dblp.uni-trier.dewww.uni-trier.de

Sheng Zhong

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
47EETingting Chen, Sheng Zhong: Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks. Computer Communications 32(6): 1058-1061 (2009)
46EEFan Wu, Jiqiang Liu, Sheng Zhong: An efficient protocol for private and accurate mining of support counts. Pattern Recognition Letters 30(1): 80-86 (2009)
2008
45EESheng Zhong, Murtuza Jadliwala, Shambhu Upadhyaya, Chunming Qiao: Towards a Theory of Robust Localization Against Malicious Beacon Nodes. INFOCOM 2008: 1391-1399
44EEFan Wu, Sheng Zhong, Chunming Qiao: Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks. INFOCOM 2008: 1543-1551
43EESheng Zhong: Welcome to SSN 2008. IPDPS 2008: 1
42EEFan Wu, Tingting Chen, Sheng Zhong, Li (Erran) Li, Yang Richard Yang: Incentive-compatible opportunistic routing for wireless networks. MOBICOM 2008: 303-314
41EEChiu Chiang Tan, Haodong Wang, Sheng Zhong, Qun Li: Body sensor network security: an identity-based cryptography approach. WISEC 2008: 148-153
40EESheng Zhong: An efficient approximation algorithm for counting n-cycles in a graph. Applied Mathematics and Computation 196(1): 479-482 (2008)
39EESheng Zhong, Rui Xue: Preface. J. Comput. Sci. Technol. 23(2): 165 (2008)
38EESheng Zhong, Zhiqiang Yang: Guided perturbation: towards private and accurate mining. VLDB J. 17(5): 1165-1177 (2008)
2007
37 Chieh-Chun Chen, Xinguang Zhu, Sheng Zhong: Selection of Thermodynamic Models for Combinatorial Control of Multiple Transcription Factors in Early Differentiation of Embryonic Stem Cells. BIOCOMP 2007: 650-656
36EEFan Wu, Sheng Zhong, Jiqiang Liu: Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks. GLOBECOM 2007: 453-457
35EETingting Chen, Sheng Zhong: Enhancing Privacy of Released Database. GrC 2007: 781-786
34EESheng Zhong, Fan Wu: On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. MOBICOM 2007: 278-289
33EEZhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Towards Privacy-Preserving Model Selection. PinKDD 2007: 138-152
32EEDejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Zhong: Understanding and Utilizing the Hierarchy of Abnormal BGP Events. SDM 2007
31EESheng Zhong: An efficient algorithm for topology discovery of a blackbox communication network. Applied Mathematics and Computation 186(1): 506-508 (2007)
30EESheng Zhong, Dan Xie: Gene Ontology analysis in multiple gene clusters under multiple hypothesis testing framework. Artificial Intelligence in Medicine 41(2): 105-115 (2007)
29EESheng Zhong: An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol. Cryptologia 31(4): 324-325 (2007)
28EESheng Zhong: Privacy-preserving algorithms for distributed mining of frequent itemsets. Inf. Sci. 177(2): 490-503 (2007)
27EEDivyesh Shah, Sheng Zhong: Two methods for privacy preserving data mining with malicious participants. Inf. Sci. 177(23): 5468-5483 (2007)
26EEYue Lu, Xin He, Sheng Zhong: Cross-species microarray analysis with the OSCAR system suggests an INSR->Pax6->NQO1 neuro-protective pathway in aging and Alzheimer's disease. Nucleic Acids Research 35(Web-Server-Issue): 105-114 (2007)
25EEJames Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong: Towards a theory of data entanglement. Theor. Comput. Sci. 389(1-2): 26-43 (2007)
24EESheng Zhong, Erran L. Li, Yanbin Grace Liu, Yang Richard Yang: On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks. Wireless Networks 13(6): 799-816 (2007)
2006
23EEZhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Privacy-Preserving Queries on Encrypted Data. ESORICS 2006: 479-495
22EESheng Zhong: An Efficient and Secure Cryptosystem for Encrypting Long Messages. Fundam. Inform. 71(4): 493-497 (2006)
21EESheng Zhong, Yang Richard Yang: Verifiable Distributed Oblivious Transfer and Mobile Agent Security. MONET 11(2): 201-210 (2006)
2005
20EEZhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Anonymity-preserving data collection. KDD 2005: 334-343
19EERebecca N. Wright, Zhiqiang Yang, Sheng Zhong: Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results. MADNES 2005: 67-79
18EESheng Zhong, Erran L. Li, Yanbin Grace Liu, Yang Richard Yang: On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques. MOBICOM 2005: 117-131
17EESheng Zhong, Zhiqiang Yang, Rebecca N. Wright: Privacy-enhancing k-anonymization of customer data. PODS 2005: 139-147
16 Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Privacy-Preserving Classification of Customer Data without Loss of Accuracy. SDM 2005
15EEPengyu Hong, Sheng Zhong, Wing Hung Wong: Ubic2 - Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval. International Journal of Software Engineering and Knowledge Engineering 15(3): 475-486 (2005)
2004
14EEPengyu Hong, Sheng Zhong, Wing Hung Wong: Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval. BIBE 2004: 57-64
13EESheng Zhong, Lu Tian, Cheng Li, Kai-Florian Storch, Wing Hung Wong: Comparative Analysis of Gene Sets in the Gene Ontology Space under the Multiple Hypothesis Testing Framework. CSB 2004: 425-435
12EEJames Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong: Towards a Theory of Data Entanglement: (Extended Abstract). ESORICS 2004: 177-192
11EESheng Zhong, Qing Zhou, P. Giangrande, J. R. Nevins, Wing Hung Wong: In silico prediction of transcription factors that interact with the E2F family of transcription factors. ICARCV 2004: 1325-1330
2003
10EESheng Zhong, Yang Richard Yang: Verifiable distributed oblivious transfer and mobile agent security. DIALM-POMC 2003: 12-21
9EESheng Zhong, Jiang Chen, Yang Richard Yang: Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. INFOCOM 2003
8EESheng Zhong, Tianwen Lin: A comment on the Chen-Chung scheme for hierarchical access control. Computers & Security 22(5): 450-452 (2003)
7EEKefei Chen, Sheng Zhong: Attacks on the (enhanced) Yang-Shieh authentication. Computers & Security 22(8): 725-727 (2003)
6 Sheng Zhong, Cheng Li, Wing Hung Wong: ChipInfo: software for extracting gene annotation and gene ontology information for microarray analysis. Nucleic Acids Research 31(13): 3483-3486 (2003)
2002
5EEPhilippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465
4 Sheng Zhong: A practical key management scheme for access control in a user hierarchy. Computers & Security 21(8): 750-759 (2002)
1995
3 Sheng Zhong, Francis Y. L. Chin: Improved and Optimal Adaptive Hierarchical Vector Quantization for Image Coding and Indexing. IW-MMDBMS 1995: 102-109
1994
2EESheng Zhong, Qing-Yun Shi, Min-Teh Cheng: Adaptive hierarchical vector quantization for image coding. Pattern Recognition Letters 15(12): 1171-1175 (1994)
1993
1 Sheng Zhong, Qing-Yun Shi, Min-Teh Cheng: High compression ratio image compression. ISCAS 1993: 275-278

Coauthor Index

1James Aspnes [12] [25]
2Dan Boneh [5]
3Chieh-Chun Chen [37]
4Jiang Chen [9]
5Kefei Chen [7]
6Tingting Chen [35] [42] [47]
7Min-Teh Cheng [1] [2]
8Francis Y. L. Chin [3]
9Dejing Dou [32]
10Joan Feigenbaum [12] [25]
11P. Giangrande [11]
12Philippe Golle [5]
13Xin He [26]
14Pengyu Hong [14] [15]
15Murtuza Jadliwala [45]
16Markus Jakobsson [5]
17Ari Juels [5]
18Shiwoong Kim [32]
19Cheng Li [6] [13]
20Erran L. Li (Li Li, Li (Erran) Li) [18] [24] [42]
21Jun Li [32]
22Qun Li [41]
23Tianwen Lin [8]
24Jiqiang Liu [36] [46]
25Yanbin Grace Liu [18] [24]
26Yue Lu [26]
27J. R. Nevins [11]
28Chunming Qiao [44] [45]
29Han Qin [32]
30Divyesh Shah [27]
31Qing-Yun Shi [1] [2]
32Kai-Florian Storch [13]
33Chiu Chiang Tan [41]
34Lu Tian [13]
35Shambhu Upadhyaya [45]
36Haodong Wang [41]
37Wing Hung Wong [6] [11] [13] [14] [15]
38Rebecca N. Wright [16] [17] [19] [20] [23] [33]
39Fan Wu [34] [36] [42] [44] [46]
40Dan Xie [30]
41Rui Xue [39]
42Aleksandr Yampolskiy [12] [25]
43Yang Richard Yang [9] [10] [18] [21] [24] [42]
44Zhiqiang Yang [16] [17] [19] [20] [23] [33] [38]
45Qing Zhou [11]
46Xinguang Zhu [37]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)