Wensheng Zhang
Affiliations:- Iowa State University, Department of Computer Science, USA
According to our database1,
Wensheng Zhang
authored at least 108 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Clustering-based Mutual-Learning for Personalized Situation-Aware Services in Smart Homes.
Proceedings of the IEEE International Conference on Software Services Engineering, 2024
2023
Situ-Oracle: A Learning-Based Situation Analysis Servicing Framework for BIoT Systems.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023
Distributed and Intelligent API Mediation Service for Enterprise-Grade Hybrid-Multicloud Computing.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023
Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud.
Proceedings of the 16th IEEE International Conference on Cloud Computing, 2023
2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Proceedings of the IEEE International Smart Cities Conference, 2022
Towards Practical Privacy-Preserving Solution for Outsourced Neural Network Inference.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022
2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the Cloud Computing - 11th EAI International Conference, 2021
2020
A Situation Enabled Framework for Energy-Efficient Workload Offloading in 5G Vehicular Edge Computing.
Proceedings of the 2020 IEEE World Congress on Services, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
EAI Endorsed Trans. Security Safety, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
LA ^3 : A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices.
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
2017
IEEE Trans. Veh. Technol., 2017
J. Commun. Networks, 2017
TSKT-ORAM: A Two-Server <i>k</i>-ary Tree Oblivious RAM without Homomorphic Encryption.
Future Internet, 2017
Comput. Electr. Eng., 2017
2016
IACR Cryptol. ePrint Arch., 2016
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services.
IACR Cryptol. ePrint Arch., 2016
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage.
IACR Cryptol. ePrint Arch., 2016
DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern.
Proceedings of the Network and System Security - 10th International Conference, 2016
TSKT-ORAM: A two-server k-ary tree ORAM for access pattern protection in cloud storage.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
Proceedings of the Wireless Power Transfer Algorithms, 2016
2015
Proceedings of the Network and System Security - 9th International Conference, 2015
2014
IEEE Trans. Wirel. Commun., 2014
IEEE Trans. Veh. Technol., 2014
IEEE Trans. Veh. Technol., 2014
IEEE Trans. Mob. Comput., 2014
IACR Cryptol. ePrint Arch., 2014
2D k-barrier duty-cycle scheduling for intruder detection in Wireless Sensor Networks.
Comput. Commun., 2014
Comput. Networks, 2014
Joint charging and rate allocation for utility maximization in sustainable sensor networks.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
IEEE Trans. Wirel. Commun., 2013
Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications.
Int. J. Distributed Sens. Networks, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013
2012
IEEE Trans. Parallel Distributed Syst., 2012
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Parallel Distributed Syst., 2011
ACM Trans. Sens. Networks, 2011
A Distributed Scheme for Securing Middle-Tier Multicast in Hierarchical Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2011
Charging scheduling with minimal waiting in a network of electric vehicles and charging stations.
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Reconciling privacy preservation and intrusion detection in sensory data aggregation.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds.
Proceedings of the Computer Security - ESORICS 2011, 2011
2010
ACM Trans. Sens. Networks, 2010
JOCN, 2010
Int. J. Sens. Networks, 2010
Ad Hoc Networks, 2010
Proceedings of the Wireless Algorithms, 2010
Proceedings of the 31st IEEE Real-Time Systems Symposium, 2010
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010
An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
2009
IEEE Trans. Mob. Comput., 2009
Editorial for special issue on privacy and security in wireless sensorand ad hoc networks.
Ad Hoc Networks, 2009
Predistribution and local collaboration-based group rekeying for wireless sensor networks.
Ad Hoc Networks, 2009
On-Demand Node Reclamation and Replacement for Guaranteed Area Coverage in Long-Lived Sensor Networks.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Network Planning for Heterogeneous Wireless Sensor Networks in Environmental Survivability.
Proceedings of the ICTAI 2009, 2009
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
2008
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks.
ACM Trans. Sens. Networks, 2008
Ad Hoc Networks, 2008
Slede: a domain-specific verification framework for sensor network security protocol implementations.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
GP^2S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data (concise contribution).
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of IEEE International Conference on Communications, 2008
2007
Wirel. Networks, 2007
IEEE Trans. Mob. Comput., 2007
Pervasive Mob. Comput., 2007
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007
A random perturbation-based scheme for pairwise key establishment in sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
SAP: seamless authentication protocol for vertical handoff in heterogeneous wireless networks.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006
Pairwise key establishment for large-scale sensor networks: from identifier-based to location-based.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006
2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005
2004
DCTC: dynamic convoy tree-based collaboration for target tracking in sensor networks.
IEEE Trans. Wirel. Commun., 2004
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
2003
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003
2002
Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record, 2002