研究成果

出自COSECWiki

跳转到: 导航, 搜索

学术论文

  1. Yuan Zhang, Boyu Zhu, Yixin Fang, Suxin Guo, Aidong Zhang, Sheng Zhong. Secure Inter-domain Forwarding Loop Test in Software Defined Networks. IEEE Transactions on Dependable and Secure Computing, Accepted.
  2. Wei Tong, Jingyu Hua, Sheng Zhong. A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. IEEE Transactions on Information Forensics & Security, Accepted.
  3. Li Wang, Jun Jie Shi, Chen Chen, Sheng Zhong. Privacy-preserving face detection based on linear and nonlinear kernels. Multimedia Tools and Applications, Accepted. PDF Download
  4. Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong. Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Transactions on Information Forensics & Security, Accepted.
  5. Fan Wu, Dongxin Liu, Zhihao Wu, Yuan Zhang, Guihai Chen. Cost-Efficient Indoor White Space Exploration Through Compressive Sensing. IEEE/ACM Transactions on Networking, 2016. PDF Download
  6. Jingyu Hua, Zhenyu Shen, Sheng Zhong. We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. IEEE Transactions on Information Forensics and Security, 2016. PDF Download
  7. Yuan Zhang, Yunlong Mao, Sheng Zhong. Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems. IEEE Journal of Selected Areas in Communications, 2016. PDF Download
  8. Yunlong Mao, Yuan Zhang, Sheng Zhong. Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks. In proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS' 16), 2016. PDF Download
  9. Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao. Instant and Robust Authentication and Key Agreement among Mobile Devices. In proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS' 16), 2016. PDF Download
  10. Yuan Zhang, Wei Tong, Sheng Zhong. On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-anonymity Location Privacy, IEEE Transactions on Information Forensics and Security, 2016. PDF Download
  11. Wei Tong, Sheng Zhong. A Unified Resource Allocation Framework for Defending against Pollution Attacks in Wireless Network Coding Systems. IEEE Transactions on Information Forensics & Security, 2016. PDF Download
  12. Jingyu Hua, An Tang, Yixin Fang, Zhenyu Shen, Sheng Zhong. Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms. IEEE Transactions on Information Forensics & Security, 2016. PDF Download
  13. Yuan Zhang, Qingjun Chen, Sheng Zhong, Privacy-preserving Data Aggregation in Mobile Phone Sensing. IEEE Transactions on Information Forensics & Security. PDF Download
  14. Jingyu Hua, Xin Ge, Sheng Zhong, FOUM: A Flow-Ordered Consistent Update Mechanism for Software-Defined Networking in Adversarial Settings. Accepted by the 35th International Conference on Computer Communications (INFOCOM'16). PDF Download
  15. Yuan Zhang, Siyuan Tang, Tingting Chen, Sheng Zhong, Competitive Auctions for Cost-aware Cellular Traffic Offloading with Optimized Capacity Gain. Accepted by the 35th International Conference on Computer Communications (INFOCOM'16). PDF Download
  16. Yuan Zhang, He Zhang, Siyuan Tang, Sheng Zhong, Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees, IEEE Transactions on Information Forensics and Security. 2016 PDF Download
  17. Dongxin Liu, Zhihao Wu, Fan Wu, Yuan Zhang, Guihai Chen, FIWEX: A Compressive Sensing Based Cost-Efficient Indoor White Space Exploration Mechanism, ACM MobiHoc 2015. PDF Download
  18. Qingjun Chen, Chen Qian, Sheng Zhong. Privacy-preserving Cross-domain Routing Optimization--A Cryptographic Approach. Accepted by The IEEE International Conference on Network Protocols 2015 (ICNP15). PDF Download
  19. Laiping Zhao, Jingyu Hua, Xin Ge and Sheng Zhong. Traffic Engineering in Hierarchical SDN Control Plane. In the proceedings of the 23rd International Workshop on Quality of Service (IWQoS'15), 2015. PDF Download
  20. Jingyu Hua, Chang Xia, Sheng Zhong. Differentially private matrix factorization. In proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI), 2015. PDF Download
  21. Jingyu Hua, Yue Gao, Sheng Zhong. Differentially private publication of general time-serial trajectory data. In proceedings of the 34th International Conference on Computer Communications (INFOCOM'15). Hongkong, 2015. PDF Download
  22. Yuan Zhang, Qingjun Chen, Sheng Zhong. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems. Accepted by IEEE Transactions on Dependable and Secure Computing. PDF Download
  23. Yuan Zhang, Yunlong Mao, He Zhang, Sheng Zhong.Privacy Preserving Market Schemes for Mobile Sensing. In proceedings of the 44th International Conference on Parallel Processing (ICPP-2015), 2015. PDF Download
  24. Jingyu Hua, An Tang, Sheng Zhong. Advertiser and Publisher-Centric Privacy Aware Online Behavioral Advertising. In the proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS'15). PDF Download
  25. Jingyu Hua, Shaoyong Du, Sheng Zhong. Towards Attack-Resistant Peer-Assisted Indoor Localization. In the proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15). PDF Download
  26. Shaoyong Du, Jingyu Hua, Yue Gao, Sheng Zhong. EV-Linker: Mapping Eavesdropped Wi-Fi Packets toIndividuals via Electronic and Visual Signal Matching. accepted by Journal of Computer and System Sciences. PDF Download
  27. Tingting Chen, Sheng Zhong. Truthful Auctions for Continuous Spectrum with Variable Bandwidths. IEEE Transactions on Wireless Communications. PDF Download
  28. Sheng Zhong, Haifan Yao. Towards Cheat-Proof Cooperative Relay for Cognitive Radio Networks. IEEE Transactions on Parallel and Distributed Systems. PDF Download
  29. Sheng Zhong, Yuan Zhang, “How to Select Optimal Gateway Selection in Multi-Domain Wireless Networks–Alternative Solutions without Learning”, IEEE Transactions on Wireless Communications, Accepted, 2013. PDF Download
  30. Zhuo Hao,Yunlong Mao,Sheng Zhong,Li Erran Li,Haifan Yao,Nenghai Yu,“Towards Wireless Security without Computational Assumptions”,IEEE Transactions on Computers PDF Download

授权专利

  1. 华景煜, 唐安, 仲盛. 一种基于差分隐私发布的数据的可用性计算. 发明专利(201410349202.7), 2017(已授权).
  2. 华景煜, 葛鑫, 管绍鹏, 仲盛. 一种基于隐私保护的心电图识别的方法. 发明专利(201410199652.2), 2017(已授权).
个人工具