Publications

Export (179) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
Filters: author is Lee  [Clear All Filters]
W
Lee, W., Ortiz, J., Ko, B., Lee, R.B., "Inferring Smartphone Users' Handwritten Patterns by Using Motion Sensors (Best Paper Award)", 4th Internation Conference on Information System Security and Privacy, Funchal, Madeira, Portugal, 22/01/2018. Abstract Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R., "Quantification of De-anonymization Risks in Social Networks", Information Systems Security and Privacy, Porto, 19/02/2017. Abstract Tagged XML BibTex
Lee, W., Liu, X., Shen, Y., Jin, H., Lee, R., "Secure Pick Up: Implicit Authentication When You Start Using the Smartphone", ACM Symposium on Access Control Models and Technologies (SACMAT) , Indianapolis, 06/21/2017. Abstract Tagged XML BibTex
Lee, W., Lee, R., "Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning", IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, 06/26/2017. Abstract Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R.B., "Blind De-anonymization Attacks using Social Networks", Workshop on Privacy in the Electronic Society (WPES), Dallas, ACM, 30/10/2017. Abstract Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R.B., "How to Quantify Graph De-anonymization Risks", Springer Information Systems Security and Privacy: Springer, 2017  . Tagged XML BibTex
Lee, W., Lee, R.B., "Implicit Sensor-based Authentication of Smartphone Users with Smartwatch", Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 2016. Abstract Tagged XML BibTex
Lee, W., Lee, R.B., "Multi-sensor authentication to improve smartphone security", Proceedings of International Conference on Information Systems Security and Privacy, February 2015. Abstract Tagged XML BibTex
Lee, W., Lee, R.B., "Implicit Authentication for Smartphone Security", Information Systems Security and Privacy, vol. 576: Springer, pp. 160-176, 2015  . Abstract Tagged XML BibTex
Zhang, W., Szefer, J.M., Chen, Y., Yu, C., Li, W.X.Y., Cheung, R.C.C., Lee, R.B., "Design of Short Ring Oscillator-Based True Random Number Generator on FPGA Platform", Princeton University Department of Electrical Engineering Technical Report CE-L2011-006 (updated Dec. 8, 2011), Sept. 20, 2011. Tagged XML BibTex
Wang, Z., Lee, R.B., A Secure yet High Performance Cache Architecture, , Princeton University Department of Electrical Engineering Technical Report CE-L2007-012, November 2007. Tagged XML BibTex
Wang, Z., Deng, J., Lee, R.B., "Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC", IEEE Infocom 2007, pp. 2531-2535, May 6-12, 2007. Abstract Tagged XML BibTex
Wang, Z., Lee, R.B., "New Cache Designs for Thwarting Software Cache-based Side Channel Attacks", Proceedings of the 34th International Symposium on Computer Architecture (ISCA 2007), San Diego, CA, pp. 494 - 505, June 2007. Abstract Tagged XML BibTex
Wang, M., Lee, R.B., "Architecture for a Non-Copyable Disk (NCdisk) Using a Secret-Protection (SP) SoC Solution", Signals, Systems and Computers, 2007. ACSSC 2007. Conference Record of the Forty-First Asilomar Conference on, Pacific Grove, CA, USA, pp. 1999-2003, 11/04/2007. Abstract Tagged XML BibTex
Wang, Z., Lee, R.B., "Covert and Side Channels due to Processor Architecture", Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06), pp. 473-482, December 2006. Abstract Tagged XML BibTex
Wang, Z., Lee, R.B., "New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation", Proceedings of the 8th Information Security Conference (ISC 2005), Singapore, pp. 498-505, September 2005. Tagged XML BibTex
Wang, Z., Lee, R.B., "Capacity Estimation of Non-Synchronous Covert Channels", Proceedings of the 2nd International Workshop on Security in Distributed Computing Systems (SDCS 2005), Columbus, OH, USA, pp. 170-176, June 6-9, 2005. Tagged XML BibTex
Wang, Z., Lee, R.B., "Micro-Architecture Issues of Predicated Execution", Proceedings of the 37th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, California, USA, pp. 349-354, Nov. 2003. Tagged XML BibTex
T
Zhang, T., Lee, R.B., "Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine’s Security Health", IEEE Transactions on Computers, vol. 67, issue 6: IEEE, 06/2018. Tagged XML BibTex
Zhang, T., Zhang, Y., Lee, R.B., "DoS Attacks on Your Memory in the Cloud", ACM Asia Conference on Computer and Communications Security, Abu Dhabi, April, 2017. Abstract Tagged XML BibTex
Zhang, T., Lee, R.B., "Host-based DoS Attacks and Defense in the Cloud", Workshop on Hardware Architectural Support for Security and Privacy, June, 2017. Abstract Tagged XML BibTex
Zhang, T., Xu, Y., Bao, Y., Lee, R.B., "CloudShelter: Protecting Virtual Machines’ Memory Resource Availability in Cloud Computing", IEEE International Conference on Computer Design (ICCD), Boston, IEEE, 05/11/2017. Tagged XML BibTex
Zhang, T., Zhang, Y., Lee, R.B., "CloudRadar: A Real-time Side-channel Attack Detection System in Clouds", Research in Attacks, Intrusion and Defense, September 2016. Abstract Tagged XML BibTex
Zhang, T., Lee, R.B., "Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing", IEEE Micro Special Issues on Security, vol. 36, issue 5, Sept/Oct 2016. Abstract Tagged XML BibTex
Zhang, T., Lee, R.B., "CloudMonatt: an Architecture for Security Health Monitoring and Attestation of Virtual Machines in Cloud Computing", Proceedings of The 42nd International Symposium on Computer Architecture, Portland, pp. 362-274, June 2015. Tagged XML BibTex