Long Cheng
Long Cheng
Associate Professor, School of Computing, Clemson University
E-mail confirmado em - Página inicial
Citado por
Citado por
Enterprise Data Breach: Causes, Challenges, Prevention, and Future Directions
L Cheng, F Liu, D Yao
WIREs Data Mining and Knowledge Discovery. Wiley., 2017
Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities
Y Luo, Y Xiao, L Cheng, G Peng, D Yao
ACM Computing Surveys (CSUR) 54 (5), 1-36, 2021
QoS aware geographic opportunistic routing in wireless sensor networks
L Cheng, J Niu, J Cao, SK Das, Y Gu
IEEE Transactions on Parallel and Distributed Systems 25 (7), 1864-1875, 2014
R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks
J Niu, L Cheng, Y Gu, L Shu, SK Das
IEEE Transaction on Industrial Informatics 10 (1), 784 - 794, 2013
Social-Loc: Improving indoor localization with social sensing
J Jun, Y Gu, L Cheng, B Lu, J Sun, T Zhu, J Niu
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems …, 2013
WicLoc: An Indoor Localization System based on WiFi Fingerprints and Crowdsourcing
J Niu, B Wang, L Cheng, JJPC Rodrigues
IEEE International Conference on Communications (ICC), 2015
Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks
L Cheng, K Tian, DD Yao
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Towards minimum-delay and energy-efficient flooding in low-duty-cycle wireless sensor networks
L Cheng, J Niu, C Luo, L Shu, L Kong, Z Zhao, Y Gu
Computer Networks 134, 2018
Blockchain-Based Mobile Crowd Sensing in Industrial Systems
J Huang, L Kong, HN Dai, W Ding, L Cheng, G Chen, X Jin, P Zeng
IEEE Transactions on Industrial Informatics 16 (10), 6553-6563, 2020
Pallas: Self-bootstrapping Fine-grained Passive Indoor Localization Using WiFi Monitors
C Luo, L Cheng, MC Chan, Y Gu, J Li, M Zhong
IEEE Transactions on Mobile Computing (TMC), 2016
PSOTrack: A RFID-Based System for Random Moving Objects Tracking in Unconstrained Indoor Environment
J Li, G Feng, W Wei, C Luo, L Cheng, H Wang, H Song, Z Ming
IEEE Internet of Things Journal 5 (6), 4632-4641, 2018
Low-overhead wifi fingerprinting
J Jun, L He, Y Gu, W Jiang, G Kushwaha, A Vipin, L Cheng, C Liu, T Zhu
IEEE Transactions on Mobile Computing 17 (3), 590-603, 2017
Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms
L Cheng, C Wilson, S Liao, J Young, D Dong, H Hu
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Measuring the effectiveness of privacy policies for voice assistant applications
S Liao, C Wilson, L Cheng, H Hu, H Deng
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
On Threat Modeling and Mitigation of Medical Cyber-Physical Systems
H Almohri, L Cheng, D Yao, H Alemzadeh
Second IEEE International Workshop on Security, Privacy, and Trustworthiness …, 2017
IOTSAFE: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery
W Ding, H Hu, L Cheng
Proceedings of the 28th Network and Distributed System Security Symposium (NDSS), 2021
Anomaly detection as a service: challenges, advances, and opportunities
D Yao, X Shu, L Cheng, SJ Stolfo, E Bertino, R Sandhu
Morgan & Claypool, 2018
ZiLoc: Energy Efficient WiFi Fingerprint-based Localization with Low-Power Radio
J Niu, B Lu, L Cheng, Y Gu, L Shu
WCNC, 2013
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection
S Yang, L Cheng, Y Zeng, Z Lang, H Zhu, Z Shi
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
Compressive Sensing based Data Quality Improvement for Crowd-Sensing Applications
L Cheng, J Niu, L Kong, C Luo, Y Gu, W He, SK Das
Journal of Network and Computer Applications (JNCA), 2016
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20