


Остановите войну!
for scientists:


default search action
Sheng Zhong 0002
Person information

- affiliation: Nanjing University, State Key Laboratory for Novel Software Technology, China
- affiliation (PhD 2004): Yale University, New Haven, CT, USA
Other persons with the same name
- Sheng Zhong — disambiguation page
- Sheng Zhong 0001
— Huazhong University of Science and Technology, School of Artificial Intelligence and Automation, Wuhan, China
- Sheng Zhong 0003
— University of California San Diego, Department of Bioengineering, La Jolla, CA, USA
- Sheng Zhong 0004
— University of Michigan, Robotics Institute, Ann Arbor, MI, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j86]Yu Lin, Yunlong Mao, Yuan Zhang, Sheng Zhong:
Secure deduplication schemes for content delivery in mobile edge computing. Comput. Secur. 114: 102602 (2022) - [j85]Yangyang Liu
, Laiping Zhao
, Jingyu Hua
, Wenyu Qu
, Suohao Zhang
, Sheng Zhong
:
Distributed Traffic Engineering for Multi-Domain SDN Without Trust. IEEE Trans. Cloud Comput. 10(4): 2481-2496 (2022) - [j84]Shaoyong Du
, Minrui Zhao
, Jingyu Hua
, Hang Zhang, Xiaoyu Chen, Zhiyun Qian
, Sheng Zhong
:
Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud. IEEE Trans. Dependable Secur. Comput. 19(4): 2648-2664 (2022) - [j83]Huijuan Zhu
, Liang-Min Wang
, Sheng Zhong
, Yang Li, Victor S. Sheng
:
A Hybrid Deep Network Framework for Android Malware Detection. IEEE Trans. Knowl. Data Eng. 34(12): 5558-5570 (2022) - [j82]Yunlong Mao
, Wenbo Hong
, Boyu Zhu, Zhifei Zhu, Yuan Zhang
, Sheng Zhong
:
Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism. IEEE Trans. Parallel Distributed Syst. 33(11): 3079-3091 (2022) - [c74]Xiaopeng Ke, Boyu Chang, Hao Wu, Fengyuan Xu, Sheng Zhong:
Towards Practical and Efficient Long Video Summary. ICASSP 2022: 1770-1774 - [c73]Huaming Yang, Zhongzhou Xia, Jersy Shin, Jingyu Hua, Yunlong Mao, Sheng Zhong:
Are You Moving as You Claim: GPS Trajectory Forgery and Detection in Location-Based Services. ICDCS 2022: 1166-1176 - [c72]Yuan Zhang, Ziwei Zhang, Minze Xu, Chen Tian, Sheng Zhong:
On Designing Secure Cross-user Redundancy Elimination for WAN Optimization. INFOCOM 2022: 1589-1598 - [c71]Yulong Tian, Xiaopeng Ke, Zeyi Tao, Shaohua Ding, Fengyuan Xu, Qun Li, Hao Han, Sheng Zhong, Xinyi Fu:
Privacy-Preserving and Robust Federated Deep Metric Learning. IWQoS 2022: 1-11 - [i9]Hao Wu, Yuhang Gong, Xiaopeng Ke, Hanzhong Liang, Minghao Li, Fengyuan Xu, Yunxin Liu, Sheng Zhong:
Automation Slicing and Testing for in-App Deep Learning Models. CoRR abs/2205.07228 (2022) - [i8]Minze Xu, Yuan Zhang, Sheng Zhong:
Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems. IACR Cryptol. ePrint Arch. 2022: 176 (2022) - 2021
- [j81]Yan Xu, Ming Wang, Hong Zhong, Sheng Zhong:
IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services. Frontiers Comput. Sci. 15(6): 156814 (2021) - [j80]Shaoyong Du
, Pengxiong Zhu, Jingyu Hua
, Zhiyun Qian
, Zhao Zhang, Xiaoyu Chen, Sheng Zhong
:
An Empirical Analysis of Hazardous Uses of Android Shared Storage. IEEE Trans. Dependable Secur. Comput. 18(1): 340-355 (2021) - [j79]Yuan Zhang
, Yunlong Mao
, Minze Xu
, Fengyuan Xu, Sheng Zhong
:
Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications. IEEE Trans. Dependable Secur. Comput. 18(3): 1008-1018 (2021) - [j78]Jingyu Hua
, Zidong Zhou
, Sheng Zhong
:
Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel. IEEE Trans. Inf. Forensics Secur. 16: 1029-1043 (2021) - [j77]Yunlong Mao
, Wenbo Hong, Heng Wang, Qun Li, Sheng Zhong:
Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training. IEEE Trans. Parallel Distributed Syst. 32(7): 1777-1788 (2021) - [j76]Santosh Pandey, Zhibin Wang, Sheng Zhong, Chen Tian, Bolong Zheng, Xiaoye S. Li, Lingda Li, Adolfy Hoisie, Caiwen Ding, Dong Li, Hang Liu:
Trust: Triangle Counting Reloaded on GPUs. IEEE Trans. Parallel Distributed Syst. 32(11): 2646-2660 (2021) - [c70]Yunlong Mao, Xinyu Yuan, Xinyang Zhao, Sheng Zhong:
Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks. ESORICS (1) 2021: 476-496 - [c69]Wei Tong, Chang Xia, Jingyu Hua, Qun Li, Sheng Zhong:
Practical Location Privacy Attacks and Defense on Point-of-interest Aggregates. ICDCS 2021: 808-818 - [c68]Minze Xu, Yuan Zhang, Fengyuan Xu, Sheng Zhong:
Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels. IWQoS 2021: 1-10 - [c67]Hao Wu, Xuejin Tian, Minghao Li, Yunxin Liu, Ganesh Ananthanarayanan, Fengyuan Xu, Sheng Zhong:
PECAM: privacy-enhanced video streaming and analytics via securely-reversible transformation. MobiCom 2021: 229-241 - [i7]Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, Sheng Zhong:
App Developer Centric Trusted Execution Environment. CoRR abs/2102.02465 (2021) - [i6]Santosh Pandey, Zhibin Wang, Sheng Zhong, Chen Tian, Bolong Zheng, Xiaoye S. Li, Lingda Li, Adolfy Hoisie, Caiwen Ding, Dong Li, Hang Liu:
TRUST: Triangle Counting Reloaded on GPUs. CoRR abs/2103.08053 (2021) - [i5]Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong:
RABA: A Robust Avatar Backdoor Attack on Deep Neural Network. CoRR abs/2104.01026 (2021) - [i4]Shucheng Li, Fengyuan Xu, Runchuan Wang, Sheng Zhong:
Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection. CoRR abs/2106.10176 (2021) - 2020
- [j75]Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong:
Distributed K-Means clustering guaranteeing local differential privacy. Comput. Secur. 90: 101699 (2020) - [j74]Yuan Zhang
, Boyu Zhu, Yixin Fang, Suxin Guo, Aidong Zhang
, Sheng Zhong:
Secure Inter-Domain Forwarding Loop Test in Software Defined Networks. IEEE Trans. Dependable Secur. Comput. 17(1): 162-178 (2020) - [j73]Yushu Zhang
, Xiangli Xiao
, Lu-Xing Yang
, Yong Xiang
, Sheng Zhong:
Secure and Efficient Outsourcing of PCA-Based Face Recognition. IEEE Trans. Inf. Forensics Secur. 15: 1683-1695 (2020) - [j72]Yunlong Mao
, Ying He
, Yuan Zhang
, Jingyu Hua
, Sheng Zhong
:
Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack. IEEE Trans. Mob. Comput. 19(12): 2916-2932 (2020) - [c66]Shucheng Li, Lingfei Wu, Shiwei Feng, Fangli Xu, Fengyuan Xu, Sheng Zhong:
Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem. EMNLP (Findings) 2020: 2841-2852 - [c65]Yayuan Xiong, Fengyuan Xu, Sheng Zhong:
Detecting GAN-based Privacy Attack in Distributed Learning. ICC 2020: 1-6 - [c64]Chang Xia, Jingyu Hua, Wei Tong, Yayuan Xiong, Sheng Zhong:
A Privacy-Preserving Scheme For Convolutional Neural Network-Based Applications In Mobile Cloud. ICME 2020: 1-6 - [c63]Han Gao, Yulong Tian, Rongchun Yao, Fengyuan Xu, Xinyi Fu, Sheng Zhong:
Exploiting Adversarial Examples to Drain Computational Resources on Mobile Deep Learning Systems. SEC 2020: 334-339 - [c62]Yunlong Mao
, Boyu Zhu, Wenbo Hong, Zhifei Zhu, Yuan Zhang, Sheng Zhong:
Private Deep Neural Network Models Publishing for Machine Learning as a Service. IWQoS 2020: 1-10 - [c61]Hao Wu, Jinghao Feng, Xuejin Tian, Edward Sun, Yunxin Liu, Bo Dong, Fengyuan Xu, Sheng Zhong:
EMO: real-time emotion recognition from single-eye images for resource-constrained eyewear devices. MobiSys 2020: 448-461 - [c60]Yayuan Xiong, Fengyuan Xu, Sheng Zhong, Qun Li:
Escaping Backdoor Attack Detection of Deep Learning. SEC 2020: 431-445 - [c59]Yu Zhu, Zongfei Li, Fengyuan Xu, Sheng Zhong:
Improving Deep Neural Network Robustness with Siamese Empowered Adversarial Training. SpaCCS 2020: 62-75 - [c58]Yan Xu
, Jinxing Ma
, Sheng Zhong:
Detection and Defense Against DDoS Attack on SDN Controller Based on Spatiotemporal Feature. SPDE 2020: 3-18 - [i3]Shucheng Li, Lingfei Wu, Shiwei Feng, Fangli Xu, Fengyuan Xu, Sheng Zhong:
Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem. CoRR abs/2004.13781 (2020)
2010 – 2019
- 2019
- [b1]Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang:
Security and Privacy for Next-Generation Wireless Networks. Wireless Networks, Springer 2019, ISBN 978-3-030-01149-9, pp. 1-180 - [j71]Binru Wang
, Yuan Zhang, Zhi-Hua Zhou, Sheng Zhong:
On repeated stackelberg security game with the cooperative human behavior model for wildlife protection. Appl. Intell. 49(3): 1002-1015 (2019) - [j70]Shaoyong Du
, Jingyu Hua, Sheng Zhong:
Securing peer-assisted indoor localization leveraging acoustic ranging. Comput. Secur. 81: 58-77 (2019) - [j69]Qingjun Chen, Shouqian Shi, Xin Li
, Chen Qian, Sheng Zhong:
SDN-Based Privacy Preserving Cross Domain Routing. IEEE Trans. Dependable Secur. Comput. 16(6): 930-943 (2019) - [c57]Hao Wu, Zheng Qin, Xuejin Tian, Edward Sun, Fengyuan Xu, Sheng Zhong:
Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources. DSC 2019: 1-8 - [c56]Laiping Zhao, Jingyu Hua, Yangyang Liu, Wenyu Qu, Suohao Zhang, Sheng Zhong:
Distributed Traffic Engineering for Multi-Domain Software Defined Networks. ICDCS 2019: 492-502 - [c55]Wei Tong, Bingbing Jiang, Fengyuan Xu, Qun Li, Sheng Zhong:
Privacy-Preserving Data Integrity Verification in Mobile Edge Computing. ICDCS 2019: 1007-1018 - [c54]Hao Wu, Jinghao Feng, Xuejin Tian, Fengyuan Xu, Yunxin Liu, XiaoFeng Wang, Sheng Zhong:
secGAN: A Cycle-Consistent GAN for Securely-Recoverable Video Transformation. HotEdgeVideo@MOBICOM 2019: 33-38 - [c53]Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun Li, Sheng Zhong:
Trojan Attack on Deep Generative Models in Autonomous Driving. SecureComm (1) 2019: 299-318 - 2018
- [j68]Jingyu Hua
, Laiping Zhao, Suohao Zhang, Yangyang Liu, Xin Ge, Sheng Zhong:
Topology-Preserving Traffic Engineering for Hierarchical Multi-Domain SDN. Comput. Networks 140: 62-77 (2018) - [j67]Yunlong Mao
, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong:
Location privacy in public access points positioning: An optimization and geometry approach. Comput. Secur. 73: 425-438 (2018) - [j66]Li Wang, Junjie Shi, Chen Chen, Sheng Zhong:
Privacy-preserving face detection based on linear and nonlinear kernels. Multim. Tools Appl. 77(6): 7261-7281 (2018) - [j65]Jingyu Hua
, Wei Tong
, Fengyuan Xu, Sheng Zhong:
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Trans. Inf. Forensics Secur. 13(5): 1155-1168 (2018) - [c52]Yunlong Mao
, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, Sheng Zhong:
Learning from Differentially Private Neural Activations with Edge Computing. SEC 2018: 90-102 - [c51]Jingyu Hua, Hongyi Sun, Zhenyu Shen, Zhiyun Qian
, Sheng Zhong:
Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information. INFOCOM 2018: 1700-1708 - [c50]Yulong Tian, Wei Wei, Qun Li, Fengyuan Xu, Sheng Zhong:
MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. INFOCOM 2018: 2726-2734 - [e1]Liehuang Zhu, Sheng Zhong:
Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers. Communications in Computer and Information Science 747, Springer 2018, ISBN 978-981-10-8889-6 [contents] - 2017
- [j64]Yuan Zhang, Qingjun Chen, Sheng Zhong:
Efficient and Privacy-Preserving Min and kth Min Computations in Mobile Sensing Systems. IEEE Trans. Dependable Secur. Comput. 14(1): 9-21 (2017) - [j63]Jingyu Hua
, Zhenyu Shen, Sheng Zhong:
We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. IEEE Trans. Inf. Forensics Secur. 12(2): 286-297 (2017) - [j62]Yunlong Mao
, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Trans. Inf. Forensics Secur. 12(6): 1483-1493 (2017) - [j61]Wei Tong
, Jingyu Hua
, Sheng Zhong:
A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. IEEE Trans. Inf. Forensics Secur. 12(10): 2444-2456 (2017) - [c49]Binru Wang, Yuan Zhang, Sheng Zhong:
On Repeated Stackelberg Security Game with the Cooperative Human Behavior Modelfor Wildlife Protection. AAMAS 2017: 1751-1753 - [c48]Yu Zhou, Yuan Zhang, Sheng Zhong:
Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity Limit. ICCCN 2017: 1-9 - 2016
- [j60]Shaoyong Du
, Jingyu Hua, Yue Gao, Sheng Zhong:
EV-Linker: Mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching. J. Comput. Syst. Sci. 82(1): 156-172 (2016) - [j59]Yuan Zhang, Yunlong Mao
, Sheng Zhong:
Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems. IEEE J. Sel. Areas Commun. 34(10): 2738-2749 (2016) - [j58]Yuan Zhang, He Zhang, Siyuan Tang, Sheng Zhong:
Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees. IEEE Trans. Inf. Forensics Secur. 11(1): 100-113 (2016) - [j57]Yuan Zhang, Qingjun Chen, Sheng Zhong:
Privacy-Preserving Data Aggregation in Mobile Phone Sensing. IEEE Trans. Inf. Forensics Secur. 11(5): 980-992 (2016) - [j56]Wei Tong, Sheng Zhong:
A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems. IEEE Trans. Inf. Forensics Secur. 11(10): 2255-2267 (2016) - [j55]Jingyu Hua, An Tang, Yixin Fang, Zhenyu Shen, Sheng Zhong:
Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms. IEEE Trans. Inf. Forensics Secur. 11(10): 2298-2311 (2016) - [j54]Yuan Zhang
, Wei Tong, Sheng Zhong:
On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy. IEEE Trans. Inf. Forensics Secur. 11(11): 2528-2541 (2016) - [c47]Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao:
Instant and Robust Authentication and Key Agreement among Mobile Devices. CCS 2016: 616-627 - [c46]Yunlong Mao
, Yuan Zhang, Sheng Zhong:
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks. CCS 2016: 1580-1590 - [c45]Chen Qian, Junjie Shi, Zihao Yu, Ye Yu
, Sheng Zhong:
Garlic Cast: Lightweight and Decentralized Anonymous Content Sharing. ICPADS 2016: 216-223 - [c44]Jingyu Hua, Xin Ge, Sheng Zhong:
FOUM: A flow-ordered consistent update mechanism for software-defined networking in adversarial settings. INFOCOM 2016: 1-9 - [c43]Yuan Zhang, Siyuan Tang, Tingting Chen, Sheng Zhong:
Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain. INFOCOM 2016: 1-9 - [c42]Shaoyong Du
, Yue Gao, Jingyu Hua, Sheng Zhong:
Secure Keyboards Against Motion Based Keystroke Inference Attack. SecureComm 2016: 63-81 - 2015
- [j53]Haifan Yao, Sheng Zhong:
Cheating Detection for Payment Based Incentives with Application to Network Coding. Ad Hoc Sens. Wirel. Networks 24(1-2): 1-19 (2015) - [j52]Wei Zhong, Yixin Fang, Shi Jin, Kai-Kit Wong, Sheng Zhong, Zuping Qian:
Joint Resource Allocation for Device-to-Device Communications Underlaying Uplink MIMO Cellular Networks. IEEE J. Sel. Areas Commun. 33(1): 41-54 (2015) - [j51]Shiyu Ji, Tingting Chen, Sheng Zhong:
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems. IEEE Trans. Mob. Comput. 14(3): 660-674 (2015) - [j50]Sheng Zhong, Haifan Yao, Yixin Fang:
MICOR: A Market for Incentive-Compatible Cooperative Relay in Cognitive Radio Networks. IEEE Trans. Veh. Technol. 64(11): 5350-5367 (2015) - [c41]Yuan Zhang, Yixin Fang, Sheng Zhong:
Incentive Mechanism Design for Smartphone Crowdsensing. BDCloud 2015: 287-292 - [c40]Jingyu Hua, Shaoyong Du
, Sheng Zhong:
Towards Attack-Resistant Peer-Assisted Indoor Localization. ESORICS (2) 2015: 417-437 - [c39]Wei Tong, Sheng Zhong:
Resource allocation in pollution attack and defense: A game-theoretic perspective. ICC 2015: 3057-3062 - [c38]Jingyu Hua, An Tang, Sheng Zhong:
Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising. ICDCS 2015: 298-307 - [c37]Qingjun Chen, Chen Qian, Sheng Zhong:
Privacy-Preserving Cross-Domain Routing Optimization - A Cryptographic Approach. ICNP 2015: 356-365 - [c36]Yuan Zhang, Yunlong Mao
, He Zhang, Sheng Zhong:
Privacy Preserving Market Schemes for Mobile Sensing. ICPP 2015: 909-918 - [c35]Jingyu Hua, Chang Xia, Sheng Zhong:
Differentially Private Matrix Factorization. IJCAI 2015: 1763-1770 - [c34]Jingyu Hua, Yue Gao, Sheng Zhong:
Differentially private publication of general time-serial trajectory data. INFOCOM 2015: 549-557 - [c33]Laiping Zhao, Jingyu Hua, Xin Ge, Sheng Zhong:
Traffic engineering in hierarchical SDN control plane. IWQoS 2015: 189-194 - [c32]Yuan Zhang, Sheng Zhong, Haifan Yao:
An Incentive Scheme for Packet Forwarding and Payment Reduction in Wireless Ad-hoc Networks Using XOR Network Coding. MSN 2015: 52-59 - [c31]Yunlong Mao
, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks. MSWiM 2015: 219-226 - [i2]Junjie Shi, Yuan Zhang, Sheng Zhong:
Privacy-preserving Network Functionality Outsourcing. CoRR abs/1502.00389 (2015) - [i1]Jingyu Hua, Zhenyu Shen, Sheng Zhong:
We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. CoRR abs/1505.05958 (2015) - 2014
- [j49]Junjie Shi, Chen Chen, Sheng Zhong
:
Privacy preserving growing neural gas over arbitrarily partitioned data. Neurocomputing 144: 427-435 (2014) - [j48]Zhuo Hao, Yunlong Mao
, Sheng Zhong, Li Erran Li, Haifan Yao, Nenghai Yu:
Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics. IEEE Trans. Computers 63(6): 1580-1593 (2014) - [j47]Sheng Zhong, Haifan Yao:
Towards Cheat-Proof Cooperative Relayfor Cognitive Radio Networks. IEEE Trans. Parallel Distributed Syst. 25(9): 2442-2451 (2014) - [j46]Tingting Chen, Sheng Zhong:
An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic Routing. IEEE Trans. Veh. Technol. 63(9): 4476-4491 (2014) - [j45]Tingting Chen, Sheng Zhong:
Truthful Auctions for Continuous Spectrum with Variable Bandwidths. IEEE Trans. Wirel. Commun. 13(2): 1116-1128 (2014) - [c30]Suxin Guo, Sheng Zhong, Aidong Zhang:
Privacy Preserving Calculation of Fisher Criterion Score for Informative Gene Selection. BIBE 2014: 90-96 - [c29]Shiyu Ji, Tingting Chen, Sheng Zhong, Subhash C. Kak:
DAWN: Defending against wormhole attacks in wireless network coding systems. INFOCOM 2014: 664-672 - [c28]Yikai Wang, Yitong Yin, Sheng Zhong:
Approximate capacities of two-dimensional codes by spatial mixing. ISIT 2014: 1061-1065 - [c27]Yikai Wang, Yitong Yin, Sheng Zhong:
Belief propagation for spatial spectrum access games. MobiHoc 2014: 225-234 - 2013
- [j44]Suxin Guo, Sheng Zhong, Aidong Zhang:
Privacy-preserving Kruskal-Wallis test. Comput. Methods Programs Biomed. 112(1): 135-145 (2013) - [j43]Yuan Zhang, Sheng Zhong:
A privacy-preserving algorithm for distributed training of neural network ensembles. Neural Comput. Appl. 22(Supplement-1): 269-282 (2013) - [j42]Yuan Zhang, Sheng Zhong:
Privacy preserving perceptron learning in malicious model. Neural Comput. Appl. 23(3-4): 843-856 (2013) - [j41]Tingting Chen, Fan Wu, Sheng Zhong:
On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains. IEEE Trans. Computers 62(7): 1403-1416 (2013) - [j40]Fan Wu, Tingting Chen, Sheng Zhong, Chunming Qiao, Guihai Chen
:
A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks. IEEE Trans. Wirel. Commun. 12(4): 1573-1583 (2013) - [j39]Sheng Zhong, Yuan Zhang:
How to Select Optimal Gateway in Multi-Domain Wireless Networks: Alternative Solutions without Learning. IEEE Trans. Wirel. Commun. 12(11): 5620-5630 (2013) - [c26]Suxin Guo, Sheng Zhong, Aidong Zhang:
A Privacy Preserving Markov Model for Sequence Classification. BCB 2013: 561 - [c25]Tingting Chen, Sheng Zhong:
On designing truthful spectrum auctions for variable bandwidths. ICC 2013: 1434-1438 - 2012
- [j38]Tingting Chen, Sheng Zhong:
Emergency Access Authorization for Personally Controlled Online Health Care Data. J. Medical Syst. 36(1): 291-300 (2012) - [j37]Tingting Chen, Ankur Bansal, Sheng Zhong, Xiaodong Chen:
Protecting data privacy in growing neural gas. Neural Comput. Appl. 21(6): 1255-1262 (2012) - [c24]Yu Li, Sheng Zhong:
Scorpio: A Simple, Convenient, Microsoft Excel Macro Based Program for Privacy-Preserving Logrank Test. FGIT-EL/DTA/UNESST 2012: 86-91 - [c23]Fan Wu, Tingting Chen, Sheng Zhong, Chunming Qiao, Guihai Chen
:
A bargaining-based approach for incentive-compatible message forwarding in opportunistic networks. ICC 2012: 789-793 - 2011
- [j36]Tingting Chen, Sheng Zhong:
Privacy-preserving models for comparing survival curves using the logrank test. Comput. Methods Programs Biomed. 104(2): 249-253 (2011) - [j35]Zhuo Hao, Sheng Zhong, Nenghai Yu:
A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing. Int. J. Comput. Commun. Control 6(2): 227-235 (2011) - [j34]Sheng Zhong, Tingting Chen:
An efficient identity-based protocol for private matching. Int. J. Commun. Syst. 24(4): 543-552 (2011) - [j33]Tingting Chen, Ankur Bansal, Sheng Zhong:
A reputation system for wireless mesh networks using network coding. J. Netw. Comput. Appl. 34(2): 535-541 (2011) - [j32]Sheng Zhong, Yuan Zhang:
Approximation algorithm for estimating failure probability of multipath transmission. Math. Comput. Simul. 81(