Sheng Zhong
Orcid: 0000-0002-6581-8730Affiliations:
- Nanjing University, State Key Laboratory for Novel Software Technology, China
- Yale University, New Haven, CT, USA (PhD 2004)
According to our database1,
Sheng Zhong
authored at least 204 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Mob. Comput., January, 2025
Joint client selection and resource allocation for federated edge learning with imperfect CSI.
Comput. Networks, 2025
2024
VLDB J., September, 2024
A Comprehensive Study of Trajectory Forgery and Detection in Location-Based Services.
IEEE Trans. Mob. Comput., April, 2024
Comput. Secur., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Scalable Differentially Private Model Publishing Via Private Iterative Sample Selection.
IEEE Trans. Dependable Secur. Comput., 2024
Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
FLiP: Privacy-Preserving Federated Learning based on the Principle of Least Privileg.
CoRR, 2024
Detecting Dataset Abuse in Fine-Tuning Stable Diffusion Models for Text-to-Image Synthesis.
CoRR, 2024
CoRR, 2024
LabObf: A Label Protection Scheme for Vertical Federated Learning Through Label Obfuscation.
CoRR, 2024
Subtoxic Questions: Dive Into Attitude Change of LLM's Response in Jailbreak Attempts.
CoRR, 2024
Sci. China Inf. Sci., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
VIDAR: Data Quality Improvement for Monocular 3D Reconstruction through In-situ Visual Interaction.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Mob. Comput., December, 2023
IEEE Trans. Mob. Comput., September, 2023
Understanding Location Privacy of the Point-of-Interest Aggregate Data via Practical Attacks and Defenses.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 2023 USENIX Annual Technical Conference, 2023
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Dataset Preparation for Arbitrary Object Detection: An Automatic Approach based on Web Information in English.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
SIEGE: Self-Supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the IEEE High Performance Extreme Computing Conference, 2023
Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks.
Proceedings of the Computer Security - ESORICS 2023, 2023
FLSwitch: Towards Secure and Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism.
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Knowl. Data Eng., 2022
Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
IACR Cryptol. ePrint Arch., 2022
Comput. Secur., 2022
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Are You Moving as You Claim: GPS Trajectory Forgery and Detection in Location-Based Services.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training.
IEEE Trans. Parallel Distributed Syst., 2021
Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services.
Frontiers Comput. Sci., 2021
Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection.
CoRR, 2021
PECAM: privacy-enhanced video streaming and analytics via securely-reversible transformation.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks.
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
IEEE Trans. Mob. Comput., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Comput. Secur., 2020
Detection and Defense Against DDoS Attack on SDN Controller Based on Spatiotemporal Feature.
Proceedings of the Security and Privacy in Digital Economy, 2020
Improving Deep Neural Network Robustness with Siamese Empowered Adversarial Training.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
EMO: real-time emotion recognition from single-eye images for resource-constrained eyewear devices.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
Exploiting Adversarial Examples to Drain Computational Resources on Mobile Deep Learning Systems.
Proceedings of the 5th IEEE/ACM Symposium on Edge Computing, 2020
A Privacy-Preserving Scheme For Convolutional Neural Network-Based Applications In Mobile Cloud.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020
2019
Wireless Networks, Springer, ISBN: 978-3-030-01149-9, 2019
IEEE Trans. Dependable Secur. Comput., 2019
Comput. Secur., 2019
On repeated stackelberg security game with the cooperative human behavior model for wildlife protection.
Appl. Intell., 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 2019 Workshop on Hot Topics in Video Analytics and Intelligent Edges, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
2018
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries.
IEEE Trans. Inf. Forensics Secur., 2018
Multim. Tools Appl., 2018
Location privacy in public access points positioning: An optimization and geometry approach.
Comput. Secur., 2018
Comput. Networks, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2017
Efficient and Privacy-Preserving Min and <i>k</i>th Min Computations in Mobile Sensing Systems.
IEEE Trans. Dependable Secur. Comput., 2017
Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity Limit.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
On Repeated Stackelberg Security Game with the Cooperative Human Behavior Modelfor Wildlife Protection.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems.
IEEE Trans. Inf. Forensics Secur., 2016
Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms.
IEEE Trans. Inf. Forensics Secur., 2016
Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems.
IEEE J. Sel. Areas Commun., 2016
EV-Linker: Mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching.
J. Comput. Syst. Sci., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
FOUM: A flow-ordered consistent update mechanism for software-defined networking in adversarial settings.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
MICOR: A Market for Incentive-Compatible Cooperative Relay in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2015
IEEE Trans. Mob. Comput., 2015
Joint Resource Allocation for Device-to-Device Communications Underlaying Uplink MIMO Cellular Networks.
IEEE J. Sel. Areas Commun., 2015
Ad Hoc Sens. Wirel. Networks, 2015
Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks.
Proceedings of the 18th ACM International Conference on Modeling, 2015
An Incentive Scheme for Packet Forwarding and Payment Reduction in Wireless Ad-hoc Networks Using XOR Network Coding.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Proceedings of the 44th International Conference on Parallel Processing, 2015
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015
2014
IEEE Trans. Wirel. Commun., 2014
An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic Routing.
IEEE Trans. Veh. Technol., 2014
IEEE Trans. Parallel Distributed Syst., 2014
Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics.
IEEE Trans. Computers, 2014
Neurocomputing, 2014
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Privacy Preserving Calculation of Fisher Criterion Score for Informative Gene Selection.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Bioengineering, 2014
2013
How to Select Optimal Gateway in Multi-Domain Wireless Networks: Alternative Solutions without Learning.
IEEE Trans. Wirel. Commun., 2013
A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks.
IEEE Trans. Wirel. Commun., 2013
On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains.
IEEE Trans. Computers, 2013
Neural Comput. Appl., 2013
Neural Comput. Appl., 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the ACM Conference on Bioinformatics, 2013
2012
J. Medical Syst., 2012
A bargaining-based approach for incentive-compatible message forwarding in opportunistic networks.
Proceedings of IEEE International Conference on Communications, 2012
Scorpio: A Simple, Convenient, Microsoft Excel Macro Based Program for Privacy-Preserving Logrank Test.
Proceedings of the Computer Applications for Database, Education, and Ubiquitous Computing, 2012
2011
Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach.
IEEE Trans. Veh. Technol., 2011
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability.
IEEE Trans. Knowl. Data Eng., 2011
IEEE Trans. Computers, 2011
Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data.
Neural Comput. Appl., 2011
Approximation algorithm for estimating failure probability of multipath transmission.
Math. Comput. Simul., 2011
J. Netw. Comput. Appl., 2011
Int. J. Commun. Syst., 2011
Int. J. Comput. Commun. Control, 2011
Comput. Methods Programs Biomed., 2011
Proceedings of the 12th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2011
Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks.
IEEE Trans. Wirel. Commun., 2010
Strong-Incentive, High-Throughput Channel Assignment for Noncooperative Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2010
IEEE/ACM Trans. Netw., 2010
IEEE Trans. Mob. Comput., 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
2009
IEEE Trans. Neural Networks, 2009
IEEE Trans. Inf. Technol. Biomed., 2009
Pattern Recognit. Lett., 2009
Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks.
Comput. Commun., 2009
Comput. Electr. Eng., 2009
2008
Efficient, anonymous, and authenticated conference key setup in cellular wireless networks.
Comput. Electr. Eng., 2008
Appl. Math. Comput., 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
2007
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks.
Wirel. Networks, 2007
Inf. Sci., 2007
Inf. Sci., 2007
Cryptologia, 2007
Appl. Math. Comput., 2007
Proceedings of the Seventh SIAM International Conference on Data Mining, 2007
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007
Proceedings of the Global Communications Conference, 2007
2006
Mob. Networks Appl., 2006
IEEE Commun. Lett., 2006
Fundam. Informaticae, 2006
Proceedings of the Computer Security, 2006
2005
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques.
Proceedings of the 11th Annual International Conference on Mobile Computing and Networking, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005
2004
Proceedings of the Computer Security, 2004
2003
Comput. Secur., 2003
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003
2002
Comput. Secur., 2002