-
T. Zheng, Z. Sun, and K. Ren, "Fid: Function modeling-based data-independent and channel-robust physical-layer identication," in INFOCOM, 2019 Proceedings IEEE, 2019. [cite]
-
M. Zhou, Q. Wang, T. Lei, Z. Wang, K. Ren, "Enabling Online Robust Barcode-based Visible Light Communication with Realtime Feedback" in IEEE Transactions on Wireless Communications, 2018. [cite]
-
Z. Ba, K. Ren, "Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies," in Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on, 2017. [cite]
-
S. Chen, K. Ren, S. Piao, C. Wang, Q. Wang, J. Weng, L. Su, A. Mohaisen, "You can hear but you cannot steal: Defending against voice impersonation attacks on smartphones," in Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on, 2017. [cite]
-
S. Chen, Z. Qin, G. Xing, K. Ren, "Securing acoustics-based short-range communication systems: an overview," in Journal of Communications and Information Networks, 2016. [cite]
-
Q. Wang, K. Ren, M. Zhou, T. Lei, D. Koutsonikolas, and L. Su, "Messages behind the sound: Real-time hidden acoustic signal capture with smartphones," in Proceedings of The 22nd Annual International Conference on Mobile Computing and Networking (MobiCom 16), 2016. [cite]
-
C. Song, A. Wang, W. Xu, and K. Ren, "Eyeveri: A secure and usable approach for smart-phone user authentication," in Proceedings of IEEE International Conference on Computer Communications (INFOCOM'16), 2016. [cite]
-
Wang, Qian and Ren, Kui and Li, Guangcheng and Xia, Chenbo and Chen, Xiaobing and Wang, Zhibo and Zou, Qin "Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice", Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security (CCS'15), 2015 [cite]
-
S. Chen and M. Li and K. Ren and X. Fu and C. Qiao "Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing", Embedded Networked Sensor Systems (SenSys 2015), 2015 The 13th ACM Conference on , 2015 [cite]
-
S. Chen and M. Li and K. Ren and C. Qiao, "CrowdMap: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos", Distributed Computing Systems (ICDCS), 2015 the 35th IEEE International Conference on, 2015 [cite]
-
Wang, Qian and Zhou, Man and Ren, Kui and Lei, Tao and Li, Jikun and Wang, Zhibo "Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes", Distributed Computing Systems (ICDCS), 2015 IEEE 35th International Conference on, 2015[cite]
-
Ren, K. and Wang, Q. and Ma, D. and Jia, X. "Securing emerging short range wireless communications: the state of the art", Wireless Communications, IEEE, 2014[cite]
-
B. Zhang and Q. Zhan and J. Wang and K. Ren and C. Wang and D. Ma, "PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.", IEEE Internet of Things, 2014 [cite]
-
K. Ren and Q. Wang and D. Ma and X. Jia, "Securing emerging short range wireless communications: the state of the art", Wireless Communications, IEEE, 2014 [cite]
-
B. Zhang and K. Ren and G. Xing and X. Fu and C. Wang, "SBVLC: Secure Barcode-based Visible Light Communication for Smartphones", Proc. of IEEE International Conference on Computer Communications (INFOCOM'14), 2014 [cite]
-
Li, Muyuan and Zhu, Haojin and Gao, Zhaoyu and Chen, Si and Yu, Le and Hu, Shangqian and Ren, Kui, "All Your Location Are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking", Proceedings of the 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014 [cite]
-
Q. Yue and Z. Ling and X. Fu and B. Liu and K. Ren and W. Zhao, "Blind Recognition of Touched Keys on Mobile Devices", Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS'14), 2014 [cite]
-
Q. Sun and Q. Wang and K. Ren and X. Jia, "Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum Supply", Network Protocols (ICNP), 2014 IEEE 22nd International Conference on, 2014 [cite]