Wensheng Zhang

Affiliations:
  • Iowa State University, Department of Computer Science, USA


According to our database1, Wensheng Zhang authored at least 107 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Situ-Oracle: A Learning-Based Situation Analysis Servicing Framework for BIoT Systems.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023

Distributed and Intelligent API Mediation Service for Enterprise-Grade Hybrid-Multicloud Computing.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023

Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud.
Proceedings of the 16th IEEE International Conference on Cloud Computing, 2023

2022
Privacy-Preserving Detection of Poisoning Attacks in Federated Learning.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Edge-based Situ-aware Reinforcement Learning for Traffic Congestion Mitigation.
Proceedings of the IEEE International Smart Cities Conference, 2022

Towards Practical Privacy-Preserving Solution for Outsourced Neural Network Inference.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022

2021
TEE-based Selective Testing of Local Workers in Federated Learning Systems.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

A Practical Oblivious Cloud Storage System based on TEE and Client Gateway.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Optimizing Fund Allocation for Game-Based Verifiable Computation Outsourcing.
Proceedings of the Cloud Computing - 11th EAI International Conference, 2021

2020
A Situation Enabled Framework for Energy-Efficient Workload Offloading in 5G Vehicular Edge Computing.
Proceedings of the 2020 IEEE World Congress on Services, 2020

Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart Contracts.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency.
EAI Endorsed Trans. Security Safety, 2019

Efficient and Accountable Oblivious Cloud Storage with Three Servers.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
LA ^3 : A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices.
Proceedings of the Network and System Security - 12th International Conference, 2018

Towards Practical Protection of Data Access Pattern to Cloud Storage.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

A New Game Theoretic Scheme for Verifiable Cloud Computing.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
Vehicles on RFID: Error-Cognitive Vehicle Localization in GPS-Less Environments.
IEEE Trans. Veh. Technol., 2017

A lifetime-balancing MAC protocol under the end-to-end delay requirement.
J. Commun. Networks, 2017

TSKT-ORAM: A Two-Server <i>k</i>-ary Tree Oblivious RAM without Homomorphic Encryption.
Future Internet, 2017

Lifetime balanced data aggregation for the internet of things.
Comput. Electr. Eng., 2017

2016
MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2016

MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services.
IACR Cryptol. ePrint Arch., 2016

SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage.
IACR Cryptol. ePrint Arch., 2016

DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern.
Proceedings of the Network and System Security - 10th International Conference, 2016

TSKT-ORAM: A two-server k-ary tree ORAM for access pattern protection in cloud storage.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Dynamic sensing scheduling to prolong network lifetime under practical requirements.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Charging and Routing Activity Scheduling to Prolong Sensor Network Lifetime.
Proceedings of the Wireless Power Transfer Algorithms, 2016

2015
GP-ORAM: A Generalized Partition ORAM.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
A Grid-Based On-Road Localization System in VANET with Linear Error Propagation.
IEEE Trans. Wirel. Commun., 2014

Access Points Planning in Urban Area for Data Dissemination to Drivers.
IEEE Trans. Veh. Technol., 2014

DOVE: Data Dissemination to a Desired Number of Receivers in VANET.
IEEE Trans. Veh. Technol., 2014

ZigBee-Assisted Power Saving Management for Mobile Devices.
IEEE Trans. Mob. Comput., 2014

KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes.
IACR Cryptol. ePrint Arch., 2014

2D k-barrier duty-cycle scheduling for intruder detection in Wireless Sensor Networks.
Comput. Commun., 2014

Detect smart intruders in sensor networks by creating network dynamics.
Comput. Networks, 2014

Joint charging and rate allocation for utility maximization in sustainable sensor networks.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Efficient verification of data encryption on cloud servers.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

S-ORAM: a segmentation-based oblivious RAM.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
ZigBee-Assisted Power Saving for More Efficient and Sustainable Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2013

Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications.
Int. J. Distributed Sens. Networks, 2013

I<sup>2</sup>C: A holistic approach to prolong the sensor network lifetime.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Joint Aggregation and MAC design to prolong sensor network lifetime.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

2012
Catching Packet Droppers and Modifiers in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

LB-MAC: A Lifetime-Balanced MAC Protocol for Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

DOVE: Data dissemination to a fixed number of receivers in VANET.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

LBA: Lifetime balanced data aggregation in low duty cycle sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Source Location Privacy.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Data Aggregation.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

False Data Injection Defense.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Node Reclamation and Replacement for Long-Lived Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2011

Optimizing sensor movement planning for energy efficiency.
ACM Trans. Sens. Networks, 2011

A Distributed Scheme for Securing Middle-Tier Multicast in Hierarchical Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

ZigBee-Assisted WiFi Transmission for Multi-interface Mobile Devices.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2011

Charging scheduling with minimal waiting in a network of electric vehicles and charging stations.
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011

GOT: Grid-Based On-Road Localization through Inter-Vehicle Collaboration.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Heterogeneity-Aware Design for Automatic Detection of Problematic Road Conditions.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Reconciling privacy preservation and intrusion detection in sensory data aggregation.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Delay-bounded MAC with minimal idle listening for sensor networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

J-RoC: A Joint Routing and Charging scheme to prolong sensor network lifetime.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
Coverage properties of clustered wireless sensor networks.
ACM Trans. Sens. Networks, 2010

Intelligent p-Cycle Protection for Dynamic Multicast Sessions in WDM Networks.
JOCN, 2010

Diffusion-based approach to deploying wireless sensor networks.
Int. J. Sens. Networks, 2010

A three-tier framework for intruder information sharing in sensor networks.
Ad Hoc Networks, 2010

Study of Joint Routing and Wireless Charging Strategies in Sensor Networks.
Proceedings of the Wireless Algorithms, 2010

Prolonging Sensor Network Lifetime Through Wireless Charging.
Proceedings of the 31st IEEE Real-Time Systems Symposium, 2010

Sensor-Aided Navigation in GPS-Denied Environments.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

2009
pDCS: Security and Privacy Support for Data-Centric Sensor Networks.
IEEE Trans. Mob. Comput., 2009

Editorial for special issue on privacy and security in wireless sensorand ad hoc networks.
Ad Hoc Networks, 2009

Predistribution and local collaboration-based group rekeying for wireless sensor networks.
Ad Hoc Networks, 2009

On-Demand Node Reclamation and Replacement for Guaranteed Area Coverage in Long-Lived Sensor Networks.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

EagleVision: A pervasive mobile device protection system.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Network Planning for Heterogeneous Wireless Sensor Networks in Environmental Survivability.
Proceedings of the ICTAI 2009, 2009

A Power-Efficient Scheme for Securing Multicast in Hierarchical Sensor Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks.
ACM Trans. Sens. Networks, 2008

Defending against cache consistency attacks in wireless ad hoc networks.
Ad Hoc Networks, 2008

Slede: a domain-specific verification framework for sensor network security protocol implementations.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

A heterogeneity-aware framework for group key management in wireless mesh networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

GP^2S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data (concise contribution).
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Lightweight and Compromise-Resilient Message Authentication in Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Confidentiality Protection for Distributed Sensor Data Aggregation.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Intelligent p-Cycle Protection for Multicast Sessions in WDM Networks.
Proceedings of IEEE International Conference on Communications, 2008

2007
Dynamic proxy tree-based data dissemination schemes for wireless sensor networks.
Wirel. Networks, 2007

Data Dissemination with Ring-Based Index for Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2007

Securing distributed data storage and retrieval in sensor networks.
Pervasive Mob. Comput., 2007

Protecting storage location privacy in sensor networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

A random perturbation-based scheme for pairwise key establishment in sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

pDCS: Security and Privacy Support for Data-Centric Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Specification Synthesis for Monitoring and Analysis of MANET Protocols.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
SAP: seamless authentication protocol for vertical handoff in heterogeneous wireless networks.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Pairwise key establishment for large-scale sensor networks: from identifier-based to location-based.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

A 3D Integral Data Model for Subsurface Entities Based on Extended GTP.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006

2005
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Sensor relocation in mobile sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Distributed Algorithms for Deploying Mobile Sensors.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
DCTC: dynamic convoy tree-based collaboration for target tracking in sensor networks.
IEEE Trans. Wirel. Commun., 2004

Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

2003
Optimizing tree reconfiguration to track mobile targets in sensor networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

2002
Improving Bluetooth network performance through a time-slot leasing approach.
Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record, 2002


  Loading...