Feng Zhu

Orcid: 0000-0003-3542-3989

Affiliations:
  • University of Alabama in Huntsville, Department of Computer Science, AL, USA
  • Michigan State University, Department of Computer Science and Engineering, East Lansing, MI, USA


According to our database1, Feng Zhu authored at least 33 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Genomics Cybersecurity Concerns, Challenges, and a Modular Test Lab.
Proceedings of the 2024 ACM Southeast Conference, 2024

2022
Dynamic Warnings: An Eye Gaze-Based Approach.
Int. J. Inf. Secur. Priv., 2022

Eye tracking technologies to visualize secure coding behavior.
Array, 2022

Subliminal Warnings: Utilizing the High Bandwidth of Nonconscious Visual Perception.
Proceedings of the Persuasive Technology - 17th International Conference, 2022

TopographyNET: a deep learning model for EEG-based mind wandering detection.
Proceedings of the BCB '22: 13th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics, Northbrook, Illinois, USA, August 7, 2022

EEG-based audiovisual face-name association classifications using transfer learning.
Proceedings of the ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18, 2022

2021
Spectra-based Classification of Audiovisual and Visuospatial Face-name Associative Memories using EEG.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021

CNN models for eye state classification using EEG with temporal ordering.
Proceedings of the BCB '21: 12th ACM International Conference on Bioinformatics, 2021

2020
ERP Template Matching for EEG Single Trial Classification.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020

Understanding and Improving Secure Coding Behavior with Eye Tracking Methodologies.
Proceedings of the 2020 ACM Southeast Conference, 2020

Do You See the Warning?: Cybersecurity Warnings via Nonconscious Processing.
Proceedings of the 2020 ACM Southeast Conference, 2020

2018
Designing Warnings to Reduce Identity Disclosure.
Int. J. Hum. Comput. Interact., 2018

2017
Expert Sources in Warnings May Reduce the Extent of Identity Disclosure in Cyber Contexts.
Int. J. Hum. Comput. Interact., 2017

2012
Understanding identity exposure in pervasive computing environments.
Pervasive Mob. Comput., 2012

Private Entity Authentication for Pervasive Computing Environments.
Int. J. Netw. Secur., 2012

Sentential access control.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

Contexts and sharing/not sharing private information.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

Is older, wiser?: an age-specific study of exposure of private information.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

2011
Reciprocity attacks.
Proceedings of the Symposium On Usable Privacy and Security, 2011

DynamicSD: Discover Dynamic and Uncertain Services in Pervasive Computing Environments.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments.
Int. J. Inf. Secur. Priv., 2010

Toward secure and private service discovery anywhere anytime.
Frontiers Comput. Sci. China, 2010

2009
Secure and Private Service Discovery in Pervasive Computing Environments.
Int. J. Inf. Secur. Priv., 2009

RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Understanding and minimizing identity exposure in ubiquitous computing environments.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

2007
Private and Secure Service Discovery via Progressive and Probabilistic Exposure.
IEEE Trans. Parallel Distributed Syst., 2007

2006
A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols.
IEEE Trans. Mob. Comput., 2006

The Master Key: A Private Authentication Approach for Pervasive Computing Environments.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

2005
Service discovery in pervasive computing environments.
IEEE Pervasive Comput., 2005

Facilitating secure ad hoc service discovery in public environments.
J. Syst. Softw., 2005

Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

2004
PrudentExposure: A Private and User-centric Service Discovery Protocol.
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 2004

2003
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003


  Loading...