The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sheng Zhong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels
    Optimistic Mixing for Exit-Polls. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:451-465 [Conf]
  2. Pengyu Hong, Sheng Zhong, Wing Hung Wong
    Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval. [Citation Graph (0, 0)][DBLP]
    BIBE, 2004, pp:57-64 [Conf]
  3. Sheng Zhong, Lu Tian, Cheng Li, Kai-Florian Storch, Wing Hung Wong
    Comparative Analysis of Gene Sets in the Gene Ontology Space under the Multiple Hypothesis Testing Framework. [Citation Graph (0, 0)][DBLP]
    CSB, 2004, pp:425-435 [Conf]
  4. Sheng Zhong, Yang Richard Yang
    Verifiable distributed oblivious transfer and mobile agent security. [Citation Graph (0, 0)][DBLP]
    DIALM-POMC, 2003, pp:12-21 [Conf]
  5. James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong
    Towards a Theory of Data Entanglement: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:177-192 [Conf]
  6. Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
    Privacy-Preserving Queries on Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:479-495 [Conf]
  7. Sheng Zhong, Jiang Chen, Yang Richard Yang
    Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  8. Sheng Zhong, Qing-Yun Shi, Min-Teh Cheng
    High compression ratio image compression. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1993, pp:275-278 [Conf]
  9. Sheng Zhong, Francis Y. L. Chin
    Improved and Optimal Adaptive Hierarchical Vector Quantization for Image Coding and Indexing. [Citation Graph (0, 0)][DBLP]
    IW-MMDBMS, 1995, pp:102-109 [Conf]
  10. Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
    Anonymity-preserving data collection. [Citation Graph (0, 0)][DBLP]
    KDD, 2005, pp:334-343 [Conf]
  11. Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong
    Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:67-79 [Conf]
  12. Sheng Zhong, Erran L. Li, Yanbin Grace Liu, Yang (Richard) Yang
    On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2005, pp:117-131 [Conf]
  13. Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
    Privacy-enhancing k-anonymization of customer data. [Citation Graph (0, 0)][DBLP]
    PODS, 2005, pp:139-147 [Conf]
  14. Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
    Privacy-Preserving Classification of Customer Data without Loss of Accuracy. [Citation Graph (0, 0)][DBLP]
    SDM, 2005, pp:- [Conf]
  15. Ke-Fei Chen, Sheng Zhong
    Attacks on the (enhanced) Yang-Shieh authentication. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:725-727 [Journal]
  16. Sheng Zhong
    A practical key management scheme for access control in a user hierarchy. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:8, pp:750-759 [Journal]
  17. Sheng Zhong, Tianwen Lin
    A comment on the Chen-Chung scheme for hierarchical access control. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:450-452 [Journal]
  18. Sheng Zhong
    An Efficient and Secure Cryptosystem for Encrypting Long Messages. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2006, v:71, n:4, pp:493-497 [Journal]
  19. Pengyu Hong, Sheng Zhong, Wing Hung Wong
    Ubic2 - Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2005, v:15, n:3, pp:475-486 [Journal]
  20. Sheng Zhong
    Privacy-preserving algorithms for distributed mining of frequent itemsets. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:2, pp:490-503 [Journal]
  21. Sheng Zhong, Yang Richard Yang
    Verifiable Distributed Oblivious Transfer and Mobile Agent Security. [Citation Graph (0, 0)][DBLP]
    MONET, 2006, v:11, n:2, pp:201-210 [Journal]
  22. Sheng Zhong, Cheng Li, Wing Hung Wong
    ChipInfo: software for extracting gene annotation and gene ontology information for microarray analysis. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2003, v:31, n:13, pp:3483-3486 [Journal]
  23. Sheng Zhong, Qing-Yun Shi, Min-Teh Cheng
    Adaptive hierarchical vector quantization for image coding. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1994, v:15, n:12, pp:1171-1175 [Journal]
  24. Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Zhong
    Understanding and Utilizing the Hierarchy of Abnormal BGP Events. [Citation Graph (0, 0)][DBLP]
    SDM, 2007, pp:- [Conf]
  25. Divyesh Shah, Sheng Zhong
    Two methods for privacy preserving data mining with malicious participants. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5468-5483 [Journal]
  26. Sheng Zhong, Zhiqiang Yang
    Guided perturbation: towards private and accurate mining. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2008, v:0, n:, pp:- [Journal]
  27. Sheng Zhong, Erran L. Li, Yanbin Grace Liu, Yang Richard Yang
    On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2007, v:13, n:6, pp:799-816 [Journal]

  28. A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree. [Citation Graph (, )][DBLP]


  29. Selection of Thermodynamic Models for Combinatorial Control of Multiple Transcription Factors in Early Differentiation of Embryonic Stem Cells. [Citation Graph (, )][DBLP]


  30. Adaptive learning routing algorithm of WSNs based autonomous decentralized system approach. [Citation Graph (, )][DBLP]


  31. Towards a Theory of Robust Localization Against Malicious Beacon Nodes. [Citation Graph (, )][DBLP]


  32. Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks. [Citation Graph (, )][DBLP]


  33. INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding. [Citation Graph (, )][DBLP]


  34. Welcome to SSN 2008. [Citation Graph (, )][DBLP]


  35. Towards Privacy-Preserving Model Selection. [Citation Graph (, )][DBLP]


  36. On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. [Citation Graph (, )][DBLP]


  37. Incentive-compatible opportunistic routing for wireless networks. [Citation Graph (, )][DBLP]


  38. Enhancing Privacy of Released Database. [Citation Graph (, )][DBLP]


  39. Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks. [Citation Graph (, )][DBLP]


  40. Body sensor network security: an identity-based cryptography approach. [Citation Graph (, )][DBLP]


  41. In silico prediction of transcription factors that interact with the E2F family of transcription factors. [Citation Graph (, )][DBLP]


  42. Gene Ontology analysis in multiple gene clusters under multiple hypothesis testing framework. [Citation Graph (, )][DBLP]


  43. TagSmart: analysis and visualization for yeast mutant fitness data measured by tag microarrays. [Citation Graph (, )][DBLP]


  44. Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks. [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.022secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002