H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 36 Citations 11,030 75 World Ranking 5549 National Ranking 2715

Research.com Recognitions

Awards & Achievements

2018 - IEEE Fellow For contributions to embedded and medical device security

2010 - ACM Senior Member

2009 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer security
  • The Internet

Kevin Fu focuses on Computer security, Wireless, Encryption, Operating system and File system. His Computer security research includes themes of Ubiquitous computing, Software deployment and Software-defined radio. His work in Software-defined radio tackles topics such as Implantable cardioverter-defibrillator which are related to areas like Software.

His studies deal with areas such as Distributed data store and Access control as well as Encryption. His File system study frequently intersects with other fields, such as Ciphertext. His File sharing study incorporates themes from File server, Scalability, Cryptographic primitive and Cryptography.

His most cited work include:

  • Improved proxy re-encryption schemes with applications to secure distributed storage (1087 citations)
  • Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers (627 citations)
  • Plutus: Scalable Secure File Sharing on Untrusted Storage (614 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Embedded system, Software, Static random-access memory and Real-time computing. His work in the fields of Encryption and Plaintext overlaps with other areas such as Work. His research investigates the connection between Encryption and topics such as File system that intersect with issues in Access control and Distributed data store.

His studies in Embedded system integrate themes in fields like Key, Software deployment and State. His Software research incorporates themes from Denial-of-service attack, Secure coding and Accelerometer. His Static random-access memory study combines topics from a wide range of disciplines, such as Key generation, Physical unclonable function, Authentication and Fingerprint.

He most often published in these fields:

  • Computer security (37.40%)
  • Embedded system (14.63%)
  • Software (11.38%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (37.40%)
  • Real-time computing (8.94%)
  • Software (11.38%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, Real-time computing, Software, Interference and Spoofing attack. Kevin Fu works on Computer security which deals in particular with Data security. While the research belongs to areas of Real-time computing, Kevin Fu spends his time largely on the problem of Vulnerability, intersecting his research to questions surrounding Signal conditioning and Detector.

His research integrates issues of Key and Security awareness in his study of Software. Kevin Fu has researched Signal in several fields, including Ultrasonic device, Acoustic transmission, Embedded system and Ultrasound. Kevin Fu combines subjects such as File system, Operating system and Laptop with his study of Ultrasonic sensor.

Between 2015 and 2021, his most popular works were:

  • WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks (103 citations)
  • Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving (68 citations)
  • Persistent Clocks for Batteryless Sensing Devices (37 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer security

Kevin Fu spends much of his time researching Software, Computer security, Microphone, Real-time computing and Spoofing attack. His Software research incorporates elements of Voice command device, Doors, Injection attacks and Aperture. In the subject of general Computer security, his work in Security awareness, Key and Data security is often linked to Natural resource and Economic impact analysis, thereby combining diverse domains of study.

The Microphone study combines topics in areas such as Eavesdropping, Ultrasonic sensor, Computer hardware and Aliasing. Kevin Fu interconnects Low overhead, Capacitive sensing, Static random-access memory and Capacitor in the investigation of issues within Real-time computing. His Spoofing attack study integrates concerns from other disciplines, such as Denial-of-service attack, Embedded system and Accelerometer.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Improved proxy re-encryption schemes with applications to secure distributed storage

Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
ACM Transactions on Information and System Security (2006)

1445 Citations

Plutus: Scalable Secure File Sharing on Untrusted Storage

Mahesh Kallahalla;Erik Riedel;Ram Swaminathan;Qian Wang.
file and storage technologies (2003)

1104 Citations

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

D. Halperin;T.S. Heydt-Benjamin;B. Ransford;S.S. Clark.
ieee symposium on security and privacy (2008)

898 Citations

Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers

D.E. Holcomb;W.P. Burleson;K. Fu.
IEEE Transactions on Computers (2009)

790 Citations

Security and Privacy for Implantable Medical Devices

D. Halperin;T. Kohno;T.S. Heydt-Benjamin;K. Fu.
IEEE Pervasive Computing (2008)

508 Citations

Private memoirs of a smart meter

Andrés Molina-Markham;Prashant Shenoy;Kevin Fu;Emmanuel Cecchet.
acm workshop on embedded sensing systems for energy efficiency in buildings (2010)

507 Citations

They can hear your heartbeats: non-invasive security for implantable medical devices

Shyamnath Gollakota;Haitham Hassanieh;Benjamin Ransford;Dina Katabi.
acm special interest group on data communication (2011)

418 Citations

Fast and secure distributed read-only file system

Kevin Fu;M. Frans Kaashoek;David Mazières.
ACM Transactions on Computer Systems (2002)

412 Citations

Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors

D. F. Kune;J. Backes;S. S. Clark;D. Kramer.
ieee symposium on security and privacy (2013)

368 Citations

Mementos: system support for long-running computation on RFID-scale devices

Benjamin Ransford;Jacob Sorber;Kevin Fu.
architectural support for programming languages and operating systems (2011)

303 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Kevin Fu

Irwin Gerszberg

Irwin Gerszberg

AT&T (United States)

Publications: 110

Paul Shala Henry

Paul Shala Henry

AT&T (United States)

Publications: 110

Robert Bennett

Robert Bennett

AT&T (United States)

Publications: 108

Farhad Barzegar

Farhad Barzegar

AT&T (United States)

Publications: 66

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 37

Tadayoshi Kohno

Tadayoshi Kohno

University of Washington

Publications: 26

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 25

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 24

Joshua R. Smith

Joshua R. Smith

University of Washington

Publications: 23

Xiaodong Lin

Xiaodong Lin

University of Guelph

Publications: 22

Farinaz Koushanfar

Farinaz Koushanfar

University of California, San Diego

Publications: 22

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 21

Zheng Yan

Zheng Yan

Shanghai Jiao Tong University

Publications: 20

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 20

Ethan L. Miller

Ethan L. Miller

University of California, Santa Cruz

Publications: 18

Wayne Burleson

Wayne Burleson

University of Massachusetts Amherst

Publications: 18

Something went wrong. Please try again later.