Preprints/arXiv-ed Articles

  1. Naoto Yamada, Yuichi Kawamoto, Hiroki Nishiyama, Nei Kato and Yao Zheng, “A Performance Evaluation Model for Crowd Control Applications in IoT Environment by Using FeedBack Control Theory,” IEEE Internet of Things Journal, accepted.
    [ARTICLE] [SLIDES] [BibTeX]

    @unpublished{YaKa:JUNO:Jnl,
      author = {Yamada, Naoto and Kawamoto, Yuichi and Nishiyama, Hiroki and Kato, Nei and Zheng, Yao},
      title = {A Performance Evaluation Model for Crowd Control Applications in IoT Environment by Using FeedBack Control Theory},
      note = {IEEE Internet of Things Journal, accepted}
    }
    
  2. Yao Zheng, Ethan Gaebel, Wenjing Lou and Y. Thomas Hou, “Privacy-Preserving Face Tagging Using Deep Learning,”
    [ARTICLE] [SLIDES] [BibTeX]

    @unpublished{ZhGa:Irene:Conf,
      author = {Zheng, Yao and Gaebel, Ethan and Lou, Wenjing and Hou, Y. Thomas},
      title = {Privacy-Preserving Face Tagging Using Deep Learning}
    }
    

Journal Articles

  1. Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou, “Location Based Handshake and Private Proximity Test with Location Tags,” IEEE Transactions on Dependable and Secure Computing, vol. PP, no. 99, pp. 1-1, 2015.
    [ARTICLE] [SLIDES] [BibTeX]

    @article{ZhLi:Lupin:Jnl,
      author = {Zheng, Yao and Li, Ming and Lou, Wenjing and Hou, Y. Thomas},
      title = {Location Based Handshake and Private Proximity Test with Location Tags},
      journal = {IEEE Transactions on Dependable and Secure Computing},
      year = {2015},
      volume = {PP},
      number = {99},
      pages = {1--1}
    }
    
  2. Bing Wang, Yao Zheng, Wenjing Lou and Y. Thomas Hou, “DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking,” Computer Network, vol. 81, pp. 308-319, 4 2015.
    [ARTICLE] [SLIDES] [BibTeX]

    @article{WaZh:DDoS:Jnl,
      author = {Wang, Bing and Zheng, Yao and Lou, Wenjing and Hou, Y. Thomas},
      title = {DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking},
      journal = {Computer Network},
      year = {2015},
      volume = {81},
      pages = {308--319}
    }
    
  3. Yao Zheng, Matthias Schulz, Wenjing Lou, Y. Thomas Hou and Matthias Hollick, “Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security,” IEEE Wireless Communications Letters, vol. 4, no. 1, pp. 34-37, 2 2015.
    [ARTICLE] [SLIDES] [BibTeX]

    @article{ZhSc:KPA:Jnl,
      author = {Zheng, Yao and Schulz, Matthias and Lou, Wenjing and Hou, Y. Thomas and Hollick, Matthias},
      title = {Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security},
      journal = {IEEE Wireless Communications Letters},
      year = {2015},
      volume = {4},
      number = {1},
      pages = {34--37}
    }
    
  4. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131-143, 1 2013.
    [ARTICLE] [SLIDES] [BibTeX]

    @article{LiYu:Pippin,
      author = {Li, Ming and Yu, Shucheng and Zheng, Yao and Ren, Kui and Lou, Wenjing},
      title = {Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption},
      journal = {IEEE Transactions on Parallel and Distributed Systems},
      year = {2013},
      volume = {24},
      number = {1},
      pages = {131--143}
    }
    

Magazine Articles

  1. Yao Zheng, Assad Moini, Wenjing Lou, Y. Thomas Hou and Yuichi Kawamoto, “Cognitive Security: Securing Burgeoning Landscape of Mobile Network,” IEEE Network, vol. 30, no. 4, pp. 66-71, 2016.
    [ARTICLE] [SLIDES] [BibTeX]

    @article{ZhMo:Cognitive:Mag,
      author = {Zheng, Yao and Moini, Assad and Lou, Wenjing and Hou, Y. Thomas and Kawamoto, Yuichi},
      title = {Cognitive Security: Securing Burgeoning Landscape of Mobile Network},
      journal = {IEEE Network},
      year = {2016},
      volume = {30},
      number = {4},
      pages = {66--71}
    }
    

Conference Proceedings

  1. Yao Zheng, Matthias Schulz, Wenjing Lou, Y. Thomas Hou and Matthias Hollick, “Profiling the Strength of Physical-Layer Security: A Study in Blinding,” in WiSec 2016, 7 2016. (acceptance rate: 0.255(13/51)).
    [PROCEEDING] [SLIDES] [BibTeX]

    @inproceedings{ZhSc:Hope:Conf,
      author = {Zheng, Yao and Schulz, Matthias and Lou, Wenjing and Hou, Y. Thomas and Hollick, Matthias},
      title = {Profiling the Strength of Physical-Layer Security: A Study in Blinding},
      booktitle = {WiSec 2016},
      year = {2016},
      note = {(acceptance rate: 0.255(13/51))}
    }
    
  2. Yao Zheng, Bing Wang, Wenjing Lou and Y. Thomas Hou, “Privacy-Preserving Link Prediction in Decentralized Online Social Networks,” in ESORICS 2015, 9 2015. (acceptance rate: 0.201(59/293)).
    [PROCEEDING] [SLIDES] [BibTeX]

    @inproceedings{ZhWa:Sarek:Conf,
      author = {Zheng, Yao and Wang, Bing and Lou, Wenjing and Hou, Y. Thomas},
      title = {Privacy-Preserving Link Prediction in Decentralized Online Social Networks},
      booktitle = {ESORICS 2015},
      year = {2015},
      note = {(acceptance rate: 0.201(59/293))}
    }
    
  3. Qiben Yan, Yao Zheng, Tingting Jiang, Wenjing Lou and Y. Thomas Hou, “PeerClean: Unveiling Peer-to-Peer Botnets through Dynamic Group Behavior Analysis,” in INFOCOM 2015, 4 2015. (acceptance rate: 0.190(316/1640)).
    [PROCEEDING] [SLIDES] [BibTeX]

    @inproceedings{YaZh:PeerClean:Conf,
      author = {Yan, Qiben and Zheng, Yao and Jiang, Tingting and Lou, Wenjing and Hou, Y. Thomas},
      title = {PeerClean: Unveiling Peer-to-Peer Botnets through Dynamic Group Behavior Analysis},
      booktitle = {INFOCOM 2015},
      year = {2015},
      note = {(acceptance rate: 0.190(316/1640))}
    }
    
  4. Bing Wang, Yao Zheng, Wenjing Lou and Y. Thomas Hou, “DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking,” in NPSec 2014, 10 2014.
    [PROCEEDING] [SLIDES] [BibTeX]

    @inproceedings{WaZh:DDoS:Conf,
      author = {Wang, Bing and Zheng, Yao and Lou, Wenjing and Hou, Y. Thomas},
      title = {DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking},
      booktitle = {NPSec 2014},
      year = {2014}
    }
    
  5. Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou, “SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags,” in ESORICS 2012, 9 2012. (acceptance rate: 0.202(50/248)).
    [PROCEEDING] [SLIDES] [BibTeX]

    @inproceedings{ZhLi:Lupin:Conf,
      author = {Zheng, Yao and Li, Ming and Lou, Wenjing and Hou, Y. Thomas},
      title = {SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags},
      booktitle = {ESORICS 2012},
      year = {2012},
      note = {(acceptance rate: 0.202(50/248))}
    }
    

Thesis and Dissertation

  1. Yao Zheng, Privacy Preservation for Cloud-Based Data Sharing and Data Analytics. PhD dissertation, Virginia Polytechnic Institute and State University, 2016.
    [DISSERTATION] [SLIDES] [BibTeX]

    @phdthesis{Zh:PHDThesis,
      author = {Zheng, Yao},
      title = {Privacy Preservation for Cloud-Based Data Sharing and Data Analytics},
      school = {Virginia Polytechnic Institute and State University},
      year = {2016}
    }
    
  2. Yao Zheng, Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption. Master thesis, Worcester Polytechnic Institute, 2011.
    [THESIS] [SLIDES] [BibTeX]

    @mastersthesis{Zh:MSThesis,
      author = {Zheng, Yao},
      title = {Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption},
      school = {Worcester Polytechnic Institute},
      year = {2011}
    }