1. Shaoyong Du, Pengxiong Zhu, Jingyu Hua, Zhiyun Qian, Zhao Zhang, Xiaoyu Chen, Sheng Zhong. An Empirical Analysis of Hazardous Uses of Android Shared Storage. Transactions on Dependable and Secure Computing, Accepted.
  2. Shaoyong Du, Jingyu Hua, Sheng Zhong. Securing Peer-Assisted Indoor Localization Leveraging Acoustic Ranging. Computers & Security, 2018, Accepted.
  3. Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, Sheng Zhong. A Privacy-Preserving Deep Learning Approach for Face Recognition with Edge Computing. USENIX Workshop on Hot Topics in Edge Computing (HotEdge ’18), Accepted.
  4. Jingyu Hua, Laiping Zhao, Suohao Zhang, Yangyang Liu, Xin Ge, Sheng Zhong. Topology-Preserving Traffic Engineering for Hierarchical Multi-Domain SDN. Computer Networks, Accepted.
  5. Qingjun Chen, Shouqian Shi, Xin Li, Chen Qian, Sheng Zhong. SDN-based Privacy Preserving Cross Domain Routing. IEEE Transactions on Dependable and Secure Computing, Accepted.
  6. Yulong Tian, Wei Wei, Qun Li, Fengyuan Xu, Sheng Zhong. MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. Accepted by the 37th International Conference on Computer Communications (INFOCOM’18),Honolulu, 2018.
  7. Jingyu Hua, Hongyi Sun, Zhenyu Shen, Zhiyun Qian, Sheng Zhong. Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information.Accepted by the 37th International Conference on Computer Communications (INFOCOM’18),Honolulu, 2018.
  8. Jingyu Hua, Wei Tong, Fengyuan Xu, Sheng Zhong. A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Transactions on Information Forensics & Security, 2017, Accepted.
  9. Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong. Location Privacy in Public Access Points Positioning: An Optimization and Geometry Approach. Computers & Security, Accepted.
  10. Yuan Zhang, Boyu Zhu, Yixin Fang, Suxin Guo, Aidong Zhang, Sheng Zhong. Secure Inter-domain Forwarding Loop Test in Software Defined Networks. IEEE Transactions on Dependable and Secure Computing, Accepted.
  11. Wei Tong, Jingyu Hua, Sheng Zhong. A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. IEEE Transactions on Information Forensics & Security, Accepted.
  12. Li Wang, Jun Jie Shi, Chen Chen, Sheng Zhong. Privacy-preserving face detection based on linear and nonlinear kernels. Multimedia Tools and Applications, Accepted.
  13. Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong. Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Transactions on Information Forensics & Security, Accepted.
  14. Fan Wu, Dongxin Liu, Zhihao Wu, Yuan Zhang, Guihai Chen. Cost-Efficient Indoor White Space Exploration Through Compressive Sensing.IEEE/ACM Transactions on Networking, 2016.
  15. Jingyu Hua, Zhenyu Shen, Sheng Zhong. We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones.IEEE Transactions on Information Forensics and Security, 2016.
  16. Yuan Zhang, Yunlong Mao, Sheng Zhong. Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems.IEEE Journal of Selected Areas in Communications, 2016.
  17. Yunlong Mao, Yuan Zhang, Sheng Zhong. Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks.In proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS’ 16), 2016.
  18. Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao. Instant and Robust Authentication and Key Agreement among Mobile Devices.In proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS’ 16), 2016.
  19. Yuan Zhang, Wei Tong, Sheng Zhong. On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-anonymity Location Privacy, IEEE Transactions on Information Forensics and Security, 2016.
  20. Wei Tong, Sheng Zhong. A Unified Resource Allocation Framework for Defending against Pollution Attacks in Wireless Network Coding Systems.IEEE Transactions on Information Forensics & Security, 2016.
  21. Jingyu Hua, An Tang, Yixin Fang, Zhenyu Shen, Sheng Zhong. Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms. IEEE Transactions on Information Forensics & Security, 2016.
  22. Yuan Zhang, Qingjun Chen, Sheng Zhong, Privacy-preserving Data Aggregation in Mobile Phone Sensing.IEEE Transactions on Information Forensics & Security.
  23. Jingyu Hua, Xin Ge, Sheng Zhong, FOUM: A Flow-Ordered Consistent Update Mechanism for Software-Defined Networking in Adversarial Settings.Accepted by the 35th International Conference on Computer Communications (INFOCOM’16).
  24. Yuan Zhang, Siyuan Tang, Tingting Chen, Sheng Zhong, Competitive Auctions for Cost-aware Cellular Traffic Offloading with Optimized Capacity Gain.Accepted by the 35th International Conference on Computer Communications (INFOCOM’16).
  25. Yuan Zhang, He Zhang, Siyuan Tang, Sheng Zhong, Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees, IEEE Transactions on Information Forensics and Security. 2016
  26. Dongxin Liu, Zhihao Wu, Fan Wu, Yuan Zhang, Guihai Chen, FIWEX: A Compressive Sensing Based Cost-Efficient Indoor White Space Exploration Mechanism, ACM MobiHoc 2015.
  27. Qingjun Chen, Chen Qian, Sheng Zhong. Privacy-preserving Cross-domain Routing Optimization–A Cryptographic Approach.Accepted by The IEEE International Conference on Network Protocols 2015 (ICNP15).
  28. Laiping Zhao, Jingyu Hua, Xin Ge and Sheng Zhong. Traffic Engineering in Hierarchical SDN Control Plane.In the proceedings of the 23rd International Workshop on Quality of Service (IWQoS’15), 2015.
  29. Jingyu Hua, Chang Xia, Sheng Zhong.Differentially private matrix factorization. In proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI), 2015.v
  30. Jingyu Hua, Yue Gao, Sheng Zhong.Differentially private publication of general time-serial trajectory data. In proceedings of the 34th International Conference on Computer Communications (INFOCOM’15). Hongkong, 2015.
  31. Yuan Zhang, Qingjun Chen, Sheng Zhong. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems. Accepted by IEEE Transactions on Dependable and Secure Computing.
  32. Yuan Zhang, Yunlong Mao, He Zhang, Sheng Zhong. Privacy Preserving Market Schemes for Mobile Sensing. In proceedings of the 44th International Conference on Parallel Processing (ICPP-2015), 2015.
  33. Jingyu Hua, An Tang, Sheng Zhong. Advertiser and Publisher-Centric Privacy Aware Online Behavioral Advertising. In the proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS’15).
  34. Jingyu Hua, Shaoyong Du, Sheng Zhong. Towards Attack-Resistant Peer-Assisted Indoor Localization. In the proceedings of the 20th European Symposium on Research in Computer Security (ESORICS’15).
  35. Shaoyong Du, Jingyu Hua, Yue Gao, Sheng Zhong. EV-Linker: Mapping Eavesdropped Wi-Fi Packets toIndividuals via Electronic and Visual Signal Matching. accepted by Journal of Computer and System Sciences.
  36. Tingting Chen, Sheng Zhong. Truthful Auctions for Continuous Spectrum with Variable Bandwidths. IEEE Transactions on Wireless Communications.
  37. Sheng Zhong, Haifan Yao. Towards Cheat-Proof Cooperative Relay for Cognitive Radio Networks. IEEE Transactions on Parallel and Distributed Systems.
  38. Sheng Zhong, Yuan Zhang, How to Select Optimal Gateway Selection in Multi-Domain Wireless Networks–Alternative Solutions without Learning, IEEE Transactions on Wireless Communications, Accepted, 2013.
  39. Zhuo Hao,Yunlong Mao,Sheng Zhong,Li Erran Li,Haifan Yao,Nenghai Yu, Towards Wireless Security without Computational Assumptions. IEEE Transactions on Computers