Feng Zhu
Orcid: 0000-0003-3542-3989Affiliations:
- University of Alabama in Huntsville, Department of Computer Science, AL, USA
- Michigan State University, Department of Computer Science and Engineering, East Lansing, MI, USA
According to our database1,
Feng Zhu
authored at least 33 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on uah.edu
-
on orcid.org
-
on cs.uah.edu
On csauthors.net:
Bibliography
2024
Proceedings of the 2024 ACM Southeast Conference, 2024
2022
Proceedings of the Persuasive Technology - 17th International Conference, 2022
Proceedings of the BCB '22: 13th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics, Northbrook, Illinois, USA, August 7, 2022
Proceedings of the ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18, 2022
2021
Spectra-based Classification of Audiovisual and Visuospatial Face-name Associative Memories using EEG.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021
Proceedings of the BCB '21: 12th ACM International Conference on Bioinformatics, 2021
2020
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020
Proceedings of the 2020 ACM Southeast Conference, 2020
Proceedings of the 2020 ACM Southeast Conference, 2020
2018
Int. J. Hum. Comput. Interact., 2018
2017
Expert Sources in Warnings May Reduce the Extent of Identity Disclosure in Cyber Contexts.
Int. J. Hum. Comput. Interact., 2017
2012
Pervasive Mob. Comput., 2012
Int. J. Netw. Secur., 2012
Proceedings of the 50th Annual Southeast Regional Conference, 2012
Proceedings of the 50th Annual Southeast Regional Conference, 2012
Proceedings of the 50th Annual Southeast Regional Conference, 2012
2011
Proceedings of the Symposium On Usable Privacy and Security, 2011
DynamicSD: Discover Dynamic and Uncertain Services in Pervasive Computing Environments.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
2010
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments.
Int. J. Inf. Secur. Priv., 2010
Frontiers Comput. Sci. China, 2010
2009
Int. J. Inf. Secur. Priv., 2009
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009
2007
IEEE Trans. Parallel Distributed Syst., 2007
2006
A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols.
IEEE Trans. Mob. Comput., 2006
The Master Key: A Private Authentication Approach for Pervasive Computing Environments.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006
2005
J. Syst. Softw., 2005
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005
2004
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 2004
2003
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003