2009 | ||
---|---|---|
47 | EE | Tingting Chen, Sheng Zhong: Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks. Computer Communications 32(6): 1058-1061 (2009) |
46 | EE | Fan Wu, Jiqiang Liu, Sheng Zhong: An efficient protocol for private and accurate mining of support counts. Pattern Recognition Letters 30(1): 80-86 (2009) |
2008 | ||
45 | EE | Sheng Zhong, Murtuza Jadliwala, Shambhu Upadhyaya, Chunming Qiao: Towards a Theory of Robust Localization Against Malicious Beacon Nodes. INFOCOM 2008: 1391-1399 |
44 | EE | Fan Wu, Sheng Zhong, Chunming Qiao: Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks. INFOCOM 2008: 1543-1551 |
43 | EE | Sheng Zhong: Welcome to SSN 2008. IPDPS 2008: 1 |
42 | EE | Fan Wu, Tingting Chen, Sheng Zhong, Li (Erran) Li, Yang Richard Yang: Incentive-compatible opportunistic routing for wireless networks. MOBICOM 2008: 303-314 |
41 | EE | Chiu Chiang Tan, Haodong Wang, Sheng Zhong, Qun Li: Body sensor network security: an identity-based cryptography approach. WISEC 2008: 148-153 |
40 | EE | Sheng Zhong: An efficient approximation algorithm for counting n-cycles in a graph. Applied Mathematics and Computation 196(1): 479-482 (2008) |
39 | EE | Sheng Zhong, Rui Xue: Preface. J. Comput. Sci. Technol. 23(2): 165 (2008) |
38 | EE | Sheng Zhong, Zhiqiang Yang: Guided perturbation: towards private and accurate mining. VLDB J. 17(5): 1165-1177 (2008) |
2007 | ||
37 | Chieh-Chun Chen, Xinguang Zhu, Sheng Zhong: Selection of Thermodynamic Models for Combinatorial Control of Multiple Transcription Factors in Early Differentiation of Embryonic Stem Cells. BIOCOMP 2007: 650-656 | |
36 | EE | Fan Wu, Sheng Zhong, Jiqiang Liu: Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks. GLOBECOM 2007: 453-457 |
35 | EE | Tingting Chen, Sheng Zhong: Enhancing Privacy of Released Database. GrC 2007: 781-786 |
34 | EE | Sheng Zhong, Fan Wu: On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. MOBICOM 2007: 278-289 |
33 | EE | Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Towards Privacy-Preserving Model Selection. PinKDD 2007: 138-152 |
32 | EE | Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Zhong: Understanding and Utilizing the Hierarchy of Abnormal BGP Events. SDM 2007 |
31 | EE | Sheng Zhong: An efficient algorithm for topology discovery of a blackbox communication network. Applied Mathematics and Computation 186(1): 506-508 (2007) |
30 | EE | Sheng Zhong, Dan Xie: Gene Ontology analysis in multiple gene clusters under multiple hypothesis testing framework. Artificial Intelligence in Medicine 41(2): 105-115 (2007) |
29 | EE | Sheng Zhong: An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol. Cryptologia 31(4): 324-325 (2007) |
28 | EE | Sheng Zhong: Privacy-preserving algorithms for distributed mining of frequent itemsets. Inf. Sci. 177(2): 490-503 (2007) |
27 | EE | Divyesh Shah, Sheng Zhong: Two methods for privacy preserving data mining with malicious participants. Inf. Sci. 177(23): 5468-5483 (2007) |
26 | EE | Yue Lu, Xin He, Sheng Zhong: Cross-species microarray analysis with the OSCAR system suggests an INSR->Pax6->NQO1 neuro-protective pathway in aging and Alzheimer's disease. Nucleic Acids Research 35(Web-Server-Issue): 105-114 (2007) |
25 | EE | James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong: Towards a theory of data entanglement. Theor. Comput. Sci. 389(1-2): 26-43 (2007) |
24 | EE | Sheng Zhong, Erran L. Li, Yanbin Grace Liu, Yang Richard Yang: On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks. Wireless Networks 13(6): 799-816 (2007) |
2006 | ||
23 | EE | Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Privacy-Preserving Queries on Encrypted Data. ESORICS 2006: 479-495 |
22 | EE | Sheng Zhong: An Efficient and Secure Cryptosystem for Encrypting Long Messages. Fundam. Inform. 71(4): 493-497 (2006) |
21 | EE | Sheng Zhong, Yang Richard Yang: Verifiable Distributed Oblivious Transfer and Mobile Agent Security. MONET 11(2): 201-210 (2006) |
2005 | ||
20 | EE | Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Anonymity-preserving data collection. KDD 2005: 334-343 |
19 | EE | Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong: Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results. MADNES 2005: 67-79 |
18 | EE | Sheng Zhong, Erran L. Li, Yanbin Grace Liu, Yang Richard Yang: On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques. MOBICOM 2005: 117-131 |
17 | EE | Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright: Privacy-enhancing k-anonymization of customer data. PODS 2005: 139-147 |
16 | Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Privacy-Preserving Classification of Customer Data without Loss of Accuracy. SDM 2005 | |
15 | EE | Pengyu Hong, Sheng Zhong, Wing Hung Wong: Ubic2 - Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval. International Journal of Software Engineering and Knowledge Engineering 15(3): 475-486 (2005) |
2004 | ||
14 | EE | Pengyu Hong, Sheng Zhong, Wing Hung Wong: Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval. BIBE 2004: 57-64 |
13 | EE | Sheng Zhong, Lu Tian, Cheng Li, Kai-Florian Storch, Wing Hung Wong: Comparative Analysis of Gene Sets in the Gene Ontology Space under the Multiple Hypothesis Testing Framework. CSB 2004: 425-435 |
12 | EE | James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong: Towards a Theory of Data Entanglement: (Extended Abstract). ESORICS 2004: 177-192 |
11 | EE | Sheng Zhong, Qing Zhou, P. Giangrande, J. R. Nevins, Wing Hung Wong: In silico prediction of transcription factors that interact with the E2F family of transcription factors. ICARCV 2004: 1325-1330 |
2003 | ||
10 | EE | Sheng Zhong, Yang Richard Yang: Verifiable distributed oblivious transfer and mobile agent security. DIALM-POMC 2003: 12-21 |
9 | EE | Sheng Zhong, Jiang Chen, Yang Richard Yang: Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. INFOCOM 2003 |
8 | EE | Sheng Zhong, Tianwen Lin: A comment on the Chen-Chung scheme for hierarchical access control. Computers & Security 22(5): 450-452 (2003) |
7 | EE | Kefei Chen, Sheng Zhong: Attacks on the (enhanced) Yang-Shieh authentication. Computers & Security 22(8): 725-727 (2003) |
6 | Sheng Zhong, Cheng Li, Wing Hung Wong: ChipInfo: software for extracting gene annotation and gene ontology information for microarray analysis. Nucleic Acids Research 31(13): 3483-3486 (2003) | |
2002 | ||
5 | EE | Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465 |
4 | Sheng Zhong: A practical key management scheme for access control in a user hierarchy. Computers & Security 21(8): 750-759 (2002) | |
1995 | ||
3 | Sheng Zhong, Francis Y. L. Chin: Improved and Optimal Adaptive Hierarchical Vector Quantization for Image Coding and Indexing. IW-MMDBMS 1995: 102-109 | |
1994 | ||
2 | EE | Sheng Zhong, Qing-Yun Shi, Min-Teh Cheng: Adaptive hierarchical vector quantization for image coding. Pattern Recognition Letters 15(12): 1171-1175 (1994) |
1993 | ||
1 | Sheng Zhong, Qing-Yun Shi, Min-Teh Cheng: High compression ratio image compression. ISCAS 1993: 275-278 |