Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks S Zhong, J Chen, YR Yang IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 1716 | 2003 |
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability Z Hao, S Zhong, N Yu IEEE transactions on Knowledge and Data Engineering 23 (9), 1432-1437, 2011 | 346 | 2011 |
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks S Zhong, LE Li, YG Liu, YR Yang Wireless networks 13 (6), 799-816, 2007 | 340 | 2007 |
Privacy-preserving classification of customer data without loss of accuracy Z Yang, S Zhong, RN Wright Proceedings of the 2005 SIAM International Conference on Data Mining, 92-102, 2005 | 260 | 2005 |
Privacy-enhancing k-anonymization of customer data S Zhong, Z Yang, RN Wright Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on …, 2005 | 233 | 2005 |
Privacy-preserving queries on encrypted data Z Yang, S Zhong, RN Wright European Symposium on Research in Computer Security, 479-495, 2006 | 199 | 2006 |
Body sensor network security: an identity-based cryptography approach CC Tan, H Wang, S Zhong, Q Li Proceedings of the first ACM conference on Wireless network security, 148-153, 2008 | 189 | 2008 |
Optimistic mixing for exit-polls P Golle, S Zhong, D Boneh, M Jakobsson, A Juels International Conference on the Theory and Application of Cryptology and …, 2002 | 156 | 2002 |
IBE-Lite: A lightweight identity-based cryptography for body sensor networks CC Tan, H Wang, S Zhong, Q Li IEEE Transactions on Information Technology in Biomedicine 13 (6), 926-932, 2009 | 155 | 2009 |
Stimulating cooperation in vehicular ad hoc networks: A coalitional game theoretic approach T Chen, L Wu, F Wu, S Zhong IEEE Transactions on Vehicular Technology 60 (2), 566-579, 2010 | 136 | 2010 |
Privacy-preserving backpropagation neural network learning T Chen, S Zhong IEEE Transactions on Neural Networks 20 (10), 1554-1564, 2009 | 122 | 2009 |
Anonymity-preserving data collection Z Yang, S Zhong, RN Wright Proceedings of the eleventh ACM SIGKDD international conference on Knowledge …, 2005 | 104 | 2005 |
Globally optimal channel assignment for non-cooperative wireless networks F Wu, S Zhong, C Qiao IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1543-1551, 2008 | 102 | 2008 |
Privacy-preserving algorithms for distributed mining of frequent itemsets S Zhong Information Sciences 177 (2), 490-503, 2007 | 100 | 2007 |
Privacy-preserving location-based services for mobile users in wireless networks S Zhong, L Li, YG Liu, YR Yang Department of Computer Science, Yale University, Technical Report ALEU/DCS …, 2004 | 94 | 2004 |
Privacy preserving back-propagation neural network learning over arbitrarily partitioned data A Bansal, T Chen, S Zhong Neural Computing and Applications 20 (1), 143-150, 2011 | 93 | 2011 |
Incentive-compatible opportunistic routing for wireless networks F Wu, T Chen, S Zhong, LE Li, YR Yang Proceedings of the 14th ACM international conference on Mobile computing and …, 2008 | 90 | 2008 |
Differentially private publication of general time-serial trajectory data J Hua, Y Gao, S Zhong 2015 IEEE Conference on Computer Communications (INFOCOM), 549-557, 2015 | 86 | 2015 |
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks S Zhong, F Wu Proceedings of the 13th annual ACM international conference on Mobile …, 2007 | 82 | 2007 |
Breaking a remote user authentication scheme for multi-server architecture X Cao, S Zhong IEEE Communications Letters 10 (8), 580-581, 2006 | 75 | 2006 |