 10, pp. 2763–2775, Oct. 2016. (PDF)(BibTex)
  • X. Yuan, X. Qin, F. Tian, Y. Shi, Y.T. Hou, W. Lou, S.F. Midkiff, S. Kompella. “A Distributed Algorithm to Achieve Transparent Coexistence for a Secondary Multi-Hop MIMO Network,” IEEE Transactions on Wireless Communications, vol. 15, no. 9, pp. 6063–6077, Sep. 2016. (PDF)(BibTex)
  • Y. Hou, M. Li, X. Yuan, Y.T. Hou, and W. Lou, “Cooperative Interference Mitigation for Heterogeneous Multi-Hop Wireless Networks Coexistence,” IEEE Transactions on Wireless Communications, vol. 15, no. 8, pp. 5328–5340, Aug. 2016. (PDF)(BibTex)
  • C. Jiang, Y. Shi, X. Qin, X. Yuan, Y.T. Hou, W. Lou, S. Kompella, S.F. Midkiff, “Cross-Layer Optimization for Multi-Hop Wireless Networks With Successive Interference Cancellation,” IEEE Transactions on Wireless Communications, vol. 15, no. 8, pp. 5819–5831, Aug. 2016. (PDF)(BibTex)
  • Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, Y.T. Hou, "Jamming Resilient Communication using MIMO Interference Cancellation," IEEE Transactions on Information Forensics & Security (TIFS), vol. 11, issue 7, pp. 1486-1499, July 2016.(PDF)(BibTex)
  • W. Sun, S. Yu, W. Lou, Y.T. Hou, and H. Li, "Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 27, issue 4, pp. 1187-1198, April 2016. (PDF)(BibTex)
  • X. Qin, X. Yuan, Y. Shi, Y.T. Hou, W. Lou, S.F. Midkiff, "Joint Flow Routing and DoF Allocation in Multi-hop MIMO Networks", IEEE Transactions on Wireless Communications, vol. 15, issue 3, pp. 1907-1922, March 2016. (PDF)(BibTex)
  • H. Zeng, Y. Shi, Y.T. Hou, W. Lou, R. Zhu, S.F. Midkiff, "A Scheduling Algorithm for MIMO DoF Allocation in Multi-hop Networks," IEEE Transactions on Mobile Computing, vol. 15, issue 2, pp. 264-277, Feb 2016. (PDF)(BibTex)
  • H. Zeng, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, and S.F. Midkiff, "An anlytical model for interference alignment in multi-hop MIMO networks," IEEE Transactions on Mobile Computing, vol. 15, issue 1, pp. 17-31, Jan 2016. (PDF)(BibTex)

Refereed conference papers:

  • E. Gaebel, N. Zhang, W. Lou, and Y. T. Hou, "Looks Good To Me: Authentication for Augmented Reality," 6th International Workshop on Trustworthy Embedded Devices (TrustED '16). ACM, Vienna, Austria. (PDF)(BibTex)
  • B. Jalaian, V. Dasari, and Y. T. Hou, “Modeling and optimization for programmable unified control plane in heterogeneous wireless networks,” in 2016 IEEE 37th Sarnoff Symposium, Newark, New Jersey, Sept 19-21, 2016, pp. 37–42. (PDF)(BibTex)
  • Y. Zheng, M. Schulz, W. Lou, Y.T. Hou, M. Hollick, "Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding," 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany, July 18-20, 2016. (Acceptance rate: 13/51 = 25.5%) (PDF)(BibTex)
  • N. Zhang, K. Sun, W. Lou, Y.T. Hou, "CaSE: Cache-Assisted Secure Execution on ARM Processors," IEEE Symposium on Security and Privacy (IEEE S&P 2016), San Jose, CA, USA, May 23-25, 2016. (Acceptance rate: 55/400 = 14%) (PDF)(BibTex)
  • C. Du, R. Zhang, W. Lou, Y.T. Hou, "MobTrack: Locating Indoor Interfering Radios With A Single Device," IEEE INFOCOM 2016, April 10-14, 2016, San Francisco, CA. (Acceptance ratio = 300/1644 = 18%) (PDF)(BibTex)
  • H. Zeng, X. Yuan, X. Qin, Y. Shi, Y.T. Hou, W. Lou, "Nullification in the Air: Interference Neutralization in Multi-Hop Wireless Networks," IEEE INFOCOM 2016, April 10-14, 2016, San Francisco, CA. (Acceptance ratio = 300/1644 = 18%) (PDF)(BibTex)
  • N. Zhang, H. Sun, K. Sun, W. Lou and Y.T. Hou, "CacheKit: Evading Memory Introspection Using Cache Incoherence," 1st IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2016), Saarbrucken, GERMANY, on March 21-24, 2016. (Acceptance ratio: 29/168=17.3%) (PDF)(BibTex)
  • Y. Sagduyu, Y. Shi, A. B. MacKenzie, and Y.T. Hou, "Regret Minimization-based Robust Game Theoretic Solution for Dynamic Spectrum Access," Proc. 13th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, USA, January 9-12, 2016. (PDF)(BibTex)

2015

Refereed magazine papers:

  • A. Nabil, Y.T. Hou, Rongbo Zhu, W. Lou, and S.F. Midkiff, "Recent Advances in Interference Management for Wireless Networks," IEEE Network, vol. 29, issue 5, Sept./Oct. 2015. (PDF)(BibTex)

Refereed journal papers:

  • X. Chen, J. Li, X. Huang, J. Ma, and W. Lou, “New Publicly Verifiable Databases with Efficient Updates,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 5, pp. 546–556, Sep. 2015. (PDF)(BibTex)
  • L. Xie, Y. Shi, Y.T. Hou, W. Lou, H.D. Sherali, H. Zhou, and S.F. Midkiff, "A Mobile Platform for Wireless Charging and Data Collection in Sensor Networks,"IEEE Journal on Selected Areas in Communications, vol. 33, issue 8, pp. 1521-1533, Aug 2015. (PDF)(BibTex)
  • X. Yuan, C. Jiang, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, and S.F. Midkiff, "Toward Transparent Coexistence for Multi-hop Secondary Cognitive Radio Networks," IEEE Journal on Selected Areas in Communications, vol. 33, issue 5, pp. 958-971, May 2015. (PDF)(BibTex)
  • J. Li, Y.K. Li, X. Chen, P. P.C. Lee, and W. Lou, "A hybrid cloud approach for secure authorized deduplication," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 26, issue 5, pp. 1206-1216, May 2015. (PDF)(BibTex)
  • B. Wang, Y. Zheng, W. Lou, Y.T. Hou, "DDoS attack Protection in the Era of Cloud Computing and Software-Defined Networking," Computer Networks, Vol. 81, Issue C, April 2015. (PDF)(BibTex)
  • Y. Zheng, M. Schulz, W. Lou; Y.T. Hou, M. Hollick, "Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security," IEEE Wireless Communications Letters, vol.4, no.1, pp.34-37, Feb. 2015 (PDF)(BibTex)
  • L. Xie, Y. Shi, Y.T. Hou, W. Lou, H. Sherali, and S. Midkiff, "Multi-node Wireless Energy Charging in Sensor Networks," IEEE/ACM Transactions on Networking, vol. 23, issue 2, pp. 437-450, Feb 2015. (PDF)(BibTex)
  • J. Li, J. Li, C. Jia, X. Chen, and W. Lou, "Identity-based encryption with outsourced revocation in cloud computing," IEEE Transactions on Computers (TC), vol. 64, issue 2, pp. 425-437, Feb 2015. (PDF)(BibTex)
  • X. Chen, X. Huang, J. Li, J. Ma, W. Lou, and D. S. Wong, “New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations,”  IEEE Transactions on Information Forensics and Security , vol. 10, no. 1, pp. 69–78, Jan. 2015. (PDF)(BibTex)

Refereed conference papers:

  • B. Jalaeian, Y. Shi, X. Yuan, Y.T. Hou, W. Lou, S.F. Midkiff, “Harmonizing SIC and MIMO DoF Interference Cancellation for Efficient Network-wide Resource Allocation,” 12th IEEE International Conference on Mobile Ad hoc and Sensor Systems (IEEE MASS 2015), Oct. 19–22, 2015, Dallas, TX.

    (BibTex)
  • X. Yuan, F. Tian, Y.T. Hou, W. Lou, H. D. Sherali, S. Kompella, J.H. Reed, "Optimal Throughput Curve for Primary and Secondary Users with Node-level Cooperation", IEEE DySPAN 2015, Sept 29-Oct 2, 2015, Stockholm, Sweden.(BibTex)

  • B. Wang W. Lou and Y.T. Hou, "Modeling The Side-Channel Attacks in Data Deduplication with Game Theory," 3rd IEEE Conference on Communications and Network Security (IEEE CNS 2015), September 28-30, 2015, Florence, Italy.(BibTex)

  • Y. Zheng, B. Wang, W. Lou, and Y.T. Hou, " Privacy-Preserving Link Prediction in Decentralized Online Social Networks," 20th European Symposium on Research in Computer Security (ESORICS 2015), Sep 21-25, 2014, Vienna, Austria. (PDF)(BibTex)
  • C. Du, H. Zeng, Y.T. Hou, W. Lou, "On Cyclostationary Analysis of WiFi Signals for Direction Estimation," IEEE ICC 2015, June 8-12, 2015, London, UK. (PDF)(BibTex)
  • N. Zhang, K. Sun, W. Lou, Y.T. Hou, and S. Jajodia. "Now You See Me: Hide and Seek in Physical Address Space," the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, April 14-17, 2015. (Acceptance ratio: 48/269=17.8%) (PDF)(BibTex)
  • Q. Yan, Y. Zheng, T. Jiang, W. Lou, and Y.T. Hou, "PeerClean: Unveiling peer-to-peer Botnets through dynamic group behavior analysis, " IEEE INFOCOM 2015, Hong Kong, China, April 2015 (Acceptance ratio = 316/1640 = 19%) (PDF)(BibTex
  • B. Wang, W. Song, W. Lou, and Y.T. Hou, "Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee,"  IEEE INFOCOM 2015, Hong Kong, China, April 2015 (Acceptance ratio = 316/1640 = 19%) (PDF)(BibTex
  • W. Sun, X. Liu, W. Lou, Y.T. Hou, and H. Li, "Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data," IEEE INFOCOM 2015, Hong Kong, China, April 2015 (Acceptance ratio = 316/1640 = 19%) (PDF)(BibTex

2014

Book:

  • Y.T Hou, Y. Shi, and H.D. Sherali, Applied Optimization Methods for Wireless Networks, Cambridge University Press, ISBN-13: 978-1107018808, April 2014.(BibTex)
    • Book chapter:

      • W. Sun, W. Lou, Y.T. Hou, and H. Li, "Privacy-preserving keyword search over encrypted data in cloud computing," in Secure Cloud Computing, edited by S. Jajodia et al., Springer, 2014. (PDF)(BibTex)
      • L. Xie, Y. Shi, Y.T. Hou, W. Lou, H.D. Sherali and H. Zhou, "Rechargeable sensor networks with magnetic resonant coupling," in Rechargeable Sensor Networks: Technology, Theory and Application, Chapter 2, pp. 31-68, edited by Jiming Chen, Shibo He, and Youxian Sun, World Scientific Publishing, 2014. ISBN: 978-981-4525-45-9 (hardcover); ISBN: 978-981-4525-47-3 (ebook). (PDF)(BibTex)

      Refereed magazine papers:

      • H. Zeng, Y. Shi, Y.T. Hou, Rongbo Zhu, and W. Lou, “A Novel MIMO DoF Model for Multi-hop Networks," IEEE Network, vol. 28, issue 5, pp. 81-85, Sept./Oct. 2014. (PDF)(BibTex)
        • Refereed journal papers:

          • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y.T. Hou, and H. Li, "Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, issue 11, pp. 3025-3035, Nov 2014. (PDF)(BibTex)
          • Q. Yan, M. Li, F. Chen, T. Jiang, W. Lou, Y.T. Hou, C.-T. Lu, “SpecMonitor: Towards efficient passive traffic monitoring for cognitive radio networks," IEEE Transactions on Wireless Communications (TWC), vol. 13, issue 10, pp. 5893-5905, Oct 2014.(BibTex)
          • X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New algorithms for secure outsourcing of modular exponentiations," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, issue 9, pp. 2386-2396, Sept 2014. (PDF)(BibTex)
          • S. Sharma, Y. Shi, Y.T. Hou, H.D. Sherali, S. Kompella, “Joint Optimization of Session Grouping and Relay Node Selection for Network-Coded Cooperative Communications," IEEE Transactions on Mobile Computing, vol. 13, no. 9, pp. 2028-2041, Sept 2014. (PDF)(BibTex)
          • Y. Shi, J. Liu, C. Jiang, C. Gao, and Y.T. Hou, “A DoF-based link layer model for multi-hop MIMO networks," IEEE Transactions on Mobile Computing, vol. 13, no. 7, pp. 1395-1408, July 2014. (PDF)(BibTex)
          • J. Li, X. Chen, M. Li, J. Li, P. P. C. Lee, and W. Lou, “Secure Deduplication with Efficient and Reliable Convergent Key Management,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp. 1615–1625, Jun. 2014. (PDF)(BibTex)
          • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, issue 1, pp. 222-233, Jan 2014. (PDF)(BibTex)

          Refereed conference papers:

          • X. Yuan, Y. Shi, Y.T. Hou, W. Lou, S.F. Midkiff, and S. Kompella, "Achieving transparent coexistence in a multi-hop secondary network through distributed computation", in Proc. IEEE International Performance Computing and Communications Conference (IPCCC 2014), December 5-7, 2014, Austin, TX. (PDF)(BibTex)
          • H. Zeng, Y.T. Hou, Y. Shi, W. Lou, S. Kompella, S.F. Midkiff, "SHARK-IA: An interference alignment algorithm for multi-hop underwater acoustic networks with large propagation delays", in Proc. ACM International Conference on Underwater Networks and Systems (ACM WuWNet'14), Nov. 12-14, 2014, Rome, Italy. (PDF)(BibTex) (BEST STUDENT PAPER AWARD)
          • N. Zhang, W. Lou, X. Jiang, and Y.T. Hou, "Enabling trusted data-intensive execution in cloud computing," 2nd IEEE Conference on Communications and Network Security (IEEE CNS 2014), Oct 29-31, 2014, San Francisco, CA. (PDF)(BibTex)
          • B. Wang, Y. Zheng, W. Lou, and Y.T. Hou. "DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking," 9th workshop on Secure Network Protocols, Raleigh, NC, October 21, 2014. Collocated with IEEE ICNP 2014. (PDF)(BibTex)
          • X. Chen, J. Li, J. Weng, J. Ma, and W. Lou, "Verifiable computation over large database with incremental updates," 19th European Symposium on Research in Computer Security (ESORICS 2014), Sep 7-11, 2014, Wroclaw, Poland. (PDF)(BibTex)
          • L. Liu, X. Chen, and W. Lou, "A secure three-party computational protocol for triangle area," 19th Australasian Conference on Information Security and Privacy (ACISP 2014), Wollongong, Australia, July 7-9, 2014. (BEST STUDENT PAPER AWARD) (BibTex)
          • H. Zeng, Y. Shi, Y.T. Hou, W. Lou, X. Yuan, R. Zhu, and J. Cao, "Increasing user throughput in cellular networks with interference alignment," in Proc. IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON 2014), June 30-July 3, 2014, Singapore. (PDF)(BibTex)
          • H. Nie, X. Chen, J. Li, J. Liu, and W. Lou, “Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming,” The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13-16, 2014.(BibTex)
          • B. Wang, S. Yu, W. Lou, and Y.T. Hou, “Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud,” IEEE INFOCOM 2014, Toronto, Canada, April 2014 (Acceptance ratio = 320/1645 = 19%) (PDF)(BibTex)
          • W. Sun, S. Yu, W. Lou, Y.T. Hou, and H. Li, “Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud,” IEEE INFOCOM 2014, Toronto, Canada, April 2014 (Acceptance ratio = 320/1645 = 19%) (PDF)(BibTex)
          • Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, and Y.T. Hou, “MIMO-based Jamming Resilient Communication in Wireless Networks,” IEEE INFOCOM 2014, Toronto, Canada, April 2014 (Acceptance ratio = 320/1645 = 19%) (PDF)(BibTex)
          • Y. Hou, M. Li, X. Yuan, Y.T. Hou, and W. Lou, “Cooperative Cross-Technology Interference Mitigation for Heterogeneous Multi-hop Networks,” IEEE INFOCOM 2014, Toronto, Canada, April 2014 (Acceptance ratio = 320/1645 = 19%) (PDF)(BibTex)

          2013

          Refereed magazine papers:

          • M. Li, S. Yu, K. Ren, W. Lou, and Y.T. Hou, “Toward privacy-assured and searchable cloud data storage services,” IEEE Networks, vol. 27, issue 4, pp. 55-62, July/August 2013. (PDF)(BibTex)
          • L. Xie, Y. Shi, Y.T. Hou, and W. Lou, “Wireless Power Transfer and Applications to Sensor Networks,” IEEE Wireless Communications, vol. 20, issue 4, pp.140-145, August 2013. (PDF)(BibTex)

          Refereed journal papers:

          • L. Xiao, Q. Yan, W. Lou, G. Chen, and Y.T. Hou, " Proximity-based security techniques for mobile users in wireless networks," IEEE Transactions on Information Forensics & Security (TIFS), vol. 8, No. 12, pp.2089-2100, Dec 2013.(PDF)(BibTex)
          • C. Jiang, Y. Shi, Y.T. Hou, S. Kompella, and S.F. Midkiff, "Bicriteria optimization in multi-hop wireless networks: Characterizing the throughput-energy envelope", IEEE Transactions on Mobile Computing (TMC), vol. 12, no. 9, pp. 1866-1878, Sept. 2013. (PDF)(BibTex)
          • Y. Shi, Y.T. Hou, J. Liu, and S. Kompella, "Bridging the gap between protocol and physical models for wireless networks", IEEE Transactions on Mobile Computing (TMC), vol, 12, issue 7, pp. 1404-1416, July 2013. (PDF)(BibTex)
          • M. Li, S. Yu, N. Cao, and W. Lou, “Privacy-preserving distributed profile matching in proximity-based mobile social networks,” IEEE Transactions on Wireless Communications (TWC), vol. 12, issue 5, pp. 2024-2033, May 2013. (PDF)(BibTex)
          • C. Jiang, Y. Shi, Y.T. Hou, W. Lou, and H. Sherali, "Throughput maximization for multi-hop wireless networks with network-wide energy constraint," IEEE Transactions on Wireless Communications (TWC), vol. 12, issue 3, pp. 1255-1267, March 2013. (PDF)(BibTex)
          • M. Li, S. Yu, J. Guttman, W. Lou and K. Ren, "Secure ad-hoc trust initialization and key management in wireless body area networks", ACM Transactions on Sensor Networks (ToSN), vol.9, issue 2, March 2013. (PDF)(BibTex)
          • C. Wang, S. Chow, Q. Wang, K. Ren, W. Lou, "Privacy-preserving public auditing for secure cloud storage," IEEE Transactions on Computing (TC), vol.62, no.2, pp.362-375, Feb. 2013. (PDF)(BibTex)
          • M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,"  IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 24, no.1, pp. 131-143, Jan. 2013. (PDF)(BibTex)

          Refereed conference papers:

          • X. Yuan, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, "UPS: A united cooperative paradigm for primary and secondary networks," The Tenth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2013), October 14-16, Hangzhou, Zhejiang, P.R.C. (PDF)(BibTex)
          • X. Qin, X. Yuan, Y. Shi, Y.T. Hou, W. Lou, S.F. Midkiff, "On throughput maximization in a multi-hop MIMO ad hoc networks," The Tenth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2013), October 14-16, Hangzhou, Zhejiang, P.R.C. (PDF)(BibTex)
          • J. Li, X. Chen, J. Li, C, Jia, J. Ma, and W. Lou, "Fine-grained access control system based on outsourced attribute-based encryption," 18th European Symposium on Research in Computer Security ( ESORICS 2013 ), Sep 9-13, 2013, Egham, U.K. (Acceptance ratio = 43/242 = 18%) (PDF)(BibTex)
          • L. Xie, Y. Shi, Y.T. Hou, W. Lou, and H.D. Sherali, "On traveling path and related problems for a mobile station in a rechargeable sensor network," in ACM MobiHoc 2013, Bangalore, India, July 29 - August 1, 2013 (Acceptance ratio = 24/234 = 10%) (PDF)(BibTex)
          • X. Yuan, C. Jiang, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, "Beyond interference avoidance: On transparent coexistence for multi-hop secondary CR networks," IEEE SECON 2013,  New Orleans, LA, USA, June 24-27, 2013. (PDF)(BibTex)
          • L. Xiao, Q. Yan, W. Lou, Y.T. Hou, “Proximity-based security using ambient radio signals," IEEE International Conference on Communications (ICC 2013), Budapest, Hungary, June 9-13, 2013 (PDF)(BibTex)
          • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y.T. Hou, and H. Li, “Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," 8th ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2013), Hangzhou, China, May 7-10, 2013 (Acceptance ratio = 35/216 = 16%) (PDF)(BibTex) (Distinguished Paper Award)
          • Q. Yan, M. Li, F. Chen, T. Jiang, W. Lou, Y.T. Hou, C.-T. Lu, “Non-parametric passive traffic monitoring in cognitive radio networks," IEEE INFOCOM 2013, Turin, Italy, April 2013 (Acceptance ratio = 280/1613 = 17%) (PDF)(BibTex)
          • L. Shi, S. Yu, W. Lou, and Y.T. Hou, “SybilShield: An agent-aided social network-based sybil defense among multiple communities," IEEE INFOCOM 2013, Turin, Italy, April 2013 (Acceptance ratio = 280/1613 = 17%) (PDF)(BibTex)
          • L. Xie, Y. Shi, Y.T. Hou, W. Lou, H. Sherali, and S.F. Midkiff, "Bundling mobile base station and wireless energy transfer: modeling and optimization," IEEE INFOCOM 2013, Turin, Italy, April 2013 (Acceptance ratio = 280/1613 = 17%) (PDF)(BibTex)
          • H. Zeng, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, and S.F. Midkiff, "On interference alignment for multi-hop MIMO networks," IEEE INFOCOM 2013, Turin, Italy, April 2013 (Acceptance ratio = 280/1613 = 17%) (PDF)(BibTex)
          • H. Zeng, Y. Shi, Y.T. Hou, and W. Lou, "An efficient DoF scheduling algorithm for multi-hop MIMO networks,” IEEE INFOCOM 2013, Turin, Italy, April 2013 (Acceptance ratio = 280/1613 = 17%) (PDF)(BibTex)

          2012

          Book chapter:

          • Y. Shi, Y.T. Hou, and H.D. Sherali, "On throughput maximization problem for UWB-based sensor networks via reformulation-linearization technique", in Handbook of Optimization in Complex Networks: Communication and Social Networks, Chapter 8, pp. 219-240, edited by M.T. Thai and P.M. Pardalos, Springer, 2012. ISBN 978-1-4614-0856-7.(PDF)(BibTex)
          • Shucheng Yu, W. Lou, and Kui Ren "Data Security in Cloud Computing," in Handbook on Securing Cyber-Physical Critical Infrastructure, Chapter 15, pp. 389-410, edited by S.K. Das, K. Kant, and N. Zhang, Morgan Kaufmann/Elsevier, 2012. ISBN 978-0124158153.(PDF)(BibTex)

          Refereed journal papers:

          • L. Xie, Y. Shi, Y.T. Hou, and H.D. Sherali, "Making sensor networks immortal: An energy renewable approach with wireless energy transfer," IEEE/ACM Transactions on Networking (ToN), vol. 20, issue 6, pp.1748-1761, December 2012 (PDF)(BibTex)
          • Z. Yang, M. Li, and W. Lou, "CodePlay: Live multimedia streaming in VANETs using symbol-level network coding", IEEE Transactions on Wireless Communications, vol.11, no.8, pp.3006-3013, August 2012. (PDF)(BibTex)
          • T. Jiang, H. Zeng, Q. Yan, W. Lou, Y.T. Hou, "On the limitation of embedding cryptographic signature for primary transmitter authentication", IEEE Wireless Communications Letters vol.1, no.4, pp.324-327, August 2012. (PDF)(BibTex)
          • Y. Shi and Y.T. Hou, "Some fundamental results on base station movement problem for wireless sensor networks", IEEE/ACM Transactions on Networking, vol.20, no.4, pp.1054-1067, Aug. 2012. (PDF)(BibTex)
          • C. Wang, N. Cao, K. Ren, W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data", IEEE Transactions on Parallel and Distributed Systems, vol.23, no.8, pp.1467-1479, Aug. 2012. (PDF)(BibTex)
          • S. Sharma, Y. Shi, J. Liu, Y.T. Hou, S. Kompella, and S.F. Midkiff, "Network coding in cooperative communications: Friend or foe?" IEEE Transactions on Mobile Computing vol.11, no.7, pp.1073-1085, July 2012. (PDF)(BibTex)
          • C. Wang, Q. Wang, K. Ren, and W. Lou, "Towards secure and dependable storage services in cloud computing", IEEE Transactions on Service Computing (TSC), vol.5, no.2, pp.220-232, April-June 2012. (PDF)(BibTex)
          • Q. Yan, M. Li. Z. Yang, W. Lou and H. Zhai, "Throughput analysis of cooperative mobile content distribution in vehicular networks using symbol level network coding", IEEE Journal on Selected Areas in Communications, vol.30, no.2, pp.484-492, February 2012. (PDF)(BibTex)
          • S. Sharma, Y. Shi, Y.T. Hou, H.D. Sherali, S. Kompella, and S.F. Midkiff, "Joint flow routing and relay node assignment in cooperative multi-hop networks", IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 254-262, February 2012. (PDF)(BibTex)

          Refereed conference papers:

          • N. Zhang, M. Li, W. Lou, and Y.T. Hou, "MUSHI: Toward Multiple Level Security Cloud with Strong Hardware Level Isolation", IEEE/AFCEA Military Communications Conference (MILCOM), October29–November 1, 2012, Orlando, FL. (PDF)(BibTex)
          • Y. Zheng, M. Li, W. Lou, and Y.T. Hou, "SHARP: Private proximity test and secure handshake with cheat-proof location tags," 17th European Symposium on Research in Computer Security (ESORICS 2012), Sep 10-14, 2012, Pisa, Italy. (Acceptance ratio = 50/248 = 20%) (PDF)(BibTex)
          • X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New algorithms for secure outsourcing of modular exponentiations," 17th European Symposium on Research in Computer Security (ESORICS 2012), Sep 10-14, 2012, Pisa, Italy. (Acceptance ratio = 50/248 = 20%) (PDF)(BibTex)
          • L. Xie, Y. Shi, Y.T. Hou, W. Lou, H. Sherali, and S.F. Midkiff, "On renewable sensor networks with wireless energy transfer: The multi-node case", IEEE SECON 2012, June 18-21, 2012, Seoul, Korea. (PDF)(BibTex)
          • Ming Li, Shucheng Yu, W. Lou, Y.T. Hou, “Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities," Third International Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC 2012), in conjunction with ICDCS 2012, Macau, China, June 18-21, 2012. (PDF)(BibTex)
          • C. Jiang, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, and S.F. Midkiff, "Toward Simple Criteria to Establish Capacity Scaling Laws for Wireless Networks", IEEE INFOCOM 2012, pp. 774-782, March 25-30, 2012, Orlando, FL, USA. (Acceptance ratio = 278/1547 = 18%) (PDF)(BibTex)
          • C. Jiang, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, and S.F. Midkiff, "Squeezing the Most Out of Interference: An Optimization Framework for Joint Interference Exploitation and Avoidance", IEEE INFOCOM 2012, pp. 424-432, March 25-30, 2012, Orlando, FL, USA. (Acceptance ratio = 278/1547 = 18%) (PDF)(BibTex)
          • C. Jiang, Y. Shi, Y.T. Hou, and W. Lou, "Cherish Every Joule: Maximizing Throughput with An Eye on Network-wide Energy Consumption", IEEE INFOCOM 2012, pp. 1934-1941, March 25-30, 2012, Orlando, FL, USA. (Acceptance ratio = 278/1547 = 18%) (PDF)(BibTex)
          • Q, Yan, M. Li, T. Jiang, W. Lou, and Y.T. Hou, "Vulnerability and Protection for Distributed Consensus-based Spectrum Sensing in Cognitive Radio Networks", IEEE INFOCOM 2012, Orlando, FL, March 2012 (Acceptance ratio = 278/1547 = 18%) (PDF)(BibTex)
          • N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou, "LT Codes-based Secure and Reliable Cloud Storage Service", IEEE INFOCOM 2012, Orlando, FL, March 2012 (Acceptance ratio = 278/1547 = 18%) (PDF)(BibTex)

            2011

            Book:

            Refereed journal papers:

            • Zhenyu Yang, Shucheng Yu, W. Lou and Cong Liu, "P2: Privacy-preserving communication and precise reward architecture for V2G networks in Smart Grid," IEEE Transactions on Smart Grid, pp.697-706, vol. 2, no. 4, Dec 2011.(PDF)(BibTex)
            • C. Gao, Y. Shi, Y.T. Hou, and S. Kompella, "On the throughput of MIMO-empowered multi-hop cognitive radio networks", IEEE Transactions on Mobile Computing, vol. 10, no. 11, pp. 1505-1519, November 2011. (PDF)(BibTex)
            • Q. Wang, K. Ren, S. Yu, and W. Lou, "Dependable and secure sensor data storage with dynamic integrity assurance", ACM Transactions on Senor Networks (ToSN), vol. 8, issue 1, August 2011. (PDF)(BibTex)
            • M. Li, K. Zeng and W. Lou, "Opportunistic broadcast of event-driven warning messages in vehicular ad Hoc networks with lossy links", Computer Networks, pp. 2443-2464, vol. 55, issue 10, July 2011. (PDF)(BibTex)
            • Z. Yang, M. Li, and W. Lou, "R-Code: Network coding based reliable broadcast in wireless mesh networks", Ad Hoc Networks, pp. 788-798, vol. 9, issue 5, July 2011. (PDF)(BibTex)
            • Y. Shi, Y.T. Hou, S. Kompella, H.D. Sherali, "Maximizing capacity in multi-hop cognitive radio networks under the SINR model," IEEE Transactions on Mobile Computing, vol 10, no. 7, pp. 954-967, July 2011. (PDF)(BibTex)

            • S. Sharma, Y. Shi, Y.T. Hou, and S. Kompella, "An optimal algorithm for relay node assignment in cooperative ad hoc networks," IEEE/ACM Transactions on Networking, vol. 19, no. 3, pp. 879-892, June 2011. (PDF)(BibTex)

            • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing", IEEE Transactions on Parallel and Distributed Systems, pp.847-859, vol. 22, no. 5, May 2011. (PDF)(BibTex)
            • C. Jiang, Y. Shi, Y.T. Hou, and S. Kompella, "On the asymptotic capacity of multi-hop MIMO ad hoc networks," IEEE Transactions on Wireless Communications, vol. 10, no. 4, pp. 1032-1037, April 2011. (PDF)(BibTex)

            • C. Gao, Y. Shi, Y.T. Hou, H.D. Sherali, and H. Zhou, "Multicast communications in multi-hop cognitive radio networks," IEEE Journal on Selected Areas in Communications, vol. 29, no. 4, pp. 784-793, April 2011. (PDF)(BibTex)

            • S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks", IEEE Transactions on Parallel and Distributed Systems, pp. 673-686, vol. 22, no. 4, April 2011. (PDF)(BibTex)
            • M. Li, Z. Yang, W. Lou, "CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding,'' IEEE Journal on Selected Areas in Communications (JSAC), special issue on Vehicular Communication Networks, pp. 223-235, Vol. 29, No. 1, January 2011. (PDF)(BibTex)

            Refereed conference papers:

            • S. Sharma, Y. Shi, Y.T.Hou, and S.F.Midkiff, "Optimal grouping and matching for network-coded cooperative communications", IEEE/AFCEA Military Communications Conference (MILCOM), pp. 722-728, November 7-10, 2011, Baltimore, MD. (PDF)(BibTex)
            • Y. Shi, C. Jiang, Y.T. Hou, and S. Kompella, "On capacity scaling law of cognitive radio networks (Invited Paper)", International Conference on Computer Communications and Networks (ICCCN 2011), 8 pages, July 31-August 4, 2011, Maui, Hawaii. Available online at IEEE Xplore. DOI: 10.1109/ICCCN. 2011.6006062. (PDF)(BibTex)
            • N. Cao, Z. Yang, C. Wang, K. Ren and W. Lou, "Privacy-preserving query over encrypted graph-structured data in cloud computing", The 31th International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, June 20-24, 2011. (PDF)(BibTex)
            • M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted personal health records in cloud computing", The 30th International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, June 20-24, 2011. (PDF)(BibTex)
            • S. Sharma, Y. Shi, Y.T. Hou, and S. Kompella, "Achievable rate analysis in network-coded cooperative communications with multiple relay nodes", IEEE ICC 2011 - Wireless Networking Symposium, 5 pages, June 5-9, 2011, Kyoto, Japan. (PDF)(BibTex)
            • N. Zhang, M. Li, and W. Lou, "'Distributed data mining with differential privacy", IEEE ICC 2011, Kyoto, Japan, June 2011 (PDF)(BibTex)
            • M. Li, N. Cao, S. Yu, and W. Lou, "FindU: Privacy-preserving personal profile matching in mobile social networks", IEEE INFOCOM 2011, Shanghai, China, April 2011 (Acceptance ratio = 291/1823 = 16%) (PDF)(BibTex)
            • S. Sharma, Y. Shi, Y.T. Hou, H.D. Sherali, and S. Kompella, "Optimizing network-coded cooperative communications via joint session grouping and relay node selection," IEEE INFOCOM 2011, pp. 1898-1906, April 10-15, 2011, Shanghai, China. (PDF)(BibTex)

            • C. Jiang, Y. Shi, Y.T. Hou, and S. Kompella, "On optimal throughput-energy curve for multi-hop wireless networks," IEEE INFOCOM 2011, pp. 1341-1349, April 10-15, 2011, Shanghai, China. (PDF)(BibTex)

            • Y. Shi, L. Xie, Y.T. Hou, and H.D. Sherali, "On renewable sensor networks with wireless energy transfer," IEEE INFOCOM 2011, pp. 1350-1358, April 10-15, 2011, Shanghai, China. (PDF)(BibTex)

            • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data", IEEE INFOCOM 2011, Shanghai, China, April 2011 (Acceptance ratio = 291/1823 = 16%) (PDF)(BibTex)
            • Y. Shi, J. Liu, C. Jiang, C. Gao, and Y.T. Hou, "An optimal link layer model multi-hop MIMO networks," IEEE INFOCOM 2011, pp. 1916-1924, April 10-15, 2011, Shanghai, China. (Best Paper Award Runner-Up). (PDF)(BibTex)


            2010

            Book:

            Book Chapter:

            • A.M. Wyglinski, M. Nekovee, and Y.T. Hou, "When radio meets software", in Cognitive Radio Communications and Networks, Chapter 1, pp. 1-12, edited by Alexander M.Wyglinski, Maziar Nekovee, and Y. Thomas Hou, Elsevier Inc., 2010. ISBN: 978-0-12-374715-0.(PDF) (BibTex)
            • Y. Shi and Y.T. Hou, "Cross-layer optimization for multi-hop cognitive radio networks", in Cognitive Radio Communications and Networks, Chapter 12, pp. 335-363, edited by Alexander M. Wyglinski, Maziar Nekovee, and Y. Thomas Hou, Elsevier Inc., 2010. ISBN: 978-0-12-374715-0.(PDF)(BibTex)
            • Ming Li, W. Lou, and Kui Ren, "Secure device pairing", in Encyclopedia of Cryptography and Security (2nd ed.), H. Tilborg and S. Jajodia Ed., Springer, 2010 (PDF)(BibTex)
            • Shucheng Yu, W. Lou, and Kui Ren, "Privacy-preserving user authentication in wireless access networks", in Encyclopedia of Cryptography and Security (2nd ed.), H. Tilborg and S. Jajodia Ed., Springer, 2010 (PDF)(BibTex)

            Refereed magazine paper:

            • C. Wang, K. Ren, W. Lou and J. Li, "Towards publicly auditable secure cloud data storage services", IEEE Networks Magazine special issue on Future Internet: New Applications and Emerging Services, vol. 24, issue 4, July/August 2010. (PDF)(BibTex)
            • M. Li, W. Lou and K. Ren, "Data security and privacy in wireless body area networks", IEEE Wireless Communications Magazine special issue on Wireless Technologies for E-healthcare, vol. 17, no. 1, February 2010. (PDF)(BibTex)

            Refereed journal papers:

            • K. Zeng, Z. Yang, and W. Lou, "Opportunistic routing in multi-radio multi-channel multi-hop wireless networks", IEEE Transactions on Wireless Communications, vol. 9, issue 11, November 2010. (PDF)(BibTex)
            • Y. Shi, Y.T. Hou, H. Zhou, and S.F. Midkiff, "Distributed cross-layer optimization for cognitive radio networks," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 4058-4069, October 2010. (PDF)(BibTex)

            • D. Hu, S. Mao, Y.T. Hou, and J.H. Reed, "Scalable video multicast in cognitive radio networks," IEEE Journal on Selected Areas in Communications, vol. 28, no. 3, pp. 434-444, April 2010. (PDF)(BibTex)

            • S. Yu, K. Ren, and W. Lou, "Attribute-based on-demand multicast group setup with receiver anonymity," Computer Networks, vol.54, issue 3, February 2010. (PDF)(BibTex)
            • K. Ren, S. Yu, W. Lou, and Y. Zhang, "PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks", IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 2, February 2010. (PDF)(BibTex)

            Refereed conference papers:

            • Z. Yang, M. Li, W. Lou, "CodePlay: Live Multimedia Streaming in VANETs using Symbol-Level Network Coding,'' The 18th IEEE International Conference on Network Protocols (ICNP 2010), Kyoto, Japan, Oct. 5-8, 2010 (Acceptance ratio = 31/170 = 18%). (PDF)(BibTex)
            • M.Li, S. Yu, K. Ren and W. Lou. "Securing Personal Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings," 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, Sep 7-9, 2010 (Acceptance ratio = 28/112=25%). (PDF)(BibTex)
            • C. Wang, N. Cao, J. Li, K. Ren and W. Lou, "Secure ranked keyword search over encrypted cloud data", The 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21-25, 2010 (Acceptance ratio = 84/585 = 14%) (PDF)(BibTex)
            • N. Cao, Q. Wang, K. Ren, and W. Lou, "Distributed storage coding for flexible and efficient data dissemination and retrieval in wireless sensor networks," International Conference on Communications (ICC 2010), Cape Town, South Africa, May 2010. (PDF)(BibTex)
            • S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation", 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 13-16, 2010 (Acceptance ratio = 25/166 = 15%) (PDF)(BibTex)
            • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing", IEEE INFOCOM 2010, San Diego, CA, March 2010 (Acceptance ratio = 276/1575 = 17.5%) (PDF)(BibTex)
            • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing", IEEE INFOCOM 2010, San Diego, CA, March 2010 (Acceptance ratio = 276/1575 = 17.5%) (PDF)(BibTex)
            • J. Liu, Y. Shi, and Y.T. Hou, "A tractable and accurate cross-layer model for multi-hop MIMO ad hoc networks," IEEE INFOCOM 2010, March 15-19, 2010, San Diego, CA, USA. (PDF)(BibTex)

            • S. Sharma, Y. Shi, J. Liu, Y.T. Hou, "Is network coding always good for cooperative communications?" IEEE INFOCOM 2010, March 15-19, 2010, San Diego, CA, USA. (PDF)(BibTex)

            • S. Sharma, Y. Shi, Y.T. Hou, H.D. Sherali, and S. Kompella, "Cooperative communications in multi-hop wireless networks: Joint flow routing and relay node assignment," IEEE INFOCOM 2010, March 15-19, 2010, San Diego, CA, USA. (PDF)(BibTex)

            • J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing", IEEE INFOCOM 2010 mini-conference, San Diego, CA, March 2010 (PDF)(BibTex)
            • M. Li, S. Yu, W. Lou, and K. Ren, "Group device pairing based secure sensor association and key management for body area networks", IEEE INFOCOM 2010, San Diego, CA, March 2010 (Acceptance ratio = 276/1575 = 17.5%) (PDF)(BibTex)
            • K. Zeng, Z. Yang, and W. Lou, "Opportunistic routing in multi-radio multi-channel multi-hop wireless networks", IEEE INFOCOM 2010 mini-conference, San Diego, CA, March 2010 (PDF)(BibTex)

            2009

            Book Chapter:

            • Y. Shi and Y.T. Hou, "Analytical models for multi-hop cognitive radio networks", in Cognitive Radio Networks, Chapter 15, pp. 383-406, edited by Yang Xiao and Fei Hu, Auerbach Publications, CRC Press, Boca Raton, FL, 2009. ISBN-13: 978-1-4200-6420-9. (PDF)(BibTex)

            Refereed magazine paper:

            • W. Lou and K. Ren, "Security, privacy, and accountability in wireless access networks", IEEE Wireless Communications Magazine, vol. 16, issue 4, August 2009 (PDF)(BibTex)

            Refereed journal papers:

            • Y. Shi, and Y.T. Hou, "Optimal base station placement in wireless sensor networks," ACM Transactions on Sensor Networks, vol. 5, no. 4, November 2009. (PDF)(BibTex)

            • K. Ren, S. Yu, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks", IEEE Transactions on Vehicular Technology, vol. 58, no. 8, October 2009 (PDF)(BibTex)
            • Y. Shi, Y.T. Hou, and H. Zhou, "Per-node based optimal power control for multi-hop cognitive radio networks," IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5290-5299, October 2009.(PDF)(BibTex)

            • K. Zeng, Z. Yang, and W. Lou, "Location-aided opportunistic forwarding in multirate and multihop wireless networks", IEEE Transactions on Vehicular Technology, vol. 58, no. 6, July 2009 (PDF)(BibTex)
            • K. Ren, W. Lou, B. Zhu, and S. Jajodia, "Secure and efficient multicast in wireless sensor networks allowing ad-hoc group formation," IEEE Transactions on Vehicular Technology, vol. 58, no. 4, May 2009 (PDF)(BibTex)
            • W. Lou, W. Liu, Y. Zhang, and Y. Fang, "Improving network security by multipath routing in mobile ad hoc networks," Wireless Networks, vol. 15, issue 3, March 2009 (available online) (PDF)(BibTex)
            • A.B. MacKenzie, J.H. Reed, P. Athanas, C.W. Bostian, R.M. Buehrer, L.A. DaSilva, S.W. Ellingson, Y.T. Hou, M. Hsiao, J.-M. Park, C. Patterson, S. Raman, C.R.C.M. da Silva, "Cognitive radio and networking research at Virginia Tech," Proceedings of the IEEE, vol. 97, no. 4, pp. 660–688, April 2009.(PDF)(BibTex)
            • S. Kompella, S. Mao, Y.T. Hou, and H.D. Sherali, "On path selection and rate allocation for concurrent video sessions in ad hoc networks," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 212-224, February 2009. (PDF)(BibTex)
            • K. Zeng, K. Ren, W. Lou, and P. J. Moran, "Energy aware efficient geographical routing in lossy wireless sensor networks with environmental energy supply," Wireless Networks, vol. 15, issue 1, January 2009 (PDF)(BibTex)
            • Y. Shi, Y.T. Hou, and A. Efrat, "Algorithm design for a class of base station location problems in sensor networks," ACM/Springer Wireless Networks (WINET), vol. 15, no. 1, pp. 21-38, January 2009. (PDF)(BibTex)

            • S.M. Hur, S. Mao, Y.T. Hou, K. Nam, and J.H. Reed, "Exploiting location information for concurrent transmissions in multi-hop wireless networks," IEEE Transactions on Vehicular Technology. vol. 58, no. 1, pp. 314– 323, January 2009.(PDF)(BibTex)
            • Kai Zeng, Kui Ren, W. Lou, and Patrick J. Moran, "Energy aware efficient geographical routing in lossy wireless sensor networks with environmental energy supply," ACM/Springer Wireless Networks (WINET), vol. 15, issue 1, January 2009.(PDF)(BibTex)

            Refereed conference papers:

            • Z. Yang, M. Li. and W. Lou, "R-Code: Network coding based reliable broadcast in wireless mesh networks with unreliable links", IEEE Global Telecommunications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, November 30 - December 4, 2009 (PDF)(BibTex)
            • J. Liu, Y.T. Hou, and H.D. Sherali, "Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels," in Proc. Conference on Information Sciences and Systems (CISS 2009), pp. 606–611, Baltimore, MD, March 18–20, 2009.(PDF)(BibTex)
            • Q. Wang, K. Ren, C. Wang, and W. Lou, "Efficient fine-grained data access control in wireless sensor networks", IEEE Military Communication Conference (MILCOM 2009), Boston, MA, USA, October 18-21, 2009 (PDF)(BibTex)
            • M. Li, W. Lou, and K. Zeng, "OppCast: Opportunistic broadcast of warning messages in VANETs with unreliable links", The 6th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2009), Macau SAR, China, October 12-15, 2009 (acceptance ratio = 62/245 = 25%) (PDF)(BibTex)
            • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public auditability and data dynamics for storage security in cloud computing", 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint Malo, France, September 21-25, 2009 (Acceptance ratio = 42/220 = 19%) (PDF)(BibTex)
            • S. Yu, K. Ren, W. Lou, and J. Li, "Defending against key abuse attacks in KP-ABE enabled broadcast systems", The 5th International ICST Conference on Security and Privacy in Communication Networks (Securecomm 2009), Athens, Greece, September 14-18, 2009 (Acceptance ratio = 20/76 = 26.3%) (PDF)(BibTex)
            • Z. Yang, M. Li. and W. Lou, "A network coding approach to reliable broadcast in wireless mesh networks", International Conference on Wireless Algorithms, Systems, and Applications (WASA 2009), Boston, MA, USA, August 16-18, 2009. (PDF)(BibTex)
            • C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing," 17th IEEE International Workshop on Quality of Service (IWQoS 2009), Charleston, South Carolina, July 13-15, 2009 (PDF)(BibTex)
            • Z. Yang, K. Zeng, and W. Lou, "FSA: A fast coordination scheme for opportunistic routing," International Conference on Communications (ICC 2009), Dresden, Germany, June 2009. (PDF)(BibTex)
            • S. Yu, K. Ren, and W. Lou, "Accountable attribute-based broadcast", IEEE Symposium on Security and Privacy ( S&P 2009), Oakland, CA, May 17-20, 2009 (poster) (PDF)(BibTex)
            • J. Liu, Y.T. Hou, Y. Shi, and H.D. Sherali, "On performance optimization for multi-carrier MIMO ad hoc networks," in ACM Mobihoc, pp. 43-54, New Orleans, Louisiana, May 18-21, 2009. (PDF)(BibTex)

            • Y. Shi, Y.T. Hou, Jia Liu, and S. Kompella, "How to correctly use the protocol interference model for multihop wireless networks," in ACM Mobihoc, pp. 239-248, New Orleans, Louisiana, May 18-21, 2009. (PDF)(BibTex)

            • S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks", IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 2009 (282/1435 = 20%) (PDF)(BibTex)
            • Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and secure sensor data storage with dynamic integrity assurance", IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 2009 (282/1435 = 20%) (PDF)(BibTex)

            2008

          Book:

          • K. Ren, W. Lou, Communication Security in Wireless Sensor Networks, VDM Verlag Dr. Muller, Germany, ISBN: 978-3-8364-3668-7, 2008(BibTex)

          Book Chapter:

          • S. Mao, Y.T. Hou, H.D. Sherali, and S.F. Midkiff, "Routing for video communications over wireless ad hoc networks", in Broadband Mobile Multimedia: Techniques and Applications, Chapter 5, pp. 157-192, edited by Y. Zhang, S. Mao, L.T. Yang and T.M. Chen, CRC Press, New York, NY, June 2008. ISBN-10: 1420051849; ISBN-13: 978-1-4200-5184-1. (PDF)(BibTex)
          • Kui Ren, W. Lou, Yanchao Zhang, "Multi-user broadcast authentication in wireless sensor networks," in Encyclopedia on Ad Hoc and Ubiquitous Computing, D. Agrawal Ed., World Scientific, 2008.(PDF)(BibTex)

          Refereed magazine papers:

          • S. Mao, Y.T. Hou and M.-Y. Wu, "Exploiting edge capabilities for wireless sensor networking," IEEE Wireless Communications, vol. 15, issue 4, pp. 67–73, August 2008.(PDF)(BibTex)
          • R. Chen, J.-P. Park, Y.T. Hou, and J. Reed, "Toward secure distributed spectrum sensing in cognitive radio networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 50–55, April 2008.(PDF)(BibTex)
          • S. Mao, Y.T. Hou, H.D. Sherali, and S.F. Midkiff, "Multimedia-centric routing for multiple description video in wireless mesh networks," IEEE Network Magazine, vol. 22, no. 1, pp. 19–24, January/February 2008.(PDF)(BibTex)

          Refereed journal papers:

          • K. Zeng, W. Lou, and H. Zhai, "Capacity of opportunistic routing in multirate and multihop wireless networks", IEEE Transactions on Wireless Communications, vol. 7, no. 12, December 2008. (PDF)(BibTex)
          • W. Guo, X. Huang, W. Lou, and C. Liang, "On relay node placement and assignment for two-tiered wireless networks," Mobile Networks and Applications (MONET) special issue on "Advances in wireless mesh networks," (2008) 13:186-197. (PDF)(BibTex)
          • Y. Shi and Y.T. Hou, "On the capacity of UWB-based wireless sensor networks," Elsevier Computer Networks, vol. 52, issue 14, pp. 2797–2804, October 2008.(PDF)(BibTex)
          • Y.T. Hou, A.M Wyglinski, M. Nekovee, H. Zhang, R. Chandramouli, and F. Martin, "Guest editorial: Special issue on cognitive radio oriented wireless networks and communications," Springer Mobile Networks and Applications (MONET), vol. 13, no. 5, pp. 411–415, October 2008.(PDF)(BibTex)
          • J. Liu, Y.T. Hou, and Y. Shi, and H.D. Sherali, "Cross-layer optimization for MIMO-based wireless ad hoc networks: Routing, power allocation, and bandwidth allocation," IEEE Journal on Selected Areas in Communications, vol. 26, no. 6, pp. 913-926, August 2008. (PDF)(BibTex)

          • Y. Shi, Y.T. Hou, and H.D. Sherali, "Cross-layer optimization for data rate utility problem in UWB-based ad hoc networks," IEEE Transactions on Mobile Computing, vol. 7, no. 6, pp. 764-777, June 2008. (PDF)(BibTex)

          • K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 7, no. 5, pp. 585-598, May 2008 (PDF)(BibTex)
          • Y.T. Hou, Y. Shi, and H.D. Sherali, "Rate allocation and network lifetime problems for wireless sensor networks," IEEE/ACM Transactions on Networking, vol. 16, no. 2, pp. 321-334, April 2008. (PDF)(BibTex)

          • J. Liu, Y.T. Hou, Y. Shi, H.D. Sherali, and S. Kompella, "On the capacity of multiuser MIMO networks with interference," IEEE Transactions on Wireless Communications, vol. 7, no. 2, pp. 488-494, February 2008. (PDF)(BibTex)

          • K. Ren, K. Zeng, and W. Lou, "Secure and fault-tolerant event boundary detection in wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 7, no. 1, January 2008. (PDF)(BibTex)
          • Y.T. Hou, Y. Shi, and H.D. Sherali, "Spectrum sharing for multi-hop networking with cognitive radios," IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 146-155, January 2008. (PDF)(BibTex)

          Refereed conference papers:

          • J. Liu and Y.T. Hou, "On the performance of MIMO-based ad hoc networks under imperfect CSI," in Proc. IEEE Military Communications Conference (MILCOM), pp. 3244–3250, San Diego, CA, November 16–19, 2008.(PDF)(BibTex)
          • Y. Shi, Y.T. Hou, and S. Kompella, "A cross-layer approach to multi-hop networking with cognitive radios," in Proc. IEEE Military Communications Conference (MILCOM), pp. 3723–3729, San Diego, CA, November 17–19, 2008.(PDF)(BibTex)
          • K. Zeng, S. Yu, K. Ren, W. Lou, and Y. Zhang, "Towards Secure Link Quality Measurement in Multihop Wireless Networks," IEEE Global Telecommunications Conference (GLOBECOM 2008), New Orleans, LA, USA, November 30-December 4, 2008. (PDF)(BibTex)
          • S. Yu, K. Ren, and W. Lou, "Attribute-Based Content Distribution with Hidden Policy," The 4th Workshop on Secure Network Protocols (NPSec 2008), Orlando, FL, USA, October 19, 2008, in conjunction with ICNP 2008. (PDF)(BibTex)
          • S. Yu, K. Ren, and W. Lou, "Attribute-Based On-Demand Multicast Group Setup with Membership Anonymity," The 4th International Conference on Security and Privacy in Communication Networks ( SecureComm 2008), Istanbul, Turkey, September 22-25. (short paper) (PDF)(BibTex)
          • Wei Ren, Kui Ren, W. Lou, and Yanchao Zhang, "Efficient User Revocation for Privacy-aware PKI," The Fifth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2008), Hong Kong, July 28-31.(PDF)(BibTex)
          • Ming Li and W. Lou, "Opportunistic Broadcast of Emergency Messages in Vehicular Ad Hoc Networks with Unreliable Links," The Fifth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2008), Hong Kong, July 28-31. (invited paper)(PDF)(BibTex)
          • K. Ren and W. Lou, "A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks", The 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 17-20, 2008 (Acceptance ratio < 16%) (PDF)(BibTex)
          • Wei Ren, Kui Ren, and W. Lou, "Optimized User Revocation for Group Signature Based Privacy-aware PKI," The First International Workshop on Wireless Security and Privacy (WiSP'08), in conjunction with ICDCS 2008.(PDF)(BibTex)
          • Y. Shi, S. Sharma, and Y.T. Hou, "Optimal relay assignment for cooperative communications," in Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), May 26-30, 2008, Hong Kong, China. (PDF)(BibTex)
          • J. Liu, Y.T. Hou, H.D. Sherali, "On the maximum weighted sum-rate of MIMO Gaussian broadcast channels," in Proc. IEEE International Conference on Communications (ICC), pp. 3664–3668, May 19–23, 2008, Beijing, China.(PDF)(BibTex)
          • J. Liu, and Y.T. Hou, and H.D. Sherali, "Routing and power allocation optimization for MIMO-based ad hoc networks with dirty paper coding," in Proc. IEEE International Conference on Communications (ICC) - Wireless Networking Symposium, May 19-23, 2008, Beijing, China. (Best Paper Award) (PDF)(BibTex)

          • Zhiguo Wan, Kui Ren, W. Lou, and Bart Preneel,  "Anonymous ID-based group key agreement for wireless networks," IEEE Wireless Communications and Networking Conference (WCNC’2008), Las Vegas, Mar-Apr 2008 (PDF)(BibTex)
          • Y. Shi, and Y.T. Hou, "Theoretical results on base station movement problem for sensor network," IEEE INFOCOM 2008, April 13-18, 2008, Phoenix, AZ, USA. (Best Paper Award) (PDF)(BibTex)

          • Y. Shi, and Y.T. Hou, "A distributed optimization algorithm for multi-hop cognitive radio networks," IEEE INFOCOM 2008, April 13-18, 2008, Phoenix, AZ, USA. (PDF)(BibTex)

          • J. Liu, and Y.T. Hou, "Weighted Proportional Fairness Capacity of Gaussian MIMO Broadcast Channels," IEEE INFOCOM 2008, April 13-18, 2008, Phoenix, AZ, USA. (PDF)(BibTex)

          • K. Zeng, W. Lou, and H. Zhai, "On end-to-end throughput of opportunistic routing in multirate and multihop wireless networks", IEEE INFOCOM 2008, Phoenix, AZ, April 15-17, 2008 (Acceptance ratio = 21%). (PDF)(BibTex)

          Earlier Publications