Sheng Zhong
TitleCited byYear
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
S Zhong, J Chen, YR Yang
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks
S Zhong, LE Li, YG Liu, YR Yang
Wireless networks 13 (6), 799-816, 2007
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
Z Hao, S Zhong, N Yu
IEEE transactions on Knowledge and Data Engineering 23 (9), 1432-1437, 2011
Privacy-preserving classification of customer data without loss of accuracy
Z Yang, S Zhong, RN Wright
Proceedings of the 2005 SIAM International Conference on Data Mining, 92-102, 2005
Privacy-enhancing k-anonymization of customer data
S Zhong, Z Yang, RN Wright
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on …, 2005
Privacy-preserving queries on encrypted data
Z Yang, S Zhong, RN Wright
European Symposium on Research in Computer Security, 479-495, 2006
Body sensor network security: an identity-based cryptography approach
CC Tan, H Wang, S Zhong, Q Li
Proceedings of the first ACM conference on Wireless network security, 148-153, 2008
Optimistic mixing for exit-polls
P Golle, S Zhong, D Boneh, M Jakobsson, A Juels
International Conference on the Theory and Application of Cryptology and …, 2002
IBE-lite: a lightweight identity-based cryptography for body sensor networks
CC Tan, H Wang, S Zhong, Q Li
IEEE Transactions on Information Technology in Biomedicine 13 (6), 926-932, 2009
Stimulating cooperation in vehicular ad hoc networks: A coalitional game theoretic approach
T Chen, L Wu, F Wu, S Zhong
IEEE Transactions on Vehicular Technology 60 (2), 566-579, 2010
Globally optimal channel assignment for non-cooperative wireless networks
F Wu, S Zhong, C Qiao
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1543-1551, 2008
Anonymity-preserving data collection
Z Yang, S Zhong, RN Wright
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge …, 2005
Privacy-preserving algorithms for distributed mining of frequent itemsets
S Zhong
Information Sciences 177 (2), 490-503, 2007
Privacy-preserving backpropagation neural network learning
T Chen, S Zhong
IEEE Transactions on Neural Networks 20 (10), 1554-1564, 2009
Incentive-compatible opportunistic routing for wireless networks
F Wu, T Chen, S Zhong, LE Li, YR Yang
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
S Zhong, F Wu
Proceedings of the 13th annual ACM international conference on Mobile …, 2007
Privacy-preserving location-based services for mobile users in wireless networks
S Zhong, L Li, YG Liu, YR Yang
Department of Computer Science, Yale University, Technical Report ALEU/DCS …, 2004
Fast differentially private matrix factorization
Z Liu, YX Wang, A Smola
Proceedings of the 9th ACM Conference on Recommender Systems, 171-178, 2015
A practical key management scheme for access control in a user hierarchy
S Zhong
Computers & Security 21 (8), 750-759, 2002
Secure distance-based localization in the presence of cheating beacon nodes
M Jadliwala, S Zhong, SJ Upadhyaya, C Qiao, JP Hubaux
IEEE Transactions on mobile computing 9 (6), 810-823, 2010
The system can't perform the operation now. Try again later.
Articles 1–20