lan zhang
lan zhang
Verified email at ustc.edu.cn
Title
Cited by
Cited by
Year
Silentsense: silent user identification via touch and movement behavioral biometrics
C Bo, L Zhang, XY Li, Q Huang, Y Wang
Proceedings of the 19th annual international conference on Mobile computing …, 2013
2232013
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
T Jung, XF Mao, XY Li, SJ Tang, W Gong, L Zhang
2013 Proceedings IEEE INFOCOM, 2634-2642, 2013
1252013
ZIMO: building cross-technology MIMO to harmonize zigbee smog with WiFi flash without intervention
Y Yubo, Y Panlong, L Xiangyang, T Yue, Z Lan, Y Lizhao
Proceedings of the 19th annual international conference on Mobile computing …, 2013
692013
Continuous user identification via touch and movement behavioral biometrics
C Bo, L Zhang, T Jung, J Han, XY Li, Y Wang
2014 IEEE 33rd International Performance Computing and Communications …, 2014
612014
It starts with igaze: Visual attention driven networking with smart glasses
L Zhang, XY Li, W Huang, K Liu, S Zong, X Jian, P Feng, T Jung, Y Liu
Proceedings of the 20th annual international conference on Mobile computing …, 2014
602014
Message in a sealed bottle: Privacy preserving friending in social networks
L Zhang, XY Li, Y Liu
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
512013
A brief survey on de-anonymization attacks in online social networks
X Ding, L Zhang, Z Wan, M Gu
2010 international conference on computational aspects of social networks …, 2010
512010
Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices
L Zhang, T Jung, C Liu, X Ding, XY Li, Y Liu
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
492015
Message in a sealed bottle: Privacy preserving friending in mobile social networks
L Zhang, XY Li, K Liu, T Jung, Y Liu
IEEE Transactions on Mobile Computing 14 (9), 1888-1902, 2015
462015
Message in a sealed bottle: Privacy preserving friending in mobile social networks
L Zhang, XY Li, K Liu, T Jung, Y Liu
IEEE Transactions on Mobile Computing 14 (9), 1888-1902, 2014
462014
Pic: Enable large-scale privacy preserving content-based image search on cloud
L Zhang, T Jung, K Liu, XY Li, X Ding, J Gu, Y Liu
IEEE Transactions on Parallel and Distributed Systems 28 (11), 3258-3271, 2017
452017
Montage: Combine frames with movement continuity for realtime multi-user tracking
L Zhang, K Liu, Y Jiang, XY Li, Y Liu, P Yang
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 799-807, 2014
442014
Verifiable private multi-party computation: ranging and ranking
L Zhang, XY Li, Y Liu, T Jung
2013 Proceedings IEEE INFOCOM, 605-609, 2013
422013
Lasagna: towards deep hierarchical understanding and searching over mobile sensing data
C Liu, L Zhang, Z Liu, K Liu, X Li, Y Liu
Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016
402016
WiFace: a secure geosocial networking system using WiFi-based multi-hop MANET
L Zhang, X Ding, Z Wan, M Gu, XY Li
Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services …, 2010
382010
Kaleido: You can watch it but cannot record it
L Zhang, C Bo, J Hou, XY Li, Y Wang, K Liu, Y Liu
Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015
292015
CARM: Crowd-sensing Accurate Outdoor RSS Maps with Error-prone Smartphone Measurements
C Xiang, P Yang, C Tian, L Zhang, H Lin, F Xiao, M Zhang, Y Liu
IEEE Transactions on Mobile Computing 15 (11), 2669-2681, 2015
272015
Fbs-radar: Uncovering fake base stations at scale in the wild
Z Li, W Wang, C Wilson, J Chen, C Qian, T Jung, L Zhang, K Liu, X Li, ...
NDSS, 2017
252017
De-anonymizing dynamic social networks
X Ding, L Zhang, Z Wan, M Gu
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011
252011
PLP: Protecting location privacy against correlation analyze attack in crowdsensing
Q Ma, S Zhang, T Zhu, K Liu, L Zhang, W He, Y Liu
IEEE transactions on mobile computing 16 (9), 2588-2598, 2016
232016
The system can't perform the operation now. Try again later.
Articles 1–20