2009 |
47 | EE | Tingting Chen,
Sheng Zhong:
Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks.
Computer Communications 32(6): 1058-1061 (2009) |
46 | EE | Fan Wu,
Jiqiang Liu,
Sheng Zhong:
An efficient protocol for private and accurate mining of support counts.
Pattern Recognition Letters 30(1): 80-86 (2009) |
2008 |
45 | EE | Sheng Zhong,
Murtuza Jadliwala,
Shambhu Upadhyaya,
Chunming Qiao:
Towards a Theory of Robust Localization Against Malicious Beacon Nodes.
INFOCOM 2008: 1391-1399 |
44 | EE | Fan Wu,
Sheng Zhong,
Chunming Qiao:
Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks.
INFOCOM 2008: 1543-1551 |
43 | EE | Sheng Zhong:
Welcome to SSN 2008.
IPDPS 2008: 1 |
42 | EE | Fan Wu,
Tingting Chen,
Sheng Zhong,
Li (Erran) Li,
Yang Richard Yang:
Incentive-compatible opportunistic routing for wireless networks.
MOBICOM 2008: 303-314 |
41 | EE | Chiu Chiang Tan,
Haodong Wang,
Sheng Zhong,
Qun Li:
Body sensor network security: an identity-based cryptography approach.
WISEC 2008: 148-153 |
40 | EE | Sheng Zhong:
An efficient approximation algorithm for counting n-cycles in a graph.
Applied Mathematics and Computation 196(1): 479-482 (2008) |
39 | EE | Sheng Zhong,
Rui Xue:
Preface.
J. Comput. Sci. Technol. 23(2): 165 (2008) |
38 | EE | Sheng Zhong,
Zhiqiang Yang:
Guided perturbation: towards private and accurate mining.
VLDB J. 17(5): 1165-1177 (2008) |
2007 |
37 | | Chieh-Chun Chen,
Xinguang Zhu,
Sheng Zhong:
Selection of Thermodynamic Models for Combinatorial Control of Multiple Transcription Factors in Early Differentiation of Embryonic Stem Cells.
BIOCOMP 2007: 650-656 |
36 | EE | Fan Wu,
Sheng Zhong,
Jiqiang Liu:
Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks.
GLOBECOM 2007: 453-457 |
35 | EE | Tingting Chen,
Sheng Zhong:
Enhancing Privacy of Released Database.
GrC 2007: 781-786 |
34 | EE | Sheng Zhong,
Fan Wu:
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks.
MOBICOM 2007: 278-289 |
33 | EE | Zhiqiang Yang,
Sheng Zhong,
Rebecca N. Wright:
Towards Privacy-Preserving Model Selection.
PinKDD 2007: 138-152 |
32 | EE | Dejing Dou,
Jun Li,
Han Qin,
Shiwoong Kim,
Sheng Zhong:
Understanding and Utilizing the Hierarchy of Abnormal BGP Events.
SDM 2007 |
31 | EE | Sheng Zhong:
An efficient algorithm for topology discovery of a blackbox communication network.
Applied Mathematics and Computation 186(1): 506-508 (2007) |
30 | EE | Sheng Zhong,
Dan Xie:
Gene Ontology analysis in multiple gene clusters under multiple hypothesis testing framework.
Artificial Intelligence in Medicine 41(2): 105-115 (2007) |
29 | EE | Sheng Zhong:
An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol.
Cryptologia 31(4): 324-325 (2007) |
28 | EE | Sheng Zhong:
Privacy-preserving algorithms for distributed mining of frequent itemsets.
Inf. Sci. 177(2): 490-503 (2007) |
27 | EE | Divyesh Shah,
Sheng Zhong:
Two methods for privacy preserving data mining with malicious participants.
Inf. Sci. 177(23): 5468-5483 (2007) |
26 | EE | Yue Lu,
Xin He,
Sheng Zhong:
Cross-species microarray analysis with the OSCAR system suggests an INSR->Pax6->NQO1 neuro-protective pathway in aging and Alzheimer's disease.
Nucleic Acids Research 35(Web-Server-Issue): 105-114 (2007) |
25 | EE | James Aspnes,
Joan Feigenbaum,
Aleksandr Yampolskiy,
Sheng Zhong:
Towards a theory of data entanglement.
Theor. Comput. Sci. 389(1-2): 26-43 (2007) |
24 | EE | Sheng Zhong,
Erran L. Li,
Yanbin Grace Liu,
Yang Richard Yang:
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks.
Wireless Networks 13(6): 799-816 (2007) |
2006 |
23 | EE | Zhiqiang Yang,
Sheng Zhong,
Rebecca N. Wright:
Privacy-Preserving Queries on Encrypted Data.
ESORICS 2006: 479-495 |
22 | EE | Sheng Zhong:
An Efficient and Secure Cryptosystem for Encrypting Long Messages.
Fundam. Inform. 71(4): 493-497 (2006) |
21 | EE | Sheng Zhong,
Yang Richard Yang:
Verifiable Distributed Oblivious Transfer and Mobile Agent Security.
MONET 11(2): 201-210 (2006) |
2005 |
20 | EE | Zhiqiang Yang,
Sheng Zhong,
Rebecca N. Wright:
Anonymity-preserving data collection.
KDD 2005: 334-343 |
19 | EE | Rebecca N. Wright,
Zhiqiang Yang,
Sheng Zhong:
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.
MADNES 2005: 67-79 |
18 | EE | Sheng Zhong,
Erran L. Li,
Yanbin Grace Liu,
Yang Richard Yang:
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques.
MOBICOM 2005: 117-131 |
17 | EE | Sheng Zhong,
Zhiqiang Yang,
Rebecca N. Wright:
Privacy-enhancing k-anonymization of customer data.
PODS 2005: 139-147 |
16 | | Zhiqiang Yang,
Sheng Zhong,
Rebecca N. Wright:
Privacy-Preserving Classification of Customer Data without Loss of Accuracy.
SDM 2005 |
15 | EE | Pengyu Hong,
Sheng Zhong,
Wing Hung Wong:
Ubic2 - Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval.
International Journal of Software Engineering and Knowledge Engineering 15(3): 475-486 (2005) |
2004 |
14 | EE | Pengyu Hong,
Sheng Zhong,
Wing Hung Wong:
Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval.
BIBE 2004: 57-64 |
13 | EE | Sheng Zhong,
Lu Tian,
Cheng Li,
Kai-Florian Storch,
Wing Hung Wong:
Comparative Analysis of Gene Sets in the Gene Ontology Space under the Multiple Hypothesis Testing Framework.
CSB 2004: 425-435 |
12 | EE | James Aspnes,
Joan Feigenbaum,
Aleksandr Yampolskiy,
Sheng Zhong:
Towards a Theory of Data Entanglement: (Extended Abstract).
ESORICS 2004: 177-192 |
11 | EE | Sheng Zhong,
Qing Zhou,
P. Giangrande,
J. R. Nevins,
Wing Hung Wong:
In silico prediction of transcription factors that interact with the E2F family of transcription factors.
ICARCV 2004: 1325-1330 |
2003 |
10 | EE | Sheng Zhong,
Yang Richard Yang:
Verifiable distributed oblivious transfer and mobile agent security.
DIALM-POMC 2003: 12-21 |
9 | EE | Sheng Zhong,
Jiang Chen,
Yang Richard Yang:
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks.
INFOCOM 2003 |
8 | EE | Sheng Zhong,
Tianwen Lin:
A comment on the Chen-Chung scheme for hierarchical access control.
Computers & Security 22(5): 450-452 (2003) |
7 | EE | Kefei Chen,
Sheng Zhong:
Attacks on the (enhanced) Yang-Shieh authentication.
Computers & Security 22(8): 725-727 (2003) |
6 | | Sheng Zhong,
Cheng Li,
Wing Hung Wong:
ChipInfo: software for extracting gene annotation and gene ontology information for microarray analysis.
Nucleic Acids Research 31(13): 3483-3486 (2003) |
2002 |
5 | EE | Philippe Golle,
Sheng Zhong,
Dan Boneh,
Markus Jakobsson,
Ari Juels:
Optimistic Mixing for Exit-Polls.
ASIACRYPT 2002: 451-465 |
4 | | Sheng Zhong:
A practical key management scheme for access control in a user hierarchy.
Computers & Security 21(8): 750-759 (2002) |
1995 |
3 | | Sheng Zhong,
Francis Y. L. Chin:
Improved and Optimal Adaptive Hierarchical Vector Quantization for Image Coding and Indexing.
IW-MMDBMS 1995: 102-109 |
1994 |
2 | EE | Sheng Zhong,
Qing-Yun Shi,
Min-Teh Cheng:
Adaptive hierarchical vector quantization for image coding.
Pattern Recognition Letters 15(12): 1171-1175 (1994) |
1993 |
1 | | Sheng Zhong,
Qing-Yun Shi,
Min-Teh Cheng:
High compression ratio image compression.
ISCAS 1993: 275-278 |