Jun Zhao (Postdoctoral Researcher)

PhD (graduated in 2015), Carnegie Mellon University
junzhao @. alumni.cmu.edu

Publications:
  •  Journal Articles:
    • Submitted:
[1] J. Zhao, J. Zhang, and V. Poor. “Dependent differential privacy,”
submitted to IEEE Transactions on Information Theory.

[2] J. Zhao, O. Yagan, and V. Gligor. “On asymptotically exact probability of k-connectivity in random
key graphs intersecting Erdos–Rényi graphs,”
submitted to IEEE Transactions on Information Theory.
    • Published/Accepted:
[3] J. Zhao and J. Zhang. “Preserving privacy enables ‘co-existence equilibrium’ of
competitive diffusion in social networks,”
IEEE Transactions on Signal and Information Processing over Networks, 2017.
https://doi.org/10.1109/TSIPN.2017.2697819

[4] J. Zhao. “On resilience and connectivity of secure wireless sensor networks under node capture
attacks,”
IEEE Transactions on Information Forensics and Security, 2017.
https://doi.org/10.1109/TIFS.2016.2613841

[5] J. Zhao, O. Yagan, and V. Gligor. “k-Connectivity in random key graphs with unreliable links,”
IEEE Transactions on Information Theory, 2015. 
https://doi.org/10.1109/TIT.2015.2425395

[6] J. Zhao, O. Yagan, and V. Gligor. “On connectivity and robustness in random intersection
graphs,” IEEE Transactions on Automatic Control, 2016. 
https://doi.org/10.1109/TAC.2016.2601564

[7] J. Zhao. “Topological properties of secure wireless sensor networks under the q-composite key
predistribution scheme with unreliable links,”
IEEE/ACM Transactions on Networking, 2017. 
https://doi.org/10.1109/TNET.2017.2653109

[8] J. Zhao. “Analyzing resilience of interest-based social networks against node and link failures,”
IEEE Transactions on Signal and Information Processing over Networks, 2017.
https://doi.org/10.1109/TSIPN.2017.2697827

[9] J. Zhao. “Analyzing connectivity of heterogeneous secure sensor networks,”
IEEE Transactions on Control of Network Systems, 2016. 
https://doi.org/10.1109/TCNS.2016.2641799

[10] J. Zhao. “Transitional behavior of q-composite random key graphs with applications to networked control,”
IEEE Transactions on Control of Network Systems, 2017 (to appear).

[11] F. Yavuz, J. Zhao, O. Yagan, and V. Gligor. “Towards k-connectivity of the random graph induced
by a pairwise key predistribution scheme with unreliable links,”
IEEE Transactions on Information Theory, 2015. 
https://doi.org/10.1109/TIT.2015.2471295

[12] F. Yavuz, J. Zhao, O. Yagan, and V. Gligor. “k-Connectivity in random K-out graphs intersecting
Erdos–Rényi graphs,”
IEEE Transactions on Information Theory, 2016. 
https://doi.org/10.1109/TIT.2016.2634422

[13] X. Liu, K. Zheng, J. Zhao, X. Liu, X. Wang, X Di. “Information-centric networks with correlated
mobility,”
IEEE Transactions on Vehicular Technology, 2017. 
https://doi.org/10.1109/TVT.2016.2602373

[14] S. Ma, G. Chen, L. Fu, W. Wu, X. Tian, J. Zhao, X. Wang. “Seeking powerful information initial
spreaders in online social networks: A dense group perspective,”
Wireless Networks (Springer), 2017. 
http://doi.org/10.1007/s11276-017-1478-1

[15] J. Zhao, V. Gligor, A. Perrig, and J. Newsome. “ReDABLS: Revisiting device attestation with
bounded leakage of secrets,”
Lecture Notes in Computer Science (for Cambridge Workshop on Security Protocols), 2013.
https://doi.org/10.1007/978-3-642-41717-7_12

[16] V. Gligor, A. Perrig, and J. Zhao. “Brief encounters with a random key graph,”
Lecture Notes in Computer Science, 2013. 
https://doi.org/10.1007/978-3-642-36213-2_20

  • Conference Papers:
    • Published/Accepted:
[1] J. Zhao. “Secure connectivity of wireless sensor networks under q-composite key predistribution with on/off channels,”
in IEEE International Conference on Distributed Computing Systems (ICDCS), 2017 (to appear).

[2] J. Zhao. “Modeling interest-based social networks: Superimposing Erdos–Rényi graphs over random
intersection graphs,”
in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.
https://www2.securecms.com/ICASSP2017/Papers/PublicSessionIndex3.asp?Sessionid=1106

[3] J. Zhao. “Designing secure networks with q-composite key predistribution under different link
constraints,”
in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.
https://www2.securecms.com/ICASSP2017/Papers/PublicSessionIndex3.asp?Sessionid=1069

[4] J. Zhao. “Initial spreaders in online social networks,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2016.
https://doi.org/10.1109/ALLERTON.2016.7852227

[5] J. Zhao. “A comprehensive guideline for choosing parameters in the Eschenauer–Gligor key
predistribution,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2016.
https://doi.org/10.1109/ALLERTON.2016.7852380

[6] J. Zhao. “On the resilience to node capture attacks of secure wireless sensor networks,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2015.
https://doi.org/10.1109/ALLERTON.2015.7447100

[7] J. Zhao. “Sharp transitions in random key graphs,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2015.
https://doi.org/10.1109/ALLERTON.2015.7447142

[8] J. Zhao. “Threshold functions in random s-intersection graphs,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2015.
https://doi.org/10.1109/ALLERTON.2015.7447166

[9] J. Zhao. “The absence of isolated node in geometric random graphs,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2015.
https://doi.org/10.1109/ALLERTON.2015.7447099

[10] J. Zhao. “Critical behavior in heterogeneous random key graphs,”
in IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2015.
https://doi.org/10.1109/GlobalSIP.2015.7418321

[11] J. Zhao. “Parameter control in predistribution schemes of cryptographic keys,”
in IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2015.
https://doi.org/10.1109/GlobalSIP.2015.7418320

[12] J. Zhao, O. Yagan, and V. Gligor. “Exact analysis of k-connectivity in secure sensor networks with
unreliable links,”
in IEEE International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless
Networks (WiOpt), 2015. https://doi.org/10.1109/WIOPT.2015.7151072

[13] J. Zhao, O. Yagan, and V. Gligor. “On k-connectivity and minimum vertex degree in random
s-intersection graphs,”
in ACM-SIAM Meeting on Analytic Algorithmics & Combinatorics (ANALCO), 2015.
http://dx.doi.org/10.1137/1.9781611973761.1

[14] J. Zhao, O. Yagan, and V. Gligor. “On topological properties of wireless sensor networks under the
q-composite key predistribution scheme with on/off channels,”
in IEEE International Symposium on Information Theory (ISIT), 2014
(a finalist for the best student paper award). https://doi.org/10.1109/ISIT.2014.6875009

[15] J. Zhao. “Minimum node degree and k-connectivity in wireless networks with unreliable links,”
in IEEE International Symposium on Information Theory (ISIT), 2014.
https://doi.org/10.1109/ISIT.2014.6874832

[16] J. Zhao, O. Yagan, and V. Gligor. “On the strengths of connectivity and robustness in general random
intersection graphs,”
in IEEE Conference on Decision and Control (CDC), 2014.
https://doi.org/10.1109/CDC.2014.7039959

[17] J. Zhao, O. Yagan, and V. Gligor. “Connectivity in secure wireless sensor networks under
transmission constraints,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2014.
https://doi.org/10.1109/ALLERTON.2014.7028605

[18] J. Zhao, O. Yagan, and V. Gligor. “Secure k-connectivity in wireless sensor networks under an
on/off channel model,”
in IEEE International Symposium on Information Theory (ISIT), 2013.
https://doi.org/10.1109/ISIT.2013.6620734

[19] F. Yavuz, J. Zhao, O. Yagan, and V. Gligor. “Designing secure and reliable wireless sensor networks
under a pairwise key predistribution scheme,”
in IEEE International Conference on Communications (ICC), 2015.
https://doi.org/10.1109/ICC.2015.7249324

[20] F. Yavuz, J. Zhao, O. Yagan, and V. Gligor. “On secure and reliable communications in wireless
sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme,”
in IEEE International Symposium on Information Theory (ISIT), 2014.
https://doi.org/10.1109/ISIT.2014.6875260

[21] X. Wang, X. Wang, and J. Zhao. “Impact of mobility and heterogeneity on coverage and energy
consumption in wireless sensor networks,”
in IEEE International Conference on Distributed Computing Systems (ICDCS), 2011.
https://doi.org/10.1109/ICDCS.2011.17

[22] C. Hu, X. Wang, D. Nie, and J. Zhao. “Multicast scaling laws with hierarchical cooperation,”
in IEEE Conference on Computer Communications (INFOCOM), 2010.
https://doi.org/10.1109/INFCOM.2010.5462000

https://sites.google.com/site/publicworkofzhao/home/junzhao-portrait.png?attredirects=0