Welcome to Security Subgroup of BBCR Lab

Wireless Networks

Journal Papers

  1. J. Ni, A. Zhang, X. Lin, and X. Shen, "Security, Privacy and Fairness in Fog-Based Vehicular Crowdsensing ", IEEE Communications Magazine, to appear.
  2. D. Chen, N. Zhang, Z. Qin, X. Mao, Z. Qin, X. Shen, and X.Y. Li, "S2M: A Lightweight Acoustic Fingerprints based Wireless Device Authentication Protocol", IEEE Internet of Things Journal, Vol. 4, No. 1, pp. 88-100, 2017.
  3. K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. Shen "Security and Privacy for Smart City Applications: Challenges and Solutions", IEEE Communications Magazine Vol. 55, No. 1, pp. 122-129, 2017.
  4. J. Ren, Y. Zhang, Q. Ye, K. Yang, K. Zhang, and X. Shen, "Exploiting Secure and Energy Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks", IEEE Trans. on Wireless Communications Vol. 15, No. 10, pp. 6813-6827, 2016.
  5. C. Lai, R. Lu, H. Li, D. Zheng, and X. Shen, "Secure Machine-Type Communications in LTE Networks", Wireless Communications and Mobile Computing (Wiley), Vo. 16, pp. 1495-1509, 2016.
  6. H. Zhu, C. Fang, Y. Liu, C. Chen, M. Li and X. Shen, " You Can Jam But You Can't Hide: Defending Against Jamming Attacks for Geo-location Database Driven Spectrum Sharing ", IEEE J. Selected Areas of Communications, to appear.
  7. J. Ren, Y. Zhang, Q. Ye, K. Yang, K. Zhang and X. Shen, " Exploiting Secure and Energy Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks ", IEEE Trans. on Wireless Communications, to appear.
  8. C. Lai, R. Lu, D. Zheng, H. Li and X. Shen, " GLARM: Group-based Lightweight Authentication Scheme for Resource-constrained Machine to Machine Communications ", Computer Networks (Elsevier), to appear.
  9. J. Ren, Y. Zhang, K. Zhang and X. Shen, "Adaptive and Channel-aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks ", IEEE Trans. Wireless Communications, Vol. 15, No. 5, pp. 3718-3731, 2016.
  10. J. Ren, Y. Zhang, K. Zhang and X. Shen, "Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks ", IEEE Trans. on Industrial Informatics, Vol. 12, No. 2, 788-800, 2016.
  11. K. Yang, K. Zhang, J. Ren and X. Shen, " Security and Privacy in Mobile Crowdsourcing Networks: Challenges and Opportunities ", IEEE Communications Magazine, Vol. 53, No. 8, pp. 75-81, 2015.
  12. J. Ren, Y. Zhang, K. Zhang and X. Shen, " Exploiting Mobile Crowdsourcing for Pervasive Cloud Services: Challenges and Solutions ", IEEE Communications Magazine, Vol. 53, No. 4, pp. 98-105, 2015.
  13. C. Lai, R. Lu, D. Zheng, H. Li, and X. Shen, "Towards Secure Large-scale Machine-to-Machine Communications in 3GPP Networks: Challenges and Solutions", IEEE Communications Magazine, Vol. 53, No. 12, pp. 12-19, 2015.
  14. C. Lai, R. Lu, H. Li, D. Zheng, X. Shen, "Secure Machine-Type Communications in LTE Networks", Wireless Communications and Mobile Computing (Wiley), to appear.
  15. Z. Shi, S. Bi, H. Zhang, R. Lu, and X. Shen, "Improved Auxiliary Particle Filter-based Synchronization of Chaotic Colpitts Circuit and Its Application to Secure Communication", Wireless Communications and Mobile Computing (Wiley), Vol. 15, Issue 10, pp. 1456-1470, 2015.
  16. J. Ren, Y. Zhang, K. Zhang, and X. Shen, "Social Aware Crowdsourcing with Reputation Management in Mobile Sensing", Computer Communications (Elsevier), Vol. 65, pp. 55-65, July 2015.
  17. M. E. Mahmoud, X. Lin, and X. Shen, "Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks", IEEE Trans. on Parallel and Distributed Systems, Vol. 26, Issue 4, pp1140-1153, 2015.
  18. M. E. Mahmoud, S. Taha, J. Misic, and X. Shen, "Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks", IEEE Trans. on Parallel and Distributed Systems, vol.25, no.8, pp.2077-2090, August 2014.
  19. P. Zhang, C. Lin, Y. Jiang, Y. Fan, and X. Shen, "A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks", IEEE Trans. on Parallel and Distributed Systems, Vol. 25, No. 9, pp. 2211-2221, 2014.
  20. C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, X. Shen, "CPAL: A Conditional Privacy-Preserving Authentication with Access Linkability for Roaming Service", IEEE Internet of Things Journal, vol.1, no.1, pp.46-57, 2014.
  21. Z. Shi, R. Sun, R. Lu, J. Qiao, J. Chen, and X. Shen, "A Wormhole Attack Resistant Neighbor Discovery Scheme with RDMA Protocol for 60 GHz Directional Network", IEEE Trans. on Emerging Topics in Computing, vol.1, no.2, pp.341-352, 2013.
  22. C. Lai, H. Li, X. Li, J. Cao, "A Novel Group Access Authentication and Key Agreement Protocol for Machine-Type Communication", Transactions on Emerging Telecommunications Technologies, vol.26, no.3, pp.414-431, 2013.
  23. M. E. Mahmoud, and X. Shen, "A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks", IEEE Trans. on Parallel and Distributed Systems, vol.24, no.2, pp.209-224, 2013.
  24. A. Wasef, and X. Shen, "EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks", IEEE Trans. on Mobile Computing, Vol. 12, No. 1, pp. 78-89, 2013.
  25. M. E. Mahmoud, and X. Shen, "A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks", IEEE Trans. on Parallel and Distributed Systems, Vol. 23, No. 10, pp. 1805-1818, 2012.
  26. K. Suto, H. Nishiyama, X. Shen, and N. Kato, "Designing P2P Networks Tolerant to Attacks and Faults Based on Bimodal Degree Distribution", J. Communications - special issue on Security and Privacy in Communication Systems and Networks, Vol. 7, No. 8, pp. 587-595, 2012.
  27. R. Zeng, Y. Jiang, C. Lin, Y. Fan, and X. Shen, "A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting", IEEE Trans. on Parallel and Distributed Systems, Vol. 23, No. 10, pp. 1819-1830, 2012.
  28. R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks", IEEE Trans. on Parallel and Distributed Systems, Vol. 23, No. 1, pp. 32-43, 2012.
  29. C. Lai, H. Li, Y. Zhang, J. Cao, "Security Issues on Machine to Machine Communications", KSII Transaction on Internet and Information Systems, vol.6, no.2, pp.498-514, 2012.
  30. A. Liu, Z. Zheng, C. Zhang, Z. Chen, X. Shen, "Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs", IEEE Trans. on Vehicular Technology, Vol. 61, Issue 7, pp. 3255-3265, 2012.
  31. M. E. Mahmoud, and X. Shen, "ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-hop Wireless Networks", IEEE Trans. on Mobile Computing, Vol. 10, No. 7, pp. 997-1010, 2011.
  32. Y. Fan, Y. Jiang, H. Zhu, J. Chen, and X. Shen, "Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks", IEEE Trans. on Wireless Communications, Vol. 10, No. 3, pp. 834-842, 2011.
  33. R. Zeng, Y. Jiang, C. Lin, Y. Fan, and X. Shen, "A Scalable and Robust Key Pre-distribution Scheme with Network Coding for Sensor Data Storage", Computer Networks (Elsevier), Vol. 55, No. 10, pp. 2534-2544, 2011.
  34. H. Samuel and W. Zhuang, "Preventing unauthorized messages and achieving end-to-end security in delay tolerant heterogeneous wireless networks", Journal of Communications, Special Issue on Delay Tolerant Networks, Architecture, and Applications, vol. 5, no. 2, 152-163, Feb 2010.
  35. X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks", Wireless Communications and Mobile Computing (Wiley), Vol. 10, No. 6, pp. 843-856, 2010.
  36. M. Shi, X. Shen, J.W. Mark and D. Zhao, "User Authentication and Undeniable Billing Support for Agent-Based Roaming Service in WLAN/Cellular Integrated Mobile Networks", Computer Networks (Elsevier), Vol. 52, No. 9, pp. 1693-1702, 2008.
  37. X. Lin, R. Lu, P.H. Ho, X. Shen and Z. Cao, "TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks", IEEE Trans. on Wireless Communications, Vol. 7, No. 4, pp. 1389-1399, 2008.
  38. X. Lin, X. Ling, H. Zhu, P.H. Ho, and X. Shen, "A Novel Localised Authentication Scheme in IEEE 802.11 based Wireless Mesh Networks", Int. J. of Security and Networks, Vol. 3, No. 2, pp. 122 - 132, 2008.
  39. H. Zhu, X. Lin, R. Lu, P.H. Ho, and X. Shen, "SLAB: Secure Localized Authentication and Billing Scheme for Wireless Mesh Networks", IEEE Trans. on Wireless Communications, Vol. 7, No. 10, pp. 3858-3868, 2008.
  40. Y. Jiang, C. Lin, M. Shi, and X. Shen, "Self-healing Group Key Distribution with Time-Limited Node Revocation for Wireless Sensor Networks", AD HOC Networks - special issue on Security Issues in Sensor and AD HOC Networks (Elsevier), Vol. 5, No. 1, pp. 14-23, 2007.
  41. Y. Jiang, C. Lin, M. Shi, X. Shen, and X. Chu, "A DoS and Fault-Tolerant Authentication Protocol for Group Communications in Ad Hoc Networks", Computer Communications (Elsevier), Vol. 30, Issue 11-12, pp. 2428-2441, 2007.
  42. J. Pan, L. Cai, and X. Shen, "Vulnerabilities in Distance-Indexed IP Traceback Schemes", Int. J. Sensor Networks (Invited Paper), Vol. 2, Nos. 1/2, pp. 81-94, 2007.
  43. J. Pan, L. Cai, X. Shen, and J.W. Mark, "Identity-based Secure collaboration in Wireless Ad Hoc Networks", Computer Networks (Elsevier), Vol. 51, No. 3, pp. 853-865, 2007.
  44. Y. Jiang, C. Lin, M. Shi and X. Shen, "A Self-Encryption Authentication Protocol for Teleconference Services", Int. J. Security and Networks, Vol. 1, Nos. 3/4, pp. 198-205, 2006.
  45. Y. Jiang, C. Lin, M. Shi and X. Shen, "Multiple Key Sharing and Distribution Scheme with (n, t) Threshold Mechanism for NEMO Group Communications", IEEE J. Selected Areas of Communications, Vol. 24, No. 9, pp. 1738-1747, 2006.
  46. Y. Jiang, C. Lin, X. Shen, and M. Shi, "Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks", IEEE Trans. on Wireless Communications, Vol. 5, No. 9, pp. 2569-2577, 2006.
  47. Y. Xiao, X. Shen, B. Sun, and L. Cai, "Security and Privacy in RFID and Applications in Telemedicine", IEEE Communications Magazine, Vol. 44, No. 4, pp. 64-72, 2006.
  48. M. Shi, X. Shen, and J.W. Mark, "IEEE802.11 Roaming and Authentication in Wireless LAN/Cellular Mobile Networks", IEEE Wireless Communications, Vol. 11, No. 4, 66-75, 2004.

Conference Papers

  1. J. Ni, X. Lin, Q. Xia, and X. Shen, "Dual-Anonymous Reward Distribution for Mobile Crowdsensing", Proc. IEEE ICC '17, Paris, France, May 21-25, 2017.
  2. J. Ni, K. Zhang, X. Lin, Q. Xia, and X. Shen, "Privacy-Preserving Mobile Crowdsensing for Located-Based Applications", Proc. IEEE ICC '17, Paris, France, May 21-25, 2017.
  3. X. Fang, N. Zhang, X. Sha, D. Chen, X. Wu, and X. Shen, "Physical Layer Security: A Weighted Fractional Fourier Transform based Cooperation Approach", Proc. IEEE ICC '17, Paris, France, May 21-25, 2017.
  4. X. Fang, X. Wu, N. Zhang, X. Sha, and X. Shen, "Safeguarding Physical Layer Security Using Weighted Fractional Fourier Transform", Proc. of IEEE Globecom '16, Washington D.C., USA, Dec. 4-8, 2016.
  5. J. Ni, X. Lin, K. Zhang and Y. Yu, "Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach", Proc. of IEEE Globecom '16, Washington D.C., USA, Dec. 4-8, 2016.
  6. J. Ni, X. Lin, K. Zhang, Y. Yu and X. Shen, "Device-Invisible Two-Factor Authenticated Key Agreement Protocol for BYOD", Proc. IEEE/CIC ICCC'16, Chengdu, China, July 27-29, 2016.
  7. Q. Li, K. Zhang, M. Cheffena and X. Shen, "Exploiting Dispersive Power Gain and Delay Spread for Sybil Detection in Industrial WSNs", Proc. IEEE/CIC ICCC'16, Chengdu, China, July 27-29, 2016.
  8. C. Lai, H. Li, R. Lu, R. Jiang, X. Shen, "LGTH: A Lightweight Group Authentication Protocol for Machine-Type Communication in LTE Networks", Proc. of IEEE Globecom'13, pp. 832-837, Atlanta, GA, December, 2013.
  9. M. Mahmoud, and X. Shen, "Secure and Efficient Source Location Privacy-Preserving Scheme for Wireless Sensor Networks", Proc. of IEEE ICC'12, Ottawa, Canada, June 10 - 15, 2012.
  10. M. Mahmoud, M. Barua, and X. Shen, "SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks", Proc. of IEEE Globecom'11, Houston, Texas, USA, Dec. 5-9, 2011.
  11. M. Mahmoud, and X. Shen, "Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-hop Wireless Network", Proc. of IEEE Globecom'10, Miami, Florida, USA, Dec. 6-10, 2010.
  12. Y. Fan, B. Lin, Y. Jiang, and X. Shen, "An Efficient Privacy-Preserving Scheme for Wireless Link Layer Security", New Orleans, LA, USA, Nov. 30 - Dec. 4, 2008.
  13. H. Zhu, X. Lin, R. Lu, P. H. Ho, and X. Shen, "Secure Localized Authentication and Billing for Wireless Mesh Networks", Proc. of IEEE GLOBECOM'07, Washington DC, USA, November 26-30, 2007.
  14. X. Lin, R. Lu , H. Zhu, P.H. Ho, X. Shen, and Z. Cao, "ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks", Proc. of IEEE ICC'07, Glasgow, UK, June 24-28, 2007.

Books/Chapters

  1. M. M. E. A. Mahmoud, and X. Shen, "Security for Multi-hop Wireless Networks", SpringerBriefs in Computer Science, Springer Verlag, 2013. (ISBN: 978-1-4614-8857-6).
  2. S. Taha, S. Cspedes, and X. Shen, "Mutual Authentication in IP Mobility-enables Multihop Wireless Networks", Security for Multihop Wireless Networks, To appear. Editors S. Khan, and J. Mauri, CRC Press, Taylo & Francis Group, USA, 2013.
  3. M. Shi, Y. Jiang, X. Shen, J.W. Mark, D. Zhao, and H. Rutagenwa, "uthentication and Billing for WLAN/cellular Network Interworking", Handbook on Security and Networks, To appear, Editors Y. Xiao, H. Li and H. Chen, Nova Science Publisher, Inc., 2009.
  4. Y. Jiang, M. Shi, and X. Shen, C. Lin, and X. Chu, "A Broadcasting Authentication Protocol with DoS and Fault Tolerance for Wireless Ad Hoc Networks", Security in RFID and Sensor Network, pp. 445-469, Editors Y. Zhang and P. Kitsos, CRC Press, 2009. (ISBN 978-0-8493-8250-5).
  5. K.H. Liu, L. Cai, and X. Shen, "Supporting Heterogeneous Services in Ultra-Wideband based WPAN", Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications, pp. 325-347, Editors Y. Zhang, L. T. Yang and J. Ma, CRC Press - Taylor & Francis Group, 2008. (ISBN-10: 1-4200-5537-2).
  6. M. Shi, H. Rutagemwa, X. Shen, J. W. Mark, Y. Jiang, and C. Lin, "AAA Architecture and Authentication for Wireless LAN Roaming", Wireless/Mobile Network Security - Springer Series on Signals and Communication Technology, pp. 273-294, Editors Y. Xiao, X. Shen and D. Du, Springer-Verlag, 2007.
  7. J. Pan, L. Cai, and X. Shen, "Promoting Identity-Based Key Management in Wireless Ad Hoc Networks", Wireless/Mobile Network Security - Springer Series on Signals and Communication Technology, pp. 83-102, Editors Y. Xiao, X. Shen and D. Du, Springer-Verlag, 2007.

Physical Layer Security and Others

Journal Papers

  1. N. Zhang, N. Cheng, N. Lu, X. Zhang, J.W. Mark, and X. Shen, "Partner Selection and Incentive Mechanism for Physical Layer Security", IEEE Trans. on Wireless Communications, Vol.14, No.8, pp. 4265-4276, 2015.
  2. Z. Shi, S. Bi, H. Zhang, R. Lu, and X. Shen, "Improved Auxiliary Particle Filter-based Synchronization of Chaotic Colpitts Circuit and Its Application to Secure Communication", Wireless Communications and Mobile Computing (Wiley), to appear.
  3. N. Zhang, N. Lu, N. Cheng, J.W. Mark, and X. Shen , "Cooperative Spectrum Access Towards Secure Information Transfer for CRNs", IEEE J. Selected Areas in Communications, vol.31, no.11, pp.2453-2464, Nov. 2013.
  4. H. Zhang, X.Z. Liu, X. Shen, and J. Liu, "Intermittent Impulsive Synchronization of Hyperchaos with Application to Secure Communication", Asian Journal of Control, vol. 15, no. 6, pp. 1686®C1699, Nov. 2013.
  5. S. Chen, R. Lu, and X. Shen, "SRC: A Multi-core NPU-based TCP Stream Reassembly Card for Deep Packet Inspection", Security and Communication Networks, March, 2013.
  6. C. Lai, H. Li, R. Lu, X. Shen, "SE-AKA: A Secure and Efficient Group Authentication and Key Agreement Protocol for LTE Networks", Computer Networks (Elsevier), Vol. 57, pp. 3492-3510, 2013.
  7. S. Taha, and X. Shen, "ALPP: Anonymous and Location Privacy Preserving Scheme for Mobile IPv6 Heterogeneous Networks", Security and Communication Networks, Vol 6, Issue 4, pp. 401-419, 2013.
  8. L. Wei, H. Zhu, Z. Cao, X. Shen, "SUCCESS: A Secure User-centric and Social-aware Reputation based Incentive Scheme for DTNs", Ad Hoc & Wireless Sensor Networks, Vol. 19, No. 1-2, pp. 95-118, 2013.
  9. K. Suto, H. Nishiyama, X. Shen, and N. Kato, "Designing P2P Networks Tolerant to Attacks and Faults Based on Bimodal Degree Distribution", J. Communications - special issue on Security and Privacy in Communication Systems and Networks, Vol. 7, No. 8, pp. 587-595, 2012.
  10. M. E. Mahmoud, and X. Shen, "FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multi-hop Cellular Networks", IEEE Trans. on Mobile Computing, Vol. 11, No. 5, pp. 753-766, 2012.
  11. R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, "GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications", IEEE Communications Magazine - Feature Topic on Recent Progress in Machine to Machine Communications, Vol. 49, No. 4, pp. 28-35, 2011.
  12. R. Lu, X. Lin, X. Liang, and X. Shen, "An Efficient and Provably Secure Public Key Encryption Scheme Based on Coding Theory", Security and Communication Networks (Wiley), Vol. 4, Issue 12, pp. 1440–1447, December 2011.
  13. Y. Jiang, H. Zhu, M. Shi, X. Shen, and C. Lin, "An Efficient Dynamic-Identity based Signature Scheme for Secure Network Coding", Computer Networks (Elsevier), Vol. 54, Issue 1, pp. 28-40, 2010.
  14. X. Lin, R. Lu, D. Kwana, and X. Shen, "REACT: An RFID-based Privacy-preserving Children Tracking Scheme for Large Amusement Parks", Computer Networks (Elsevier), Vol. 54, Issue 15, pp. 2744-2755, 2010.
  15. H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: A Secure Multi-Layer Credit Based Incentive Scheme for Delay-Tolerant Networks", IEEE Trans. on Vehicular Technology, Vol. 58, Issue 8, pp. 4628 - 4639, 2009.
  16. M. Dianati, R. Alleaume, M. Gagnaire, and X. Shen, "Architecture and Protocols of the Future European Quantum Key Distribution Network", Security and Communication Networks (Wiley), Vol. 1, No. 1, pp. 57-74, 2008.
  17. A. Khadra, X. Liu and X. Shen, "Application of Impulsive Synchronization to Communication Security", IEEE Trans. on Circuits and Systems I: Fundamental Theory and Applications, Vol. 50, No. 3, pp. 341-351, 2003.

Conference Papers

  1. X. Fang, X. Wu, N. Zhang, X. Sha and X. Shen, "Safeguarding Physical Layer Security Using Weighted Fractional Fourier Transform", Proc. of IEEE Globecom '16, Washington D.C., USA, Dec. 4-8, 2016.
  2. X. Fang, X. Sha, N. Zhang, X. Wu and X. Shen, "Towards PHY-aided Authentication via Weighted Fractional Fourier Transform", Proc. IEEE VTC-Fall'16, Montreal, Canada, Sept. 18-21, 2016.
  3. C. Pei, N. Zhang, X. Shen, and J.W. Mark, "Channel-based Physical Layer Authenticaiton", Proc. IEEE Globecom'14, Austin, TX, USA, December 8-12, 2014.
  4. N. Zhang, N. Cheng, X. Zhang, J. W. Mark, and X. Shen, "A Cooperative Scheme for Secure Communications with Partner Selection and Incentive Mechanism", Proc. of WCSP'14, Hefei, China, Oct. 23 - 25, 2014.
  5. C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, "SEGR: A Secure and Efficient Group Roaming Scheme for Machine to Machine Communications between 3GPP and WiMAX Networks", Proc. of IEEE ICC'14, Sydney, Australia, June 10 - 14, 2014.
  6. N. Zhang, N. Lu, N. Cheng, J.W. Mark, and X. Shen , "Towards Secure Communications in Cooperative Cognitive Radio Networks", Proc. of IEEE ICCC'13, Xi'An, China, August 12 - 14, 2013.
  7. C. Lai, H. Li, R. Lu, X. Shen, and J. Cao, "A Unified End-to-End Security Scheme for Machine-Type Communication in LTE Networks", Proc. of IEEE ICCC'13, Xi'An, China, August 12 - 14, 2013.
  8. N. Zhang, N. Lu, N. Cheng, J.W. Mark, and X. Shen , "Cooperative Networking Towards Secure Communications for CRNs", Proc. of IEEE WCNC13, Shanghai, China, April 7-10, 2013.
  9. Z. Shi, R. Lu, J. Qiao, and X. Shen, "SND: Secure Neighbor Discovery for 60 GHz Network with Directional Antenna", Proc. of IEEE WCNC13, Shanghai, China, April 7-10, 2013.
  10. H. Luo, G. He, X. Lin, and X. Shen, "Towards Hierarchical Security Framework for Smartphones", Proc. of IEEE ICCC'12, Beijing, China, August 15 - 17, 2012.
  11. P. Zhang, Y. Jiang, C. Lin, Y. Fan, and X. Shen, "P-Coding: Secure Network Coding against Eavesdropping Attacks", Proc. of IEEE INFOCOM'10, San Diego, California, USA, March 14 - 19, 2010. (acceptance rate is 17.5%).
  12. H. Zhu, X. Lin, R. Lu, and X. Shen, "A Secure Credit Based Incentive Scheme for Delay Tolerant Networks", Proc. of Chinacom'08, Hangzhou, China, Aug. 25-27, 2008.
  13. X. Lin, R. Lu, H. Zhu, P.H. Ho, and X. Shen, "Provably Secure Self-certified Partially Blind Signature Scheme from Bilinear Pairings", Proc. of IEEE ICC'08, Beijing, China, May 19-23, 2008.