Shouling Ji
Shouling Ji
Zhejiang University & Georgia Institute of Technology
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Structural data de-anonymization: Quantification, practice, and implications
S Ji, W Li, M Srivatsa, R Beyah
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
962014
Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization
S Ji, W Li, P Mittal, X Hu, R Beyah
24th {USENIX} Security Symposium ({USENIX} Security 15), 303-318, 2015
882015
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
S Ji, W Li, NZ Gong, P Mittal, RA Beyah
NDSS, 2015
772015
Optimal distributed data collection for asynchronous cognitive radio networks
Z Cai, S Ji, J He, AG Bourgeois
2012 IEEE 32nd international conference on distributed computing systems …, 2012
622012
Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey
S Ji, P Mittal, R Beyah
IEEE Communications Surveys & Tutorials 19 (2), 1305-1326, 2016
582016
Structure based data de-anonymization of social networks and mobility traces
S Ji, W Li, M Srivatsa, JS He, R Beyah
International Conference on Information Security, 237-254, 2014
572014
Constructing load-balanced data aggregation trees in probabilistic wireless sensor networks
J He, S Ji, Y Pan, Y Li
IEEE Transactions on Parallel and Distributed Systems 25 (7), 1681-1690, 2013
552013
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
Z Liu, H Seo, J Großschädl, H Kim
IEEE Transactions on Information Forensics and Security 11 (7), 1385-1397, 2015
532015
Capacity of dual-radio multi-channel wireless sensor networks for continuous data collection
S Ji, Y Li, X Jia
2011 Proceedings IEEE INFOCOM, 1062-1070, 2011
522011
Snapshot and continuous data collection in probabilistic wireless sensor networks
S Ji, R Beyah, Z Cai
IEEE Transactions on Mobile Computing 13 (3), 626-637, 2013
512013
Textbugger: Generating adversarial text against real-world applications
J Li, S Ji, T Du, B Li, T Wang
arXiv preprint arXiv:1812.05271, 2018
492018
Approximation algorithms for load-balanced virtual backbone construction in wireless sensor networks
JS He, S Ji, Y Pan, Z Cai
Theoretical Computer Science 507, 2-16, 2013
482013
Distributed data collection in large-scale asynchronous wireless sensor networks under the generalized physical interference model
S Ji, Z Cai
IEEE/ACM Transactions on Networking 21 (4), 1270-1283, 2012
472012
Distributed data collection and its capacity in asynchronous wireless sensor networks
S Ji, Z Cai
2012 Proceedings IEEE INFOCOM, 2113-2121, 2012
432012
Distributed and asynchronous data collection in cognitive radio networks with fairness consideration
Z Cai, S Ji, J He, L Wei, AG Bourgeois
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2020-2029, 2013
392013
Certchain: Public and efficient certificate audit based on blockchain for tls connections
J Chen, S Yao, Q Yuan, K He, S Ji, R Du
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2060-2068, 2018
382018
Continuous Data Collection Capacity of Wireless Sensor Networks Under Physical Interference Model
S Ji, R Beyah, Y Li
382011
Dual encoding for zero-example video retrieval
J Dong, X Li, C Xu, S Ji, Y He, G Yang, X Wang
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2019
372019
Model-reuse attacks on deep learning systems
Y Ji, X Zhang, S Ji, X Luo, T Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
362018
Snapshot/continuous data collection capacity for large-scale probabilistic wireless sensor networks
S Ji, R Beyah, Z Cai
2012 Proceedings IEEE INFOCOM, 1035-1043, 2012
362012
The system can't perform the operation now. Try again later.
Articles 1–20