default search action
Chenglong Fu 0002
Person information
- affiliation: Temple University, Philadelphia, PA, USA
Other persons with the same name
- Chenglong Fu 0001 — Southern University of Science and Technology Shenzhen, Department of Mechanical and Energy Engineering, China (and 1 more)
- Chenglong Fu 0003 — Huzhou University, School of Information Engineering, China
- Chenglong Fu 0004 — University of North Carolina at Charlotte, NC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Huan Bui, Harper Lienerth, Chenglong Fu, Meera Sridhar:
Poster: TAPChecker: Model Checking in Trigger-Action Rules Generation Using Large Language Models. CCS 2024: 4994-4996 - [c17]Trent Reichenbach, Chenglong Fu, Xiaojiang Du, Jia Di, Yuede Ji:
TrustEvent: Cross-Platform IoT Trigger Event Verification Using Edge Computing. ICC 2024: 4084-4089 - [c16]Chenglong Fu, Xiaojiang Du, Qiang Zeng, Zhenyu Zhao, Fei Zuo, Jia Di:
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events. WISEC 2024: 101-112 - [i5]Danial Abshari, Chenglong Fu, Meera Sridhar:
LLM-assisted Physical Invariant Extraction for Cyber-Physical Systems Anomaly Detection. CoRR abs/2411.10918 (2024) - 2023
- [c15]Andrew D'Angelo, Chenglong Fu, Xiaojiang Du, E. Paul Ratazzi:
Transformer-based Compound Correlation Miner for Smart Home Anomaly Detection. CloudNet 2023: 281-289 - [c14]Yunping Fang, Chenglong Fu, Xiaojiang Du:
Virtual-Device-Based Policy Enforcement in Multi-Admin Smart Environments. CloudNet 2023: 343-351 - [c13]Xuening Xu, Chenglong Fu, Xiaojiang Du, E. Paul Ratazzi:
VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers. DSN 2023: 582-596 - [c12]Andrew D'Angelo, Chenglong Fu, Xiaojiang Du, E. Paul Ratazzi:
Discovering Complex Correlations Among Multiple IoT Devices in Smart Environments. GLOBECOM 2023: 1914-1919 - [c11]Xuening Xu, Chenglong Fu, Xiaojiang Du:
MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands. RAID 2023: 46-62 - 2022
- [c10]Chenglong Fu, Qiang Zeng, Haotian Chi, Xiaojiang Du, Siva Likitha Valluru:
IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors. DSN 2022: 428-440 - [c9]Chenxu Jiang, Chenglong Fu, Zhenyu Zhao, Xiaojiang Du:
Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals. EUSPN/ICTH 2022: 53-60 - [c8]Haotian Chi, Chenglong Fu, Qiang Zeng, Xiaojiang Du:
Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks. SP 2022: 285-302 - [i4]Chenxu Jiang, Chenglong Fu, Zhenyu Zhao, Xiaojiang Du, Yuede Ji:
Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals. CoRR abs/2201.07954 (2022) - 2021
- [c7]Michael Wang, Chenglong Fu, Xiaojiang Du:
Decision-Tree Based Root Cause Localization for Anomalies in Smart IoT Systems. ICC 2021: 1-5 - [c6]Xuanyu Liu, Qiang Zeng, Xiaojiang Du, Siva Likitha Valluru, Chenglong Fu, Xiao Fu, Bin Luo:
SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes. RAID 2021: 33-47 - [c5]Chenglong Fu, Qiang Zeng, Xiaojiang Du:
HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. USENIX Security Symposium 2021: 4223-4240 - 2020
- [j1]Heena Rathore, Chenglong Fu, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Mohsen Guizani, Zhengtao Yu:
Multi-layer security scheme for implantable medical devices. Neural Comput. Appl. 32(9): 4347-4360 (2020)
2010 – 2019
- 2019
- [c4]Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo, Xiaojiang Du, Chiu C. Tan, Jie Wu:
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples. DSN 2019: 39-51 - [c3]Xuening Xu, Chenglong Fu, Xiaojiang Du, E. Paul Ratazzi:
Effective UAV and Ground Sensor Authentication. GLOBECOM 2019: 1-6 - [c2]Chenglong Fu, Xiaojiang Du, Longfei Wu, Qiang Zeng, Amr Mohamed, Mohsen Guizani:
POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices. SecureComm (1) 2019: 105-125 - [i3]Chenglong Fu, Qiang Zeng, Xiaojiang Du:
Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access. CoRR abs/1912.00264 (2019) - 2018
- [c1]Chenglong Fu, Tassadit Kezmane, Xiaojiang Du, Yat Fu, Colin Morrisseau:
An Location-aware Authentication Scheme for Cross-domain Internet of Thing Systems. ICNC 2018: 452-456 - [i2]Chenglong Fu, Xiaojiang Du, Longfei Wu, Qiang Zeng, Amr Mohamed, Mohsen Guizani:
POKs Based Low Energy Authentication Scheme for Implantable Medical Devices. CoRR abs/1803.09890 (2018) - [i1]Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo:
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples. CoRR abs/1812.10199 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint