Wensheng Zhang 0001
Iowa State University, Department of Computer Science, USA
http://www.cs.iastate.edu/~wzhang/
Wensheng Zhang
Wensheng Zhang 0002
Chinese Academy of Sciences, Institute of Automation, Beijing, China
https://orcid.org/0000-0003-2693-0786
https://orcid.org/0000-0003-0752-941X
https://orcid.org/0000-0003-3998-6252
https://orcid.org/0000-0002-9120-9736
https://www.wikidata.org/entity/Q96245352
https://www.wikidata.org/entity/Q96184245
Wensheng Zhang 0003
Jiangxi University of Science and Technology, China
Wensheng Zhang 0004
Shandong University, Shandong Provincial Key Laboratory of Wireless Communication Technologies, China
https://orcid.org/0000-0001-8742-8736
Wensheng Zhang 0005
Xavier University of Louisiana, Bioinformatics Core of Xavier RCMI Center for Cancer Research, New Orleans, LA, USA
University of Georgia, Athen, GA, USA
Wensheng Zhang 0006
Keio University, Departement of Electrical and Electronics Engineering, Japan
Pinglan Liu
Wensheng Zhang 0001
Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud.
529-539
2023
CLOUD
https://doi.org/10.1109/CLOUD60044.2023.00071
conf/IEEEcloud/2023
db/conf/IEEEcloud/IEEEcloud2023.html#LiuZ23
Hongyi Bian
Rong N. Chang
Kumar Bhaskaran
Wensheng Zhang 0001
Carl K. Chang
Distributed and Intelligent API Mediation Service for Enterprise-Grade Hybrid-Multicloud Computing.
1-11
2023
SSE
https://doi.org/10.1109/SSE60056.2023.00025
conf/IEEEscc/2023
db/conf/IEEEscc/scc2023.html#BianCBZC23
Hongyi Bian
Wensheng Zhang 0001
Carl K. Chang
Situ-Oracle: A Learning-Based Situation Analysis Servicing Framework for BIoT Systems.
159-169
2023
SSE
https://doi.org/10.1109/SSE60056.2023.00030
conf/IEEEscc/2023
db/conf/IEEEscc/scc2023.html#BianZC23
Pinglan Liu
Wensheng Zhang 0001
Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud.
2023
abs/2308.00963
CoRR
https://doi.org/10.48550/arXiv.2308.00963
db/journals/corr/corr2308.html#abs-2308-00963
Pinglan Liu
Wensheng Zhang 0001
Towards Practical Privacy-Preserving Solution for Outsourced Neural Network Inference.
357-362
2022
CLOUD
https://doi.org/10.1109/CLOUD55607.2022.00059
conf/IEEEcloud/2022
db/conf/IEEEcloud/IEEEcloud2022.html#LiuZ22
Chen-Yeou Yu
Wensheng Zhang 0001
Carl K. Chang
Edge-based Situ-aware Reinforcement Learning for Traffic Congestion Mitigation.
1-7
2022
ISC2
https://doi.org/10.1109/ISC255366.2022.9922461
conf/isc2/2022
db/conf/isc2/isc2022.html#YuZC22
Trent Muhr
Wensheng Zhang 0001
Privacy-Preserving Detection of Poisoning Attacks in Federated Learning.
1-10
2022
PST
https://doi.org/10.1109/PST55820.2022.9851993
conf/pst/2022
db/conf/pst/pst2022.html#MuhrZ22
Pinglan Liu
Wensheng Zhang 0001
Towards Practical Privacy-Preserving Solution for Outsourced Neural Network Inference.
2022
abs/2206.02384
CoRR
https://doi.org/10.48550/arXiv.2206.02384
db/journals/corr/corr2206.html#abs-2206-02384
Pinglan Liu
Xiaojuan Ma
Wensheng Zhang 0001
Optimizing Fund Allocation for Game-Based Verifiable Computation Outsourcing.
60-71
2021
CloudComp
https://doi.org/10.1007/978-3-030-99191-3_6
conf/cloudcomp/2021
db/conf/cloudcomp/cloudcomp2021.html#LiuMZ21
Wensheng Zhang 0001
A Practical Oblivious Cloud Storage System based on TEE and Client Gateway.
1-6
2021
PST
https://doi.org/10.1109/PST52912.2021.9647827
conf/pst/2021
db/conf/pst/pst2021.html#Zhang21
Wensheng Zhang 0001
Trent Muhr
TEE-based Selective Testing of Local Workers in Federated Learning Systems.
1-6
2021
PST
https://doi.org/10.1109/PST52912.2021.9647773
conf/pst/2021
db/conf/pst/pst2021.html#ZhangM21
Claudio Agostino Ardagna
Carl K. Chang
Ernesto Daminai
Rajiv Ranjan
Zhongjie Wang
Robert Ward
Jia Zhang 0001
Wensheng Zhang 0001
14th IEEE International Conference on Cloud Computing, CLOUD 2021, Chicago, IL, USA, September 5-10, 2021
CLOUD
IEEE
2021
978-1-6654-0060-2
https://doi.org/10.1109/CLOUD53861.2021
db/conf/IEEEcloud/IEEEcloud2021.html
Pinglan Liu
Xiaojuan Ma
Wensheng Zhang 0001
Optimizing Fund Allocation for Game-based Verifiable Computation Outsourcing.
2021
abs/2103.06440
CoRR
https://arxiv.org/abs/2103.06440
db/journals/corr/corr2103.html#abs-2103-06440
Wensheng Zhang 0001
Trent Muhr
TEE-based Selective Testing of Local Workers in Federated Learning Systems.
2021
abs/2111.02662
CoRR
https://arxiv.org/abs/2111.02662
db/journals/corr/corr2111.html#abs-2111-02662
Pinglan Liu
Wensheng Zhang 0001
Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart Contracts.
1-9
2020
CNS
https://doi.org/10.1109/CNS48642.2020.9162290
conf/cns/2020
db/conf/cns/cns2020.html#LiuZ20
Chen-Yeou Yu
Carl K. Chang
Wensheng Zhang 0001
A Situation Enabled Framework for Energy-Efficient Workload Offloading in 5G Vehicular Edge Computing.
61-68
2020
SERVICES
https://doi.org/10.1109/SERVICES48979.2020.00027
conf/services/2020
db/conf/services/services2020.html#YuCZ20
Qiumao Ma
Wensheng Zhang 0001
Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency.
e5
2019
6
EAI Endorsed Trans. Security Safety
20
https://doi.org/10.4108/eai.29-4-2019.162405
db/journals/sesa/sesa6.html#MaZ19
Qiumao Ma
Wensheng Zhang 0001
Efficient and Accountable Oblivious Cloud Storage with Three Servers.
37-45
2019
CNS
https://doi.org/10.1109/CNS.2019.8802848
conf/cns/2019
db/conf/cns/cns2019.html#Ma019
Pinglan Liu
Wensheng Zhang 0001
A New Game Theoretic Scheme for Verifiable Cloud Computing.
1-8
2018
IPCCC
https://doi.org/10.1109/PCCC.2018.8711141
conf/ipccc/2018
db/conf/ipccc/ipccc2018.html#LiuZ18
Qiumao Ma
Wensheng Zhang 0001
Towards Practical Protection of Data Access Pattern to Cloud Storage.
1-9
2018
MILCOM
https://doi.org/10.1109/MILCOM.2018.8599798
conf/milcom/2018
db/conf/milcom/milcom2018.html#Ma018
Wensheng Zhang 0001
Chuang Wang
LA ^3 : A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices.
277-287
2018
NSS
https://doi.org/10.1007/978-3-030-02744-5_21
conf/nss/2018
db/conf/nss/nss2018.html#ZhangW18
Zi Li
Wensheng Zhang 0001
Daji Qiao
Yang Peng
Lifetime balanced data aggregation for the internet of things.
244-264
2017
58
Comput. Electr. Eng.
https://doi.org/10.1016/j.compeleceng.2016.09.025
db/journals/cee/cee58.html#LiZQP17
Jinsheng Zhang
Qiumao Ma
Wensheng Zhang 0001
Daji Qiao
TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption.
57
2017
9
Future Internet
4
https://doi.org/10.3390/fi9040057
https://www.wikidata.org/entity/Q121328796
db/journals/fi/fi9.html#ZhangMZQ17
Yang Peng
Zi Li
Wensheng Zhang 0001
Daji Qiao
A lifetime-balancing MAC protocol under the end-to-end delay requirement.
51-64
2017
19
J. Commun. Networks
1
https://doi.org/10.1109/JCN.2017.000008
db/journals/jcn/jcn19.html#PengLZQ17
Hua Qin
Yang Peng
Wensheng Zhang 0001
Vehicles on RFID: Error-Cognitive Vehicle Localization in GPS-Less Environments.
9943-9957
2017
66
IEEE Trans. Veh. Technol.
11
https://doi.org/10.1109/TVT.2017.2739123
db/journals/tvt/tvt66.html#QinPZ17
Qiumao Ma
Jinsheng Zhang
Yang Peng
Wensheng Zhang 0001
Daji Qiao
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage.
20-25
2016
CSCloud
https://doi.org/10.1109/CSCloud.2016.24
https://doi.ieeecomputersociety.org/10.1109/CSCloud.2016.24
conf/cscloud/2016
db/conf/cscloud/cscloud2016.html#MaZPZQ16
Yang Peng
Zi Li
Wensheng Zhang 0001
Daji Qiao
Dynamic sensing scheduling to prolong network lifetime under practical requirements.
1-7
2016
ICC
https://doi.org/10.1109/ICC.2016.7511530
conf/icc/2016
db/conf/icc/icc2016.html#PengLZQ16
Jinsheng Zhang
Qiumao Ma
Wensheng Zhang 0001
Daji Qiao
TSKT-ORAM: A two-server k-ary tree ORAM for access pattern protection in cloud storage.
527-532
2016
MILCOM
https://doi.org/10.1109/MILCOM.2016.7795381
conf/milcom/2016
db/conf/milcom/milcom2016.html#ZhangM0Q16
Qiumao Ma
Wensheng Zhang 0001
Jinsheng Zhang
DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern.
415-432
2016
NSS
https://doi.org/10.1007/978-3-319-46298-1_27
conf/nss/2016
db/conf/nss/nss2016.html#MaZZ16
Yang Peng
Wensheng Zhang 0001
Daji Qiao
Charging and Routing Activity Scheduling to Prolong Sensor Network Lifetime.
607-644
2016
Wireless Power Transfer Algorithms, Technologies and Applications in Ad Hoc Communication Networks
https://doi.org/10.1007/978-3-319-46810-5_23
books/sp/NYG2016
db/books/collections/NYG2016.html#Peng0Q16
Jinsheng Zhang
Wensheng Zhang 0001
Daji Qiao
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services.
73
2016
2016
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2016/073
db/journals/iacr/iacr2016.html#Zhang0Q16
Qiumao Ma
Jinsheng Zhang
Wensheng Zhang 0001
Daji Qiao
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage.
256
2016
2016
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2016/256
db/journals/iacr/iacr2016.html#Ma0ZQ16
Jinsheng Zhang
Qiumao Ma
Wensheng Zhang 0001
Daji Qiao
MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption.
882
2016
2016
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2016/882
db/journals/iacr/iacr2016.html#ZhangM0Q16
Jinsheng Zhang
Wensheng Zhang 0001
Daji Qiao
GP-ORAM: A Generalized Partition ORAM.
268-282
2015
NSS
https://doi.org/10.1007/978-3-319-25645-0_18
conf/nss/2015
db/conf/nss/nss2015.html#Zhang0Q15
Jie Tian 0002
Guiling Wang 0001
Tan Yan
Wensheng Zhang 0001
Detect smart intruders in sensor networks by creating network dynamics.
182-196
2014
62
Comput. Networks
https://doi.org/10.1016/j.bjp.2013.11.017
db/journals/cn/cn62.html#TianWYZ14
Jie Tian 0002
Wensheng Zhang 0001
Guiling Wang 0001
Xin Gao
2D k-barrier duty-cycle scheduling for intruder detection in Wireless Sensor Networks.
31-42
2014
43
Comput. Commun.
https://doi.org/10.1016/j.comcom.2014.01.007
db/journals/comcom/comcom43.html#TianZWG14
Hua Qin
Wensheng Zhang 0001
ZigBee-Assisted Power Saving Management for Mobile Devices.
2933-2947
2014
13
IEEE Trans. Mob. Comput.
12
https://doi.org/10.1109/TMC.2013.67
http://doi.ieeecomputersociety.org/10.1109/TMC.2013.67
db/journals/tmc/tmc13.html#Qin014
Tan Yan
Wensheng Zhang 0001
Guiling Wang 0001
Yujun Zhang
Access Points Planning in Urban Area for Data Dissemination to Drivers.
390-402
2014
63
IEEE Trans. Veh. Technol.
1
https://doi.org/10.1109/TVT.2013.2272724
db/journals/tvt/tvt63.html#YanZWZ14
Tan Yan
Wensheng Zhang 0001
Guiling Wang 0001
DOVE: Data Dissemination to a Desired Number of Receivers in VANET.
1903-1916
2014
63
IEEE Trans. Veh. Technol.
4
https://doi.org/10.1109/TVT.2013.2287692
db/journals/tvt/tvt63.html#Yan0W14
Tan Yan
Wensheng Zhang 0001
Guiling Wang 0001
A Grid-Based On-Road Localization System in VANET with Linear Error Propagation.
861-875
2014
13
IEEE Trans. Wirel. Commun.
2
https://doi.org/10.1109/TWC.2013.122313.130547
db/journals/twc/twc13.html#YanZW14
Jinsheng Zhang
Wensheng Zhang 0001
Daji Qiao
S-ORAM: a segmentation-based oblivious RAM.
147-158
2014
AsiaCCS
https://doi.org/10.1145/2590296.2590323
conf/ccs/2014asia
db/conf/ccs/asiaccs2014.html#Zhang0Q14
Keji Hu
Wensheng Zhang 0001
Efficient verification of data encryption on cloud servers.
314-321
2014
PST
https://doi.org/10.1109/PST.2014.6890954
https://doi.ieeecomputersociety.org/10.1109/PST.2014.6890954
conf/pst/2014
db/conf/pst/pst2014.html#HuZ14
Zi Li
Yang Peng
Daji Qiao
Wensheng Zhang 0001
Joint charging and rate allocation for utility maximization in sustainable sensor networks.
459-467
2014
SECON
https://doi.org/10.1109/SAHCN.2014.6990384
conf/secon/2014
db/conf/secon/secon2014.html#LiPQ014
Jinsheng Zhang
Qiumao Ma
Wensheng Zhang 0001
Daji Qiao
KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes.
624
2014
2014
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2014/624
db/journals/iacr/iacr2014.html#ZhangM0Q14
Dong Seong Kim 0001
Sunho Lim
Wensheng Zhang 0001
Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications.
2013
9
Int. J. Distributed Sens. Networks
https://doi.org/10.1155/2013/505313
db/journals/ijdsn/ijdsn9.html#KimLZ13
Hua Qin
Wensheng Zhang 0001
ZigBee-Assisted Power Saving for More Efficient and Sustainable Ad Hoc Networks.
6180-6193
2013
12
IEEE Trans. Wirel. Commun.
12
https://doi.org/10.1109/TW.2013.110813.130035
db/journals/twc/twc12.html#Qin013
Zi Li
Yang Peng
Daji Qiao
Wensheng Zhang 0001
Joint Aggregation and MAC design to prolong sensor network lifetime.
1-10
2013
ICNP
https://doi.org/10.1109/ICNP.2013.6733601
https://doi.ieeecomputersociety.org/10.1109/ICNP.2013.6733601
conf/icnp/2013
db/conf/icnp/icnp2013.html#LiPQZ13
Yang Peng
Zi Li
Daji Qiao
Wensheng Zhang 0001
I2C: A holistic approach to prolong the sensor network lifetime.
2670-2678
2013
INFOCOM
https://doi.org/10.1109/INFCOM.2013.6567075
conf/infocom/2013
db/conf/infocom/infocom2013.html#PengLQZ13
Chuang Wang 0002
Taiming Feng
Jinsook Kim
Guiling Wang 0001
Wensheng Zhang 0001
Catching Packet Droppers and Modifiers in Wireless Sensor Networks.
835-843
2012
23
IEEE Trans. Parallel Distributed Syst.
5
https://doi.org/10.1109/TPDS.2011.117
http://doi.ieeecomputersociety.org/10.1109/TPDS.2011.117
db/journals/tpds/tpds23.html#WangFKWZ12
Zi Li
Yang Peng
Daji Qiao
Wensheng Zhang 0001
LBA: Lifetime balanced data aggregation in low duty cycle sensor networks.
1844-1852
2012
INFOCOM
https://doi.org/10.1109/INFCOM.2012.6195559
conf/infocom/2012
db/conf/infocom/infocom2012.html#LiPQZ12
Hua Qin
Wensheng Zhang 0001
ZigBee-assisted Power Saving Management for mobile devices.
93-101
2012
MASS
https://doi.org/10.1109/MASS.2012.6502506
https://doi.ieeecomputersociety.org/10.1109/MASS.2012.6502506
conf/mass/2012
db/conf/mass/mass2012.html#Qin012
Tan Yan
Wensheng Zhang 0001
Guiling Wang 0001
DOVE: Data dissemination to a fixed number of receivers in VANET.
272-280
2012
SECON
https://doi.org/10.1109/SECON.2012.6275787
conf/secon/2012
db/conf/secon/secon2012.html#Yan0W12
Yang Peng
Zi Li
Wensheng Zhang 0001
Daji Qiao
LB-MAC: A Lifetime-Balanced MAC Protocol for Sensor Networks.
272-291
2012
WASA
https://doi.org/10.1007/978-3-642-31869-6_23
conf/wasa/2012
db/conf/wasa/wasa2012.html#PengLZQ12
Jie Tian 0002
Guiling Wang 0001
Tan Yan
Wensheng Zhang 0001
A Distributed Scheme for Securing Middle-Tier Multicast in Hierarchical Sensor Networks.
245-264
2011
11
Ad Hoc Sens. Wirel. Networks
3-4
http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-11-number-3-4-2011/ahswn-11-3-4-p-245-264/
db/journals/ahswn/ahswn11.html#TianWTZ11
Guiling Wang 0001
Mary Jane Irwin
Haoying Fu
Piotr Berman
Wensheng Zhang 0001
Tom La Porta
Optimizing sensor movement planning for energy efficiency.
33:1-33:17
2011
7
ACM Trans. Sens. Networks
4
https://doi.org/10.1145/1921621.1921627
db/journals/tosn/tosn7.html#WangIFBZP11
Bin Tong
Guiling Wang 0001
Wensheng Zhang 0001
Chuang Wang 0002
Node Reclamation and Replacement for Long-Lived Sensor Networks.
1550-1563
2011
22
IEEE Trans. Parallel Distributed Syst.
9
https://doi.org/10.1109/TPDS.2011.25
http://doi.ieeecomputersociety.org/10.1109/TPDS.2011.25
db/journals/tpds/tpds22.html#TongWZW11
Ka Yang
Jinsheng Zhang
Wensheng Zhang 0001
Daji Qiao
A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds.
528-547
2011
ESORICS
https://doi.org/10.1007/978-3-642-23822-2_29
conf/esorics/2011
db/conf/esorics/esorics2011.html#YangZZQ11
Zi Li
Yang Peng
Wensheng Zhang 0001
Daji Qiao
J-RoC: A Joint Routing and Charging scheme to prolong sensor network lifetime.
373-382
2011
ICNP
https://doi.org/10.1109/ICNP.2011.6089076
https://doi.ieeecomputersociety.org/10.1109/ICNP.2011.6089076
conf/icnp/2011
db/conf/icnp/icnp2011.html#LiPZQ11
Chuang Wang 0002
Guiling Wang 0001
Wensheng Zhang 0001
Taiming Feng
Reconciling privacy preservation and intrusion detection in sensory data aggregation.
336-340
2011
INFOCOM
https://doi.org/10.1109/INFCOM.2011.5935177
conf/infocom/2011
db/conf/infocom/infocom2011.html#WangWZF11
Yang Peng
Zi Li
Daji Qiao
Wensheng Zhang 0001
Delay-bounded MAC with minimal idle listening for sensor networks.
1314-1322
2011
INFOCOM
https://doi.org/10.1109/INFCOM.2011.5934914
conf/infocom/2011
db/conf/infocom/infocom2011.html#PengLQZ11
Tan Yan
Wensheng Zhang 0001
Guiling Wang 0001
Yujun Zhang
GOT: Grid-Based On-Road Localization through Inter-Vehicle Collaboration.
13-18
2011
MASS
https://doi.org/10.1109/MASS.2011.13
https://doi.ieeecomputersociety.org/10.1109/MASS.2011.13
conf/mass/2011
db/conf/mass/mass2011.html#YanZWZ11
Hua Qin
Xuejia Lu
Yanfei Wang
Guiling Wang 0001
Wensheng Zhang 0001
Yaying Zhang
Heterogeneity-Aware Design for Automatic Detection of Problematic Road Conditions.
252-261
2011
MASS
https://doi.org/10.1109/MASS.2011.32
https://doi.ieeecomputersociety.org/10.1109/MASS.2011.32
conf/mass/2011
db/conf/mass/mass2011.html#QinLWWZZ11
Hua Qin
Wensheng Zhang 0001
Charging scheduling with minimal waiting in a network of electric vehicles and charging stations.
51-60
2011
Vehicular Ad Hoc Networks
https://doi.org/10.1145/2030698.2030706
conf/mobicom/2011vanet
db/conf/mobicom/vanet2011.html#QinZ11
Hua Qin
Yanfei Wang
Wensheng Zhang 0001
ZigBee-Assisted WiFi Transmission for Multi-interface Mobile Devices.
248-259
2011
MobiQuitous
https://doi.org/10.1007/978-3-642-30973-1_26
http://eudl.eu/doi/10.1007/978-3-642-30973-1_26
conf/mobiquitous/2011
db/conf/mobiquitous/mobiquitous2011.html#QinWZ11
Wensheng Zhang 0001
False Data Injection Defense.
448-450
2011
Encyclopedia of Cryptography and Security (2nd Ed.)
https://doi.org/10.1007/978-1-4419-5906-5_630
reference/crypt/2011
db/reference/crypt/crypt2011.html#Zhang11
Wensheng Zhang 0001
Secure Data Aggregation.
1104-1105
2011
Encyclopedia of Cryptography and Security (2nd Ed.)
https://doi.org/10.1007/978-1-4419-5906-5_639
reference/crypt/2011
db/reference/crypt/crypt2011.html#Zhang11a
Wensheng Zhang 0001
Source Location Privacy.
1230-1231
2011
Encyclopedia of Cryptography and Security (2nd Ed.)
https://doi.org/10.1007/978-1-4419-5906-5_645
reference/crypt/2011
db/reference/crypt/crypt2011.html#Zhang11b
Bin Tong
Santosh Panchapakesan
Wensheng Zhang 0001
A three-tier framework for intruder information sharing in sensor networks.
345-360
2010
8
Ad Hoc Networks
3
https://doi.org/10.1016/j.adhoc.2009.10.001
db/journals/adhoc/adhoc8.html#TongPZ10
Renita Machado
Sirin Tekinay
Wensheng Zhang 0001
Guiling Wang 0001
Diffusion-based approach to deploying wireless sensor networks.
222-232
2010
8
Int. J. Sens. Networks
3/4
https://doi.org/10.1504/IJSNET.2010.036197
db/journals/ijsnet/ijsnet8.html#MachadoTZW10
Taiming Feng
Lu Ruan 0001
Wensheng Zhang 0001
Intelligent p-Cycle Protection for Dynamic Multicast Sessions in WDM Networks.
389-399
2010
2
JOCN
7
https://doi.org/10.1364/jocn.2.000389
db/journals/jocnet/jocnet2.html#Feng0010
Renita Machado
Wensheng Zhang 0001
Guiling Wang 0001
Sirin Tekinay
Coverage properties of clustered wireless sensor networks.
2010
7
ACM Trans. Sens. Networks
2
https://doi.org/10.1145/1824766.1824769
db/journals/tosn/tosn7.html#MachadoZWT10
13:1-13:21
Bin Tong
Zi Li
Guiling Wang 0001
Wensheng Zhang 0001
How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing.
438-447
2010
ICDCS
https://doi.org/10.1109/ICDCS.2010.61
https://doi.ieeecomputersociety.org/10.1109/ICDCS.2010.61
conf/icdcs/2010
db/conf/icdcs/icdcs2010.html#TongLWZ10
Bin Tong
Zi Li
Guiling Wang 0001
Wensheng Zhang 0001
Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks.
1891-1899
2010
INFOCOM
https://doi.org/10.1109/INFCOM.2010.5462010
conf/infocom/2010
db/conf/infocom/infocom2010.html#TongLWZ10
Hua Qin
Zi Li
Yanfei Wang
Xuejia Lu
Wensheng Zhang 0001
Guiling Wang 0001
An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments.
79-87
2010
PerCom
https://doi.org/10.1109/PERCOM.2010.5466988
https://doi.ieeecomputersociety.org/10.1109/PERCOM.2010.5466988
conf/percom/2010
db/conf/percom/percom2010.html#QinLWLZW10
Ka Yang
Daji Qiao
Wensheng Zhang 0001
Sensor-Aided Navigation in GPS-Denied Environments.
345-361
2010
QSHINE
https://doi.org/10.1007/978-3-642-29222-4_25
http://eudl.eu/doi/10.1007/978-3-642-29222-4_25
conf/qshine/2010
db/conf/qshine/qshine2010.html#YangQZ10
Yang Peng
Zi Li
Wensheng Zhang 0001
Daji Qiao
Prolonging Sensor Network Lifetime Through Wireless Charging.
129-139
2010
RTSS
https://doi.org/10.1109/RTSS.2010.35
https://doi.ieeecomputersociety.org/10.1109/RTSS.2010.35
conf/rtss/2010
db/conf/rtss/rtss2010.html#PengLZQ10
Zi Li
Yang Peng
Wensheng Zhang 0001
Daji Qiao
Study of Joint Routing and Wireless Charging Strategies in Sensor Networks.
125-135
2010
WASA
https://doi.org/10.1007/978-3-642-14654-1_17
conf/wasa/2010
db/conf/wasa/wasa2010.html#LiPZQ10
Wensheng Zhang 0001
Sencun Zhu
Guohong Cao
Predistribution and local collaboration-based group rekeying for wireless sensor networks.
1229-1242
2009
7
Ad Hoc Networks
6
https://doi.org/10.1016/j.adhoc.2008.11.004
db/journals/adhoc/adhoc7.html#ZhangZC09
Wensheng Zhang 0001
Sencun Zhu
Guohong Cao
Editorial for special issue on privacy and security in wireless sensorand ad hoc networks.
1431-1433
2009
7
Ad Hoc Networks
8
https://doi.org/10.1016/j.adhoc.2009.05.001
db/journals/adhoc/adhoc7.html#ZhangZC09a
Min Shao
Sencun Zhu
Wensheng Zhang 0001
Guohong Cao
Yi Yang 0002
pDCS: Security and Privacy Support for Data-Centric Sensor Networks.
1023-1038
2009
8
IEEE Trans. Mob. Comput.
8
https://doi.org/10.1109/TMC.2008.168
http://doi.ieeecomputersociety.org/10.1109/TMC.2008.168
db/journals/tmc/tmc8.html#ShaoZZCY09
Jie Tian 0002
Guiling Wang 0001
Tan Yan
Wensheng Zhang 0001
A Power-Efficient Scheme for Securing Multicast in Hierarchical Sensor Networks.
1-6
2009
ICCCN
https://doi.org/10.1109/ICCCN.2009.5235220
https://doi.ieeecomputersociety.org/10.1109/ICCCN.2009.5235220
conf/icccn/2009
db/conf/icccn/icccn2009.html#TianWY009
Renita Machado
Wensheng Zhang 0001
Guiling Wang 0001
Network Planning for Heterogeneous Wireless Sensor Networks in Environmental Survivability.
814-821
2009
ICTAI
https://doi.org/10.1109/ICTAI.2009.115
https://doi.ieeecomputersociety.org/10.1109/ICTAI.2009.115
conf/ictai/2009
db/conf/ictai/ictai2009.html#MachadoZW09
Nalin Subramanian
Ka Yang
Wensheng Zhang 0001
Daji Qiao
ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query.
936-944
2009
INFOCOM
https://doi.org/10.1109/INFCOM.2009.5062004
conf/infocom/2009
db/conf/infocom/infocom2009.html#SubramanianYZQ09
Ka Yang
Nalin Subramanian
Daji Qiao
Wensheng Zhang 0001
EagleVision: A pervasive mobile device protection system.
1-10
2009
MobiQuitous
https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6855
https://ieeexplore.ieee.org/document/5326390/
conf/mobiquitous/2009
db/conf/mobiquitous/mobiquitous2009.html#YangSQ009
Bin Tong
Zi Li
Guiling Wang 0001
Wensheng Zhang 0001
On-Demand Node Reclamation and Replacement for Guaranteed Area Coverage in Long-Lived Sensor Networks.
148-166
2009
QSHINE
https://doi.org/10.1007/978-3-642-10625-5_10
http://eudl.eu/doi/10.1007/978-3-642-10625-5_10
conf/qshine/2009
db/conf/qshine/qshine2009.html#TongLWZ09
Bin Tong
Guiling Wang 0001
Wensheng Zhang 0001
Chuang Wang 0002
Node Reclamation and Replacement for Long-lived Sensor Networks.
1-9
2009
SECON
https://doi.org/10.1109/SAHCN.2009.5168950
conf/secon/2009
db/conf/secon/secon2009.html#TongWZW09
Chuang Wang 0002
Taiming Feng
Jinsook Kim
Guiling Wang 0001
Wensheng Zhang 0001
Catching Packet Droppers and Modifiers in Wireless Sensor Networks.
1-9
2009
SECON
https://doi.org/10.1109/SAHCN.2009.5168914
conf/secon/2009
db/conf/secon/secon2009.html#WangFKWZ09
Wensheng Zhang 0001
Guohong Cao
Defending against cache consistency attacks in wireless ad hoc networks.
363-379
2008
6
Ad Hoc Networks
3
https://doi.org/10.1016/j.adhoc.2007.02.005
db/journals/adhoc/adhoc6.html#ZhangC08
Hui Song
Sencun Zhu
Wensheng Zhang 0001
Guohong Cao
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks.
2008
4
ACM Trans. Sens. Networks
4
https://doi.org/10.1145/1387663.1387669
db/journals/tosn/tosn4.html#SongZZC08
23:1-23:34
Taiming Feng
Lu Ruan 0001
Wensheng Zhang 0001
Intelligent p-Cycle Protection for Multicast Sessions in WDM Networks.
5165-5169
2008
ICC
https://doi.org/10.1109/ICC.2008.970
conf/icc/2008
db/conf/icc/icc2008.html#FengRZ08
Taiming Feng
Chuang Wang 0002
Wensheng Zhang 0001
Lu Ruan 0001
Confidentiality Protection for Distributed Sensor Data Aggregation.
56-60
2008
INFOCOM
https://doi.org/10.1109/INFOCOM.2008.20
conf/infocom/2008
db/conf/infocom/infocom2008.html#FengWZR08
Wensheng Zhang 0001
Nalin Subramanian
Guiling Wang 0001
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks.
1418-1426
2008
INFOCOM
https://doi.org/10.1109/INFOCOM.2008.200
conf/infocom/2008
db/conf/infocom/infocom2008.html#ZhangSW08
Guanqun Yang
Bin Tong
Daji Qiao
Wensheng Zhang 0001
Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks.
2216-2224
2008
INFOCOM
https://doi.org/10.1109/INFOCOM.2008.289
conf/infocom/2008
db/conf/infocom/infocom2008.html#YangTQZ08
Wensheng Zhang 0001
Chuang Wang 0002
Taiming Feng
GP^2S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data (concise contribution).
179-184
2008
PerCom
https://doi.org/10.1109/PERCOM.2008.60
https://doi.ieeecomputersociety.org/10.1109/PERCOM.2008.60
conf/percom/2008
db/conf/percom/percom2008.html#ZhangWF08
Bin Tong
Santosh Panchapakesan
Wensheng Zhang 0001
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks.
451-459
2008
SECON
https://doi.org/10.1109/SAHCN.2008.61
conf/secon/2008
db/conf/secon/secon2008.html#TongPZ08
Xia Wang
Johnny Wong
Wensheng Zhang 0001
A heterogeneity-aware framework for group key management in wireless mesh networks.
32
2008
SecureComm
https://doi.org/10.1145/1460877.1460918
http://eudl.eu/doi/10.1145/1460877.1460918
conf/securecomm/2008
db/conf/securecomm/securecomm2008.html#WangW008
Youssef Hanna
Hridesh Rajan
Wensheng Zhang 0001
Slede: a domain-specific verification framework for sensor network security protocol implementations.
109-118
2008
WISEC
https://doi.org/10.1145/1352533.1352551
conf/wisec/2008
db/conf/wisec/wisec2008.html#HannaRZ08
Nalin Subramanian
Chanjun Yang
Wensheng Zhang 0001
Securing distributed data storage and retrieval in sensor networks.
659-676
2007
3
Pervasive Mob. Comput.
6
https://doi.org/10.1016/j.pmcj.2007.06.002
db/journals/percom/percom3.html#SubramanianYZ07
Wensheng Zhang 0001
Guohong Cao
Tom La Porta
Data Dissemination with Ring-Based Index for Wireless Sensor Networks.
832-847
2007
6
IEEE Trans. Mob. Comput.
7
https://doi.org/10.1109/TMC.2007.1019
http://doi.ieeecomputersociety.org/10.1109/TMC.2007.1019
db/journals/tmc/tmc6.html#ZhangCP07
Wensheng Zhang 0001
Guohong Cao
Tom La Porta
Dynamic proxy tree-based data dissemination schemes for wireless sensor networks.
583-595
2007
13
Wirel. Networks
5
https://doi.org/10.1007/s11276-006-6254-6
db/journals/winet/winet13.html#ZhangCP07
Natalia Stakhanova
Samik Basu 0001
Wensheng Zhang 0001
Xia Wang
Johnny Wong
Specification Synthesis for Monitoring and Analysis of MANET Protocols.
183-187
2007
conf/aina/2007w1
AINA Workshops (1)
https://doi.org/10.1109/AINAW.2007.342
https://doi.ieeecomputersociety.org/10.1109/AINAW.2007.342
db/conf/aina/ainaw2007-1.html#StakhanovaBZWW07
Min Shao
Sencun Zhu
Wensheng Zhang 0001
Guohong Cao
pDCS: Security and Privacy Support for Data-Centric Sensor Networks.
1298-1306
2007
conf/infocom/2007
INFOCOM
https://doi.org/10.1109/INFCOM.2007.154
db/conf/infocom/infocom2007.html#ShaoZZC07
Wensheng Zhang 0001
Minh Tran
Sencun Zhu
Guohong Cao
A random perturbation-based scheme for pairwise key establishment in sensor networks.
90-99
2007
MobiHoc
https://doi.org/10.1145/1288107.1288120
conf/mobihoc/2007
db/conf/mobihoc/mobihoc2007.html#ZhangTZC07
Nalin Subramanian
Chanjun Yang
Wensheng Zhang 0001
Securing Distributed Data Storage and Retrieval in Sensor Networks.
191-200
2007
conf/percom/2007
PerCom
https://doi.org/10.1109/PERCOM.2007.29
https://doi.ieeecomputersociety.org/10.1109/PERCOM.2007.29
db/conf/percom/percom2007.html#SubramanianYZ07
Jianming Zhou
Wensheng Zhang 0001
Daji Qiao
Protecting storage location privacy in sensor networks.
22
2007
QSHINE
https://doi.org/10.1145/1577222.1577253
http://eudl.eu/doi/10.1145/1577222.1577253
conf/qshine/2007
db/conf/qshine/qshine2007.html#Zhou0Q07
Qiu Li
Xuexi Chen
Hongbo Zhang
Junhai Gao
Wensheng Zhang 0001
Changao Shi
A 3D Integral Data Model for Subsurface Entities Based on Extended GTP.
1519-1522
2006
IGARSS
https://doi.org/10.1109/IGARSS.2006.392
conf/igarss/2006
db/conf/igarss/igarss2006.html#LiCZGZS06
Chanjun Yang
Jianming Zhou
Wensheng Zhang 0001
Johnny Wong
Pairwise key establishment for large-scale sensor networks: from identifier-based to location-based.
27
2006
Infoscale
https://doi.org/10.1145/1146847.1146874
http://eudl.eu/doi/10.1145/1146847.1146874
conf/infoscale/2006
db/conf/infoscale/infoscale2006.html#YangZZW06
Scott C.-H. Huang
Hao Zhu 0007
Wensheng Zhang 0001
SAP: seamless authentication protocol for vertical handoff in heterogeneous wireless networks.
32
2006
QSHINE
https://doi.org/10.1145/1185373.1185415
http://eudl.eu/doi/10.1145/1185373.1185415
conf/qshine/2006
db/conf/qshine/qshine2006.html#HuangZ006
Wensheng Zhang 0001
Guohong Cao
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach.
503-514
2005
conf/infocom/2005
INFOCOM
https://doi.org/10.1109/INFCOM.2005.1497918
db/conf/infocom/infocom2005.html#ZhangC05
Guiling Wang 0001
Guohong Cao
Thomas F. La Porta
Wensheng Zhang 0001
Sensor relocation in mobile sensor networks.
2302-2312
2005
conf/infocom/2005
INFOCOM
https://doi.org/10.1109/INFCOM.2005.1498517
db/conf/infocom/infocom2005.html#WangCPZ05
Wensheng Zhang 0001
Hui Song
Sencun Zhu
Guohong Cao
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks.
378-389
2005
conf/mobihoc/2005
MobiHoc
https://doi.org/10.1145/1062689.1062737
db/conf/mobihoc/mobihoc2005.html#ZhangSZC05
Wensheng Zhang 0001
Guohong Cao
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks.
22-32
2005
conf/mobiquitous/2005
MobiQuitous
https://doi.org/10.1109/MOBIQUITOUS.2005.23
https://doi.ieeecomputersociety.org/10.1109/MOBIQUITOUS.2005.23
http://eudl.eu/doi/10.1109/MOBIQUITOUS.2005.23
db/conf/mobiquitous/mobiquitous2005.html#ZhangC05
Guohong Cao
Guiling Wang 0001
Tom La Porta
Shashi Phoha
Wensheng Zhang 0001
Distributed Algorithms for Deploying Mobile Sensors.
427-440
2005
Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks
https://doi.org/10.1201/9780203323687.ch26
books/tf/05/W2005
db/books/collections/W2005.html#CaoWPP005
Wensheng Zhang 0001
Guohong Cao
DCTC: dynamic convoy tree-based collaboration for target tracking in sensor networks.
1689-1701
2004
3
IEEE Trans. Wirel. Commun.
5
https://doi.org/10.1109/TWC.2004.833443
db/journals/twc/twc3.html#ZhangC04
Wensheng Zhang 0001
Guohong Cao
Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks.
2004
conf/infocom/2004
INFOCOM
https://doi.org/10.1109/INFCOM.2004.1354665
db/conf/infocom/infocom2004.html#ZhangC04
2434-2445
Wensheng Zhang 0001
Guohong Cao
Tom La Porta
Dynamic proxy tree-based data dissemination schemes for wireless sensor networks.
21-30
2004
MASS
https://doi.org/10.1109/MAHSS.2004.1392064
https://doi.ieeecomputersociety.org/10.1109/MAHSS.2004.1392064
conf/mass/2004
db/conf/mass/mass2004.html#0001CP04
Wensheng Zhang 0001
Guohong Cao
Optimizing tree reconfiguration to track mobile targets in sensor networks.
39-40
2003
7
ACM SIGMOBILE Mob. Comput. Commun. Rev.
3
https://doi.org/10.1145/961268.961282
db/journals/sigmobile/sigmobile7.html#ZhangC03
Wensheng Zhang 0001
Guohong Cao
Thomas F. La Porta
Data Dissemination with Ring-Based Index for Wireless Sensor Networks.
305-314
2003
conf/icnp/2003
ICNP
https://doi.org/10.1109/ICNP.2003.1249780
https://doi.ieeecomputersociety.org/10.1109/ICNP.2003.1249780
db/conf/icnp/icnp2003.html#ZhangCP03
Wensheng Zhang 0001
Hao Zhu 0007
Guohong Cao
Improving Bluetooth network performance through a time-slot leasing approach.
592-596
2002
WCNC
https://doi.org/10.1109/WCNC.2002.993334
conf/wcnc/2002
db/conf/wcnc/wcnc2002.html#0001ZC02
Claudio A. ArdagnaClaudio Agostino Ardagna
Samik Basu 0001
Piotr Berman
Kumar Bhaskaran
Hongyi Bian
Guohong Cao
Carl K. Chang
Rong Chang 0001Rong N. Chang
Xuexi Chen
Ernesto Daminai
Taiming Feng
Haoying Fu
Junhai Gao
Xin Gao
Youssef Hanna
Keji Hu
Scott C.-H. Huang
Mary Jane Irwin
Dong Seong Kim 0001
Jinsook Kim
Qiu Li
Zi Li
Sunho Lim
Pinglan Liu
Xuejia Lu
Qiumao Ma
Xiaojuan Ma
Renita Machado
Trent Muhr
Santosh Panchapakesan
Yang Peng
Shashi Phoha
Thomas La PortaThomas F. La PortaTom La Porta
Daji Qiao
Hua Qin
Hridesh Rajan
Rajiv Ranjan
Lu Ruan 0001
Min Shao
Changao Shi
Hui Song
Natalia Stakhanova
Nalin Subramanian
Sirin Tekinay
Jie Tian 0002
Bin Tong
Minh Tran
Chuang Wang
Chuang Wang 0002
Grace Guiling WangGuiling Wang 0001
Xia Wang
Yanfei Wang
Zhongjie Wang
Robert Ward
Johnny S. WongJohnny Wong
Tan Yan
Chanjun Yang
Guanqun Yang
Ka Yang
Yi Yang 0002
Chen-Yeou Yu
Hongbo Zhang
Jia Zhang 0001
Jinsheng Zhang
Yaying Zhang
Yujun Zhang
Jianming Zhou
Hao Zhu 0007
Sencun Zhu