Recent Publications
Recent Publications (from 2012)
Since 1989, I have produced more than 400 publications in international journals, international conference proceedings, and as books or book chapters. Here I only list the most recent publications. Please drop me a message (Email me) if you request a copy of the published paper.
Google Scholar citations to my articles; dblp computer science bibliography listing
2023 accepted/published articles
Chi Liu, Tianqing Zhu, Jun Zhang, Wanlei Zhou (2022), "Privacy Intelligence: A Survey on Image Privacy in Online Social Networks", ACM Computing Surveys, Volume 55, Issue 8, August 2023, Article No.: 161, pp 1–35, https://doi.org/10.1145/3547299
Shuai Zhou, Chi Liu, Dayong Ye, Tianqing Zhu, Wanlei Zhou, Philip S. Yu, "Adversarial Attacks and Defenses in Deep Learning: from a Perspective of Cybersecurity", ACM Computing Surveys, Volume 55, Issue 8, August 2023, Article No.: 163, pp 1–39, https://doi.org/10.1145/3547330
Xiangyu Hu, Tianqing Zhu, Xuemeng Zhai, Wanlei Zhou, Wei Zhao, "Privacy Data Propagation and Preservation in Social Media: a Real-world Case Study", Accepted by IEEE Transactions on Knowledge and Data Engineering, doi: 10.1109/TKDE.2021.3137326, early access: https://ieeexplore.ieee.org/document/9658172
Tao Zhang, Tianqing Zhu, Kun Gao, Wanlei Zhou, Philip S. Yu, "Balancing Learning Model Privacy, Fairness, and Accuracy With Early Stopping Criteria", accepted by IEEE Transactions on Neural Networks and Learning Systems, early access: https://ieeexplore.ieee.org/document/9642428
Hui Sun, Tianqing Zhu, Zhiqiu Zhang, Dawei Jin, Ping Xiong, Wanlei Zhou, "Adversarial Attacks Against Deep Generative Models on Data: A Survey", accepted by IEEE Transactions on Knowledge and Data Engineering, early access: https://ieeexplore.ieee.org/document/9627776
Dayong Ye, Tianqing Zhu, Congcong Zhu, Wanlei Zhou, Philip S. Yu, "Model-Based Self-Advising for Multi-Agent Learning", Accepted by IEEE Transactions on Neural Networks and Learning Systems, early access: https://ieeexplore.ieee.org/document/9712868
Guangsheng Zhang, Bo Liu, Tianqing Zhu, Ming Ding, Wanlei Zhou, "Label-Only Membership Inference Attacks and Defenses In Semantic Segmentation Models", Accepted by IEEE Transactions on Dependable and Secure Computing, early access: https://ieeexplore.ieee.org/document/9723588
Xiangyu Hu, Tianqing Zhu, Xuemeng Zhai, Hengming Wang, Wanlei Zhou, and Wei Zhao, "Privacy Data Diffusion Modeling and Preserving in Online Social Network", accepted by IEEE Transactions on Knowledge and Data Engineering, early access: https://ieeexplore.ieee.org/document/9780197
Zichuan Xu, Haozhe Ren, Weifa Liang, Qiufen Xia, Wanlei Zhou, Pan Zhou, Wenzheng Xu, Guowei Wu, and Mingchu Li, "Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks", Accepted by IEEE/ACM Transactions on Networking, https://ieeexplore.ieee.org/document/9791085
Tianqing Zhu, Dayong Ye, Zishuo Cheng, Wanlei Zhou, Philip S. Yu, "Learning Games for Defending Advanced Persistent Threats in Cyber Systems", Accepted by IEEE Transactions on Systems, Man, and Cybernetics: Systems. https://ieeexplore.ieee.org/document/9923774
Tianqing Zhu, Dayong Ye, Shuan Zhou, Bo Liu and Wanlei Zhou, "Label-only Model Inversion Attacks: Attack with the Least Information," Accepted by IEEE Transactions on Information Forensics and Security, Early access: https://ieeexplore.ieee.org/document/10003239
2022
Lefeng Zhang, Tianqing Zhu, Ping Xiong, Wanlei Zhou and Philip S. Yu, "More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design", ACM Computing Surveys. 54:7, Article 136 (2022).
Zishuo Cheng, Dayong Ye, Tianqing Zhu, Wanlei Zhou, Philip S. Yu, Congcong Zhu, "Multi-agent reinforcement learning via knowledge transfer with differentially private noise". International Journal of Intelligent Systems, 37(1): 799-828 (2022).
Jing Li, Weifa Liang, Wenzheng Xu, Zichuan Xu, Xiaohua Jia, Wanlei Zhou, and Jin Zhao, "Maximizing User Service Satisfaction for Delay-Sensitive IoT Applications in Edge Computing", IEEE Transactions on Parallel and Distributed Systems, 33(5): 1199-1212 (2022).
Yuan Zhao, Bo Liu, Tianqing Zhu, Ming Ding, Wanlei Zhou, "Private-Encoder: Enforcing Privacy in Latent Space for Human Face Images", Concurrency and Computation: Practice and Experience, 34(3) (2022).
Tianqing Zhu, Guangsheng Zhang, Bo Liu, Andi Zhou, Wanlei Zhou, "Visual Privacy Attacks and Defenses in Deep Learning: a Survey" Artificial Intelligence Review (2022). https://doi.org/10.1007/s10462-021-10123-y
Dayong Ye; Tianqing Zhu; Sheng Shen; Wanlei Zhou; Philip Yu. “Differentially Private Multi-Agent Planning for Logistic-like Problems”, IEEE Transactions on Dependable and Secure Computing. 19(2): 1212 – 1226. March/April 2022.
Shi-Jinn Horng, Julian Supardi, Wanlei Zhou, Chin-Teng Lin, Bin Jiang, "Recognizing Very Small Face Images Using Convolution Neural Networks", IEEE Transactions on Intelligent Transportation Systems, 23(3): 2103-2115. March 2022.
Dayong Ye, Shen Sheng, Tianqing Zhu, Bo Liu and Wanlei Zhou, "One Parameter Defense - Defending Data Inference Attacks via Differential Privacy". IEEE Transactions on Information Forensics and Security, Vol. 17, pp. 1466-1480.
Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, Philip Yu, "More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence", IEEE Transactions on Knowledge and Data Engineering, Vol 34, No 6, pp. 1041-4347. June 2022.
Tianqing Zhu, Jin Li, Xiangyu Hu, Ping Xiong, Wanlei Zhou, "The Dynamic Privacy-preserving Mechanisms for Online Dynamic Social Networks". IEEE Transactions on Knowledge and Data Engineering, Vol 34, No 6, pp. 2962-2974. June 2022.
2021
Tianrui Zong, Yong Xiang, Iynkaran Natgunanathan, Longxiang Gao, Guang Hua, Wanlei Zhou, "Non-linear-echo Based Anti-collusion Mechanism for Audio Signals", IEEE/ACM Transactions on Audio, Speech and Language Processing, Vol. 29, 2021, pp. 969-984.
Juan Zhao, Tianrui Zong, Yong Xiang, Longxiang Gao, Wanlei Zhou, Gleb Beliakov, "Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient Modification". IEEE/ACM Transactions on Audio, Speech and Language Processing 29: 2282-2295 (2021).
Jianghua Liu, Jingyu Hou, Wenjie Yang, Yang Xiang, Wanlei Zhou, Wei Wu, and Xinyi Huang, "Leakage-Free Dissemination of Authenticated Tree-Structured Data with Multi-Party Control", IEEE Transactions on Computers, Vol. 70, No. 7, July 2021.
Jianghua Liu, Jinhua Ma, Yang Xiang, Wanlei Zhou, and Xinyi Huang, "Authenticated Medical Documents Releasing with Privacy Protection and Release Control". IEEE Transactions on Dependable and Secure Computing, Jan/Feb 2021, Volume: 18, Issue: 1, pp. 448-459.
Dayong Ye, Tianqing Zhu, Sheng Shen, Wanlei Zhou: "A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries". IEEE Transactions on Information Forensics and Security. 16: 569-584 (2021).
Youyang Qu, Shui Yu, Wanlei Zhou, Shiping Chen, and Jun Wu, "Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Network", IEEE Transactions on Network Science and Engineering, Vol. 8, No. 1, January-March 2021, pp. 269-281.
Jianchao Lu, Xi Zheng, Lihong Tang, Tianyi Zhang, Quan Z. Sheng, Chen Wang, Jiong Jin, Shui Yu, Wanlei Zhou, "Can Steering Wheel Detect Your Driving Fatigue", IEEE Transactions on Vehicular Technology, 70(6): 5537-5550 (2021).
Lefeng Zhang, Tianqing Zhu, Ping Xiong, Wanlei Zhou and Philip S. Yu, "More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design", ACM Computing Surveys. 54:7, Article 136 (June 2021). Online https://dl.acm.org/doi/fullHtml/10.1145/3460771
Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yong Xiang, Frank Jiang and Wanlei Zhou, "Effective quarantine and recovery scheme against advanced persistent threat," Accepted by IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 51, No. 10, pp. 5977-5991 (2021).
Aneesh Chivukula, Xinghao Yang, Wei Liu, Tianqing Zhu, Wanlei Zhou, "Game Theoretical Adversarial Deep Learning with Variational Adversaries". Accepted by IEEE Transactions on Knowledge and Data Engineering, Vol. 33, No. 11, pp. 3568-3581 (2021).
Tao Zhang, Tianqing Zhu, Jing Li, Mengde Han, Wanlei Zhou, Philip Yu, "Fairness in Semi-supervised Learning: Unlabeled Data Help to Reduce Discrimination", Accepted by IEEE Transactions on Knowledge and Data Engineering, early access: https://ieeexplore.ieee.org/document/9117188
Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, Philip Yu, "More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence", Accepted by IEEE Transactions on Knowledge and Data Engineering, early access: https://ieeexplore.ieee.org/document/9158374
Tianqing Zhu, Jin Li, Xiangyu Hu, Ping Xiong, Wanlei Zhou, "The Dynamic Privacy-preserving Mechanisms for Online Dynamic Social Networks". Accepted by IEEE Transactions on Knowledge and Data Engineering, early access: https://ieeexplore.ieee.org/document/9165190
Dayong Ye, Tianqing Zhu, Zishuo Cheng, Wanlei Zhou and Philip S. Yu, "Differential Advising in Multiagent Reinforcement Learning", accepted by IEEE Transactions on Cybernetics, early access: https://ieeexplore.ieee.org/document/9269516
Weifa Liang, Yu Ma, Wenzheng Xu, Zichuan Xu, Xiaohua Jia, and Wanlei Zhou, "Request Reliability Augmentation with Service Function Chain Requirements in Mobile Edge Computing", Accepted by IEEE Transactions on Mobile Computing, published online as early access: https://ieeexplore-ieee-org.ezproxy.lib.uts.edu.au/document/9435077
Juan Zhao, Tianrui Zong, Yong Xiang, Iynkaran Natgunanathan, Longxiang Gao, Wanlei Zhou, "Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels", Accepted on 1/2/2021 by The World Wide Web Journal.
Jing Li, Weifa Liang, Wenzheng Xu, Zichuan Xu, Xiaohua Jia, Wanlei Zhou, and Jin Zhao, "Maximizing User Service Satisfaction for Delay-Sensitive IoT Applications in Edge Computing", Accepted by IEEE Transactions on Parallel and Distributed Systems, early access: https://ieeexplore-ieee-org.ezproxy.lib.uts.edu.au/document/9521690
2020
Yanxin Zhang, Yulei Sui, Shirui Pan, Zheng Zheng, Baodi Ning, Ivor W. Tsang, Wanlei Zhou, "Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning". IEEE Transactions on Information Forensics and Security. 15: 3401-3414 (2020)
Tao Zhang, Tianqing Zhu, Ping Xiong, Huan Huo, Zahir Tari, Wanlei Zhou, "Correlated Differential Privacy: Feature Selection in Machine Learning". IEEE Transactions on Industrial Informatics. 16(3): 2115-2124 (2020).
Dayong Ye, Tianqing Zhu, Wanlei Zhou, and Philip S. Yu, "Differentially Private Malicious Agent Avoidance in Multiagent Advising Learning", IEEE Transactions on Cybernetics, 50(10): 4214-4227 (2020).
Shi-Jinn Horng, Cheng-Chung Lu and Wanlei Zhou, "An Identity-based and Revocable Data-sharing Scheme in VANETs", IEEE Transactions on Vehicular Technology, Vol. 69, No. 12, December 2020, pp. 15933-15946.
Youyang Qu, Shui Yu, Wanlei Zhou, and Yonghong Tian, "GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems", IEEE Transactions on Network Science and Engineering, Vol. 7, Issue: 4, pp. 2576-2586 (2020).
Tianqing Zhu, Ping Xiong, Gang Li, Wanlei Zhou, Philip S. Yu, "Differentially private model publishing in cyber physical systems". Future Generation of Computer Systems. 108: 1297-1306 (2020)
Ping Xiong, Lefeng Zhang, Tianqing Zhu, Gang Li, Wanlei Zhou, "Private collaborative filtering under untrusted recommender server". Future Generation of Computer Systems. 109: 511-520 (2020)
Xuemeng Zhai, Wanlei Zhou, Gaolei Fei, Cai Lu, Guangmin Hu, "Network sparse representation: Decomposition, dimensionality-reduction and reconstruction". Information Sciences. 521: 307-325 (2020)
Minghao Wang, Tianqing Zhu, Tao Zhang, Jun Zhang, Shui Yu, Wanlei Zhou, "Security and privacy in 6G networks: New areas and new challenges", Digital Communications and Networks, Volume 6, Issue 3, August 2020, pp. 281-291.
Kasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou, Saeed Saedy, Mehrdad Rostami, "Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithms". Journal of High Speed Networks 26(2): 141-153 (2020)
Mohammad Reza Nosouhi, Shui Yu, Wanlei Zhou, Marthie Grobler, Habiba Keshtiar, "Blockchain for secure location verification". Journal of Parallel and Distributed Computing. 136: 40-51 (2020)
Shigang Liu, Jun Zhang, Yang Xiang, Wanlei Zhou, Dongxi Xiang: "A study of data pre-processing techniques for imbalanced biomedical data classification". International Journal of Bioinformatics Research and Applications. 16(3): 290-318 (2020)
Linjing Wu, Qingtang Liu, Wanlei Zhou, Gang Mao, Jingxiu Huang, Huan Huang: "A Semantic Web-Based Recommendation Framework of Educational Resources in E-Learning". Technology, Knowledge and Learning. 25(4): 811-833 (2020).
2019
Lu-Xing Yang, Pengdeng Li, Yushu Zhang, Xiaofan Yang, Yong Xiang, Wanlei Zhou: "Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach". IEEE Transactions on Information Forensics and Security 14(7): 1713-1728 (2019).
Derek Wang, Tingmin Wu, Sheng Wen, Xiaofeng Chen, Yang Xiang, and Wanlei Zhou, "STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation". IEEE Transactions on Sustainable Computing. 4(2): 178-190 (2019).
Xianjiao Zeng, Guangquan Xu, Xi Zheng, Yang Xiang, Wanlei Zhou, "E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT." IEEE Internet of Things Journal 6(2): 1506-1519 (2019).
Rajkumar Buyya, Satish Narayana Srirama, Giuliano Casale, Rodrigo N. Calheiros, Yogesh Simmhan, Blesson Varghese, Erol Gelenbe, Bahman Javadi, Luis Miguel Vaquero, Marco A. S. Netto, Adel Nadjaran Toosi, Maria Alejandra Rodriguez, Ignacio Martín Llorente, Sabrina De Capitani di Vimercati, Pierangela Samarati, Dejan S. Milojicic, Carlos A. Varela, Rami Bahsoon, Marcos Dias de Assunção, Omer Rana, Wanlei Zhou, Hai Jin, Wolfgang Gentzsch, Albert Y. Zomaya, Haiying Shen: "A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade". ACM Computing Survey. 51(5): 105:1-105:38 (2019).
Yunyun Wu, Jingyu Hou, Jing Liu, Wanlei Zhou, Shaowen Yao: Novel Multi-Keyword Search on Encrypted Data in the Cloud. IEEE Access 7: 31984-31996 (2019).
Bo Liu, Ming Ding, Tianqing Zhu, Yong Xiang, Wanlei Zhou, "Adversaries or allies? Privacy and deep learning in big data era." Concurrency and Computation: Practice and Experience 31(19) (2019).
Chee Keong Ng, Frank Jiang, Leo Yu Zhang, Wanlei Zhou, "Static malware clustering using enhanced deep embedding method." Concurrency and Computation: Practice and Experience 31(19) (2019).
Mengmeng Yang, Tianqing Zhu, Kaitai Liang, Wanlei Zhou, Robert H. Deng: "A blockchain-based location privacy-preserving crowdsensing system". Future Generation of Computer Systems. 94: 408-418 (2019).
Xuemeng Zhai, Wanlei Zhou, Gaolei Fei, Cai Lu, Sheng Wen, Guangmin Hu: Edge-based stochastic network model reveals structural complexity of edges. Future Generation of Computer Systems 100: 1073-1087 (2019).
Mohammad Reza Nosouhi, Shui Yu, Wanlei Zhou, Marthie Grobler, Habiba Keshtiar, Blockchain for secure location verification, Journal of Parallel and Distributed Computing, Volume 136, 2020, Pages 40-51, ISSN 0743-7315, https://doi.org/10.1016/j.jpdc.2019.10.007.
2018
Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, and Wanlei Zhou, "Rumor Source Identification in Social Networks with Time-varying Topology", IEEE Transactions on Dependable and Secure Computing. Volume: 15, Issue: 1, pp. 166-179, Jan.-Feb. 1 2018
Bo Liu, Wanlei Zhou, Longxiang Gao, Haibo Zhou, Tom Luan, and Sheng Wen, "Malware Propagations in Wireless Ad Hoc Networks". IEEE Transactions on Dependable and Secure Computing, 15(6): 1016-1026 (2018).
Tianqing Zhu, Gang Li, Ping Xiong, Wanlei Zhou, "Answering differentially private queries for continual datasets release", Future Generation Computer Systems, 87: 816-827 (2018).
Jiannong Cao, Aniello Castiglione, Giovanni Motta, Florin Pop, Yanjiang Yang, Wanlei Zhou: "Human-Driven Edge Computing and Communication: Part 2". IEEE Communications Magazine 56(2): 134-135 (2018).
Tingmin Wu, Sheng Wen, Yang Xiang, Wanlei Zhou: "Twitter spam detection: Survey of new approaches and comparative study". Computers & Security 76: 265-284 (2018).
Youyang Qu, Shui Yu, Longxiang Gao, Wanlei Zhou, Sancheng Peng: "A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks". IEEE Transactions on Computational Social Systems 5(3): 773-784 (2018).
Youyang Qu, Shui Yu, Wanlei Zhou, Sancheng Peng, Guojun Wang, Ke Xiao: "Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things". IEEE Wireless Communications. 25(6): 91-97 (2018).
Derek Wang, Tingmin Wu, Sheng Wen, Donghai Liu, Yang Xiang, Wanlei Zhou, Houcine Hassan, Abdulhameed Alelaiwi: Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks. Journal of Computational Science 26: 456-467 (2018).
Mengmeng Yang, Tianqing Zhu, Yang Xiang, and Wanlei Zhou, "Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy", IEEE Access, Volumn 6: Issue 1, pp. 14779-14789 (2018),
Bo Liu, Wanlei Zhou, Tianqing Zhu, Longxiang Gao, and Yong Xiang, "Location Privacy and the Applications: A Systematical Study," IEEE Access, Volume 6: Issue 1, pp. 17606-17624 (2018).
2017
Shigang Liu, Jun Zhang, Yang Xiang, and Wanlei Zhou, "Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning", IEEE Transactions on Fuzzy Systems, Volume: 25, Issue:6, Page(s): 1476-1490, DECEMBER 2017. http://ieeexplore.ieee.org/document/8047322
Chao Chen, Yu Wang, Jun Zhang, Yang Xiang, and Wanlei Zhou, and Geyong Min, "Statistical Features Based Real-time Detection of Drifted Twitter Spam". IEEE Transactions on Information Forensics & Security. Vol 12, No. 4, pp. 914-925, April 2017. http://ieeexplore.ieee.org/document/7707341/
Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, and Wanlei Zhou, "Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies", IEEE Communications Surveys and Tutorials. Vol. 19, No. 1, pp. 465-481, First Quarter 2017. http://ieeexplore.ieee.org/document/7582484
Longxiang Gao, Tom H. Luan, Shui Yu, Wanlei Zhou, and Bo Liu , "FogRoute: DTN-based Data Dissemination Model in Fog Computing", IEEE Internet of Things Journal, 4(1): 225-235 (2017). http://ieeexplore.ieee.org/document/7801034/
Sheng Wen, Jiaojiao Jiang, Bo Liu, Yang Xiang and Wanlei Zhou, "Using epidemic betweenness to measure the influence of users in complex networks", Journal of Network and Computer Applications, Volume 78, January 2017, Pages 288-299. http://www.sciencedirect.com/science/article/pii/S1084804516302557
Bo Liu, Wanlei Zhou, Tianqing Zhu, Haibo Zhou, Xiaodong Lin, "Invisible Hand: Economic Model based Trajectory Privacy Preserving Schemes in Mobile Crowd Sensing Applications". IEEE Transactions on Vehicular Technology. VOL. 66, NO. 5, pp.4410-4423, MAY 2017. Available online: http://ieeexplore.ieee.org/document/7572139/
Tianqing Zhu, Gang Li, Wanlei Zhou, and Philip S. Yu, "Differentially Private Data Publishing and Analysis: a Survey". IEEE Transactions on Knowledge and Data Engineering. Vol. 29, No. 8, pp. 1619-1638, August 2017. Available online: http://ieeexplore.ieee.org/document/7911185/
Tianqing Zhu, Gang Li, Wanlei Zhou, and Philip S. Yu, Differential Privacy and Its Applications, ISBN 978-3-319-62002-2, Springer, 2017. http://www.springer.com/us/book/9783319620022.
Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou, "A secure search protocol for low cost passive RFID tags". Computer Networks, Vol 122 (2017), pp. 70-82. Available online: http://www.sciencedirect.com/science/article/pii/S138912861730155X
Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou, and Houcine Hassan, "The structure of communities in scale-free networks". Concurrency and Computation: Practice and Experience. 29(14), pp. 1-16, July 2017. Available online: http://onlinelibrary.wiley.com/doi/10.1002/cpe.4040/full
2016
Shui Yu, Wanlei Zhou, Song Guo, Minyi Guo, "A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking", IEEE Transactions on Computers. VOL. 65, NO. 5, MAY 2016, pp. 1418-1427, http://ieeexplore.ieee.org/document/7115110/
Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou, Jonathan Oliver, "Spammers Are Becoming 'Smarter' on Twitter". IEEE IT Professional, 18(2): 66-70 (2016). http://ieeexplore.ieee.org/document/7436683/
Tianqing Zhu, Gang Li, Wanlei Zhou, Ping Xiong, and Cao Yuan, "Privacy-preserving topic model for tagging recommender systems", Knowledge and Information Systems (Springer), January 2016, Volume 46, Issue 1, pp 33-58, http://link.springer.com/article/10.1007%2Fs10115-015-0832-9
Guangyan Huang, Jing He, Wanlei Zhou, Guang-Li Huang, Limin Guo, Xiangmin Zhou, Feiyi Tang, "Discovery of Stop Regions for Understanding Repeat Travel Behaviors of Moving Objects", Journal of Computer and System Sciences, 82 (2016) 582-593. http://www.sciencedirect.com/science/article/pii/S0022000015001348
Song Han, Shuai Zhao, Qinghua Li, Chunhua Ju and Wanlei Zhou, "PPM-HDA: Privacy-preserving and multifunctional health data aggregation with fault tolerance", IEEE Transactions on Information Forensics & Security. VOL. 11, NO. 9, pp. 1940-1955, SEPTEMBER 2016, http://ieeexplore.ieee.org/document/7219462/
Mohammad Sayad Haghighi, Sheng Wen, Yang Xiang, Barry Quinn, and Wanlei Zhou, "On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks". IEEE Transactions on Information Forensics & Security. Volume 11, Issue 12, pp. 2854-2865, DECEMBER.2016. http://ieeexplore.ieee.org/document/7534868/
Bo Liu, Wanlei Zhou, Tianqing Zhu, Longxiang Gao, Tom H. Luan, and Haibo Zhou, "Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks", IEEE Transactions on Vehicular Technology. VOL. 65, NO. 12, December 2016, pp. 9942-9953. http://ieeexplore.ieee.org/document/7414507/
Faizal Riaz-ud-Din, Wanlei Zhou, and Robin Doss, "Query verification schemes for cloud-hosted databases: a brief survey", International Journal of Parallel, Emergent and Distributed Systems, 31:6, 543-561, 2016. http://dx.doi.org/10.1080/17445760.2015.1132421
Guangyan Huang, Wanlei Zhou, and Jing He, "Speedup of big data transfer on the internet". In Yu, Shui, Lin, Xiaodong, Misic, Jelena and Shen, Xuemin (ed), Networking for big data, CRC Press - Taylor & Francis Group, Boca Raton, Fla., pp.139-155, 2016. http://www.crcnetbase.com/doi/abs/10.1201/b18772-11
Faizal Riaz-ud-Din, Robin Doss, and Wanlei Zhou, "String matching query verification on the cloud-hosted databases", in IICDCN 2016 : Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, pp. 1-10. http://dl.acm.org/citation.cfm?doid=2833312.2833326.
Kai He, Jian Weng, Joseph K. Liu, Wanlei Zhou, Jianan Liu, "Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing". The 2016 International Conference on Network and System Security (NSS 2016), LNCS Vol 9955, pp. 65-79. http://link.springer.com/chapter/10.1007/978-3-319-46298-1_5/fulltext.html
Bo Liu, Wanlei Zhou, Jiao Jiao Jiang, Kun Wang, "K-Source: Multiple source selection for traffic offloading in mobile social networks". The 8th International Conference on Wireless Communications & Signal Processing (WCSP 2016): 1-5. http://ieeexplore.ieee.org/document/7752474/
2015
Longxiang Gao, Shui Yu, Tom H. Luan, and Wanlei Zhou, Delay Tolerant Networks, ISBN 978-3-319-18108-0, Springer, 2015. http://www.springer.com/gb/book/9783319181073
Tianqing Zhu, Ping Xiong, Gang Li and Wanlei Zhou, "Correlated Differential Privacy: Hiding Information in Non-IID Dataset," IEEE Transactions on Information Forensics and Security, Vol 10, No 2, February 2015, pp229-242. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6949097
Sheng Wen, Mohammad Sayad Haghighi, Chao Chen, Yang Xiang, Wanlei Zhou, and Weijia Jia, "A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks", IEEE Transactions on Computers, Vol. 64, No. 3, pp. 640-653, March 2015. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6714520
Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, and Wanlei Zhou, "Secure Tag Search in RFID Systems Using Mobile Readers", IEEE Transactions on Dependable and Secure Computing, Vol. 12, No. 2, pp. 230-242, March/April 2015. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6803031
Yong Xiang, Tianrui Zong, Iynkaran Natgunanathan, Song Guo, Wanlei Zhou and Gleb Beliakov, "Robust Histogram Shape Based Method for Image Watermarking", IEEE Transactions on Circuits and Systems for Video Technology, Vol. 25, No. 5, pp. 717-729, May 2015. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6930818
Saravanan Sundaresan, Robin Doss, Wanlei Zhou, and Selwyn Piramuthu, "Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy", Computer Communications (Elsevier), pp. 112-124, Vol 55. January 2015. http://www.sciencedirect.com/science/article/pii/S0140366414003053
Xueqi Cheng, Jinhong Yuan, Ali Tajer, Aiqun Hu, and Wanlei Zhou, "Special issue on recent advances in network and information security - security and communication networks journal". Security and Communication Networks (Wiley) Volume 8, Issue 1, 2015, pp. 1. http://onlinelibrary.wiley.com/doi/10.1002/sec.1180/epdf
Sheng Wen, Di Wu, Ping Li, Yang Xiang, Wanlei Zhou and Guiyi Wei, "Detecting stepping stones by abnormal causality probability", Security and Communication Networks (Wiley), Volume 8, Issue 10, 2015, pp. 1831-1844, available online: http://onlinelibrary.wiley.com/doi/10.1002/sec.1037/epdf
Yongli Ren, Gang Li, and Wanlei Zhou, "A Survey of Recommendation Techniques Based on Off-line Data Processing" Concurrency and Computation: Practice and Experience, Volume 27, Issue 15, October 2015, Pages 3915-3942, http://onlinelibrary.wiley.com/wol1/doi/10.1002/cpe.3370/full
Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou, and Jie Wu, "Robust Network Traffic Classification," IEEE/ACM Transactions on Networking. Volume 23, Issue 4, pp. 1257-1270. August 2015. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6812220
Saravanan Sundaresan, Robin Doss, and Wanlei Zhou, "Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags", IEEE Transactions on Computers. Volume:64, Issue: 10, pp. 2994-3008, October 2015. Available online: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7005429
Chao Chen, Yang Xiang, Jun Zhang, Wanlei Zhou, and Xie Yi, "A Performance Evaluation of Machine Learning Based Streaming Spam Tweets Detection", IEEE Transactions on Computational Social Systems. VOL. 2, NO. 3, SEPTEMBER 2015, pp.65-76. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7400989
Guangyan Huang, Jing He, Yanchun Zhang, Wanlei Zhou, Hai Liu, Peng Zhang, Zhiming Ding, Yue You, Jian Cao, "Mining streams of short text for analysis of world-wide event evolutions". World Wide Web 18(5): 1201-1217 (2015). http://link.springer.com/article/10.1007%2Fs11280-014-0293-1
Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, and Wanlei Zhou, "K-center: An Approach on the Multi-source Identification of Information Diffusion", IEEE Transactions on Information Forensics & Security, Volume:10, Issue: 12, pp. 2616-2626. December 2015. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7206580
Shui Yu, Guojun Wang, and Wanlei Zhou, "Modelling Malicious Activities in Cyber Space", IEEE Network, Volume:29, Issue:6, pp. 83-87, November/December 2015. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7340429
Chao Chen, Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou, "6 million spam tweets: A large ground truth for timely Twitter spam detection." ICC 2015, pp. 7065-7070.
Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou, "Asymmetric self-learning for tackling Twitter Spam Drift." INFOCOM Workshops 2015, pp. 208-213.
2014
Yini Wang, Sheng Wen, Yang Xiang, and Wanlei Zhou, "Modeling the Propagation of Worms in Networks: A Survey", IEEE Communications Surveys and Tutorials, Volume:16, Issue: 2, 2014, pp 942-960. Available online: http://doi.ieeecomputersociety.org/10.1109/SURV.2013.100913.00195
Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, and Wanlei Zhou, "A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags", IEEE Transactions on Information Forensics and Security, VOL. 9, NO. 6, 2014, pp 961-975. http://doi.ieeecomputersociety.org/10.1109/TIFS.2014.2316338
Silvio Cesare, Yang Xiang, and Wanlei Zhou, "Control Flow-based Malware Variant Detection", IEEE Transactions on Dependable and Secure Computing, VOL. 11, NO. 4, JULY/AUGUST 2014, pp. 304-317. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6601601
Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia, and Cliff C.Zou "Modeling and Analysis on the Propagation Dynamics of Modern Email Malware", IEEE Transactions on Dependable and Secure Computing, VOL. 11, NO. 4, JULY/AUGUST 2014, pp. 361-374. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6671578
Yong Xiang, Iynkaran Natgunanathan, Song Guo, Wanlei Zhou, and Saeid Nahavandi, "Patchwork-Based Audio Watermarking Method Robust to De-synchronization Attacks", IEEE Transactions on Audio, Speech and Language Processing, VOL. 22, NO. 9, 2014. PP. 1413-1423. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6846326
Yu Wang, Yang Xiang, Wanlei Zhou, Jun Zhang, "Internet traffic clustering with side information", Journal of Computer and System Sciences, Volume 80 (2014), Pages 1021-1036. Available online: http://dx.doi.org/10.1016/j.jcss.2014.02.008
Tianqing Zhu, Yongli Ren, Wanlei Zhou, Jia Rong, Ping Xiong, "An Effective Privacy Preserving Algorithm for Neighborhood-based Collaborative Filtering", Future Generation Computer System, Volume 36 (2014), Pages 142-155. Available online: http://dx.doi.org/10.1016/j.future.2013.07.019
YongHong Tian, Shui Yu, Chin-Yung Lin, Wen Gao, and Wanlei Zhou, "Special Issue on Social Multimedia Computing: Challenges, Techniques, and Applications: Guest Editorial", Journal of Multimedia, Vol 9, No 1 (2014), pp. 1-3. Available online: http://ojs.academypublisher.com/index.php/jmm/article/view/jmm090113/8380
Wei Zhou, Weijia Jia, Sheng Wen, Yang Xiang, Wanlei Zhou, "Detection and defense of application-layer DDoS attacks in backbone web traffic", Future Generation Computer System, Volume 38, 2014, Pages 36-46. Available online: http://dx.doi.org/10.1016/j.future.2013.08.002
Yongli Ren, Gang Li, Jun Zhang and Wanlei Zhou, "The Maximum Imputation Framework for Neighborhood-based Collaborative Filtering", Social Network Analysis and Mining (Springer), (2014) 4:207, Available online: http://link.springer.com/article/10.1007%2Fs13278-014-0207-3
Tianqing Zhu, Gang Li, Lei Pan, Yongli Ren, and Wanlei Zhou, "Privacy preserving collaborative filtering for KNN attack resisting", Social Network Analysis and Mining (Springer), (2014) 4:196, Available online: http://download.springer.com/static/pdf/602/art%253A10.1007%252Fs13278-014-0196-2.pdf?auth66=1405215782_ba5c15aaa1db2e076bc0dd68c558888f&ext=.pdf
Sheng Wen, Jiaojiao Jiang, Yang Xiang, Shui Yu, and Wanlei Zhou, "Are the Popular Users Always Important for the Information Dissemination in Online Social Networks?" IEEE Network, pp. 64-67, September/October 2014. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6915441
Theerasak Thapngam, Shui Yu, Wanlei Zhou, and S. Kami Makki, "Distributed Denial of Service (DDoS) detection by traffic pattern analysis", Peer-to-Peer Networking and Applications (Springer), Volume 7, Issue 4, December 2014, pp. 346-358. Available online: http://link.springer.com/article/10.1007%2Fs12083-012-0173-3
Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Guiyi Wei, and Laurence Yang, "Internet Traffic Classification Using Constrained Clustering", IEEE Transactions on Parallel and Distributed Systems, VOL. 25, NO. 11, NOVEMBER 2014. pp. 2932-2943. Available online: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6684161
Sheng Wen, Jiaojiao Jiang, Yang Xiang, Shui Yu, Wanlei Zhou and Weijia Jia, "To shut them up or to clarify: restraining the spread of rumours in Online Social Networks", IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 12, pp. 3306-3316, 2014. Available online: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6714492
Xian-He Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei (Chris) Liu (eds), Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I. Lecture Notes in Computer Science Vol. 8630, Springer 2014, ISBN 978-3-319-11196-4. http://www.springer.com/gp/book/9783319111964
Xian-He Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei (Chris) Liu (eds), Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II. Lecture Notes in Computer Science Vol. 8631, Springer 2014, ISBN 978-3-319-11193-3. http://www.springer.com/gp/book/9783319111933
2013
Jun Zhang, Yang Xiang, Yu Wang, Wanlei Zhou, Yong Xiang, and Yong Guan, "Network Traffic Classification Using Correlation Information", IEEE Transactions on Parallel and Distributed Systems, VOL. 24, NO. 1, JANUARY 2013, pp. 104-117. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06171176
R. Doss, S. Sundaresan and W. Zhou, "A Practical Quadratic Residues Based Scheme for Authentication and Privacy in Mobile RFID Systems", Ad Hoc Networks (Elsevier), Volume 11, Issue 1, January 2013, Pages 383-396. Available online: http://www.sciencedirect.com/science/article/pii/S1570870512001333
Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, and Yong Xiang, "Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions", IEEE Transactions on Information Forensics and Security, VOL. 8, NO. 1, JANUARY 2013, pp. 5-15. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6327666
R. Doss, W. Zhou, and S. Yu, "Secure RFID Tag Ownership Transfer based on Quadratic Residues", IEEE Transactions on Information Forensics and Security, VOL. 8, NO. 2, FEBRUARY 2013, pp. 390-401. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6392263
Jun Zhang, Yang Xiang, Wanlei Zhou, Yu Wang, "Unsupervised Traffic Classification Using Flow Statistical Properties and IP Packet Payload", Journal of Computer and System Sciences (Elsevier), Volume 79, Issue 5, August 2013, Pages 573-585. Available online: http://www.sciencedirect.com/science/article/pii/S0022000012001729
Silvio Cesare, Yang Xiang, and Wanlei Zhou, "Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware", IEEE Transactions on Computers, Vol. 62, Issue 6. pp.1193-1206, June 2013. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6171162
Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, and Weijia Jia, "Modeling Propagation Dynamics of Social Network Worms", IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 8, pp. 1633-1643, Aug. 2013. Available online: http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6547593
Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, and Athanasios V. Vasilakos, "An Effective Network Traffic Classification Method with Unknown Flow Detection", IEEE Transactions on Network and Service Management, VOL. 10, NO. 2, JUNE 2013, pp. 133-147. Available online: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6476080
Longxiang Gao, Ming Li, Alessio Bonti, Wanlei Zhou, and Shui Yu, "Multi-Dimensional Routing Protocol in Human Associated Delay-Tolerant Networks", IEEE Transactions on Mobile Computing, VOL. 12, NO. 11, NOVEMBER 2013, pp. 2132-2144. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6291718
Jun Zhang, Lei Ye, Yang Xiang, Wanlei Zhou, "Robust Image Retrieval with Hidden Classes," Computer Vision and Image Understanding, vol. 117, no. 6, pp. 670-679, 2013. Available online: http://www.sciencedirect.com/science/article/pii/S1077314213000520
Guojun Wang, Wanlei Zhou, and Laurence T. Yang, "Trust, security and privacy for pervasive applications," Journal of Supercomputing, vol. 64, no. 3, pp. 661-663, 2013. Available online: http://link.springer.com/article/10.1007%2Fs11227-013-0953-4
Ashish Saini, Jingyu Hou, and Wanlei Zhou, "Hub-Based Reliable Gene Expression Algorithm to Classify ER+ and ER- Breast Cancer Subtypes," International Journal of Bioscience, Biochemistry and Bioinformatics, Vol. 3, No. 1, pp. 20-26, January 2013. Available online: http://www.ijbbb.org/show-35-404-1.html
Yongli Ren, Gang Li, and Wanlei Zhou, "A learning method for Top-N recommendations with incomplete data", Social Network Analysis and Mining (Springer), December 2013, Volume 3, Issue 4, pp 1135-1148. Available online: http://link.springer.com/article/10.1007%2Fs13278-013-0103-2
Yongli Ren, Gang Li, Jun Zhang, and Wanlei Zhou, "Lazy Collaborative Filtering for Data Sets with Missing Values", IEEE Transactions on Cybernetics, VOL. 43, NO. 6, pp. 1822-1834, DECEMBER 2013. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6412787
2012
Shui Yu, Wanlei Zhou, Weijia Jia, Song Guo, Yong Xiang, and Feilong Tang, "Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient", IEEE Transactions on Parallel and Distributed Systems, VOL. 23, NO. 6, JUNE 2012. pp. 1073-1080. Available online: http://www.computer.org/portal/web/csdl/doi/10.1109/TPDS.2011.262
Yong Xiang, Iynkaran Natgunanathan, Dezhong Peng, Wanlei Zhou, and Shui Yu, "A Dual-Channel Time-Spread Echo Method for Audio Watermarking", IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, April 2012, pp. 383 - 392. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6061955
Iynkaran Natgunanathan, Yong Xiang, Yue Rong, Wanlei Zhou, and Song Guo, "Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking", IEEE Transactions on Audio, Speech and Language Processing, Volume: 20 , Issue: 8 Page(s): 2232 - 2239. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06198872
Sheng Wen, Wei Zhou, Yini Wang, Wanlei Zhou, and Yang Xiang, "Locating Defense Positions for Thwarting the Propagation of Topological Worms", IEEE Communication Letters, VOL. 16, NO. 4, pp. 560-563, APRIL 2012. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6168149
Yanli Yu, Keqiu Li, Wanlei Zhou, and Ping Li, "Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures", Journal of Networking and Computer Applications (Elsevier), Volume 35, Issue 3, May 2012, Pages 867-880. Available online: http://www.sciencedirect.com/science/article/pii/S1084804511000592
Yu Wang, Yang Xiang, Wanlei Zhou, and Shunzheng Yu, "Generating Regular Expression Signatures for Network Traffic Classification in Trusted Network Management", Journal of Network and Computer Applications (Elsevier), Volume 35, Issue 3, May 2012, Pages 992-1000. Available online: http://www.sciencedirect.com/science/article/pii/S1084804511000713
Shui Yu, Wanlei Zhou, Weijia Jia, and Jiankun Hu, "Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics", The Computer Journal, Vol. 55 No. 4, 2012. pp. 410-421. Available online: http://comjnl.oxfordjournals.org/content/55/4/410.abstract?etoc
Sheng Wen, Wei Zhou, Yang Xiang and Wanlei Zhou, "CAFS: A Novel Lightweight Cache-based Scheme for Large-Scale Intrusion Alert Fusion", Concurrency and Computation: Practice and Experience (Wiley), Vol. 24, Issue 10, July 2012, pp. 1137-1153. Available online: http://onlinelibrary.wiley.com/doi/10.1002/cpe.1747/pdf
Longxiang Gao, Ming Li, Alessio Bonti, Wanlei Zhou, and Shui Yu, "M-Dimension: Multi Characteristics Based Routing Protocol in Human Associated Delay-Tolerant Networks with Improved Performance over One Dimensional Classic Models", Journal of Networking and Computer Applications (Elsevier), Volume 35, Issue 4, July 2012, Pages 1285-1296. Available online: http://www.sciencedirect.com/science/article/pii/S1084804512000276
R. Doss, W. Zhou, S. Sundaresan, S. Yu and L. Gao, "Minimum Disclosure Approach to Authentication and Privacy in RFID Systems", Computer Networks (Elsevier), Volume 56, Issue 15, 15 October 2012, Pages 3401-3416. Available online: http://www.sciencedirect.com/science/article/pii/S1389128612002447
Jun Zhang, Chao Chen, Yang Xiang, and Wanlei Zhou, "Semi-supervised and compound classification of network traffic," International Journal of Security and Networks, vol. 7, no. 4, pp.252-261, 2012.