Book Chapters:

  1. Jiawei Yuan and Shucheng Yu, "Third Party Providers Integrity Assurance for Data Outsourcing", in Cloud Computing Security: Fundamentals and Challenges (1st Ed.), Chapter 24, edited by John R. Vacca, CRC Press, 2016. ISBN: 978-1482260946.
  2. Shucheng Yu, Ming Li, and Lu Shi, "Trust Establishment in Wireless Body Area Networks", in Wearable Sensors: Fundamentals, Implementation and Applications (1st Ed.), Chapter 6.4, edited by Edward Sazonov and Michael R Neuman, Academic Press, 2014. ISBN: 978-0124186620.
  3. Chia-Chu Chiang and Shucheng Yu, "Cloud-Enabled Software Testing Based on Program Understanding", in Software Testing in the Cloud: Perspectives on an Emerging Discipline, Chapter 3, edited by S.Tilley and T. Parveen, IGI Global, 2012. ISBN 978-1466625365.
  4. Shucheng Yu, Wenjing Lou, and Kui Ren "Data Security in Cloud Computing", in Handbook on Securing Cyber-Physical Critical Infrastructure, Chapter 15, pp. 389-410, edited by S.K. Das, K. Kant, and N. Zhang, Morgan Kaufmann/Elsevier, 2012. ISBN 978-0124158153.
  5. Shucheng Yu, Wenjing Lou, and Kui Ren "Privacy-Preserving User Authentication in Wireless Access Networks", in Encyclopedia of Cryptography and Security (2nd Ed.), edited by H. Tilborg and S. Jajodia, Springer, 2011.
 
Journal Articles (Underlined are my students):

  1. Yantian Hou, Ming Li and Shucheng Yu, "Making Body Area Networks Robust against Cross-Technology Interference", to appear, IEEE Transactions on Wireless Communications (TWC), 2017.
  2. Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, and Hui Li, "Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 27, issue 4, pp. 1187-1198, April 2016.
  3. Jiawei Yuan and Shucheng Yu, "Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification", IEEE Transactions on Information Forensics and Security (IEEE TIFS), vol. 10, no. 8, pp. 1717-1726, August 2015.
  4. Jiawei Yuan and Shucheng Yu, "PCPOR: Public and Constant-Cost Proofs of Retrievability in Cloud", Journal of Computer Security (JCS), vol. 23, no. 3, pp. 403-425, July 2015.
  5. Lu Shi, Jiawei Yuan, Shucheng Yu, and Ming Li, "MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks", IEEE Internet of Things Journal, vol.2, no.1, pp:52-62, February, 2015.
  6. Jiawei Yuan and Shucheng Yu, "Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol.25, issue.1, pp:212 - 221, January, 2014.
  7. Lu Shi, Ming Li, Shucheng Yu, and Jiawei Yuan, "BANA: Body Area Network Authentication Exploiting Channel Characteristics", IEEE Journal on Selected Areas in Communications (JSAC), vol.31, issue 9, pp. 1803-1816, September, 2013.
  8. Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, and Y. Thomas Hou, "Toward Privacy-Assured Searchable Cloud Data Storage Services", IEEE Network, vol.27, issue 4, 1-0, July - August 2013.
  9. Ming Li, Shucheng Yu, Ning Cao, and Wenjing Lou, "Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks", IEEE Transactions on Wireless Communications (TWC), vol.12, no.5, May 2013.
  10. Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou, and Kui Ren, "Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks", ACM Transactions on Sensor Networks (TOSN), vol. 9, issue 2, no. 18, March 2013.
  11. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou, "Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption", IEEE Transactions on Parallel and DistributedSystems (TPDS), vol. 24, issue 1, pp. 131-143, January 2013. (Spotlight paper of the issue)
  12. Zhenyu Yang, Shucheng Yu, Wenjing Lou, and Cong Liu, "P^2: Secure and Privacy-preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid", IEEE Transactions on Smart Grid (TSG), vol.2, no.4, pp. 697-706, December 2011.
  13. Qian Wang, Kui Ren, Shucheng Yu, and Wenjing Lou, "Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance", ACM Transactions on Sensor Networks (TOSN), vol.8, no. 1, pp. 9:1-9:24, August 2011.
  14. Shucheng Yu, Kui Ren, and Wenjing Lou, "FDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol.22, no.4, pp. 673-686, April 2011.
  15. Shucheng Yu, Kui Ren, and Wenjing Lou, "Attribute-Based On-Demand Multicast Group Setup with Membership Anonymity", Computer Networks (COMNET), vol. 54, issue 3, pp. 377–386, February 2010.
  16. Kui Ren, Shucheng Yu, Wenjing Lou, and Yanchao Zhang,"PEACE: A Novel Privacy-enhanced Yet Accountable Security Framework for Wireless Mesh Networks", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 21, no. 2, pp. 203-215, February 2010.
  17. Kui Ren, Shucheng Yu, Wenjing Lou, and Yanchao Zhang, "Multi-user Broadcast Authentication in Wireless Sensor Networks", IEEE Transactions on Vehicular Technology (TVT), vol. 58, no. 8, pp. 4554-4564, October 2009.
  18. Shucheng Yu, Jinlei Jiang, and Meilin Shi, "Semantic Web Based Dynamic Workflow Interoperation", Computer Science, 2004, 31(12): 6-9 (In Chinese).
 
Conference Papers (Underlined are my students):

  1. Yangyang Tao, Shucheng Yu and Junxiu Zhou, "Information Flow Queue Optimization in EC Cloud, International Conference on Computing", IEEE ICNC 2018, Maui, Hawaii, USA, March 5-8, 2018.
  2. Yangyang Tao, Shucheng Yu, Kenji Yoshigoe and Junxiu Zhou, "Optimal Code Regeneration with Background Traffic Awareness in Distributed Storage", International Workshop on Computing, Networking and Communications, in conjunction with IEEE ICNC 2018, Maui, Hawaii, USA, March 5-8, 2018.
  3. Zachary King and Shucheng Yu, "Investigating and Securing Communications in the Controller Area Network (CAN)", REUNS 2017, Silicon Valley, CA USA, January 27, 2017.
  4. Yifan Tian, Jiawei Yuan and Shucheng Yu, "SBPA: Social Behavior Based Cross Social Network Phishing Attacks", IEEE CNS 2016, Poster Paper, Philadelphia, PA USA, October 27, 2016.
  5. Jiawei Yuan, Shucheng Yu, and Linke Guo, "SEISA: Secure and Efficient Encrypted Image Search with Access Control", IEEE INFOCOM 2015, Hong Kong, China, April 26 - May 1, 2015. (Acceptance ratio: 316/1640 = 19.3%).
  6. Jiawei Yuan and Shucheng Yu, "Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification", IEEE INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014 (Acceptance ratio: 320/1645=19.4%).
  7. Bing Wang, Shucheng Yu, Wenjing Lou, and Y. Thomas Hou, "Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud", IEEE INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014 (Acceptance ratio: 320/1645=19.4%).
  8. Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, and Hui Li, "Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud", IEEE INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014 (Acceptance ratio: 320/1645=19.4%).
  9. Jiawei Yuan and Shucheng Yu, "Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud", IEEE CNS-SPCC 2013, in conjunction with IEEE CNS 2013, Washington D.C., Oct. 14-16, 2013.
  10. Jiawei Yuan and Shucheng Yu, "Secure and Constant Cost Public Cloud Storage Auditing with Deduplication", IEEE CNS 2013, Washington D.C., Oct. 14-16, 2013. (Acceptance ratio: 28%)
  11. Yantian Hou, Ming Li, and Shucheng Yu, "Surviving the RF Smog: Making Body Area Networks Robust to Cross-Technology Interference", IEEE SECON 2013, New Orleans, Jun. 24-27, 2013. (Acceptance ratio: 51/280=18.2%)
  12. Jiawei Yuan and Shucheng Yu, "Proof of Retrievability with Public Verifiability and Constant Communication Cost in Cloud", ACM ASIACCS-SCC 2013, Hangzhou, China, May 7-10, 2013.
  13. Lu Shi, Jiawei Yuan, Shucheng Yu, and Ming Li, "ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks", ACM WiSec 2013, Budapest, Hungary, April 17-19, 2013. (Full-paper acceptance ratio: 11/74=15%)
  14. Lu Shi, Shucheng Yu, Wenjing Lou, and Y. Thomas Hou, "SybilShield: An Agent-Aided Social Network-Based Sybil Defense among Multiple Communities", IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013 (Acceptance ratio: 280/1613=17%).
  15. Jiawei Yuan and Shucheng Yu, "Efficient Privacy-Preserving Biometric Identification in Cloud Computing", IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013 (Acceptance ratio: 280/1613=17%).
  16. Jiawei Yuan, Lu Shi, Shucheng Yu, and Ming Li, "Authenticated Secret Key Extraction using Channel Characteristics for Body Area Networks", CCS Poster, Raleigh, NC, October 16-18, 2012.
  17. Jiawei Yuan and Shucheng Yu, "Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing", SecureComm 2012, Padua, Italy, September 3-5, 2012.
  18. Ming Li, Shucheng Yu, Wenjing Lou, and Y. Thomas Hou, "Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities", SPCC 2012, in conjunction with IEEE ICDCS, Macau, China, June 18-21, 2012.
  19. Lu Shi, Ming Li, Shucheng Yu, and Jiawei Yuan, "BANA: Body Area Network Authentication Exploiting Channel Characteristics", ACM WiSec 2012, Tucson, Arizona, April 16-18, 2012. (Accpetance ratio: 27%)[PDF]
  20. Cong Wang, Kui Ren, Shucheng Yu, and Karthik Mahendra Raje Urs, "Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data", IEEE INFOCOM 2012, Orlando, Florida, March 25-30, 2012 (Acceptance ratio = 278/1547 = 18%).
  21. Ning Cao, Shucheng Yu, Zhenyu Yang, Wenjing Lou, and Y. Thomas Hou, "LT Codes-based Secure and Reliable Cloud Storage Service", IEEE INFOCOM 2012, Orlando, Florida, March 25-30, 2012 (Acceptance ratio = 278/1547 = 18%).
  22. Ming Li, Shucheng Yu, Ning Cao, and Wenjing Lou, "Authorized Private Keyword Search over Encrypted Personal Health Records in Cloud Computing", IEEE ICDCS 2011, Minnesapolis, MN, June 20-24 2011.[PDF]
  23. Ming Li, Ning Cao, Shucheng Yu, and Wenjing Lou, "FindU: Privacy-Preserving Personal Profile Matching in Mobile Social Networ", IEEE INFOCOM 2011, Shanghai, China, April 2011. (291/1823 = 16%).
  24. Ming Li, Shucheng Yu, Kui Ren, and Wenjing Lou, "Securing Personaly Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings", The 6th International Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, September 7-10, 2010. (28/112 = 25%).
  25. Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, "Attribute Based Data Sharing with Attribute Revocation", ACM ASIACCS 2010, Beijing, China, April 13-16, 2010. (25/166 = 15%).
  26. Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing", IEEE INFOCOM 2010, San Diego, CA, March 15-19, 2010. (276/1575 = 17.5%). [Citation > 700 on Google Scholar as of January 2015!]
  27. Ming Li, Shucheng Yu, Kui Ren, and Wenjing Lou, "Group Device Pairing Based Secure Sensor Association and Key Management for Body Area Networks", IEEE INFOCOM 2010, San Diego, CA, March 15-19, 2010. (276/1575 = 17.5%).
  28. Shucheng Yu, Kui Ren, Wenjing Lou, and Jin Li, "Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems", The 5th International Conference on Security and Privacy in Communication Networks (SecureComm 2009), Athens, Greece, September 14-18, 2009. (20/76 = 26.3%).[PDF]
  29. Shucheng Yu, Kui Ren, and Wenjing Lou, "Accountable attribute-based broadcast", IEEE Symposium on Security and Privacy (S&P 2009), Oakland, CA, May 17-20, 2009 (poster).
  30. Shucheng Yu, Kui Ren, and Wenjing Lou, "FDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks", IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 19-25, 2009. (282/1435 < 20%).[PDF]
  31. Kai Zeng, Shucheng Yu, Kui Ren, Wenjing Lou, and Yanchao Zhang, "Towards Secure Link Quality Measurement in Multihop Wireless Networks", IEEE Global Telecommunications Conference (GLOBECOM 2008), New Orleans, LA, USA, November 30-December 4, 2008.[PDF]
  32. Shucheng Yu, Kui Ren, and Wenjing Lou, "Attribute-Based Content Distribution with Hidden Policy", The 4th Workshop on Secure Network Protocols (NPSec 2008), Orlando, FL, USA, October 19, 2008, in conjunction with ICNP 2008.[PDF]
  33. Shucheng Yu, Kui Ren, and Wenjing Lou, "Attribute-Based On-Demand Multicast Group Setup with Receiver Anonymity", The 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008), Istanbul, Turkey, September 22-25,2008. (short paper).[PDF]
  34. Shucheng Yu, Kui Ren, and Wenjing Lou, "A privacy-preserving lightweight authentication protocol for low-cost RFID tags", IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, October 29-31, 2007.[PDF]