研究成果

出自COSECWiki

跳转到: 导航, 搜索

学术论文

  1. Jingyu Hua, Wei Tong, Fengyuan Xu, Shang Zhang. A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Transactions on Information Forensics & Security, 2017. (Accepted)
  2. Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong. Location Privacy in Public Access Points Positioning: An Optimization and Geometry Approach. Computers & Security, Accepted.
  3. Yuan Zhang, Boyu Zhu, Yixin Fang, Suxin Guo, Aidong Zhang, Sheng Zhong. Secure Inter-domain Forwarding Loop Test in Software Defined Networks. IEEE Transactions on Dependable and Secure Computing, Accepted.
  4. Wei Tong, Jingyu Hua, Sheng Zhong. A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. IEEE Transactions on Information Forensics & Security, Accepted.
  5. Li Wang, Jun Jie Shi, Chen Chen, Sheng Zhong. Privacy-preserving face detection based on linear and nonlinear kernels. Multimedia Tools and Applications, Accepted. PDF Download
  6. Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong. Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Transactions on Information Forensics & Security, Accepted.
  7. Fan Wu, Dongxin Liu, Zhihao Wu, Yuan Zhang, Guihai Chen. Cost-Efficient Indoor White Space Exploration Through Compressive Sensing. IEEE/ACM Transactions on Networking, 2016. PDF Download
  8. Jingyu Hua, Zhenyu Shen, Sheng Zhong. We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. IEEE Transactions on Information Forensics and Security, 2016. PDF Download
  9. Yuan Zhang, Yunlong Mao, Sheng Zhong. Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems. IEEE Journal of Selected Areas in Communications, 2016. PDF Download
  10. Yunlong Mao, Yuan Zhang, Sheng Zhong. Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks. In proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS' 16), 2016. PDF Download
  11. Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao. Instant and Robust Authentication and Key Agreement among Mobile Devices. In proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS' 16), 2016. PDF Download
  12. Yuan Zhang, Wei Tong, Sheng Zhong. On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-anonymity Location Privacy, IEEE Transactions on Information Forensics and Security, 2016. PDF Download
  13. Wei Tong, Sheng Zhong. A Unified Resource Allocation Framework for Defending against Pollution Attacks in Wireless Network Coding Systems. IEEE Transactions on Information Forensics & Security, 2016. PDF Download
  14. Jingyu Hua, An Tang, Yixin Fang, Zhenyu Shen, Sheng Zhong. Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms. IEEE Transactions on Information Forensics & Security, 2016. PDF Download
  15. Yuan Zhang, Qingjun Chen, Sheng Zhong, Privacy-preserving Data Aggregation in Mobile Phone Sensing. IEEE Transactions on Information Forensics & Security. PDF Download
  16. Jingyu Hua, Xin Ge, Sheng Zhong, FOUM: A Flow-Ordered Consistent Update Mechanism for Software-Defined Networking in Adversarial Settings. Accepted by the 35th International Conference on Computer Communications (INFOCOM'16). PDF Download
  17. Yuan Zhang, Siyuan Tang, Tingting Chen, Sheng Zhong, Competitive Auctions for Cost-aware Cellular Traffic Offloading with Optimized Capacity Gain. Accepted by the 35th International Conference on Computer Communications (INFOCOM'16). PDF Download
  18. Yuan Zhang, He Zhang, Siyuan Tang, Sheng Zhong, Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees, IEEE Transactions on Information Forensics and Security. 2016 PDF Download
  19. Dongxin Liu, Zhihao Wu, Fan Wu, Yuan Zhang, Guihai Chen, FIWEX: A Compressive Sensing Based Cost-Efficient Indoor White Space Exploration Mechanism, ACM MobiHoc 2015. PDF Download
  20. Qingjun Chen, Chen Qian, Sheng Zhong. Privacy-preserving Cross-domain Routing Optimization--A Cryptographic Approach. Accepted by The IEEE International Conference on Network Protocols 2015 (ICNP15). PDF Download
  21. Laiping Zhao, Jingyu Hua, Xin Ge and Sheng Zhong. Traffic Engineering in Hierarchical SDN Control Plane. In the proceedings of the 23rd International Workshop on Quality of Service (IWQoS'15), 2015. PDF Download
  22. Jingyu Hua, Chang Xia, Sheng Zhong. Differentially private matrix factorization. In proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI), 2015. PDF Download
  23. Jingyu Hua, Yue Gao, Sheng Zhong. Differentially private publication of general time-serial trajectory data. In proceedings of the 34th International Conference on Computer Communications (INFOCOM'15). Hongkong, 2015. PDF Download
  24. Yuan Zhang, Qingjun Chen, Sheng Zhong. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems. Accepted by IEEE Transactions on Dependable and Secure Computing. PDF Download
  25. Yuan Zhang, Yunlong Mao, He Zhang, Sheng Zhong.Privacy Preserving Market Schemes for Mobile Sensing. In proceedings of the 44th International Conference on Parallel Processing (ICPP-2015), 2015. PDF Download
  26. Jingyu Hua, An Tang, Sheng Zhong. Advertiser and Publisher-Centric Privacy Aware Online Behavioral Advertising. In the proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS'15). PDF Download
  27. Jingyu Hua, Shaoyong Du, Sheng Zhong. Towards Attack-Resistant Peer-Assisted Indoor Localization. In the proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15). PDF Download
  28. Shaoyong Du, Jingyu Hua, Yue Gao, Sheng Zhong. EV-Linker: Mapping Eavesdropped Wi-Fi Packets toIndividuals via Electronic and Visual Signal Matching. accepted by Journal of Computer and System Sciences. PDF Download
  29. Tingting Chen, Sheng Zhong. Truthful Auctions for Continuous Spectrum with Variable Bandwidths. IEEE Transactions on Wireless Communications. PDF Download
  30. Sheng Zhong, Haifan Yao. Towards Cheat-Proof Cooperative Relay for Cognitive Radio Networks. IEEE Transactions on Parallel and Distributed Systems. PDF Download
  31. Sheng Zhong, Yuan Zhang, “How to Select Optimal Gateway Selection in Multi-Domain Wireless Networks–Alternative Solutions without Learning”, IEEE Transactions on Wireless Communications, Accepted, 2013. PDF Download
  32. Zhuo Hao,Yunlong Mao,Sheng Zhong,Li Erran Li,Haifan Yao,Nenghai Yu,“Towards Wireless Security without Computational Assumptions”,IEEE Transactions on Computers PDF Download

授权专利

  1. 华景煜, 唐安, 仲盛. 一种基于差分隐私发布的数据的可用性计算. 发明专利(201410349202.7), 2017(已授权).
  2. 华景煜, 葛鑫, 管绍鹏, 仲盛. 一种基于隐私保护的心电图识别的方法. 发明专利(201410199652.2), 2017(已授权).
个人工具