Sheng Zhong
Citée par
Citée par
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
S Zhong, J Chen, YR Yang
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
Z Hao, S Zhong, N Yu
IEEE transactions on Knowledge and Data Engineering 23 (9), 1432-1437, 2011
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks
S Zhong, LE Li, YG Liu, YR Yang
Wireless networks 13 (6), 799-816, 2007
Privacy-preserving classification of customer data without loss of accuracy
Z Yang, S Zhong, RN Wright
Proceedings of the 2005 SIAM International Conference on Data Mining, 92-102, 2005
Privacy-enhancing k-anonymization of customer data
S Zhong, Z Yang, RN Wright
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on …, 2005
Privacy-preserving queries on encrypted data
Z Yang, S Zhong, RN Wright
European Symposium on Research in Computer Security, 479-495, 2006
Body sensor network security: an identity-based cryptography approach
CC Tan, H Wang, S Zhong, Q Li
Proceedings of the first ACM conference on Wireless network security, 148-153, 2008
IBE-Lite: A lightweight identity-based cryptography for body sensor networks
CC Tan, H Wang, S Zhong, Q Li
IEEE Transactions on Information Technology in Biomedicine 13 (6), 926-932, 2009
Optimistic mixing for exit-polls
P Golle, S Zhong, D Boneh, M Jakobsson, A Juels
International Conference on the Theory and Application of Cryptology and …, 2002
Stimulating cooperation in vehicular ad hoc networks: A coalitional game theoretic approach
T Chen, L Wu, F Wu, S Zhong
IEEE Transactions on Vehicular Technology 60 (2), 566-579, 2010
Privacy-preserving backpropagation neural network learning
T Chen, S Zhong
IEEE Transactions on Neural Networks 20 (10), 1554-1564, 2009
Anonymity-preserving data collection
Z Yang, S Zhong, RN Wright
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge …, 2005
Globally optimal channel assignment for non-cooperative wireless networks
F Wu, S Zhong, C Qiao
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1543-1551, 2008
Privacy-preserving algorithms for distributed mining of frequent itemsets
S Zhong
Information Sciences 177 (2), 490-503, 2007
Privacy-preserving location-based services for mobile users in wireless networks
S Zhong, L Li, YG Liu, YR Yang
Department of Computer Science, Yale University, Technical Report ALEU/DCS …, 2004
Privacy preserving back-propagation neural network learning over arbitrarily partitioned data
A Bansal, T Chen, S Zhong
Neural Computing and Applications 20 (1), 143-150, 2011
Incentive-compatible opportunistic routing for wireless networks
F Wu, T Chen, S Zhong, LE Li, YR Yang
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
Differentially private publication of general time-serial trajectory data
J Hua, Y Gao, S Zhong
2015 IEEE Conference on Computer Communications (INFOCOM), 549-557, 2015
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
S Zhong, F Wu
Proceedings of the 13th annual ACM international conference on Mobile …, 2007
Privacy-preserving data aggregation in mobile phone sensing
Y Zhang, Q Chen, S Zhong
IEEE Transactions on Information Forensics and Security 11 (5), 980-992, 2016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20