Sheng Zhong
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [b1]Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang:
Security and Privacy for Next-Generation Wireless Networks. Wireless Networks, Springer 2019, ISBN 978-3-030-01149-9, pp. 1-180 - [j94]Shaoyong Du, Jingyu Hua, Sheng Zhong:
Securing peer-assisted indoor localization leveraging acoustic ranging. Computers & Security 81: 58-77 (2019) - [j93]Yi Chang, Luxin Yan, Houzhang Fang, Sheng Zhong, Wenshan Liao:
HSI-DeNet: Hyperspectral Image Restoration via Convolutional Neural Network. IEEE Trans. Geoscience and Remote Sensing 57(2): 667-682 (2019) - 2018
- [j92]Sheng Zhong, Wei Ren, Tianqing Zhu, Yi Ren, Kim-Kwang Raymond Choo:
Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt. IEEE Access 6: 37850-37857 (2018) - [j91]Sen Chen, Wenchao Xue, Sheng Zhong, Yi Huang:
On comparison of modified ADRCs for nonlinear uncertain systems with time delay. SCIENCE CHINA Information Sciences 61(7): 70223:1-70223:15 (2018) - [j90]Jingyu Hua, Laiping Zhao, Suohao Zhang, Yangyang Liu, Xin Ge, Sheng Zhong:
Topology-Preserving Traffic Engineering for Hierarchical Multi-Domain SDN. Computer Networks 140: 62-77 (2018) - [j89]Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong:
Location privacy in public access points positioning: An optimization and geometry approach. Computers & Security 73: 425-438 (2018) - [j88]Riccardo Calandrelli, Qiuyang Wu, Jihong Guan, Sheng Zhong:
GITAR: An Open Source Tool for Analysis and Visualization of Hi-C Data. Genomics, Proteomics & Bioinformatics 16(5): 365-372 (2018) - [j87]Li Wang, Junjie Shi, Chen Chen, Sheng Zhong:
Privacy-preserving face detection based on linear and nonlinear kernels. Multimedia Tools Appl. 77(6): 7261-7281 (2018) - [j86]Weijun Zhang, Sheng Zhong, Wenhui Xu, Ying Wu:
Motion Correlation Discovery for Visual Tracking. IEEE Signal Process. Lett. 25(11): 1720-1724 (2018) - [j85]Jingyu Hua, Wei Tong, Fengyuan Xu, Sheng Zhong:
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Trans. Information Forensics and Security 13(5): 1155-1168 (2018) - [c80]Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, Sheng Zhong:
Learning from Differentially Private Neural Activations with Edge Computing. SEC 2018: 90-102 - [c79]Jingyu Hua, Hongyi Sun, Zhenyu Shen, Zhiyun Qian, Sheng Zhong:
Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information. INFOCOM 2018: 1700-1708 - [c78]Yulong Tian, Wei Wei, Qun Li, Fengyuan Xu, Sheng Zhong:
MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. INFOCOM 2018: 2726-2734 - [e3]Liehuang Zhu, Sheng Zhong:
Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers. Communications in Computer and Information Science 747, Springer 2018, ISBN 978-981-10-8889-6 [contents] - 2017
- [j84]Yuan Zhang, Qingjun Chen, Sheng Zhong:
Efficient and Privacy-Preserving Min and kth Min Computations in Mobile Sensing Systems. IEEE Trans. Dependable Sec. Comput. 14(1): 9-21 (2017) - [j83]Jingyu Hua, Zhenyu Shen, Sheng Zhong:
We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. IEEE Trans. Information Forensics and Security 12(2): 286-297 (2017) - [j82]Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Trans. Information Forensics and Security 12(6): 1483-1493 (2017) - [j81]Wei Tong, Jingyu Hua, Sheng Zhong:
A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. IEEE Trans. Information Forensics and Security 12(10): 2444-2456 (2017) - [c77]Binru Wang, Yuan Zhang, Sheng Zhong:
On Repeated Stackelberg Security Game with the Cooperative Human Behavior Modelfor Wildlife Protection. AAMAS 2017: 1751-1753 - [c76]
- [c75]Yu Zhou, Yuan Zhang, Sheng Zhong:
Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity Limit. ICCCN 2017: 1-9 - [c74]
- [c73]Yi Chang, Luxin Yan, Sheng Zhong:
Hyperspectral image denoising via spectral and spatial low-rank approximation. IGARSS 2017: 4193-4196 - [i7]Yi Chang, Luxin Yan, Houzhang Fang, Sheng Zhong, Zhijun Zhang:
Weighted Low-rank Tensor Recovery for Hyperspectral Image Restoration. CoRR abs/1709.00192 (2017) - [i6]Taihang Dong, Sheng Zhong:
Discussion among Different Methods of Updating Model Filter in Object Tracking. CoRR abs/1711.07829 (2017) - [i5]Taihang Dong, Sheng Zhong:
Robust Object Tracking Based on Self-adaptive Search Area. CoRR abs/1711.07835 (2017) - 2016
- [j80]Shaoyong Du, Jingyu Hua, Yue Gao, Sheng Zhong:
EV-Linker: Mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching. J. Comput. Syst. Sci. 82(1): 156-172 (2016) - [j79]Yuan Zhang, Yunlong Mao, Sheng Zhong:
Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems. IEEE Journal on Selected Areas in Communications 34(10): 2738-2749 (2016) - [j78]Yongqing Zhang, Xiaoyi Cao, Sheng Zhong:
GeNemo: a search engine for web-based functional genomic data. Nucleic Acids Research 44(Webserver-Issue): W122-W127 (2016) - [j77]Yi Chang, Luxin Yan, Tao Wu, Sheng Zhong:
Remote Sensing Image Stripe Noise Removal: From Image Decomposition Perspective. IEEE Trans. Geoscience and Remote Sensing 54(12): 7018-7031 (2016) - [j76]Yuan Zhang, He Zhang, Siyuan Tang, Sheng Zhong:
Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees. IEEE Trans. Information Forensics and Security 11(1): 100-113 (2016) - [j75]Yuan Zhang, Qingjun Chen, Sheng Zhong:
Privacy-Preserving Data Aggregation in Mobile Phone Sensing. IEEE Trans. Information Forensics and Security 11(5): 980-992 (2016) - [j74]Wei Tong, Sheng Zhong:
A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems. IEEE Trans. Information Forensics and Security 11(10): 2255-2267 (2016) - [j73]Jingyu Hua, An Tang, Yixin Fang, Zhenyu Shen, Sheng Zhong:
Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms. IEEE Trans. Information Forensics and Security 11(10): 2298-2311 (2016) - [j72]Yuan Zhang, Wei Tong, Sheng Zhong:
On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy. IEEE Trans. Information Forensics and Security 11(11): 2528-2541 (2016) - [c72]Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao:
Instant and Robust Authentication and Key Agreement among Mobile Devices. ACM Conference on Computer and Communications Security 2016: 616-627 - [c71]Yunlong Mao, Yuan Zhang, Sheng Zhong:
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks. ACM Conference on Computer and Communications Security 2016: 1580-1590 - [c70]Chen Qian, Junjie Shi, Zihao Yu, Ye Yu, Sheng Zhong:
Garlic Cast: Lightweight and Decentralized Anonymous Content Sharing. ICPADS 2016: 216-223 - [c69]Jingyu Hua, Xin Ge, Sheng Zhong:
FOUM: A flow-ordered consistent update mechanism for software-defined networking in adversarial settings. INFOCOM 2016: 1-9 - [c68]Yuan Zhang, Siyuan Tang, Tingting Chen, Sheng Zhong:
Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain. INFOCOM 2016: 1-9 - [c67]Shaoyong Du, Yue Gao, Jingyu Hua, Sheng Zhong:
Secure Keyboards Against Motion Based Keystroke Inference Attack. SecureComm 2016: 63-81 - [e2]Sheng Zhong, Anna Cinzia Squicciarini:
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, Xi'an, China, May 30 - June 3, 2016. ACM 2016, ISBN 978-1-4503-4285-8 [contents] - 2015
- [j71]Haifan Yao, Sheng Zhong:
Cheating Detection for Payment Based Incentives with Application to Network Coding. Ad Hoc & Sensor Wireless Networks 24(1-2): 1-19 (2015) - [j70]Wei Zhong, Yixin Fang, Shi Jin, Kai-Kit Wong, Sheng Zhong, Zuping Qian:
Joint Resource Allocation for Device-to-Device Communications Underlaying Uplink MIMO Cellular Networks. IEEE Journal on Selected Areas in Communications 33(1): 41-54 (2015) - [j69]Shiyu Ji, Tingting Chen, Sheng Zhong:
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems. IEEE Trans. Mob. Comput. 14(3): 660-674 (2015) - [j68]Sheng Zhong, Haifan Yao, Yixin Fang:
MICOR: A Market for Incentive-Compatible Cooperative Relay in Cognitive Radio Networks. IEEE Trans. Vehicular Technology 64(11): 5350-5367 (2015) - [c66]Yuan Zhang, Yixin Fang, Sheng Zhong:
Incentive Mechanism Design for Smartphone Crowdsensing. BDCloud 2015: 287-292 - [c65]Jingyu Hua, Shaoyong Du, Sheng Zhong:
Towards Attack-Resistant Peer-Assisted Indoor Localization. ESORICS (2) 2015: 417-437 - [c64]
- [c63]Jingyu Hua, An Tang, Sheng Zhong:
Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising. ICDCS 2015: 298-307 - [c62]Qingjun Chen, Chen Qian, Sheng Zhong:
Privacy-Preserving Cross-Domain Routing Optimization - A Cryptographic Approach. ICNP 2015: 356-365 - [c61]Yuan Zhang, Yunlong Mao, He Zhang, Sheng Zhong:
Privacy Preserving Market Schemes for Mobile Sensing. ICPP 2015: 909-918 - [c60]Sheng Zhong, Lu Hou, Zhiyong Rao, Wen Hu:
Foodservice Management of Health Industries Based on Customer Satisfaction. APMS (2) 2015: 612-619 - [c59]Jingyu Hua, Chang Xia, Sheng Zhong:
Differentially Private Matrix Factorization. IJCAI 2015: 1763-1770 - [c58]Jingyu Hua, Yue Gao, Sheng Zhong:
Differentially private publication of general time-serial trajectory data. INFOCOM 2015: 549-557 - [c57]
- [c56]Laiping Zhao, Jingyu Hua, Xin Ge, Sheng Zhong:
Traffic engineering in hierarchical SDN control plane. IWQoS 2015: 189-194 - [c55]Yuan Zhang, Sheng Zhong, Haifan Yao:
An Incentive Scheme for Packet Forwarding and Payment Reduction in Wireless Ad-hoc Networks Using XOR Network Coding. MSN 2015: 52-59 - [c54]Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks. MSWiM 2015: 219-226 - [c53]Sheng Zhong, Yunfeng Zhao, Huiwen Jing:
A Risk Control Technology towards Supply Chain Finance in Banking Industry. ICSS 2015: 49-56 - [i4]Junjie Shi, Yuan Zhang, Sheng Zhong:
Privacy-preserving Network Functionality Outsourcing. CoRR abs/1502.00389 (2015) - [i3]Jingyu Hua, Zhenyu Shen, Sheng Zhong:
We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. CoRR abs/1505.05958 (2015) - [i2]Qingjun Chen, Chen Qian, Sheng Zhong:
Privacy-preserving Cross-domain Routing Optimization - A Cryptographic Approach. CoRR abs/1505.05960 (2015) - 2014
- [j67]Junjie Shi, Chen Chen, Sheng Zhong:
Privacy preserving growing neural gas over arbitrarily partitioned data. Neurocomputing 144: 427-435 (2014) - [j66]Sheng Zhong, Chun Yang, Jian Zhang:
Symbol Timing Estimation with Multi-h CPM Signals. JNW 9(4): 921-926 (2014) - [j65]Ruicheng Yan, Zhiguo Cao, Jianhui Wang, Sheng Zhong, Dominik A. Klein, Armin B. Cremers:
Horizontal velocity estimation via downward looking descent images for lunar landing. IEEE Trans. Aerospace and Electronic Systems 50(2): 1197-1221 (2014) - [j64]Zhuo Hao, Yunlong Mao, Sheng Zhong, Li Erran Li, Haifan Yao, Nenghai Yu:
Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics. IEEE Trans. Computers 63(6): 1580-1593 (2014) - [j63]Jianhui Wang, Sheng Zhong, Luxin Yan, Zhiguo Cao:
An Embedded System-on-Chip Architecture for Real-time Visual Detection and Matching. IEEE Trans. Circuits Syst. Video Techn. 24(3): 525-538 (2014) - [j62]Sheng Zhong, Haifan Yao:
Towards Cheat-Proof Cooperative Relayfor Cognitive Radio Networks. IEEE Trans. Parallel Distrib. Syst. 25(9): 2442-2451 (2014) - [j61]Tingting Chen, Sheng Zhong:
An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic Routing. IEEE Trans. Vehicular Technology 63(9): 4476-4491 (2014) - [j60]Tingting Chen, Sheng Zhong:
Truthful Auctions for Continuous Spectrum with Variable Bandwidths. IEEE Trans. Wireless Communications 13(2): 1116-1128 (2014) - [c52]Suxin Guo, Sheng Zhong, Aidong Zhang:
Privacy Preserving Calculation of Fisher Criterion Score for Informative Gene Selection. BIBE 2014: 90-96 - [c51]Sheng Han, Xin Chen, Sheng Zhong, Yongjin Zhou, Zhiguo Zhang:
A novel outlier detection method for identifying torque-related transient patterns of in vivo muscle behavior. EMBC 2014: 4216-4219 - [c50]Sheng Zhong, Yongjin Zhou, Kai Zhan, Huiying Wen, Xin Chen, Wanzhang Yang, Yun Xiang:
A preliminary study of in vivo muscle behavior during walking among hemiplegia patients. DSP 2014: 739-741 - [c49]Shiyu Ji, Tingting Chen, Sheng Zhong, Subhash C. Kak:
DAWN: Defending against wormhole attacks in wireless network coding systems. INFOCOM 2014: 664-672 - [c48]Xin Chen, Sheng Zhong, Yangyang Niu, Siping Chen, Tianfu Wang, Shing-Chow Chan, Zhiguo Zhang:
A multimodal investigation of in vivo muscle behavior: System design and data analysis. ISCAS 2014: 2053-2056 - [c47]Yikai Wang, Yitong Yin, Sheng Zhong:
Approximate capacities of two-dimensional codes by spatial mixing. ISIT 2014: 1061-1065 - [c46]Yikai Wang, Yitong Yin, Sheng Zhong:
Belief propagation for spatial spectrum access games. MobiHoc 2014: 225-234 - [i1]Yikai Wang, Yitong Yin, Sheng Zhong:
Approximate Capacities of Two-Dimensional Codes by Spatial Mixing. CoRR abs/1401.4831 (2014) - 2013
- [j59]Xiaoyi Cao, Sheng Zhong:
Enabling interspecies epigenomic comparison with CEpBrowser. Bioinformatics 29(9): 1223-1225 (2013) - [j58]Suxin Guo, Sheng Zhong, Aidong Zhang:
Privacy-preserving Kruskal-Wallis test. Computer Methods and Programs in Biomedicine 112(1): 135-145 (2013) - [j57]Sheng Zhong, Jianhui Wang, Luxin Yan, Lie Kang, Zhiguo Cao:
A real-time embedded architecture for SIFT. Journal of Systems Architecture - Embedded Systems Design 59(1): 16-29 (2013) - [j56]Yuan Zhang, Sheng Zhong:
A privacy-preserving algorithm for distributed training of neural network ensembles. Neural Computing and Applications 22(Supplement-1): 269-282 (2013) - [j55]Yuan Zhang, Sheng Zhong:
Privacy preserving perceptron learning in malicious model. Neural Computing and Applications 23(3-4): 843-856 (2013) - [j54]Chieh-Chun Chen, Shu Xiao, Dan Xie, Xiaoyi Cao, Chun-Xiao Song, Ting Wang, Chuan He, Sheng Zhong:
Understanding Variation in Transcription Factor Binding by Modeling Transcription Factor Genome-Epigenome Interactions. PLoS Computational Biology 9(12) (2013) - [j53]Tingting Chen, Fan Wu, Sheng Zhong:
On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains. IEEE Trans. Computers 62(7): 1403-1416 (2013) - [j52]Fan Wu, Tingting Chen, Sheng Zhong, Chunming Qiao, Guihai Chen:
A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks. IEEE Trans. Wireless Communications 12(4): 1573-1583 (2013) - [j51]Sheng Zhong, Yuan Zhang:
How to Select Optimal Gateway in Multi-Domain Wireless Networks: Alternative Solutions without Learning. IEEE Trans. Wireless Communications 12(11): 5620-5630 (2013) - [c45]Yanrong Guo, Haoming Lin, Xinyu Zhang, Sheng Zhong, Yin Yin, Xin Chen:
Noninvasive assessment of liver viscoelasticity by acoustic radiation force with a rat model. ICICS 2013: 1-4 - [c44]Suxin Guo, Sheng Zhong, Aidong Zhang:
A Privacy Preserving Markov Model for Sequence Classification. BCB 2013: 561 - [c43]Tingting Chen, Sheng Zhong:
On designing truthful spectrum auctions for variable bandwidths. ICC 2013: 1434-1438 - [c42]Shaohua Hu, Sheng Zhong:
An improved differential evolution algorithm based on the Sector Window Floating Zoom Immune Random Search operator. ICNC 2013: 392-396 - 2012
- [j50]Tingting Chen, Sheng Zhong:
Emergency Access Authorization for Personally Controlled Online Health Care Data. J. Medical Systems 36(1): 291-300 (2012) - [j49]Tingting Chen, Ankur Bansal, Sheng Zhong, Xiaodong Chen:
Protecting data privacy in growing neural gas. Neural Computing and Applications 21(6): 1255-1262 (2012) - [c41]Yu Li, Sheng Zhong:
Scorpio: A Simple, Convenient, Microsoft Excel Macro Based Program for Privacy-Preserving Logrank Test. FGIT-EL/DTA/UNESST 2012: 86-91 - [c40]Fan Wu, Tingting Chen, Sheng Zhong, Chunming Qiao, Guihai Chen:
A bargaining-based approach for incentive-compatible message forwarding in opportunistic networks. ICC 2012: 789-793 - 2011
- [j48]Marcelo Rivas-Astroza, Dan Xie, Xiaoyi Cao, Sheng Zhong:
Mapping personal functional data to personal genomes. Bioinformatics 27(24): 3427-3429 (2011) - [j47]Tingting Chen, Sheng Zhong:
Privacy-preserving models for comparing survival curves using the logrank test. Computer Methods and Programs in Biomedicine 104(2): 249-253 (2011) - [j46]Sheng Zhong, Baihai Zhang, Jun Li, Qiao Li:
High-precision localisation algorithm in wireless sensor networks. IJCAT 41(1/2): 150-155 (2011) - [j45]Sheng Zhong, Tingting Chen:
An efficient identity-based protocol for private matching. Int. J. Communication Systems 24(4): 543-552 (2011) - [j44]Tingting Chen, Ankur Bansal, Sheng Zhong:
A reputation system for wireless mesh networks using network coding. J. Network and Computer Applications 34(2): 535-541 (2011) - [j43]Sheng Zhong, Yuan Zhang:
Approximation algorithm for estimating failure probability of multipath transmission. Mathematics and Computers in Simulation 81(9): 1729-1732 (2011) - [j42]Ankur Bansal, Tingting Chen, Sheng Zhong:
Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data. Neural Computing and Applications 20(1): 143-150 (2011) - [j41]Dan Xie, Chieh-Chun Chen, Xin He, Xiaoyi Cao, Sheng Zhong:
Towards an Evolutionary Model of Transcription Networks. PLoS Computational Biology 7(6) (2011) - [j40]Tingting Chen, Fan Wu, Sheng Zhong:
FITS: A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks. IEEE Trans. Computers 60(7): 1045-1056 (2011) - [j39]Zhuo Hao, Sheng Zhong, Nenghai Yu:
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability. IEEE Trans. Knowl. Data Eng. 23(9): 1432-1437 (2011) - [j38]Tingting Chen, Liehuang Zhu, Fan Wu, Sheng Zhong:
Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach. IEEE Trans. Vehicular Technology 60(2): 566-579 (2011) - [c39]Shengjie Sun, Sheng Zhong, Baihai Zhang:
Researching on the Growth Operator SWFZIRS of Growth Evolution Algorithms. CIS 2011: 135-138 - [c38]
- [c37]Hong Zhang, Sheng Zhong:
Co-op Advertising Analysis within a Supply Chain Based on the Product Life Cycle. CIS 2011: 1456-1460 - [c36]Zhuo Hao, Sheng Zhong, Erran L. Li:
Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel. INFOCOM 2011: 2156-2164 - [c35]Haifan Yao, Sheng Zhong:
Towards cheat-proof cooperative relay for cognitive radio networks. MobiHoc 2011: 16 - [e1]Sheng Zhong, Dejing Dou, Yu Wang:
30th IEEE International Performance Computing and Communications Conference, IPCCC 2011, Orlando, Florida, USA, November 17-19, 2011. IEEE Computer Society 2011, ISBN 978-1-4673-0010-0 [contents] - 2010
- [j37]Wei Huang, Xiaoyi Cao, Sheng Zhong:
Network-based comparison of temporal gene expression patterns. Bioinformatics 26(23): 2944-2951 (2010) - [j36]Jun Cai, Dan Xie, Zhewen Fan, Hiram Chipperfield, John Marden, Wing H. Wong, Sheng Zhong:
Modeling Co-Expression across Species for Complex Traits: Insights to the Difference of Human and Mouse Embryonic Stem Cells. PLoS Computational Biology 6(3) (2010) - [j35]Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhyaya, Chunming Qiao, Jean-Pierre Hubaux:
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes. IEEE Trans. Mob. Comput. 9(6): 810-823 (2010) - [j34]Sheng Zhong, Fan Wu:
A collusion-resistant routing scheme for noncooperative wireless ad hoc networks. IEEE/ACM Trans. Netw. 18(2): 582-595 (2010) - [j33]Fan Wu, Sheng Zhong, Chunming Qiao:
Strong-Incentive, High-Throughput Channel Assignment for Noncooperative Wireless Networks. IEEE Trans. Parallel Distrib. Syst. 21(12): 1808-1821 (2010) - [j32]Fan Wu, Sheng Zhong, Jiqiang Liu:
An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks. IEEE Trans. Wireless Communications 9(3): 1012-1021 (2010) - [c34]Sheng Zhong, Baihai Zhang:
Adaptive learning routing algorithm of WSNs based autonomous decentralized system approach. ICNC 2010: 66-69 - [c33]Tingting Chen, Sheng Zhong:
INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding. INFOCOM 2010: 1828-1836
2000 – 2009
- 2009
- [j31]Sheng Zhong:
Identity-based mix: Anonymous communications without public key certificates. Computers & Electrical Engineering 35(5): 705-711 (2009) - [j30]Tingting Chen, Sheng Zhong:
Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks. Computer Communications 32(6): 1058-1061 (2009) - [j29]Jiqiang Liu, Sheng Zhong:
Analysis of Kim-Jeon-Yoo Password Authentication Schemes. Cryptologia 33(2): 183-187 (2009) - [j28]