Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks S Zhong, J Chen, YR Yang IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 1751 | 2003 |
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability Z Hao, S Zhong, N Yu IEEE transactions on Knowledge and Data Engineering 23 (9), 1432-1437, 2011 | 384 | 2011 |
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques S Zhong, L Li, YG Liu, Y Yang Proceedings of the 11th annual international conference on Mobile computing …, 2005 | 345 | 2005 |
Privacy-preserving classification of customer data without loss of accuracy Z Yang, S Zhong, RN Wright Proceedings of the 2005 SIAM International Conference on Data Mining, 92-102, 2005 | 291 | 2005 |
Privacy-enhancing k-anonymization of customer data S Zhong, Z Yang, RN Wright Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on …, 2005 | 248 | 2005 |
Privacy-preserving queries on encrypted data Z Yang, S Zhong, RN Wright Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 208 | 2006 |
Body sensor network security: an identity-based cryptography approach CC Tan, H Wang, S Zhong, Q Li Proceedings of the first ACM conference on Wireless network security, 148-153, 2008 | 206 | 2008 |
IBE-Lite: A lightweight identity-based cryptography for body sensor networks CC Tan, H Wang, S Zhong, Q Li IEEE Transactions on Information Technology in Biomedicine 13 (6), 926-932, 2009 | 185 | 2009 |
Optimistic mixing for exit-polls P Golle, S Zhong, D Boneh, M Jakobsson, A Juels International Conference on the Theory and Application of Cryptology and …, 2002 | 162 | 2002 |
Privacy-preserving backpropagation neural network learning T Chen, S Zhong IEEE Transactions on Neural Networks 20 (10), 1554-1564, 2009 | 158 | 2009 |
Stimulating cooperation in vehicular ad hoc networks: A coalitional game theoretic approach T Chen, L Wu, F Wu, S Zhong IEEE Transactions on Vehicular Technology 60 (2), 566-579, 2010 | 146 | 2010 |
Differentially private publication of general time-serial trajectory data J Hua, Y Gao, S Zhong 2015 IEEE Conference on Computer Communications (INFOCOM), 549-557, 2015 | 143 | 2015 |
Privacy-preserving kruskal–wallis test S Guo, S Zhong, A Zhang Computer methods and programs in biomedicine 112 (1), 135-145, 2013 | 132 | 2013 |
Accurate and efficient wireless device fingerprinting using channel state information J Hua, H Sun, Z Shen, Z Qian, S Zhong IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1700-1708, 2018 | 129 | 2018 |
Instant and robust authentication and key agreement among mobile devices W Xi, C Qian, J Han, K Zhao, S Zhong, XY Li, J Zhao Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 119 | 2016 |
Privacy preserving back-propagation neural network learning over arbitrarily partitioned data A Bansal, T Chen, S Zhong Neural Computing and Applications 20, 143-150, 2011 | 111 | 2011 |
Privacy-preserving algorithms for distributed mining of frequent itemsets S Zhong Information Sciences 177 (2), 490-503, 2007 | 110 | 2007 |
Anonymity-preserving data collection Z Yang, S Zhong, RN Wright Proceedings of the eleventh ACM SIGKDD international conference on Knowledge …, 2005 | 109 | 2005 |
Globally optimal channel assignment for non-cooperative wireless networks F Wu, S Zhong, C Qiao IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1543-1551, 2008 | 104 | 2008 |
Privacy-preserving location-based services for mobile users in wireless networks S Zhong, L Li, YG Liu, YR Yang Department of Computer Science, Yale University, Technical Report ALEU/DCS …, 2004 | 104 | 2004 |