Search the dblp DataBase
Sheng Zhong :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Philippe Golle , Sheng Zhong , Dan Boneh , Markus Jakobsson , Ari Juels Optimistic Mixing for Exit-Polls. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:451-465 [Conf ] Pengyu Hong , Sheng Zhong , Wing Hung Wong Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval. [Citation Graph (0, 0)][DBLP ] BIBE, 2004, pp:57-64 [Conf ] Sheng Zhong , Lu Tian , Cheng Li , Kai-Florian Storch , Wing Hung Wong Comparative Analysis of Gene Sets in the Gene Ontology Space under the Multiple Hypothesis Testing Framework. [Citation Graph (0, 0)][DBLP ] CSB, 2004, pp:425-435 [Conf ] Sheng Zhong , Yang Richard Yang Verifiable distributed oblivious transfer and mobile agent security. [Citation Graph (0, 0)][DBLP ] DIALM-POMC, 2003, pp:12-21 [Conf ] James Aspnes , Joan Feigenbaum , Aleksandr Yampolskiy , Sheng Zhong Towards a Theory of Data Entanglement: (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:177-192 [Conf ] Zhiqiang Yang , Sheng Zhong , Rebecca N. Wright Privacy-Preserving Queries on Encrypted Data. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:479-495 [Conf ] Sheng Zhong , Jiang Chen , Yang Richard Yang Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Sheng Zhong , Qing-Yun Shi , Min-Teh Cheng High compression ratio image compression. [Citation Graph (0, 0)][DBLP ] ISCAS, 1993, pp:275-278 [Conf ] Sheng Zhong , Francis Y. L. Chin Improved and Optimal Adaptive Hierarchical Vector Quantization for Image Coding and Indexing. [Citation Graph (0, 0)][DBLP ] IW-MMDBMS, 1995, pp:102-109 [Conf ] Zhiqiang Yang , Sheng Zhong , Rebecca N. Wright Anonymity-preserving data collection. [Citation Graph (0, 0)][DBLP ] KDD, 2005, pp:334-343 [Conf ] Rebecca N. Wright , Zhiqiang Yang , Sheng Zhong Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results. [Citation Graph (0, 0)][DBLP ] MADNES, 2005, pp:67-79 [Conf ] Sheng Zhong , Erran L. Li , Yanbin Grace Liu , Yang (Richard) Yang On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2005, pp:117-131 [Conf ] Sheng Zhong , Zhiqiang Yang , Rebecca N. Wright Privacy-enhancing k -anonymization of customer data. [Citation Graph (0, 0)][DBLP ] PODS, 2005, pp:139-147 [Conf ] Zhiqiang Yang , Sheng Zhong , Rebecca N. Wright Privacy-Preserving Classification of Customer Data without Loss of Accuracy. [Citation Graph (0, 0)][DBLP ] SDM, 2005, pp:- [Conf ] Ke-Fei Chen , Sheng Zhong Attacks on the (enhanced) Yang-Shieh authentication. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:725-727 [Journal ] Sheng Zhong A practical key management scheme for access control in a user hierarchy. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:8, pp:750-759 [Journal ] Sheng Zhong , Tianwen Lin A comment on the Chen-Chung scheme for hierarchical access control. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:5, pp:450-452 [Journal ] Sheng Zhong An Efficient and Secure Cryptosystem for Encrypting Long Messages. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2006, v:71, n:4, pp:493-497 [Journal ] Pengyu Hong , Sheng Zhong , Wing Hung Wong Ubic2 - Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2005, v:15, n:3, pp:475-486 [Journal ] Sheng Zhong Privacy-preserving algorithms for distributed mining of frequent itemsets. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:2, pp:490-503 [Journal ] Sheng Zhong , Yang Richard Yang Verifiable Distributed Oblivious Transfer and Mobile Agent Security. [Citation Graph (0, 0)][DBLP ] MONET, 2006, v:11, n:2, pp:201-210 [Journal ] Sheng Zhong , Cheng Li , Wing Hung Wong ChipInfo: software for extracting gene annotation and gene ontology information for microarray analysis. [Citation Graph (0, 0)][DBLP ] Nucleic Acids Research, 2003, v:31, n:13, pp:3483-3486 [Journal ] Sheng Zhong , Qing-Yun Shi , Min-Teh Cheng Adaptive hierarchical vector quantization for image coding. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 1994, v:15, n:12, pp:1171-1175 [Journal ] Dejing Dou , Jun Li , Han Qin , Shiwoong Kim , Sheng Zhong Understanding and Utilizing the Hierarchy of Abnormal BGP Events. [Citation Graph (0, 0)][DBLP ] SDM, 2007, pp:- [Conf ] Divyesh Shah , Sheng Zhong Two methods for privacy preserving data mining with malicious participants. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:23, pp:5468-5483 [Journal ] Sheng Zhong , Zhiqiang Yang Guided perturbation: towards private and accurate mining. [Citation Graph (0, 0)][DBLP ] VLDB J., 2008, v:0, n:, pp:- [Journal ] Sheng Zhong , Erran L. Li , Yanbin Grace Liu , Yang Richard Yang On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2007, v:13, n:6, pp:799-816 [Journal ] A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree. [Citation Graph (, )][DBLP ] Selection of Thermodynamic Models for Combinatorial Control of Multiple Transcription Factors in Early Differentiation of Embryonic Stem Cells. [Citation Graph (, )][DBLP ] Adaptive learning routing algorithm of WSNs based autonomous decentralized system approach. [Citation Graph (, )][DBLP ] Towards a Theory of Robust Localization Against Malicious Beacon Nodes. [Citation Graph (, )][DBLP ] Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks. [Citation Graph (, )][DBLP ] INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding. [Citation Graph (, )][DBLP ] Welcome to SSN 2008. [Citation Graph (, )][DBLP ] Towards Privacy-Preserving Model Selection. [Citation Graph (, )][DBLP ] On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. [Citation Graph (, )][DBLP ] Incentive-compatible opportunistic routing for wireless networks. [Citation Graph (, )][DBLP ] Enhancing Privacy of Released Database. [Citation Graph (, )][DBLP ] Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks. [Citation Graph (, )][DBLP ] Body sensor network security: an identity-based cryptography approach. [Citation Graph (, )][DBLP ] In silico prediction of transcription factors that interact with the E2F family of transcription factors. [Citation Graph (, )][DBLP ] Gene Ontology analysis in multiple gene clusters under multiple hypothesis testing framework. [Citation Graph (, )][DBLP ] TagSmart: analysis and visualization for yeast mutant fitness data measured by tag microarrays. [Citation Graph (, )][DBLP ] Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.309secs