1、Yunlong Mao, Wenbo Hong, Boyu Zhu, Zhifei Zhu, Yuan Zhang,Sheng Zhong. Secure Deep Neural Network Models Publishing Against Membership Inference Attacks Via Training Task Parallelism. IEEE Transactions on Parallel and Distributed Systems (TPDS, 2021)
2、Yunlong Mao, Xinyu Yuan, Xinyang Zhao, Sheng Zhong. Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks.European Symposium on Research in Computer Security (ESORICS, 2021)
3、Minze Xu, Yuan Zhang, Fengyuan Xu, Sheng Zhong. Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels. IEEE/ACM International Workshop on Quality of Service(IWQoS )
4、Wei Tong, Chang Xia, Jingyu Hua, Qun Li and Sheng Zhong. Practical Location Privacy Attacks and Defense on Point-of-interest Aggregates. IEEE International Conference on Distributed Computing (ICDCS 2021)
5、Santosh Pandey, Zhibin Wang, Sheng Zhong, Chen Tian, Bolong Zheng, Xiaoye Li, Lingda Li, Adolfy Hoisie, Caiwen Ding, Dong Li, Hang Liu. TRUST: Triangle Counting Reloaded on GPUs. IEEE Transactions on Parallel and Distributed Systems(TPDS)
6、Shaoyong Du, Minrui Zhao, Jingyu Hua, Hang Zhang, Xiaoyu Chen, Zhiyun Qian, and Sheng Zhong. Who Moves My App Promotion Investment? A Systematic Study about App Distribution Fraud. IEEE Transactions on Dependable and Secure Computing.
7、Hao Wu,XueJin Tian,Minghao Li,Yunxin Liu,Ganesh Ananthanarayanan,Fengyuan Xu,Sheng Zhong.PECAM: Privacy-Enhanced Video Streaming and Analytics via Securely-Reversible Transformation. (MobiCom 2021)
8、Yangyang Liu, Laiping Zhao, Jingyu Hua, Wenyu Qu, Suohao Zhang, and Sheng Zhong. Distributed Traffic Engineering for Multi-Domain SDN without Trust. IEEE Transactions on Cloud Computing, Accepted.
9、Yunlong Mao, Wenbo Hong, Heng Wang, Qun Li, Sheng Zhong. Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training.Accepted, IEEE Transactions on Parallel and Distributed Systems. 2020.
10、Zidong Zhou, Jingyu Hua, Sheng Zhong.Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Convert Channel, IEEETransactions on Information Forensics & Security(TIFS 2020).
11、Hao Wu, Jinghao Feng, Xuejin Tian, Edward Sun, Yunxin Liu, Bo Dong, Fengyuan Xu, Sheng Zhong. EMO: Real-Time Emotion Recognition from Single-Eye Images for Resource-Constrained Eyewear Devices, International Conference on Mobile Systems,Applications and Services(Mobisys 2020).
12、Yunlong Mao, Boyu Zhu, Wenbo Hong, Zhifei Zhu, Yuan Zhang, Sheng Zhong. Private Deep Neural Network Models Publishing for Machine Learning as a Service, International Workshop on Quality of Service (IWQoS 2020).
13、Chang Xia, Jingyu Hua, Wei Tong, and Sheng Zhong. Distributed K-Means Clustering Guaranteeing Local Differential Privacy, accepted for publication in Computers & Security
14、Yushu Zhang, Xiangli Xiao, Lu-Xing Yang, Yong Xiang, and Sheng Zhong, Secure and Efficient Outsourcing of PCA-Based Face Recognition, Accepted by IEEE Transactions on Information Forensics & Security.
15、Yunlong Mao, Ying He, Yuan Zhang, Jingyu Hua and Sheng Zhong, Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack, accepted by IEEE Transactions on Mobile Computing
16、Shucheng Li, Lingfei Wu, Shiwei Feng, Yulong Tian, Fengyuan Xu, Fangli Xu and Sheng Zhong. Toward Automated Queries Generation from Natural Language Description Using Graph Neural Networks. AIAED 2019. Best Student Paper.
17、Laiping Zhao, Jingyu Hua, Yangyang Liu, Wenyu Qu, Suohao Zhang and Sheng Zhong. Distributed Traffic Engineering for Multi-Domain Software Defined Networks. In Proceedings of the 39th IEEE International Conference on Distributed Computing (ICDCS’19), 2019
18、Wei Tong, Bingbing Jiang, Fengyuan Xu, Qun Li and Sheng Zhong. Privacy-Preserving Data Integrity Verification in Mobile Edge Computing. In Proceedings of the 39th IEEE International Conference on Distributed Computing (ICDCS’19), 2019
19、Yuan Zhang, Yunlong Mao, Minze Xu, Fengyuan Xu, Sheng Zhong, Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications, Accepted by IEEE Transactions on Dependable and Secure Computing.
20、Jun Wu, Yuan Zhang, Qiao Yu, Lei Zhang, Chongjun Wang, Junyuan Xie, Multi-unit Budget Feasible Mechanisms for Cellular Traffic Offloading, Accepted by the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019)
21、Shaoyong Du, Pengxiong Zhu, Jingyu Hua, Zhiyun Qian, Zhao Zhang, Xiaoyu Chen, Sheng Zhong. An Empirical Analysis of Hazardous Uses of Android Shared Storage. IEEE Transactions on Dependable and Secure Computing, Accepted.
22、Shaoyong Du, Jingyu Hua, Sheng Zhong. Securing Peer-Assisted Indoor Localization Leveraging Acoustic Ranging. Computers & Security, 2018, Accepted.
23、Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, Sheng Zhong. A Privacy-Preserving Deep Learning Approach for Face Recognition with Edge Computing. USENIX Workshop on Hot Topics in Edge Computing (HotEdge ’18), Accepted.
24、Jingyu Hua, Laiping Zhao, Suohao Zhang, Yangyang Liu, Xin Ge, Sheng Zhong. Topology-Preserving Traffic Engineering for Hierarchical Multi-Domain SDN. Computer Networks, Accepted.
25、Qingjun Chen, Shouqian Shi, Xin Li, Chen Qian, Sheng Zhong. SDN-based Privacy Preserving Cross Domain Routing. IEEE Transactions on Dependable and Secure Computing, Accepted.
26、Yulong Tian, Wei Wei, Qun Li, Fengyuan Xu, Sheng Zhong. MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. Accepted by the 37th International Conference on Computer Communications (INFOCOM’18),Honolulu, 2018.
27、Jingyu Hua, Hongyi Sun, Zhenyu Shen, Zhiyun Qian, Sheng Zhong. Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information.Accepted by the 37th International Conference on Computer Communications (INFOCOM’18),Honolulu, 2018.
28、Jingyu Hua, Wei Tong, Fengyuan Xu, Sheng Zhong. A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Transactions on Information Forensics & Security, 2017, Accepted.
29、Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong. Location Privacy in Public Access Points Positioning: An Optimization and Geometry Approach. Computers & Security, Accepted.
30、Yuan Zhang, Boyu Zhu, Yixin Fang, Suxin Guo, Aidong Zhang, Sheng Zhong.Secure Inter-domain Forwarding Loop Test in Software Defined Networks.IEEE Transactions on Dependable and Secure Computing, Accepted.
31、Wei Tong, Jingyu Hua, Sheng Zhong.A Jointly Differentially Private Scheduling Protocol for Ridesharing Services.IEEE Transactions on Information Forensics & Security, Accepted.
32、Li Wang, Jun Jie Shi, Chen Chen, Sheng Zhong.Privacy-preserving face detection based on linear and nonlinear kernels.Multimedia Tools and Applications, Accepted.
33、Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong. Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Transactions on Information Forensics & Security, Accepted.
34、Fan Wu, Dongxin Liu, Zhihao Wu, Yuan Zhang, Guihai Chen.Cost-Efficient Indoor White Space Exploration Through Compressive Sensing.IEEE/ACM Transactions on Networking, 2016.
35、Jingyu Hua, Zhenyu Shen, Sheng Zhong.We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones.IEEE Transactions on Information Forensics and Security, 2016.
36、Yuan Zhang, Yunlong Mao, Sheng Zhong.Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems.IEEE Journal of Selected Areas in Communications, 2016.
37、Yunlong Mao, Yuan Zhang, Sheng Zhong.Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks.In proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS’ 16), 2016.
38、Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao.Instant and Robust Authentication and Key Agreement among Mobile Devices.In proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS’ 16), 2016.
39、Yuan Zhang, Wei Tong, Sheng Zhong.On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-anonymity Location Privacy, IEEE Transactions on Information Forensics and Security, 2016.
40、Wei Tong, Sheng Zhong.A Unified Resource Allocation Framework for Defending against Pollution Attacks in Wireless Network Coding Systems.IEEE Transactions on Information Forensics & Security, 2016.
41、Jingyu Hua, An Tang, Yixin Fang, Zhenyu Shen, Sheng Zhong.Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms.IEEE Transactions on Information Forensics & Security, 2016.
42、Yuan Zhang, Qingjun Chen, Sheng Zhong,Privacy-preserving Data Aggregation in Mobile Phone Sensing.IEEE Transactions on Information Forensics & Security.
43、Jingyu Hua, Xin Ge, Sheng Zhong,FOUM: A Flow-Ordered Consistent Update Mechanism for Software-Defined Networking in Adversarial Settings.Accepted by the 35th International Conference on Computer Communications (INFOCOM’16).
44、Yuan Zhang, Siyuan Tang, Tingting Chen, Sheng Zhong,Competitive Auctions for Cost-aware Cellular Traffic Offloading with Optimized Capacity Gain.Accepted by the 35th International Conference on Computer Communications (INFOCOM’16).
45、Yuan Zhang, He Zhang, Siyuan Tang, Sheng Zhong,Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees, IEEE Transactions on Information Forensics and Security. 2016
46、Dongxin Liu, Zhihao Wu, Fan Wu, Yuan Zhang, Guihai Chen,FIWEX: A Compressive Sensing Based Cost-Efficient Indoor White Space Exploration Mechanism,ACM MobiHoc 2015.
47、Qingjun Chen, Chen Qian, Sheng Zhong.Privacy-preserving Cross-domain Routing Optimization–A Cryptographic Approach.Accepted by The IEEE International Conference on Network Protocols 2015 (ICNP15).
48、Laiping Zhao, Jingyu Hua, Xin Ge and Sheng Zhong.Traffic Engineering in Hierarchical SDN Control Plane.In the proceedings of the 23rd International Workshop on Quality of Service (IWQoS’15), 2015.
49、Jingyu Hua, Chang Xia, Sheng Zhong.Differentially private matrix factorization.In proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI), 2015.v
50、Jingyu Hua, Yue Gao, Sheng Zhong.Differentially private publication of general time-serial trajectory data.In proceedings of the 34th International Conference on Computer Communications (INFOCOM’15). Hongkong, 2015.
51、Yuan Zhang, Qingjun Chen, Sheng Zhong.Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems.Accepted by IEEE Transactions on Dependable and Secure Computing.
52、Yuan Zhang, Yunlong Mao, He Zhang, Sheng Zhong.Privacy Preserving Market Schemes for Mobile Sensing.In proceedings of the 44th International Conference on Parallel Processing (ICPP-2015), 2015.
53、Jingyu Hua, An Tang, Sheng Zhong.Advertiser and Publisher-Centric Privacy Aware Online Behavioral Advertising.In the proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS’15).
54、Jingyu Hua, Shaoyong Du, Sheng Zhong.Towards Attack-Resistant Peer-Assisted Indoor Localization.In the proceedings of the 20th European Symposium on Research in Computer Security (ESORICS’15).
55、Shaoyong Du, Jingyu Hua, Yue Gao, Sheng Zhong.EV-Linker: Mapping Eavesdropped Wi-Fi Packets toIndividuals via Electronic and Visual Signal Matching.accepted by Journal of Computer and System Sciences.
56、Tingting Chen, Sheng Zhong.Truthful Auctions for Continuous Spectrum with Variable Bandwidths.IEEE Transactions on Wireless Communications.
57、Sheng Zhong, Haifan Yao.Towards Cheat-Proof Cooperative Relay for Cognitive Radio Networks.IEEE Transactions on Parallel and Distributed Systems.
58、Sheng Zhong, Yuan Zhang,How to Select Optimal Gateway Selection in Multi-Domain Wireless Networks–Alternative Solutions without Learning,IEEE Transactions on Wireless Communications, Accepted, 2013.
59、Zhuo Hao,Yunlong Mao,Sheng Zhong,Li Erran Li,Haifan Yao,Nenghai Yu,Towards Wireless Security without Computational Assumptions. IEEE Transactions on Computers