default search action
Sheng Zhong 0002
Person information
- affiliation: Nanjing University, State Key Laboratory for Novel Software Technology, China
- affiliation (PhD 2004): Yale University, New Haven, CT, USA
Other persons with the same name
- Sheng Zhong — disambiguation page
- Sheng Zhong 0001 — Huazhong University of Science and Technology, School of Artificial Intelligence and Automation, Wuhan, China
- Sheng Zhong 0003 — University of California San Diego, Department of Bioengineering, La Jolla, CA, USA
- Sheng Zhong 0004 — University of Michigan, Robotics Institute, Ann Arbor, MI, USA
- Sheng Zhong 0005 — University of New Mexico, Albuquerque, NM, USA
- Sheng Zhong 0006 — Northwest University, School of Information and Technology, Shaanxi, China (and 1 more)
Other persons with a similar name
- Zhong-sheng Cao
- Zhong-Sheng Chen
- Zhong-Sheng Hou
- Zhong-Sheng Hua
- Zhong-sheng Qian
- Sheng-Zhong Song
- Zhong Sheng Sun
- Zhong-sheng Wang
- Shenghua Zhong (aka: Sheng-hua Zhong, Sheng-Hua Zhong)
- Shisheng Zhong (aka: Shi-sheng Zhong) — disambiguation page
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j104]Sheng Zhong, Liangmin Wang, Weihua Wu, Li Feng:
Joint client selection and resource allocation for federated edge learning with imperfect CSI. Comput. Networks 257: 110914 (2025) - [j103]Wenjie Chen, Haoyu Chen, Tingxuan Han, Wei Tong, Sheng Zhong:
Secure Two-Party Frequent Itemset Mining With Guaranteeing Differential Privacy. IEEE Trans. Mob. Comput. 24(1): 276-292 (2025) - 2024
- [j102]Quanyu Zhao, Bingbing Jiang, Yuan Zhang, Heng Wang, Yunlong Mao, Sheng Zhong:
Unbalanced private set intersection with linear communication complexity. Sci. China Inf. Sci. 67(3) (2024) - [j101]Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong:
SGBA: A stealthy scapegoat backdoor attack against deep neural networks. Comput. Secur. 136: 103523 (2024) - [j100]Wei Tong, Jiacheng Niu, Jingyu Hua, Qun Li, Sheng Zhong:
Scalable Differentially Private Model Publishing Via Private Iterative Sample Selection. IEEE Trans. Dependable Secur. Comput. 21(4): 2494-2506 (2024) - [j99]Jiacheng Gao, Yuan Zhang, Sheng Zhong:
Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing. IEEE Trans. Dependable Secur. Comput. 21(4): 3211-3226 (2024) - [j98]Yunlong Mao, Ziqin Dang, Heng Wang, Yuan Zhang, Sheng Zhong:
Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms. IEEE Trans. Dependable Secur. Comput. 21(5): 4684-4698 (2024) - [j97]Ying He, Zhili Shen, Jingyu Hua, Qixuan Dong, Jiacheng Niu, Wei Tong, Xu Huang, Chen Li, Sheng Zhong:
Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 748-763 (2024) - [j96]Boyu Zhu, Changyu Dong, Yuan Zhang, Yunlong Mao, Sheng Zhong:
Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers. IEEE Trans. Inf. Forensics Secur. 19: 1810-1825 (2024) - [j95]Yunlong Mao, Zhujing Ye, Xinyu Yuan, Sheng Zhong:
Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness. IEEE Trans. Inf. Forensics Secur. 19: 6321-6336 (2024) - [j94]Hao Wu, Yuhang Gong, Xiaopeng Ke, Hanzhong Liang, Fengyuan Xu, Yunxin Liu, Sheng Zhong:
TIM: Enabling Large-Scale White-Box Testing on In-App Deep Learning Models. IEEE Trans. Inf. Forensics Secur. 19: 8188-8203 (2024) - [j93]Shucheng Li, Jingzhou Zhu, Boyu Chang, Hao Wu, Fengyuan Xu, Sheng Zhong:
Multi-Label and Evolvable Dataset Preparation for Web-Based Object Detection. ACM Trans. Knowl. Discov. Data 18(9): 236:1-236:21 (2024) - [j92]Huaming Yang, Zhongzhou Xia, Jersy Shin, Jingyu Hua, Yunlong Mao, Sheng Zhong:
A Comprehensive Study of Trajectory Forgery and Detection in Location-Based Services. IEEE Trans. Mob. Comput. 23(4): 3228-3242 (2024) - [j91]Zhibin Wang, Longbin Lai, Yixue Liu, Bing Shui, Chen Tian, Sheng Zhong:
Parallelization of butterfly counting on hierarchical memory. VLDB J. 33(5): 1453-1484 (2024) - [c89]Wei Tong, Haoyu Chen, Jiacheng Niu, Sheng Zhong:
Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols. CCS 2024: 3555-3569 - [c88]Han Gao, Hao Wu, Peiwen Dong, Yixin Xu, Fengyuan Xu, Sheng Zhong:
MuSR: Multi-Scale 3D Scenes Reconstruction based on Monocular Video. ICASSP 2024: 2840-2844 - [c87]Han Gao, Yating Liu, Fang Cao, Hao Wu, Fengyuan Xu, Sheng Zhong:
VIDAR: Data Quality Improvement for Monocular 3D Reconstruction through In-situ Visual Interaction. ICRA 2024: 7895-7901 - [c86]Hao Wu, Likun Zhang, Shucheng Li, Fengyuan Xu, Sheng Zhong:
CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation. ACM Multimedia 2024: 1839-1847 - [c85]Zirui Huang, Yunlong Mao, Sheng Zhong:
UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage. USENIX Security Symposium 2024 - [i20]Tianyu Zhang, Zixuan Zhao, Jiaqi Huang, Jingyu Hua, Sheng Zhong:
Subtoxic Questions: Dive Into Attitude Change of LLM's Response in Jailbreak Attempts. CoRR abs/2404.08309 (2024) - [i19]Ying He, Mingyang Niu, Jingyu Hua, Yunlong Mao, Xu Huang, Chen Li, Sheng Zhong:
LabObf: A Label Protection Scheme for Vertical Federated Learning Through Label Obfuscation. CoRR abs/2405.17042 (2024) - [i18]Zhili Shen, Zihang Xi, Ying He, Wei Tong, Jingyu Hua, Sheng Zhong:
The Fire Thief Is Also the Keeper: Balancing Usability and Privacy in Prompts. CoRR abs/2406.14318 (2024) - [i17]Wei Tong, Haoyu Chen, Jiacheng Niu, Sheng Zhong:
Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols. CoRR abs/2406.19466 (2024) - [i16]Hao Wu, Likun Zhang, Shucheng Li, Fengyuan Xu, Sheng Zhong:
CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation. CoRR abs/2409.02495 (2024) - [i15]Songrui Wang, Yubo Zhu, Wei Tong, Sheng Zhong:
Detecting Dataset Abuse in Fine-Tuning Stable Diffusion Models for Text-to-Image Synthesis. CoRR abs/2409.18897 (2024) - [i14]Zhibin Wang, Shipeng Li, Yuhang Zhou, Xue Li, Rong Gu, Nguyen Cam-Tu, Chen Tian, Sheng Zhong:
Revisiting SLO and Goodput Metrics in LLM Serving. CoRR abs/2410.14257 (2024) - [i13]ShiMao Xu, Xiaopeng Ke, Xing Su, Shucheng Li, Hao Wu, Sheng Zhong, Fengyuan Xu:
FLiP: Privacy-Preserving Federated Learning based on the Principle of Least Privileg. CoRR abs/2410.19548 (2024) - 2023
- [j90]Zhibin Wang, Longbin Lai, Yixue Liu, Bing Shui, Chen Tian, Sheng Zhong:
I/O-Efficient Butterfly Counting at Scale. Proc. ACM Manag. Data 1(1): 34:1-34:27 (2023) - [j89]Wei Tong, Yinggang Tong, Chang Xia, Jingyu Hua, Qun Li, Sheng Zhong:
Understanding Location Privacy of the Point-of-Interest Aggregate Data via Practical Attacks and Defenses. IEEE Trans. Dependable Secur. Comput. 20(3): 2433-2449 (2023) - [j88]Wei Tong, Wenjie Chen, Bingbing Jiang, Fengyuan Xu, Qun Li, Sheng Zhong:
Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage. IEEE Trans. Mob. Comput. 22(9): 5463-5478 (2023) - [j87]Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, Sheng Zhong:
LEAP: TrustZone Based Developer-Friendly TEE for Intelligent Mobile Apps. IEEE Trans. Mob. Comput. 22(12): 7138-7155 (2023) - [c84]Yunlong Mao, Ziqin Dang, Yu Lin, Tianling Zhang, Yuan Zhang, Jingyu Hua, Sheng Zhong:
FLSwitch: Towards Secure and Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch. ACNS (1) 2023: 476-500 - [c83]Yunlong Mao, Zexi Xin, Zhenyu Li, Jue Hong, Qingyou Yang, Sheng Zhong:
Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks. ESORICS (4) 2023: 23-43 - [c82]Zhibin Wang, Ziheng Meng, Xue Li, Xi Lin, Long Zheng, Chen Tian, Sheng Zhong:
SMOG: Accelerating Subgraph Matching on GPUs. HPEC 2023: 1-7 - [c81]Hao Wu, Bo Yang, Xiaopeng Ke, Siyi He, Fengyuan Xu, Sheng Zhong:
GAPter: Gray-Box Data Protector for Deep Learning Inference Services at User Side. ICASSP 2023: 1-5 - [c80]Wei Tong, Wenjie Chen, Tingxuan Han, Haoyu Chen, Sheng Zhong:
Differentially Private Two-Party Top-$k$ Frequent Item Mining. ICDCS 2023: 166-177 - [c79]Shucheng Li, Runchuan Wang, Hao Wu, Sheng Zhong, Fengyuan Xu:
SIEGE: Self-Supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection. ACM Multimedia 2023: 8881-8890 - [c78]Shucheng Li, Boyu Chang, Bo Yang, Hao Wu, Sheng Zhong, Fengyuan Xu:
Dataset Preparation for Arbitrary Object Detection: An Automatic Approach based on Web Information in English. SIGIR 2023: 749-759 - [c77]Minze Xu, Yuan Zhang, Sheng Zhong:
SilenTower: A Robust, Scalable and Secure Watchtower with Silent Executors. SRDS 2023: 173-186 - [c76]Longbin Lai, Yufan Yang, Zhibin Wang, Yuxuan Liu, Haotian Ma, Sijie Shen, Bingqing Lyu, Xiaoli Zhou, Wenyuan Yu, Zhengping Qian, Chen Tian, Sheng Zhong, Yeh-Ching Chung, Jingren Zhou:
GLogS: Interactive Graph Pattern Matching Query At Large Scale. USENIX ATC 2023: 53-69 - [i12]Yunlong Mao, Zexi Xin, Zhenyu Li, Jue Hong, Qingyou Yang, Sheng Zhong:
Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks. CoRR abs/2304.09515 (2023) - 2022
- [j86]Yu Lin, Yunlong Mao, Yuan Zhang, Sheng Zhong:
Secure deduplication schemes for content delivery in mobile edge computing. Comput. Secur. 114: 102602 (2022) - [j85]Yangyang Liu, Laiping Zhao, Jingyu Hua, Wenyu Qu, Suohao Zhang, Sheng Zhong:
Distributed Traffic Engineering for Multi-Domain SDN Without Trust. IEEE Trans. Cloud Comput. 10(4): 2481-2496 (2022) - [j84]Shaoyong Du, Minrui Zhao, Jingyu Hua, Hang Zhang, Xiaoyu Chen, Zhiyun Qian, Sheng Zhong:
Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud. IEEE Trans. Dependable Secur. Comput. 19(4): 2648-2664 (2022) - [j83]Huijuan Zhu, Liang-Min Wang, Sheng Zhong, Yang Li, Victor S. Sheng:
A Hybrid Deep Network Framework for Android Malware Detection. IEEE Trans. Knowl. Data Eng. 34(12): 5558-5570 (2022) - [j82]Yunlong Mao, Wenbo Hong, Boyu Zhu, Zhifei Zhu, Yuan Zhang, Sheng Zhong:
Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism. IEEE Trans. Parallel Distributed Syst. 33(11): 3079-3091 (2022) - [c75]Xiaopeng Ke, Boyu Chang, Hao Wu, Fengyuan Xu, Sheng Zhong:
Towards Practical and Efficient Long Video Summary. ICASSP 2022: 1770-1774 - [c74]Huaming Yang, Zhongzhou Xia, Jersy Shin, Jingyu Hua, Yunlong Mao, Sheng Zhong:
Are You Moving as You Claim: GPS Trajectory Forgery and Detection in Location-Based Services. ICDCS 2022: 1166-1176 - [c73]Yuan Zhang, Ziwei Zhang, Minze Xu, Chen Tian, Sheng Zhong:
On Designing Secure Cross-user Redundancy Elimination for WAN Optimization. INFOCOM 2022: 1589-1598 - [c72]Yulong Tian, Xiaopeng Ke, Zeyi Tao, Shaohua Ding, Fengyuan Xu, Qun Li, Hao Han, Sheng Zhong, Xinyi Fu:
Privacy-Preserving and Robust Federated Deep Metric Learning. IWQoS 2022: 1-11 - [i11]Hao Wu, Yuhang Gong, Xiaopeng Ke, Hanzhong Liang, Minghao Li, Fengyuan Xu, Yunxin Liu, Sheng Zhong:
Automation Slicing and Testing for in-App Deep Learning Models. CoRR abs/2205.07228 (2022) - [i10]Minze Xu, Yuan Zhang, Sheng Zhong:
Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems. IACR Cryptol. ePrint Arch. 2022: 176 (2022) - 2021
- [j81]Yan Xu, Ming Wang, Hong Zhong, Sheng Zhong:
IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services. Frontiers Comput. Sci. 15(6): 156814 (2021) - [j80]Shaoyong Du, Pengxiong Zhu, Jingyu Hua, Zhiyun Qian, Zhao Zhang, Xiaoyu Chen, Sheng Zhong:
An Empirical Analysis of Hazardous Uses of Android Shared Storage. IEEE Trans. Dependable Secur. Comput. 18(1): 340-355 (2021) - [j79]Yuan Zhang, Yunlong Mao, Minze Xu, Fengyuan Xu, Sheng Zhong:
Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications. IEEE Trans. Dependable Secur. Comput. 18(3): 1008-1018 (2021) - [j78]Jingyu Hua, Zidong Zhou, Sheng Zhong:
Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel. IEEE Trans. Inf. Forensics Secur. 16: 1029-1043 (2021) - [j77]Yunlong Mao, Wenbo Hong, Heng Wang, Qun Li, Sheng Zhong:
Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training. IEEE Trans. Parallel Distributed Syst. 32(7): 1777-1788 (2021) - [j76]Santosh Pandey, Zhibin Wang, Sheng Zhong, Chen Tian, Bolong Zheng, Xiaoye S. Li, Lingda Li, Adolfy Hoisie, Caiwen Ding, Dong Li, Hang Liu:
Trust: Triangle Counting Reloaded on GPUs. IEEE Trans. Parallel Distributed Syst. 32(11): 2646-2660 (2021) - [c71]Yunlong Mao, Xinyu Yuan, Xinyang Zhao, Sheng Zhong:
Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks. ESORICS (1) 2021: 476-496 - [c70]Wei Tong, Chang Xia, Jingyu Hua, Qun Li, Sheng Zhong:
Practical Location Privacy Attacks and Defense on Point-of-interest Aggregates. ICDCS 2021: 808-818 - [c69]Minze Xu, Yuan Zhang, Fengyuan Xu, Sheng Zhong:
Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels. IWQoS 2021: 1-10 - [c68]Hao Wu, Xuejin Tian, Minghao Li, Yunxin Liu, Ganesh Ananthanarayanan, Fengyuan Xu, Sheng Zhong:
PECAM: privacy-enhanced video streaming and analytics via securely-reversible transformation. MobiCom 2021: 229-241 - [i9]Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, Sheng Zhong:
App Developer Centric Trusted Execution Environment. CoRR abs/2102.02465 (2021) - [i8]Santosh Pandey, Zhibin Wang, Sheng Zhong, Chen Tian, Bolong Zheng, Xiaoye S. Li, Lingda Li, Adolfy Hoisie, Caiwen Ding, Dong Li, Hang Liu:
TRUST: Triangle Counting Reloaded on GPUs. CoRR abs/2103.08053 (2021) - [i7]Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong:
RABA: A Robust Avatar Backdoor Attack on Deep Neural Network. CoRR abs/2104.01026 (2021) - [i6]Shucheng Li, Fengyuan Xu, Runchuan Wang, Sheng Zhong:
Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection. CoRR abs/2106.10176 (2021) - 2020
- [j75]Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong:
Distributed K-Means clustering guaranteeing local differential privacy. Comput. Secur. 90: 101699 (2020) - [j74]Yuan Zhang, Boyu Zhu, Yixin Fang, Suxin Guo, Aidong Zhang, Sheng Zhong:
Secure Inter-Domain Forwarding Loop Test in Software Defined Networks. IEEE Trans. Dependable Secur. Comput. 17(1): 162-178 (2020) - [j73]Yushu Zhang, Xiangli Xiao, Lu-Xing Yang, Yong Xiang, Sheng Zhong:
Secure and Efficient Outsourcing of PCA-Based Face Recognition. IEEE Trans. Inf. Forensics Secur. 15: 1683-1695 (2020) - [j72]Yunlong Mao, Ying He, Yuan Zhang, Jingyu Hua, Sheng Zhong:
Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack. IEEE Trans. Mob. Comput. 19(12): 2916-2932 (2020) - [c67]Shucheng Li, Lingfei Wu, Shiwei Feng, Fangli Xu, Fengyuan Xu, Sheng Zhong:
Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem. EMNLP (Findings) 2020: 2841-2852 - [c66]Yayuan Xiong, Fengyuan Xu, Sheng Zhong:
Detecting GAN-based Privacy Attack in Distributed Learning. ICC 2020: 1-6 - [c65]Chang Xia, Jingyu Hua, Wei Tong, Yayuan Xiong, Sheng Zhong:
A Privacy-Preserving Scheme For Convolutional Neural Network-Based Applications In Mobile Cloud. ICME 2020: 1-6 - [c64]Han Gao, Yulong Tian, Rongchun Yao, Fengyuan Xu, Xinyi Fu, Sheng Zhong:
Exploiting Adversarial Examples to Drain Computational Resources on Mobile Deep Learning Systems. SEC 2020: 334-339 - [c63]Yunlong Mao, Boyu Zhu, Wenbo Hong, Zhifei Zhu, Yuan Zhang, Sheng Zhong:
Private Deep Neural Network Models Publishing for Machine Learning as a Service. IWQoS 2020: 1-10 - [c62]Hao Wu, Jinghao Feng, Xuejin Tian, Edward Sun, Yunxin Liu, Bo Dong, Fengyuan Xu, Sheng Zhong:
EMO: real-time emotion recognition from single-eye images for resource-constrained eyewear devices. MobiSys 2020: 448-461 - [c61]Yayuan Xiong, Fengyuan Xu, Sheng Zhong, Qun Li:
Escaping Backdoor Attack Detection of Deep Learning. SEC 2020: 431-445 - [c60]Yu Zhu, Zongfei Li, Fengyuan Xu, Sheng Zhong:
Improving Deep Neural Network Robustness with Siamese Empowered Adversarial Training. SpaCCS 2020: 62-75 - [c59]Yan Xu, Jinxing Ma, Sheng Zhong:
Detection and Defense Against DDoS Attack on SDN Controller Based on Spatiotemporal Feature. SPDE 2020: 3-18 - [i5]Shucheng Li, Lingfei Wu, Shiwei Feng, Fangli Xu, Fengyuan Xu, Sheng Zhong:
Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem. CoRR abs/2004.13781 (2020)
2010 – 2019
- 2019
- [b1]Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang:
Security and Privacy for Next-Generation Wireless Networks. Wireless Networks, Springer 2019, ISBN 978-3-030-01149-9, pp. 1-180 - [j71]Binru Wang, Yuan Zhang, Zhi-Hua Zhou, Sheng Zhong:
On repeated stackelberg security game with the cooperative human behavior model for wildlife protection. Appl. Intell. 49(3): 1002-1015 (2019) - [j70]Shaoyong Du, Jingyu Hua, Sheng Zhong:
Securing peer-assisted indoor localization leveraging acoustic ranging. Comput. Secur. 81: 58-77 (2019) - [j69]Qingjun Chen, Shouqian Shi, Xin Li, Chen Qian, Sheng Zhong:
SDN-Based Privacy Preserving Cross Domain Routing. IEEE Trans. Dependable Secur. Comput. 16(6): 930-943 (2019) - [c58]Hao Wu, Zheng Qin, Xuejin Tian, Edward Sun, Fengyuan Xu, Sheng Zhong:
Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources. DSC 2019: 1-8 - [c57]Laiping Zhao, Jingyu Hua, Yangyang Liu, Wenyu Qu, Suohao Zhang, Sheng Zhong:
Distributed Traffic Engineering for Multi-Domain Software Defined Networks. ICDCS 2019: 492-502 - [c56]Wei Tong, Bingbing Jiang, Fengyuan Xu, Qun Li, Sheng Zhong:
Privacy-Preserving Data Integrity Verification in Mobile Edge Computing. ICDCS 2019: 1007-1018 - [c55]Hao Wu, Jinghao Feng, Xuejin Tian, Fengyuan Xu, Yunxin Liu, XiaoFeng Wang, Sheng Zhong:
secGAN: A Cycle-Consistent GAN for Securely-Recoverable Video Transformation. HotEdgeVideo@MobiCom 2019: 33-38 - [c54]Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun Li, Sheng Zhong:
Trojan Attack on Deep Generative Models in Autonomous Driving. SecureComm (1) 2019: 299-318 - 2018
- [j68]Jingyu Hua, Laiping Zhao, Suohao Zhang, Yangyang Liu, Xin Ge, Sheng Zhong:
Topology-Preserving Traffic Engineering for Hierarchical Multi-Domain SDN. Comput. Networks 140: 62-77 (2018) - [j67]Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong:
Location privacy in public access points positioning: An optimization and geometry approach. Comput. Secur. 73: 425-438 (2018) - [j66]Li Wang, Junjie Shi, Chen Chen, Sheng Zhong:
Privacy-preserving face detection based on linear and nonlinear kernels. Multim. Tools Appl. 77(6): 7261-7281 (2018) - [j65]Jingyu Hua, Wei Tong, Fengyuan Xu, Sheng Zhong:
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Trans. Inf. Forensics Secur. 13(5): 1155-1168 (2018) - [c53]Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, Sheng Zhong:
Learning from Differentially Private Neural Activations with Edge Computing. SEC 2018: 90-102 - [c52]Jingyu Hua, Hongyi Sun, Zhenyu Shen, Zhiyun Qian, Sheng Zhong:
Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information. INFOCOM 2018: 1700-1708 - [c51]Yulong Tian, Wei Wei, Qun Li, Fengyuan Xu, Sheng Zhong:
MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. INFOCOM 2018: 2726-2734 - [e2]Liehuang Zhu, Sheng Zhong:
Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers. Communications in Computer and Information Science 747, Springer 2018, ISBN 978-981-10-8889-6 [contents] - 2017
- [j64]Yuan Zhang, Qingjun Chen, Sheng Zhong:
Efficient and Privacy-Preserving Min and kth Min Computations in Mobile Sensing Systems. IEEE Trans. Dependable Secur. Comput. 14(1): 9-21 (2017) - [j63]Jingyu Hua, Zhenyu Shen, Sheng Zhong:
We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. IEEE Trans. Inf. Forensics Secur. 12(2): 286-297 (2017) - [j62]Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Trans. Inf. Forensics Secur. 12(6): 1483-1493 (2017) - [j61]Wei Tong, Jingyu Hua, Sheng Zhong:
A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. IEEE Trans. Inf. Forensics Secur. 12(10): 2444-2456 (2017) - [c50]Binru Wang, Yuan Zhang, Sheng Zhong:
On Repeated Stackelberg Security Game with the Cooperative Human Behavior Modelfor Wildlife Protection. AAMAS 2017: 1751-1753 - [c49]Yu Zhou, Yuan Zhang, Sheng Zhong:
Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity Limit. ICCCN 2017: 1-9 - 2016
- [j60]Shaoyong Du, Jingyu Hua, Yue Gao, Sheng Zhong:
EV-Linker: Mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching. J. Comput. Syst. Sci. 82(1): 156-172 (2016) - [j59]Yuan Zhang, Yunlong Mao, Sheng Zhong:
Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems. IEEE J. Sel. Areas Commun. 34(10): 2738-2749 (2016) - [j58]Yuan Zhang, He Zhang, Siyuan Tang, Sheng Zhong:
Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees. IEEE Trans. Inf. Forensics Secur. 11(1): 100-113 (2016) - [j57]Yuan Zhang, Qingjun Chen, Sheng Zhong:
Privacy-Preserving Data Aggregation in Mobile Phone Sensing. IEEE Trans. Inf. Forensics Secur. 11(5): 980-992 (2016) - [j56]Wei Tong, Sheng Zhong:
A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems. IEEE Trans. Inf. Forensics Secur. 11(10): 2255-2267 (2016) - [j55]Jingyu Hua, An Tang, Yixin Fang, Zhenyu Shen, Sheng Zhong:
Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms. IEEE Trans. Inf. Forensics Secur. 11(10): 2298-2311 (2016) - [j54]Yuan Zhang, Wei Tong, Sheng Zhong:
On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy. IEEE Trans. Inf. Forensics Secur. 11(11): 2528-2541 (2016) - [c48]Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao:
Instant and Robust Authentication and Key Agreement among Mobile Devices. CCS 2016: 616-627 - [c47]Yunlong Mao, Yuan Zhang, Sheng Zhong:
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks. CCS 2016: 1580-1590 - [c46]Chen Qian, Junjie Shi, Zihao Yu, Ye Yu, Sheng Zhong:
Garlic Cast: Lightweight and Decentralized Anonymous Content Sharing. ICPADS 2016: 216-223 - [c45]Jingyu Hua, Xin Ge, Sheng Zhong:
FOUM: A flow-ordered consistent update mechanism for software-defined networking in adversarial settings. INFOCOM 2016: 1-9 - [c44]Yuan Zhang, Siyuan Tang, Tingting Chen, Sheng Zhong:
Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain. INFOCOM 2016: 1-9 - [c43]Shaoyong Du, Yue Gao, Jingyu Hua, Sheng Zhong:
Secure Keyboards Against Motion Based Keystroke Inference Attack. SecureComm 2016: 63-81 - 2015
- [j53]Haifan Yao, Sheng Zhong:
Cheating Detection for Payment Based Incentives with Application to Network Coding. Ad Hoc Sens. Wirel. Networks 24(1-2): 1-19 (2015) - [j52]Wei Zhong, Yixin Fang, Shi Jin, Kai-Kit Wong, Sheng Zhong, Zuping Qian:
Joint Resource Allocation for Device-to-Device Communications Underlaying Uplink MIMO Cellular Networks. IEEE J. Sel. Areas Commun. 33(1): 41-54 (2015) - [j51]Shiyu Ji, Tingting Chen, Sheng Zhong:
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems. IEEE Trans. Mob. Comput. 14(3): 660-674 (2015) - [j50]Sheng Zhong, Haifan Yao, Yixin Fang:
MICOR: A Market for Incentive-Compatible Cooperative Relay in Cognitive Radio Networks. IEEE Trans. Veh. Technol. 64(11): 5350-5367 (2015) - [c42]Yuan Zhang, Yixin Fang, Sheng Zhong:
Incentive Mechanism Design for Smartphone Crowdsensing. BDCloud 2015: 287-292 - [c41]Jingyu Hua, Shaoyong Du, Sheng Zhong:
Towards Attack-Resistant Peer-Assisted Indoor Localization. ESORICS (2) 2015: 417-437 - [c40]Wei Tong, Sheng Zhong:
Resource allocation in pollution attack and defense: A game-theoretic perspective. ICC 2015: 3057-3062 - [c39]Jingyu Hua, An Tang, Sheng Zhong:
Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising. ICDCS 2015: 298-307 - [c38]Qingjun Chen, Chen Qian, Sheng Zhong:
Privacy-Preserving Cross-Domain Routing Optimization - A Cryptographic Approach. ICNP 2015: 356-365 - [c37]Yuan Zhang, Yunlong Mao, He Zhang, Sheng Zhong:
Privacy Preserving Market Schemes for Mobile Sensing. ICPP 2015: 909-918 - [c36]Jingyu Hua, Chang Xia, Sheng Zhong:
Differentially Private Matrix Factorization. IJCAI 2015: 1763-1770 - [c35]Jingyu Hua, Yue Gao, Sheng Zhong:
Differentially private publication of general time-serial trajectory data. INFOCOM 2015: 549-557 - [c34]Laiping Zhao, Jingyu Hua, Xin Ge, Sheng Zhong:
Traffic engineering in hierarchical SDN control plane. IWQoS 2015: 189-194 - [c33]Yuan Zhang, Sheng Zhong, Haifan Yao:
An Incentive Scheme for Packet Forwarding and Payment Reduction in Wireless Ad-hoc Networks Using XOR Network Coding. MSN 2015: 52-59 - [c32]Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks. MSWiM 2015: 219-226 - [i4]Junjie Shi, Yuan Zhang, Sheng Zhong:
Privacy-preserving Network Functionality Outsourcing. CoRR abs/1502.00389 (2015) - [i3]Jingyu Hua, Zhenyu Shen, Sheng Zhong:
We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. CoRR abs/1505.05958 (2015) - [i2]Qingjun Chen, Chen Qian, Sheng Zhong:
Privacy-preserving Cross-domain Routing Optimization - A Cryptographic Approach. CoRR abs/1505.05960 (2015) - 2014
- [j49]Junjie Shi, Chen Chen, Sheng Zhong:
Privacy preserving growing neural gas over arbitrarily partitioned data. Neurocomputing 144: 427-435 (2014) - [j48]Zhuo Hao, Yunlong Mao, Sheng Zhong, Li Erran Li, Haifan Yao, Nenghai Yu:
Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics. IEEE Trans. Computers 63(6): 1580-1593 (2014) - [j47]Sheng Zhong, Haifan Yao:
Towards Cheat-Proof Cooperative Relayfor Cognitive Radio Networks. IEEE Trans. Parallel Distributed Syst. 25(9): 2442-2451 (2014) - [j46]Tingting Chen, Sheng Zhong:
An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic Routing. IEEE Trans. Veh. Technol. 63(9): 4476-4491 (2014) - [j45]Tingting Chen, Sheng Zhong:
Truthful Auctions for Continuous Spectrum with Variable Bandwidths. IEEE Trans. Wirel. Commun. 13(2): 1116-1128 (2014) - [c31]Suxin Guo, Sheng Zhong, Aidong Zhang:
Privacy Preserving Calculation of Fisher Criterion Score for Informative Gene Selection. BIBE 2014: 90-96 - [c30]Shiyu Ji, Tingting Chen, Sheng Zhong, Subhash C. Kak:
DAWN: Defending against wormhole attacks in wireless network coding systems. INFOCOM 2014: 664-672 - [c29]Yi-Kai Wang, Yitong Yin, Sheng Zhong:
Approximate capacities of two-dimensional codes by spatial mixing. ISIT 2014: 1061-1065 - [c28]Yi-Kai Wang, Yitong Yin, Sheng Zhong:
Belief propagation for spatial spectrum access games. MobiHoc 2014: 225-234 - [i1]Yi-Kai Wang, Yitong Yin, Sheng Zhong:
Approximate Capacities of Two-Dimensional Codes by Spatial Mixing. CoRR abs/1401.4831 (2014) - 2013
- [j44]Suxin Guo, Sheng Zhong, Aidong Zhang:
Privacy-preserving Kruskal-Wallis test. Comput. Methods Programs Biomed. 112(1): 135-145 (2013) - [j43]Yuan Zhang, Sheng Zhong:
A privacy-preserving algorithm for distributed training of neural network ensembles. Neural Comput. Appl. 22(Supplement-1): 269-282 (2013) - [j42]Yuan Zhang, Sheng Zhong:
Privacy preserving perceptron learning in malicious model. Neural Comput. Appl. 23(3-4): 843-856 (2013) - [j41]Tingting Chen, Fan Wu, Sheng Zhong:
On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains. IEEE Trans. Computers 62(7): 1403-1416 (2013) - [j40]Fan Wu, Tingting Chen, Sheng Zhong, Chunming Qiao, Guihai Chen:
A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks. IEEE Trans. Wirel. Commun. 12(4): 1573-1583 (2013) - [j39]Sheng Zhong, Yuan Zhang:
How to Select Optimal Gateway in Multi-Domain Wireless Networks: Alternative Solutions without Learning. IEEE Trans. Wirel. Commun. 12(11): 5620-5630 (2013) - [c27]Suxin Guo, Sheng Zhong, Aidong Zhang:
A Privacy Preserving Markov Model for Sequence Classification. BCB 2013: 561 - [c26]Tingting Chen, Sheng Zhong:
On designing truthful spectrum auctions for variable bandwidths. ICC 2013: 1434-1438 - 2012
- [j38]Tingting Chen, Sheng Zhong:
Emergency Access Authorization for Personally Controlled Online Health Care Data. J. Medical Syst. 36(1): 291-300 (2012) - [j37]Tingting Chen, Ankur Bansal, Sheng Zhong, Xiaodong Chen:
Protecting data privacy in growing neural gas. Neural Comput. Appl. 21(6): 1255-1262 (2012) - [c25]Yu Li, Sheng Zhong:
Scorpio: A Simple, Convenient, Microsoft Excel Macro Based Program for Privacy-Preserving Logrank Test. FGIT-EL/DTA/UNESST 2012: 86-91 - [c24]Fan Wu, Tingting Chen, Sheng Zhong, Chunming Qiao, Guihai Chen:
A bargaining-based approach for incentive-compatible message forwarding in opportunistic networks. ICC 2012: 789-793 - 2011
- [j36]Tingting Chen, Sheng Zhong:
Privacy-preserving models for comparing survival curves using the logrank test. Comput. Methods Programs Biomed. 104(2): 249-253 (2011) - [j35]Zhuo Hao, Sheng Zhong, Nenghai Yu:
A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing. Int. J. Comput. Commun. Control 6(2): 227-235 (2011) - [j34]Sheng Zhong, Tingting Chen:
An efficient identity-based protocol for private matching. Int. J. Commun. Syst. 24(4): 543-552 (2011) - [j33]Tingting Chen, Ankur Bansal, Sheng Zhong:
A reputation system for wireless mesh networks using network coding. J. Netw. Comput. Appl. 34(2): 535-541 (2011) - [j32]Sheng Zhong, Yuan Zhang:
Approximation algorithm for estimating failure probability of multipath transmission. Math. Comput. Simul. 81(9): 1729-1732 (2011) - [j31]Ankur Bansal, Tingting Chen, Sheng Zhong:
Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data. Neural Comput. Appl. 20(1): 143-150 (2011) - [j30]Tingting Chen, Fan Wu, Sheng Zhong:
FITS: A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks. IEEE Trans. Computers 60(7): 1045-1056 (2011) - [j29]Zhuo Hao, Sheng Zhong, Nenghai Yu:
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability. IEEE Trans. Knowl. Data Eng. 23(9): 1432-1437 (2011) - [j28]Tingting Chen, Liehuang Zhu, Fan Wu, Sheng Zhong:
Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach. IEEE Trans. Veh. Technol. 60(2): 566-579 (2011) - [c23]Zhuo Hao, Sheng Zhong, Li Erran Li:
Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel. INFOCOM 2011: 2156-2164 - [c22]Haifan Yao, Sheng Zhong:
Towards cheat-proof cooperative relay for cognitive radio networks. MobiHoc 2011: 16 - [e1]Sheng Zhong, Dejing Dou, Yu Wang:
30th IEEE International Performance Computing and Communications Conference, IPCCC 2011, Orlando, Florida, USA, November 17-19, 2011. IEEE Computer Society 2011, ISBN 978-1-4673-0010-0 [contents] - 2010
- [j27]Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhyaya, Chunming Qiao, Jean-Pierre Hubaux:
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes. IEEE Trans. Mob. Comput. 9(6): 810-823 (2010) - [j26]Sheng Zhong, Fan Wu:
A collusion-resistant routing scheme for noncooperative wireless ad hoc networks. IEEE/ACM Trans. Netw. 18(2): 582-595 (2010) - [j25]Fan Wu, Sheng Zhong, Chunming Qiao:
Strong-Incentive, High-Throughput Channel Assignment for Noncooperative Wireless Networks. IEEE Trans. Parallel Distributed Syst. 21(12): 1808-1821 (2010) - [j24]Fan Wu, Sheng Zhong, Jiqiang Liu:
An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks. IEEE Trans. Wirel. Commun. 9(3): 1012-1021 (2010) - [c21]Tingting Chen, Sheng Zhong:
INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding. INFOCOM 2010: 1828-1836
2000 – 2009
- 2009
- [j23]Sheng Zhong:
Identity-based mix: Anonymous communications without public key certificates. Comput. Electr. Eng. 35(5): 705-711 (2009) - [j22]Tingting Chen, Sheng Zhong:
Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks. Comput. Commun. 32(6): 1058-1061 (2009) - [j21]Jiqiang Liu, Sheng Zhong:
Analysis of Kim-Jeon-Yoo Password Authentication Schemes. Cryptologia 33(2): 183-187 (2009) - [j20]Sheng Zhong:
On Distributed k-Anonymization. Fundam. Informaticae 92(4): 411-431 (2009) - [j19]Sheng Zhong, Zhiqiang Yang, Tingting Chen:
k-Anonymous data collection. Inf. Sci. 179(17): 2948-2963 (2009) - [j18]Fan Wu, Jiqiang Liu, Sheng Zhong:
An efficient protocol for private and accurate mining of support counts. Pattern Recognit. Lett. 30(1): 80-86 (2009) - [j17]Chiu C. Tan, Haodong Wang, Sheng Zhong, Qun Li:
IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 13(6): 926-932 (2009) - [j16]Tingting Chen, Sheng Zhong:
Privacy-Preserving Backpropagation Neural Network Learning. IEEE Trans. Neural Networks 20(10): 1554-1564 (2009) - 2008
- [j15]Sheng Zhong:
An efficient approximation algorithm for counting n-cycles in a graph. Appl. Math. Comput. 196(1): 479-482 (2008) - [j14]Sheng Zhong:
Efficient, anonymous, and authenticated conference key setup in cellular wireless networks. Comput. Electr. Eng. 34(5): 357-367 (2008) - [j13]Sheng Zhong, Zhiqiang Yang:
Guided perturbation: towards private and accurate mining. VLDB J. 17(5): 1165-1177 (2008) - [c20]Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhyaya, Chunming Qiao:
Towards a Theory of Robust Localization Against Malicious Beacon Nodes. INFOCOM 2008: 1391-1399 - [c19]Fan Wu, Sheng Zhong, Chunming Qiao:
Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks. INFOCOM 2008: 1543-1551 - [c18]Sheng Zhong:
Welcome to SSN 2008. IPDPS 2008: 1 - [c17]Fan Wu, Tingting Chen, Sheng Zhong, Li Erran Li, Yang Richard Yang:
Incentive-compatible opportunistic routing for wireless networks. MobiCom 2008: 303-314 - [c16]Chiu C. Tan, Haodong Wang, Sheng Zhong, Qun Li:
Body sensor network security: an identity-based cryptography approach. WISEC 2008: 148-153 - 2007
- [j12]Sheng Zhong:
An efficient algorithm for topology discovery of a blackbox communication network. Appl. Math. Comput. 186(1): 506-508 (2007) - [j11]Sheng Zhong:
An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol. Cryptologia 31(4): 324-325 (2007) - [j10]Sheng Zhong:
Privacy-preserving algorithms for distributed mining of frequent itemsets. Inf. Sci. 177(2): 490-503 (2007) - [j9]Divyesh Shah, Sheng Zhong:
Two methods for privacy preserving data mining with malicious participants. Inf. Sci. 177(23): 5468-5483 (2007) - [j8]James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong:
Towards a theory of data entanglement. Theor. Comput. Sci. 389(1-2): 26-43 (2007) - [j7]Sheng Zhong, Li Erran Li, Yanbin Grace Liu, Yang Richard Yang:
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks. Wirel. Networks 13(6): 799-816 (2007) - [c15]Fan Wu, Sheng Zhong, Jiqiang Liu:
Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks. GLOBECOM 2007: 453-457 - [c14]Tingting Chen, Sheng Zhong:
Enhancing Privacy of Released Database. GrC 2007: 781-786 - [c13]Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright:
Towards Privacy-Preserving Model Selection. PinKDD 2007: 138-152 - [c12]Sheng Zhong, Fan Wu:
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. MobiCom 2007: 278-289 - [c11]Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Zhong:
Understanding and Utilizing the Hierarchy of Abnormal BGP Events. SDM 2007: 467-472 - 2006
- [j6]Sheng Zhong:
An Efficient and Secure Cryptosystem for Encrypting Long Messages. Fundam. Informaticae 71(4): 493-497 (2006) - [j5]Xiang Cao, Sheng Zhong:
Breaking a remote user authentication scheme for multi-server architecture. IEEE Commun. Lett. 10(8): 580-581 (2006) - [j4]Sheng Zhong, Yang Richard Yang:
Verifiable Distributed Oblivious Transfer and Mobile Agent Security. Mob. Networks Appl. 11(2): 201-210 (2006) - [c10]Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright:
Privacy-Preserving Queries on Encrypted Data. ESORICS 2006: 479-495 - 2005
- [c9]Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright:
Anonymity-preserving data collection. KDD 2005: 334-343 - [c8]Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong:
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results. MADNES 2005: 67-79 - [c7]Sheng Zhong, Li (Erran) Li, Yanbin Grace Liu, Yang Richard Yang:
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques. MobiCom 2005: 117-131 - [c6]Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright:
Privacy-enhancing k-anonymization of customer data. PODS 2005: 139-147 - [c5]Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright:
Privacy-Preserving Classification of Customer Data without Loss of Accuracy. SDM 2005: 92-102 - 2004
- [c4]James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong:
Towards a Theory of Data Entanglement: (Extended Abstract). ESORICS 2004: 177-192 - 2003
- [j3]Sheng Zhong, Tianwen Lin:
A comment on the Chen-Chung scheme for hierarchical access control. Comput. Secur. 22(5): 450-452 (2003) - [j2]Kefei Chen, Sheng Zhong:
Attacks on the (enhanced) Yang-Shieh authentication. Comput. Secur. 22(8): 725-727 (2003) - [c3]Sheng Zhong, Yang Richard Yang:
Verifiable distributed oblivious transfer and mobile agent security. DIALM-POMC 2003: 12-21 - [c2]Sheng Zhong, Jiang Chen, Yang Richard Yang:
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. INFOCOM 2003: 1987-1997 - 2002
- [j1]Sheng Zhong:
A practical key management scheme for access control in a user hierarchy. Comput. Secur. 21(8): 750-759 (2002) - [c1]Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels:
Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint