Sheng Zhong

Orcid: 0000-0002-6581-8730

Affiliations:
  • Nanjing University, State Key Laboratory for Novel Software Technology, China
  • Yale University, New Haven, CT, USA (PhD 2004)


According to our database1, Sheng Zhong authored at least 204 papers between 2002 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Secure Two-Party Frequent Itemset Mining With Guaranteeing Differential Privacy.
IEEE Trans. Mob. Comput., January, 2025

Joint client selection and resource allocation for federated edge learning with imperfect CSI.
Comput. Networks, 2025

2024
Parallelization of butterfly counting on hierarchical memory.
VLDB J., September, 2024

A Comprehensive Study of Trajectory Forgery and Detection in Location-Based Services.
IEEE Trans. Mob. Comput., April, 2024

SGBA: A stealthy scapegoat backdoor attack against deep neural networks.
Comput. Secur., January, 2024

Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers.
IEEE Trans. Inf. Forensics Secur., 2024

TIM: Enabling Large-Scale White-Box Testing on In-App Deep Learning Models.
IEEE Trans. Inf. Forensics Secur., 2024

Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness.
IEEE Trans. Inf. Forensics Secur., 2024

Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Scalable Differentially Private Model Publishing Via Private Iterative Sample Selection.
IEEE Trans. Dependable Secur. Comput., 2024

Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms.
IEEE Trans. Dependable Secur. Comput., 2024

Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing.
IEEE Trans. Dependable Secur. Comput., 2024

FLiP: Privacy-Preserving Federated Learning based on the Principle of Least Privileg.
CoRR, 2024

Revisiting SLO and Goodput Metrics in LLM Serving.
CoRR, 2024

Detecting Dataset Abuse in Fine-Tuning Stable Diffusion Models for Text-to-Image Synthesis.
CoRR, 2024

The Fire Thief Is Also the Keeper: Balancing Usability and Privacy in Prompts.
CoRR, 2024

LabObf: A Label Protection Scheme for Vertical Federated Learning Through Label Obfuscation.
CoRR, 2024

Subtoxic Questions: Dive Into Attitude Change of LLM's Response in Jailbreak Attempts.
CoRR, 2024

Unbalanced private set intersection with linear communication complexity.
Sci. China Inf. Sci., 2024

UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage.
Proceedings of the 33rd USENIX Security Symposium, 2024

CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

VIDAR: Data Quality Improvement for Monocular 3D Reconstruction through In-situ Visual Interaction.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

MuSR: Multi-Scale 3D Scenes Reconstruction based on Monocular Video.
Proceedings of the IEEE International Conference on Acoustics, 2024

Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
LEAP: TrustZone Based Developer-Friendly TEE for Intelligent Mobile Apps.
IEEE Trans. Mob. Comput., December, 2023

Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage.
IEEE Trans. Mob. Comput., September, 2023

Understanding Location Privacy of the Point-of-Interest Aggregate Data via Practical Attacks and Defenses.
IEEE Trans. Dependable Secur. Comput., 2023

I/O-Efficient Butterfly Counting at Scale.
Proc. ACM Manag. Data, 2023

GLogS: Interactive Graph Pattern Matching Query At Large Scale.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

SilenTower: A Robust, Scalable and Secure Watchtower with Silent Executors.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

Dataset Preparation for Arbitrary Object Detection: An Automatic Approach based on Web Information in English.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

SIEGE: Self-Supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Differentially Private Two-Party Top-$k$ Frequent Item Mining.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

GAPter: Gray-Box Data Protector for Deep Learning Inference Services at User Side.
Proceedings of the IEEE International Conference on Acoustics, 2023

SMOG: Accelerating Subgraph Matching on GPUs.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2023

Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks.
Proceedings of the Computer Security - ESORICS 2023, 2023

FLSwitch: Towards Secure and Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism.
IEEE Trans. Parallel Distributed Syst., 2022

A Hybrid Deep Network Framework for Android Malware Detection.
IEEE Trans. Knowl. Data Eng., 2022

Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud.
IEEE Trans. Dependable Secur. Comput., 2022

Distributed Traffic Engineering for Multi-Domain SDN Without Trust.
IEEE Trans. Cloud Comput., 2022

Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems.
IACR Cryptol. ePrint Arch., 2022

Automation Slicing and Testing for in-App Deep Learning Models.
CoRR, 2022

Secure deduplication schemes for content delivery in mobile edge computing.
Comput. Secur., 2022

Privacy-Preserving and Robust Federated Deep Metric Learning.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

On Designing Secure Cross-user Redundancy Elimination for WAN Optimization.
Proceedings of the IEEE INFOCOM 2022, 2022

Are You Moving as You Claim: GPS Trajectory Forgery and Detection in Location-Based Services.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Towards Practical and Efficient Long Video Summary.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Trust: Triangle Counting Reloaded on GPUs.
IEEE Trans. Parallel Distributed Syst., 2021

Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training.
IEEE Trans. Parallel Distributed Syst., 2021

Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel.
IEEE Trans. Inf. Forensics Secur., 2021

Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications.
IEEE Trans. Dependable Secur. Comput., 2021

An Empirical Analysis of Hazardous Uses of Android Shared Storage.
IEEE Trans. Dependable Secur. Comput., 2021

IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services.
Frontiers Comput. Sci., 2021

Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection.
CoRR, 2021

RABA: A Robust Avatar Backdoor Attack on Deep Neural Network.
CoRR, 2021

App Developer Centric Trusted Execution Environment.
CoRR, 2021

PECAM: privacy-enhanced video streaming and analytics via securely-reversible transformation.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Practical Location Privacy Attacks and Defense on Point-of-interest Aggregates.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack.
IEEE Trans. Mob. Comput., 2020

Secure and Efficient Outsourcing of PCA-Based Face Recognition.
IEEE Trans. Inf. Forensics Secur., 2020

Secure Inter-Domain Forwarding Loop Test in Software Defined Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Distributed <i>K</i>-Means clustering guaranteeing local differential privacy.
Comput. Secur., 2020

Detection and Defense Against DDoS Attack on SDN Controller Based on Spatiotemporal Feature.
Proceedings of the Security and Privacy in Digital Economy, 2020

Improving Deep Neural Network Robustness with Siamese Empowered Adversarial Training.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Escaping Backdoor Attack Detection of Deep Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

EMO: real-time emotion recognition from single-eye images for resource-constrained eyewear devices.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Private Deep Neural Network Models Publishing for Machine Learning as a Service.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Exploiting Adversarial Examples to Drain Computational Resources on Mobile Deep Learning Systems.
Proceedings of the 5th IEEE/ACM Symposium on Edge Computing, 2020

A Privacy-Preserving Scheme For Convolutional Neural Network-Based Applications In Mobile Cloud.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

Detecting GAN-based Privacy Attack in Distributed Learning.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

2019
Security and Privacy for Next-Generation Wireless Networks
Wireless Networks, Springer, ISBN: 978-3-030-01149-9, 2019

SDN-Based Privacy Preserving Cross Domain Routing.
IEEE Trans. Dependable Secur. Comput., 2019

Securing peer-assisted indoor localization leveraging acoustic ranging.
Comput. Secur., 2019

On repeated stackelberg security game with the cooperative human behavior model for wildlife protection.
Appl. Intell., 2019

Trojan Attack on Deep Generative Models in Autonomous Driving.
Proceedings of the Security and Privacy in Communication Networks, 2019

secGAN: A Cycle-Consistent GAN for Securely-Recoverable Video Transformation.
Proceedings of the 2019 Workshop on Hot Topics in Video Analytics and Intelligent Edges, 2019

Distributed Traffic Engineering for Multi-Domain Software Defined Networks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Privacy-Preserving Data Integrity Verification in Mobile Edge Computing.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries.
IEEE Trans. Inf. Forensics Secur., 2018

Privacy-preserving face detection based on linear and nonlinear kernels.
Multim. Tools Appl., 2018

Location privacy in public access points positioning: An optimization and geometry approach.
Comput. Secur., 2018

Topology-Preserving Traffic Engineering for Hierarchical Multi-Domain SDN.
Comput. Networks, 2018

MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Learning from Differentially Private Neural Activations with Edge Computing.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

2017
A Jointly Differentially Private Scheduling Protocol for Ridesharing Services.
IEEE Trans. Inf. Forensics Secur., 2017

Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing.
IEEE Trans. Inf. Forensics Secur., 2017

We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2017

Efficient and Privacy-Preserving Min and <i>k</i>th Min Computations in Mobile Sensing Systems.
IEEE Trans. Dependable Secur. Comput., 2017

Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity Limit.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

On Repeated Stackelberg Security Game with the Cooperative Human Behavior Modelfor Wildlife Protection.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees.
IEEE Trans. Inf. Forensics Secur., 2016

On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving Data Aggregation in Mobile Phone Sensing.
IEEE Trans. Inf. Forensics Secur., 2016

A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms.
IEEE Trans. Inf. Forensics Secur., 2016

Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems.
IEEE J. Sel. Areas Commun., 2016

EV-Linker: Mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching.
J. Comput. Syst. Sci., 2016

Secure Keyboards Against Motion Based Keystroke Inference Attack.
Proceedings of the Security and Privacy in Communication Networks, 2016

Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

FOUM: A flow-ordered consistent update mechanism for software-defined networking in adversarial settings.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Garlic Cast: Lightweight and Decentralized Anonymous Content Sharing.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Instant and Robust Authentication and Key Agreement among Mobile Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
MICOR: A Market for Incentive-Compatible Cooperative Relay in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2015

Wormhole Attack Detection Algorithms in Wireless Network Coding Systems.
IEEE Trans. Mob. Comput., 2015

Joint Resource Allocation for Device-to-Device Communications Underlaying Uplink MIMO Cellular Networks.
IEEE J. Sel. Areas Commun., 2015

Privacy-preserving Network Functionality Outsourcing.
CoRR, 2015

Cheating Detection for Payment Based Incentives with Application to Network Coding.
Ad Hoc Sens. Wirel. Networks, 2015

Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks.
Proceedings of the 18th ACM International Conference on Modeling, 2015

An Incentive Scheme for Packet Forwarding and Payment Reduction in Wireless Ad-hoc Networks Using XOR Network Coding.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Traffic engineering in hierarchical SDN control plane.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Differentially private publication of general time-serial trajectory data.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Differentially Private Matrix Factorization.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Privacy Preserving Market Schemes for Mobile Sensing.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Privacy-Preserving Cross-Domain Routing Optimization - A Cryptographic Approach.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Resource allocation in pollution attack and defense: A game-theoretic perspective.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards Attack-Resistant Peer-Assisted Indoor Localization.
Proceedings of the Computer Security - ESORICS 2015, 2015

Incentive Mechanism Design for Smartphone Crowdsensing.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

2014
Truthful Auctions for Continuous Spectrum with Variable Bandwidths.
IEEE Trans. Wirel. Commun., 2014

An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic Routing.
IEEE Trans. Veh. Technol., 2014

Towards Cheat-Proof Cooperative Relayfor Cognitive Radio Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics.
IEEE Trans. Computers, 2014

Privacy preserving growing neural gas over arbitrarily partitioned data.
Neurocomputing, 2014

Belief propagation for spatial spectrum access games.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Approximate capacities of two-dimensional codes by spatial mixing.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

DAWN: Defending against wormhole attacks in wireless network coding systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Privacy Preserving Calculation of Fisher Criterion Score for Informative Gene Selection.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Bioengineering, 2014

2013
How to Select Optimal Gateway in Multi-Domain Wireless Networks: Alternative Solutions without Learning.
IEEE Trans. Wirel. Commun., 2013

A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks.
IEEE Trans. Wirel. Commun., 2013

On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains.
IEEE Trans. Computers, 2013

A privacy-preserving algorithm for distributed training of neural network ensembles.
Neural Comput. Appl., 2013

Privacy preserving perceptron learning in malicious model.
Neural Comput. Appl., 2013

Privacy-preserving Kruskal-Wallis test.
Comput. Methods Programs Biomed., 2013

On designing truthful spectrum auctions for variable bandwidths.
Proceedings of IEEE International Conference on Communications, 2013

A Privacy Preserving Markov Model for Sequence Classification.
Proceedings of the ACM Conference on Bioinformatics, 2013

2012
Protecting data privacy in growing neural gas.
Neural Comput. Appl., 2012

Emergency Access Authorization for Personally Controlled Online Health Care Data.
J. Medical Syst., 2012

A bargaining-based approach for incentive-compatible message forwarding in opportunistic networks.
Proceedings of IEEE International Conference on Communications, 2012

Scorpio: A Simple, Convenient, Microsoft Excel Macro Based Program for Privacy-Preserving Logrank Test.
Proceedings of the Computer Applications for Database, Education, and Ubiquitous Computing, 2012

2011
Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach.
IEEE Trans. Veh. Technol., 2011

A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability.
IEEE Trans. Knowl. Data Eng., 2011

FITS: A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks.
IEEE Trans. Computers, 2011

Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data.
Neural Comput. Appl., 2011

Approximation algorithm for estimating failure probability of multipath transmission.
Math. Comput. Simul., 2011

A reputation system for wireless mesh networks using network coding.
J. Netw. Comput. Appl., 2011

An efficient identity-based protocol for private matching.
Int. J. Commun. Syst., 2011

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing.
Int. J. Comput. Commun. Control, 2011

Privacy-preserving models for comparing survival curves using the logrank test.
Comput. Methods Programs Biomed., 2011

Towards cheat-proof cooperative relay for cognitive radio networks.
Proceedings of the 12th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2011

Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks.
IEEE Trans. Wirel. Commun., 2010

Strong-Incentive, High-Throughput Channel Assignment for Noncooperative Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2010

A collusion-resistant routing scheme for noncooperative wireless ad hoc networks.
IEEE/ACM Trans. Netw., 2010

Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes.
IEEE Trans. Mob. Comput., 2010

INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Privacy-Preserving Backpropagation Neural Network Learning.
IEEE Trans. Neural Networks, 2009

IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2009

An efficient protocol for private and accurate mining of support counts.
Pattern Recognit. Lett., 2009

k-Anonymous data collection.
Inf. Sci., 2009

On Distributed k-Anonymization.
Fundam. Informaticae, 2009

Analysis of Kim-Jeon-Yoo Password Authentication Schemes.
Cryptologia, 2009

Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks.
Comput. Commun., 2009

Identity-based mix: Anonymous communications without public key certificates.
Comput. Electr. Eng., 2009

2008
Guided perturbation: towards private and accurate mining.
VLDB J., 2008

Efficient, anonymous, and authenticated conference key setup in cellular wireless networks.
Comput. Electr. Eng., 2008

An efficient approximation algorithm for counting n-cycles in a graph.
Appl. Math. Comput., 2008

Body sensor network security: an identity-based cryptography approach.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Incentive-compatible opportunistic routing for wireless networks.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Welcome to SSN 2008.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Towards a Theory of Robust Localization Against Malicious Beacon Nodes.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks.
Wirel. Networks, 2007

Towards a theory of data entanglement.
Theor. Comput. Sci., 2007

Privacy-preserving algorithms for distributed mining of frequent itemsets.
Inf. Sci., 2007

Two methods for privacy preserving data mining with malicious participants.
Inf. Sci., 2007

An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol.
Cryptologia, 2007

An efficient algorithm for topology discovery of a blackbox communication network.
Appl. Math. Comput., 2007

Understanding and Utilizing the Hierarchy of Abnormal BGP Events.
Proceedings of the Seventh SIAM International Conference on Data Mining, 2007

On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

Towards Privacy-Preserving Model Selection.
Proceedings of the Privacy, 2007

Enhancing Privacy of Released Database.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks.
Proceedings of the Global Communications Conference, 2007

2006
Verifiable Distributed Oblivious Transfer and Mobile Agent Security.
Mob. Networks Appl., 2006

Breaking a remote user authentication scheme for multi-server architecture.
IEEE Commun. Lett., 2006

An Efficient and Secure Cryptosystem for Encrypting Long Messages.
Fundam. Informaticae, 2006

Privacy-Preserving Queries on Encrypted Data.
Proceedings of the Computer Security, 2006

2005
Privacy-Preserving Classification of Customer Data without Loss of Accuracy.
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005

Privacy-enhancing <i>k</i>-anonymization of customer data.
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005

On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques.
Proceedings of the 11th Annual International Conference on Mobile Computing and Networking, 2005

Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Anonymity-preserving data collection.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

2004
Towards a Theory of Data Entanglement: (Extended Abstract).
Proceedings of the Computer Security, 2004

2003
A comment on the Chen-Chung scheme for hierarchical access control.
Comput. Secur., 2003

Attacks on the (enhanced) Yang-Shieh authentication.
Comput. Secur., 2003

Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

2002
A practical key management scheme for access control in a user hierarchy.
Comput. Secur., 2002

Optimistic Mixing for Exit-Polls.
Proceedings of the Advances in Cryptology, 2002


  Loading...