2009 |
35 | EE | Dong Zheng,
Weiyan Ge,
Junshan Zhang:
Distributed Opportunistic Scheduling for Ad Hoc Networks With Random Access: An Optimal Stopping Approach.
IEEE Transactions on Information Theory 55(1): 205-222 (2009) |
34 | EE | Wei Han,
Kefei Chen,
Dong Zheng:
Receipt-Freeness for Groth e-Voting Schemes.
J. Inf. Sci. Eng. 25(2): 517-530 (2009) |
2008 |
33 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Dong Zheng,
Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
CT-RSA 2008: 203-220 |
32 | EE | Man-On Pun,
Weiyan Ge,
Dong Zheng,
Junshan Zhang,
H. Vincent Poor:
Distributed Opportunistic Scheduling for MIMO Ad-Hoc Networks.
ICC 2008: 3689-3693 |
31 | EE | Dong Zheng,
Man-On Pun,
Weiyan Ge,
Junshan Zhang,
H. Vincent Poor:
Distributed Opportunistic Scheduling For Ad-Hoc Communications under Noisy Channel Estimation.
ICC 2008: 3715-3719 |
30 | EE | Dong Zheng,
Min Cao,
Junshan Zhang,
P. R. Kumar:
Channel Aware Distributed Scheduling for Exploiting Multi-Receiver Diversity and Multiuser Diversity in Ad-Hoc Networks: A Unified PHY/MAC Approach.
INFOCOM 2008: 1454-1462 |
29 | EE | Wei Han,
Tao Hao,
Dong Zheng,
Kefei Chen,
Xiaofeng Chen:
A Tamper-Evident Voting Machine Resistant to Covert Channels.
ProvSec 2008: 335-344 |
28 | EE | Dong Zheng,
Man-On Pun,
Weiyan Ge,
Junshan Zhang,
H. Vincent Poor:
Distributed Opportunistic Scheduling For Ad-Hoc Communications Under Noisy Channel Estimation
CoRR abs/0802.4282: (2008) |
27 | EE | Man-On Pun,
Weiyan Ge,
Dong Zheng,
Junshan Zhang,
H. Vincent Poor:
Distributed Opportunistic Scheduling for MIMO Ad-Hoc Networks
CoRR abs/0802.4284: (2008) |
26 | EE | Junshan Zhang,
Dong Zheng,
Mung Chiang:
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization.
IEEE Transactions on Information Theory 54(2): 645-665 (2008) |
25 | EE | Zheng Gong,
Xiangxue Li,
Dong Zheng,
Kefei Chen:
A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register.
J. Inf. Sci. Eng. 24(5): 1347-1360 (2008) |
24 | EE | Huiyan Qi,
Dong Zheng,
Jiying Zhao:
Human visual system based adaptive digital image watermarking.
Signal Processing 88(1): 174-188 (2008) |
2007 |
23 | EE | Xiangxue Li,
Dong Zheng,
Kefei Chen:
Efficient Blind Signatures from Linear Feedback Shift Register.
CDVE 2007: 423-425 |
22 | EE | Dong Zheng,
Xiangxue Li,
Kefei Chen,
Jianhua Li:
Linkable Ring Signatures from Linear Feedback Shift Register.
EUC Workshops 2007: 716-727 |
21 | EE | Xiangxue Li,
Dong Zheng,
Kefei Chen:
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register.
ICA3PP 2007: 95-106 |
20 | EE | Dong Zheng,
Jiying Zhao:
A Rotation Invariant Feature and Image Normalization Based Image Watermarking Algorithm.
ICME 2007: 2098-2101 |
19 | EE | Junshan Zhang,
Dong Zheng,
Mung Chiang:
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization.
INFOCOM 2007: 222-230 |
18 | EE | Dong Zheng,
Junshan Zhang:
Joint Optimal Channel Probing and Transmission in Collocated Wireless Networks.
INFOCOM 2007: 2266-2270 |
17 | EE | Dong Zheng,
Weiyan Ge,
Junshan Zhang:
Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach.
MobiHoc 2007: 1-10 |
16 | EE | Dong Zheng,
Yan Liu,
Jiying Zhao,
Abdulmotaleb El-Saddik:
A survey of RST invariant image watermarking algorithms.
ACM Comput. Surv. 39(2): (2007) |
15 | EE | Dong Zheng,
Junshan Zhang:
A two-phase utility maximization framework for wireless medium access control.
IEEE Transactions on Wireless Communications 6(12): 4299-4207 (2007) |
14 | EE | Yan Liu,
Dong Zheng,
Jiying Zhao:
An image rectification scheme and its applications in RST invariant digital image watermarking.
Multimedia Tools Appl. 34(1): 57-84 (2007) |
2006 |
13 | EE | Dong Zheng,
Yan Liu,
Jiying Zhao:
A Survey of RST Invariant Image Watermarking Algorithms.
CCECE 2006: 2086-2089 |
12 | EE | Dong Zheng,
Junshan Zhang:
Protocol design and throughput analysis of frequency-agile multi-channel medium access control.
IEEE Transactions on Wireless Communications 5(10): 2887-2895 (2006) |
2005 |
11 | EE | Yongguo Liu,
Wei Zhang,
Dong Zheng,
Kefei Chen:
A Novel Clustering Technique Based on Improved Noising Method.
CIARP 2005: 81-92 |
10 | EE | Yongguo Liu,
Dong Zheng,
Shiqun Li,
Libin Wang,
Kefei Chen:
A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation.
Discovery Science 2005: 380-382 |
9 | EE | Longjun Zhang,
Han Wei,
Dong Zheng,
Kefei Chen:
A Security Solution of WLAN Based on Public Key Cryptosystem.
ICPADS (2) 2005: 422-427 |
8 | EE | Changshe Ma,
Kefei Chen,
Dong Zheng,
Shengli Liu:
Efficient and Proactive Threshold Signcryption.
ISC 2005: 233-243 |
7 | EE | Dong Zheng,
Junshan Zhang:
Channel-Aware Weighted Proportional Fair Medium Access Control in Wireless LANs with MIMO links.
QSHINE 2005: 24 |
6 | | Changshe Ma,
Kefei Chen,
Shengli Liu,
Dong Zheng:
Transitive Signatures Based on Bilinear Maps.
WOSIS 2005: 48-56 |
5 | EE | Yan Liu,
Dong Zheng,
Jiying Zhao:
A Rectification Scheme for RST Invariant Image Watermarking.
IEICE Transactions 88-A(1): 314-318 (2005) |
4 | EE | Dong Zheng,
Yan Liu,
Jiying Zhao:
RST invariant digital image watermarking based on a new phase-only filtering method.
Signal Processing 85(12): 2354-2370 (2005) |
2004 |
3 | EE | Dong Zheng,
Huang Zheng,
Kefei Chen,
Weidong Kou:
ID-Based Proxy Blind Signature.
AINA (2) 2004: 380-383 |
2003 |
2 | | Dong Zheng,
Jiying Zhao,
Abdulmotaleb El-Saddik:
RST-invariant digital image watermarking based on log-polar mapping and phase correlation.
IEEE Trans. Circuits Syst. Video Techn. 13(8): 753-765 (2003) |
2002 |
1 | EE | Dong Zheng,
Kefei Chen,
Jinyuan You:
Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party.
J. Comput. Sci. Technol. 17(6): 749-756 (2002) |