Kuan Zhang

Contact Information:

Scott Campus (Omaha)
PKI 206B
(402) 554-6005
kuan.zhang@unl.edu

Personal Links:

My Google Scholar

Professional Memberships:

• IEEE Member

Associate Professor

Academic Degrees

  • Ph.D., Electrical and Computer Engineering; University of Waterloo, Canada (2016)
  • M.S., Computer Applied Technology; Northeastern University, China (2011)
  • B.S., Communications Engineering; Northeastern University, China (2009)

Certifications

  • Ph.D.

Open Positions - RA for Ph.D. students

  • I am seeking self-motivated Ph.D. students with strong interests in the area of cyber security, wireless network, AI and data analytics, and embedded/cyber physical systems. If you want to apply for this position, please email me a copy of your resume (including education background, relevant research/working experience, and relevant publications), GPA, GRE score (if applicable), and TOEFL/IELTS score (for international applicants). In your email, please use “Graduate Applicant – Your Name” as the subject, and describe the motivation of your interests. For admission by the Department of Electrical and Computer Engineering, you should submit a formal application to UNL Office of Graduate Studies following the guidelines. Multiple Full RAs will be provided to outstanding applicants, starting from Fall 2024 or Spring 2025.

Curriculum Vitae (CV):

Areas of Research and Professional Interest

  • Cyber security
  • Wireless and mobile network
  • Cyber physical system
  • Dynamic modeling and estimation for Lithium-ion battery
  • AI-driven data analytics and processing
  • e-healthcare
  • Intelligent agricultural system
  • Social network
  • Blockchain
  • Cloud/edge computing

Research Profiles:

In the News: Powered by the Nebraska Engineering News

Courses Taught

  • ECEN 4950/8510 - Advanced Topics in Cyber Security -- Spring 2018, 2019, 2020, 2021, 2022, 2023
  • ECEN 4950/8510 - Advanced Topics in Network Design -- Fall 2018, 2019
  • ECEN 352 - Electronic Circuit II -- Fall 2020, 2021, 2022, 2023

About Kuan Zhang

Dr. Kuan Zhang joined the Department of Electrical and Computer Engineering at the University of Nebraska–Lincoln (UNL) as an assistant professor in September 2017. Dr. Zhang’s research interests cover broad areas of cyber security and cyber physical systems, including network and system security, privacy, big data analysis, social network, e-healthcare system, vehicular communications, blockchain, cloud/edge computing, and Internet-of-Things. Dr. Zhang was the recipient of Best Paper Award in IEEE WCNC 2013, Securecomm 2016, BigDataSE 2019, and IEEE ICC 2020.

Honors and Awards

IEEE Technical Committee on Scalable Computing (TCSC) Award for Excellence - Outstanding Ph.D Thesis, 2017

Funding

  • "An Intelligent Unmanned Aerial Application System for Site-Specific Weed Management" (co-PI), supported by Deptment of Agriculture and National Institute of Food and Agriculture (NIFA), 7/2021-6/2024.
  • "CPS:Medium: CPS-Enabled Variable Rate Technology" (co-PI), supported by National Science Foundation (NSF) Cyber Physical System (CPS) program and NIFA, 4/2021-3/2024.
  • "SCC-PG: Smart and Connected Childcare" (co-PI), supported by NSF - Smart and Connected Community (SCC) program, 10/2020-9/2021.
  • "E-Healthcare Solutions in the Treatment of Trauma using EMDR" (co-PI), supported by Nebraska Community Foundation Inc. and Blue Cross Blue Sheild, 5/2018-4/2022.

Selected Publications

Referred Journal Papers:

(Student Advisees are marked with*)

2022

  1. C. Yu*, S. Shen*, H. Yang, K. Zhang, and H. Zhao, "Leveraging Energy, Latency and Robustness for Routing Path Selection in Internet of Battlefield Things", accepted by IEEE Internet of Things Journal.
  2. Y. Jiang*, K. Zhang, Y. Qian, and L. Zhou, "P2AE: Preserving Privacy, Accuracy, and Efficiency in Location-dependent Mobile Crowdsensing", accepted by IEEE Transactions on Mobile Computing.
  3. K. Fan, Q. Chen, R. Su, K. Zhang, H. Wang, H. Li, and Y. Yang, "MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid with Cloud-Edge-End", accepted by IEEE Transactions on Cloud Computing.
  4. D. Chen, H. Wang, N. Zhang, X. Nie, H. Dai, K. Zhang, and K. Choo, "Privacy-Preserving Encrypted Traffic Inspection with Symmetric Cryptographic Techniques in IoT", accepted by IEEE Internet of Things Journal.
  5. H. Wang, K. Fan, K. Zhang, Z. Wang, H. Li, and Y. Yang, "Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground Integrated Vehicular Networks", accepted by IEEE Internet of Things Journal.
  6. H. Wang, K. Fan, K. Zhang, Z. Wang, H. Li, and Y. Yang, "Secure and Efficient Data Privacy-preserving Scheme for Mobile Cyber Physical Systems", accepted by IEEE Internet of Things Journal.
  7. J. Ni, K. Zhang, Y. Yu, and T. Yang, "Identity-based Provable Data Possession from RSA Assumption for Secure Cloud Storage", accepted by IEEE Transactions on Dependable and Secure Computing.
  8. Y Jiang*, K Zhang, Y Qian, R Hu, "Privacy-preserving data deduplication in edge-assisted mobile crowdsensing", International Journal of Multimedia Intelligence and Security, vol. 4, no. 1, pp: 1-19, 2022.

  9. Y. Wang, Z. Su, J. Li, N. Zhang, K. Zhang, R. Choo, and Y. Liu, "Blockchain-Based Secure and Cooperative Private Charging Pile Sharing Services for Vehicular Network", IEEE Transactions on Vehicular Technology, vol. 71, no. 2, pp. 1857-1874, 2022.

2021

  1. S. Shen*, C. Yu*, K. Zhang, and S. Ci, "Adaptive Artificial Intelligence for Resource-constrained Connected Vehicles in Cybertwin-driven 6G Network", IEEE Internet of Things Journal, vol. 8, no. 22, pp: 16269-16278, 2021
  2. S. Shen*, B. Liu, K. Zhang, and S. Ci, "Toward Fast and Accurate SOH Prediction for Lithium-ion Batteries", IEEE Transactions on Energy Conversion, vol. 36, no. 3, pp: 2036-2046, 2021.
  3. S. Shen*, C. Yu*, K. Zhang, J. Ni, and S. Ci, "Adaptive and Dynamic Security in AI-empowered 6G: From an Energy Efficiency Perspective", IEEE Communications Standards Magazine, vol. 5, no. 3, pp: 80-88, 2021.
  4. Y. Jiang*, K. Zhang, Y. Qian, and L. Zhou, "Reinforcement Learning-Based Query Optimization in Differentially Private IoT Data Publishing", IEEE Internet of Things Journal, vol. 8, no. 14, pp: 11163-11176, 2021.
  5. B Hu, Y Bi, M Zhi, K Zhang, F Yan, Q Zhang, and Z Liu, "A Deep One-Class Intrusion Detection Scheme in Software-Defined Industrial Networks", IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp: 4286-4296, 2021.
  6. X. Yuan, J. Chen, K. Zhang, Y. Wu, and T. Yang, "A Stable AI-based Binary and Multiple Class Heart Disease Prediction Model for IoMT", IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp: 2032-2040, 2021.
  7. W. Li, Z. Su, and K. Zhang, "Security Solutions for IoT-Enabled Applications Against Disease Pandemic", IEEE Internet of Things Magazine, vol. 4, no. 4, pp: 100-106, 2021.
  8. B. Wei, K. Li, W. Luo, W. Xu, J. Zhang, and K. Zhang, "No Need of Data Pre-processing: A General Framework for Radio-Based Device-Free Context Awareness", ACM Transactions on Internet of Things, vol. 2, no. 4, pp: 1-26, 2021.
  9. Q. Xu, Z. Su, K. Zhang, and S. Yu, "Fast Containment of Infectious Diseases with E-healthcare Mobile Social Internet of Things", IEEE Internet of Things Journal, vol. 8, no. 22, pp: 16473-16485, 2021.
  10. J. Ni, K. Zhang, and A. Vasilakos, "Security and Privacy for Mobile Edge Caching: Challenges and Solutions", IEEE Wireless Communications, vol. 28, no. 3, pp: 77-83, 2021.
  11. J. Kang, K. Fan, K. Zhang, X. Cheng, H. Li, and Y. Yang, "An ultra light weight and secure RFID batch authentication scheme for IoMT", Computer Communications, vol. 167, pp: 48-54, 2021.

2020

  1. S. Shen*, K. Zhang, S. Ci, and Y. Zhou, "Security in Edge-Assisted Internet-of-Things: Challenges and Solutions", Science China Information Sciences (SCIS), vol. 63, pp:220302, 2020.
  2. H. Yang*, K. Zheng, K. Zhang, and Y. Qian, "Joint Frame Design and Resource Allocation for Ultra-Reliable and Low-Latency Vehicular Networks", accepted by IEEE Transactions on Wireless Communications, vol. 19, no. 5, pp: 3607-3622, 2020.
  3. H. Yang*, K. Zhang, K. Zheng, Y. Qian, "Leveraging Linear Quadratic Regulator Cost and Energy Consumption for Ultra-Reliable and Low-Latency IoT Control Systems", IEEE Internet of Things Journal, vol. 7 no. 9, pp: 8356-8371, 2020.
  4. W. Li, Z. Su, K. Zhang, and Q. Xu, "Abnormal Crowd Traffic Detection for Crowdsourced Indoor Positioning in Heterogeneous Communications Networks", IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp: 2494-2505, 2020.
  5. W. Li, Z. Su, R. Li, K. Zhang, and Y. Wang, "Blockchain-Based Data Security for Artificial Intelligence Applications in 6G Networks", IEEE Network, vol. 34, no. 6, pp: 31-37, 2020.
  6. L. Lei, Y. Tan, K. Zheng, S. Liu, K. Zhang, and X. Shen, "Deep Reinforcement Learning for Autonomous Internet of Things: Model, Applications and Challenges", IEEE Communications Surveys & Tutorials, vol.22, no.3, pp:1722-1760, third quarter 2020.
  7. W. Li, Z. Su, K. Zhang, and A. Benslimane, "Defending Malicious Check-in Using Big Data Analysis of Indoor Positioning System: An  Access Point Selection Approach", IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp: 2642-2655, 2020.
  8. Q. Chen, K. Fan, K. Zhang, H. Wang, H. Li, and Y. Yang, "Privacy-preserving searchable encryption in the intelligent edge computing", Computer Communications, vol. 164, pp: 31-41, 2020.
  9. Y. Tan, C. Hu, K. Zhang, K. Zheng, E. Davis, and J. Park, "LSTM-based Anomaly Detection for Non-linear Dynamical System", IEEE Access, no. 8, pp: 103301-103308, 2020.
  10. P. Huang, K. Fan, H. Yang, K. Zhang, H. Li, and Y. Yang, "A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System", IEEE Access, vol. 8, pp: 94780-94794, 2020.
  11. M. Huang, K. Zhang, Z. Zeng, T. Wang, and Y. Liu, "An AUV-assisted Data Gathering Scheme based on Clustering and Matrix Completion for Smart Ocean", IEEE Internet-of-Things Journal, vol. 7, no. 10, pp: 9904-9918, 2020.
  12. K. Fan, K. Zhang, Y. Yang, and H. Li, "A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks", IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp: 5826-5835, 2020.
  13. H. Yang*, K. Zheng, K. Zhang, J. Mei, and Y. Qian, "Ultra-Reliable and Low-Latency Communications for Connected Vehicles: Challenges and Solutions", IEEE Network, vol. 34, no. 3, pp: 92-100, 2020.
  14. J. Ni, K. Zhang, Q. Xia, X. Lin, and X. Shen, "Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing", IEEE Transactions on Mobile Computing, vol. 19, no. 6, pp: 1317-1331, 2020.
  15. K. Fan, Q. Luo, K. Zhang, and Y. Yang, "Cloud-based lightweight secure RFID mutual authentication protocol in IoT", Information Sciences, vol. 527, pp: 329-340, 2020.
  16. D. Chen, N. Zhang, N. Cheng, K. Zhang, Z. Qin, and X. Shen, "Physical Layer based Message Authentication with Secure Channel Codes", accepted by IEEE Transactions on Dependable and Secure Computing.
  17. W. Tang, J. Ren, K. Zhang, D. Zhang, Y. Zhang, and X. Shen, "Efficient and Privacy-preserving Fog-assisted Health Data Sharing Scheme", ACM Transactions on Intelligent Systems and Technology, vol. 10, no. 6, pp: (68)1-23, 2020.
  18. Q. Xu, Z. Su, K. Zhang, and P. Li, "Intelligent Cache Pollution Attacks Detection for Edge Computing enabled Mobile Social Networks", IEEE Transaction on Emerging Topics in Computational Intelligence, vol. 4, no. 3, pp: 241-252, 2020.
  19. W. Tang, K. Zhang, J. Ren, Y. Zhang, and X. Shen, "Privacy-Preserving Task Recommendation with Win-win Incentives for Mobile Crowdsourcing", Information Science, vol. 527, pp: 477-492, 2020.
  20. K. Fan, Y. Liu, K. Zhang, H. Li, and Y. Yang, "A secure and efficient outsourced computation on data sharing scheme for privacy computing", Journal of Parallel and Distributed Computing, vol. 135, pp: 169-176, 2020.

2019

  1. K. Fan, S. Zhu, K. Zhang, H. Li and Y. Yang, "A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems", IEEE Network, vol. 33, no. 2, pp: 44-49, 2019.
  2. W. Tang, K. Zhang, D. Zhang, J. Ren, Y. Zhang, and X. Shen, "Fog-enabled Smart Health: Towards Cooperative and Secure Healthcare Service Provision", IEEE Communications Magazine, vol. 57, no. 5, pp: 42-48, 2019.
  3. Q. Jiang, X. Huang, N. Zhang, K. Zhang, X. Ma, and J. Ma, "Shake to Communicate: Secure Handshake Acceleration-based Pairing Mechanism for Wrist Worn Devices", IEEE Internet of Things Journal, vol. 6, no. 3, pp: 5618-5630, 2019.
  4. Q. Xu, Z. Su, Q. Zheng, M. Luo, B. Dong, and K. Zhang, "Game Theoretical Secure Caching Scheme in Multi-homing Edge Computing-enabled Heterogeneous Networks", IEEE Internet of Things Journal, vol. 6, no. 3, pp: 4536-4546, 2019.
  5. J. Qiu, K. Fan, K. Zhang, Q. Pan, H. Li and Y. Yang, "An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT", IEEE Access, vol. 7, pp: 180205-180217, 2019.
  6. Z. Yang, K. Zhang, L. Lei, and K. Zheng, "A Novel Classifier Exploiting Mobility Behaviors for Sybil Detection in Connected Vehicle Systems", IEEE Internet of Things Journal, vol. 6, no. 2, pp: 2626-2636, 2019.
  7. Z. Qin, L. Hu, N. Zhang, D. Chen, K. Zhang, Z. Qin, and K. Choo, "Learning Aided User Identification Using Smartphone Sensors for Smart Homes", IEEE Internet of Things Journal, vol. 6, no. 5, pp: 7760-7772, 2019.
  8. J. Ni, K. Zhang, X. Lin, and X. Shen, "Balancing Security and Efficiency for Smart Metering against Misbehaving Collectors", IEEE Transactions on Smart Grid, vol. 10 , no. 2, pp.1225 - 1236, 2019.
  9. K. Fan, S. Zhu, K. Zhang, H. Li, and Y. Yang, "A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems", IEEE Network, vol. 33, no. 2, pp: 44-49, 2019.
  10. W. Tang, K. Zhang, J. Ren, Y. Zhang, and X. Shen, "Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features",  IEEE Transactions on Mobile Computing, vol. 18, no. 4, pp: 845-856, 2019.

2018

  1. K. Zhang, X. Liang, J. Ni, K. Yang, and X. Shen, "Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage", IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp: 607-620, 2018.
  2. D. Chen, N. Zhang, R. Lu, X. Fang, K. Zhang, Z. Qin, and X. Shen, "An LDPC code based physical layer message authentication scheme with prefect security", IEEE Journal on Selected Areas in Communications, vol. 36, no.4, pp: 748-761, 2018.
  3. X. Yuan, C. Li, Q. Ye, K. Zhang, N. Cheng, N. Zhang, and X. Shen, "Performance Analysis of IEEE 802.15.6-Based Coexisting Mobile WBANs With Prioritized Traffic and Dynamic Interference", IEEE Transactions on Wireless Communications, vol. 17, no. 8, pp: 5637-5652, 2018.
  4. K. Fan, J. Yin, K. Zhang, H. Li, and Y. Yang, "EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing", Sensors, Vol. 18, No. 11, pp: 1-16, 2018.
  5. Y. Wu, X. Chen, J. Shi, K. Ni, L. Qian, L. Huang, and K. Zhang, "Optimal Computational Power Allocation in Multi-Access Mobile Edge Computing for Blockchain", Sensors, vol. 18, no. 10, 2018, pp: 1-19.
  6. Y. Liu, K. Ota, K. Zhang, M. Ma, N. Xiong, A. Liu, and J. Long, "QTSAC: An energy-efficient mac protocol for delay minimization in wireless sensor networks", IEEE Access, vol. 6, 2018, pp: 8273-8291.
  7. H. Teng, K. Zhang, M. Dong, K. Ota, A. Liu, M. Zhao, and T. Wang, "Adaptive transmission range based topology control scheme for fast and reliable data collection", Wireless Communications and Mobile Computing, Vol. 2018, pp:1-21.
  8. J. Ni, K. Zhang, X. Lin, and X. Shen, “Securing Fog Computing for Internet of Things Applications: Challenges and Solutions”, IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 601-628, 2018.

2017

  1. K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. Shen, "Security and Privacy for Smart City Applications: Challenges and Solutions", IEEE Communications Magazine, vol. 55, no. 1, pp. 122-129, 2017.
  2. J. Ni, K. Zhang, K. Alharbi, X. Lin, N. Zhang, and X. Shen, "Differentially Private Smart Metering with Fault Tolerance and Range-Based Filtering", IEEE Trans.on Smart Grid, Vol. 8, No. 5, pp. 2483-2493, 2017.
  3. C. Lai, K. Zhang, N. Cheng, H. Li, and X. Shen, "SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs", IEEE Transactions on Intelligent Transportation Systems, Vol. 18, No. 6, pp. 1559-1574, 2017.

2016 and before

  1. J. Ren, Y. Zhang, K. Zhang, and X. Shen, "Adaptive and Channel-aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks", IEEE Transactions on Wireless Communications, vol.15, no.5, pp.3718-3731, 2016.
  2. J. Ren, Y. Zhang, K. Zhang, A. Liu, J. Chen, and X. Shen, "Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks", IEEE Transactions on Industry Informatics, vol.12, no.2, pp.788-800, 2016.
  3. K. Zheng, Z. Yang, K. Zhang, P. Chatzimisios, W. Xiang, and K. Yang, "Big Data Driven Optimization for Mobile Networks towards 5G", IEEE Network Magazine, vol.30, no.1, pp.44-51, 2016.
  4. K. Zhang, X. Liang, R. Lu, and X. Shen, "PIF: A Personalized Fine-grained Spam Filtering Scheme with Privacy Preservation in Mobile Social Network", IEEE Transactions on Computational Social Systems, vol.2, no.3, pp.41-52, 2015.
  5. K. Zhang, K. Yang, X. Liang, Z. Su, X. Shen, and H. Luo, "Security and Privacy for Mobile Healthcare Networks — from Quality-of-Protection Perspective", IEEE Wireless Communications, vol.22, no.4, pp.104-112, 2015.
  6. Q. Xu, Z. Su, K. Zhang, P. Ren, and X. Shen, "Epidemic Information Dissemination in Mobile Social Networks with Opportunistic Links", IEEE Transactions on Emerging Topics on Computing, vol.3, no.3, pp.399-409, 2015.
  7. K. Yang, K. Zhang, J. Ren and X. Shen, "Security and Privacy in Mobile Crowdsourcing Networks: Challenges and Opportunities", IEEE Communications Magazine, vol.53, no.8, pp.75-81, 2015.
  8. J. Ren, Y. Zhang, K. Zhang, and X. Shen, "Exploiting Mobile Crowdsourcing for Pervasive Cloud Services: Challenges and Solutions", IEEE Communications Magazine, vol.53, no.53, pp.98-105, 2015.
  9. N. Zhang, N. Cheng, A. Gamage, K. Zhang, J. W. Mark, X. Shen, "Cloud Assisted HetNets Toward 5G Wireless Networks", IEEE Communications Magazine, vol.53, no.6, pp.59-65, 2015.
  10. K. Zhang, X. Liang, R. Lu, and X. Shen, "Exploiting Multimedia Services in Mobile Social Network from Security and Privacy Perspectives", IEEE Communications Magazine, vol.52, no.3, pp.58-65, 2014.
  11. K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil Attacks and Their Defenses in the Internet of Things", IEEE Internet of Things Journal, vol.1, no.5, pp.372-383, 2014.
  12. K. Zhang, X. Liang, M. Barua, R. Lu, and X. Shen, "PHDA: A Priority Based Health Data Aggregation with Privacy Preservation for Cloud Assisted WBANs", Information Sciences, Elsevier, vol.284, pp.130-141, 2014.
  13. X. Liang, K. Zhang, X. Shen, and X. Lin, "Security and Privacy in Mobile Social Networks: Challenges and Solutions", IEEE Wireless Communications, vol.21, no.1, pp.33-41, 2014.
  14. X. Liang, X. Li, K. Zhang, R. Lu, X. Lin, and X. Shen, "Fully Anonymous Profile Matching in Mobile Social Networks," IEEE Journal on Selected Areas in Communications, vol.31, no.9, pp.641-655, 2013.
  15. X. Liang, K. Zhang, R. Lu, X. Lin, and X. Shen, "EPS: An Ecient and Privacy-Preserving Service Searching Scheme for Smart Community," IEEE Sensors Journal, vol.13, no.10, pp.3702-3710, 2013.
  16. M. Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, "PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid", IEEE Transactions on Emerging Topics in Computing, vol.1, no.1, pp.178-191, 2013.



Referred Conference Papers:

(Student Advisees are marked with*)

2022

  1. C. Yu*, S. Shen*, S. Wang, K. Zhang, and H. Zhao, "Efficient Multi-Layer Stochastic Gradient Descent Algorithm for Federated Learning in E-health", Proc. of IEEE of ICC'22, Seoul, Korea, May 16-20, 2022.
  2. S. Shen*, C. Yu*, K. Zhang, and S. Ci, "Collaborative Edge Caching with Personalized Modeling of Content Popularity over Indoor Mobile Social Networks", Proc. of IEEE of ICC'22, Seoul, Korea, May 16-20, 2022.
  3. W. Huang, W. Tang, K. Zhang, H. Zhu, and Y. Zhang, "Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems", Proc. of IEEE Infocom'22, virtual conference, May 2-5, 2022.
  4. C. Yu*, S. Shen*, K. Zhang, H. Zhao, and Y. Shi, "Energy-Aware Device Scheduling for Joint Federated Learning in Edge-assisted Internet of Agriculture Things", Proc. of IEEE WCNC'22, Austin, TX, April 10-13, 2022.
  5. Y. Jiang*, K. Zhang, Y. Qian, and R. Hu, "Preserving Location Privacy and Accurate Task Allocation in Edge-assisted Mobile Crowdsensing", Proc. of IEEE WCNC'22, Austin, TX, April 10-13, 2022.

2021

  1. Y. Jiang*, K. Zhang, Y. Qian, and R. Hu, "Cooperative Task Allocation in Edge Computing Assisted Vehicular Crowdsensing", Proc. of IEEE Globecom'21, Madrid, Spain, December 7-11, 2021.
  2. W. Yao, K. Zhang, C. Yu*, and H. Zhao, "Exploiting Ensemble Learning for Edge-assisted Anomaly Detection Scheme in e-healthcare System", Proc. of IEEE Globecom'21, Madrid, Spain, December 7-11, 2021.
  3. S. Shen*, C. Yu*, K. Zhang, and S. Ci, "Exploiting Feature Interactions for Malicious Website Detection with Overhead-accuracy Tradeoff", Proc. of IEEE ICC'21, Montreal, QC, Canada, June 2021.
  4. S. Shen*, C. Yu*, K. Zhang, X. Chen, H. Chen, and S. Ci, "Communication-Efficient Federated Learning for Connected Vehicles with Constrained Resources", Proc. of IEEE IWCMC, Harbin, China, June 28-July 2, 2021.
  5. Y. Jiang*, K. Zhang, Y. Qian, and R. Hu, "Efficient and Privacy-preserving Distributed Learning in Cloud-Edge Computing Systems", ACM Workshop on Wireless Security and Machine Learning (WiseML), June 28-July 2, 2021.
  6. C. Guo, Y. Yang, Y. Zhou, K. Zhang, and S. Ci, "A Quantitative Study of Energy Consumption for Embedded Security", Proc. of IEEE WCNC'21, Nanjing, China, March 29-April 1, 2021.

2020

  1. Y. Jiang*, K. Zhang, Y. Qian, and L. Zhou, "An Optimization Framework for Privacy-preserving Access Control in Cloud-Fog Computing Systems", Proc. of IEEE VTC'20-Fall, Victoria, BC, Canada, October 2020.
  2. W. Li, Z. Su, K. Zhang, A. Benslimane, "Defending Malicious Check-in Based on Access Point Selection for Indoor Positioning System", Proc. of IEEE ICC'20, Ireland, June 7-11, 2020 (Best Paper Award)

2019

  1. X. Yuan, J. Han, J. Pan, K. Zhang, C. Li, and Q. Ye, "2TM-MAC: A Two-Tier Multi-channel Interference Mitigation MAC Protocol for Coexisting WBANs", Proc. of IEEE Globecom'19, Waikoloa, HI, USA, December 9-13, 2019.
  2. Q. Xu, Z. Su, Y. Wang, and K. Zhang, "Secure Edge Caching for Layered Multimedia Contents in Heterogeneous Networks", Proc. of IEEE Globecom'19, Waikoloa, HI, USA, December 9-13, 2019.
  3. H. Yang*, K. Zhang, K. Zheng, and Y. Qian, "Secure Edge Caching Placement and Delivery for Ultra-Reliable and Low-Latency Vehicular Networks", IEEE Globecom Workshop on Advanced Mobile Edge/Fog Computing for 5G Mobile Networks and Beyond, Waikoloa, HI, USA, December 9-13, 2019.
  4. S. Shen*, K. Zhang, S. Ci, and X. Liang, "Lifecycle Prediction of Second Use Electric Vehicle Batteries Based on ARIMA Model", IEEE Globecom Workshop on Cyber-Physical Energy System for Sustainable ICT (CYPESS), Waikoloa, HI, USA, December 9-13, 2019.
  5. X. Yuan, Z. Ma, W. Li, H. Wang, C. Li, and K. Zhang, "An IEEE 802.15.6-Based MAC Frame Aggregation Approach for Wireless Body Area Networks", in Proc. of IEEE WCSP, Xi’an, China, October 2019.
  6. X. Wang, Y. Zhou, X. Ma, N. Lu, N. Cheng, and K. Zhang, "Smart Cyber Forensics of Rear-End Collision based on Multi-Access Edge Computing", Proc. of IEEE CIC/ICCC'19, Changchun, China, August 11-13, 2019.
  7. X. Yuan, X. Wang, J. Han, J. Liu, H. Chen, K. Zhang, and Q. Ye, "A High Accuracy Integrated Bagging-Fuzzy-GBDT Prediction Algorithm for Heart Disease Diagnosis", Proc. of IEEE CIC/ICCC'19, Changchun, China, August 11-13, 2019.
  8. Y. Wang, Z. Su, and K. Zhang, "A Secure Private Charging Piles Sharing Scheme with Electric Vehicles in Energy Blockchain", in Proc. of IEEE BigDataSE'19, Rotorua, New Zealand, August 5-8, 2019 (Best Paper Award).
  9. Z. Su, Q. Xu, and K. Zhang, "HMM Based Cache Pollution Attack Detection for Edge Computing Enabled Mobile Social Networks", Proc. IEEE ICC'19, Shanghai, China, May 20-24, 2019.
  10. M. Hadian, T. Altuwaiyan, X. Liang, B. Sheng and K. Zhang, "SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis", Proc. IEEE ICNC'19, Honolulu, Hawaii, USA, February 18-21, 2019.

2018

  1. Y. Wu, J. Shi, X. Chen, K. Ni, L. Qian, L. Huang, and K. Zhang, "Optimal Multi-Access Computation Offoading for Mobile Blockchain", Proc. ICCS, Chengdu, China, Dec. 19-21, 2018.
  2. W. Li, K. Zhang, Z. Su, R. Lu, and Y. Wang, "Anomalous Path Detection for Spatial Crowdsourcing based Indoor Navigation System", Proc. IEEE Globecom'18, Abu Dahbi, UAE, December 9-13, 2018.
  3. X. Yuan, C. Li, K. Zhang, Q. Ye, N. Cheng, N. Zhang, and X. Shen, "Dynamic interference analysis of coexisting mobile WBANs for health monitoring", Proc. IEEE ICC'18, Kansas City, MO, May 20-24, 2018.

2017

  1. Q. Li, K. Zhang, M. Cheffena, and X. Shen, "Channel-based Sybil Detection in Industrial Wireless Sensor Networks: a Multi-kernel Approach", Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  2. W. Tang, K. Zhang, J. Ren, Y. Zhang, and X. Shen, "Lightweight and Privacy-preserving Fog-assisted Information Sharing Scheme for Health Big Data", Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  3. Q. Li, K. Zhang, M. Cheffena, and X. Shen, "Channel-based Sampling Rate and Queuing State Control in Delay-Constraint Industrial WSNs", Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  4. D. Chen, N. Cheng, N. Zhang, K. Zhang, Z. Qin, and X. Shen, "Multi-Message Authentication over Noisy Channel with Polar Codes", Proc. IEEE MASS, Orlando, Florida, October 22-25, 2017.
  5. J. Ni, K. Zhang, X. Lin, Q. Xia, and X. Shen, "Privacy-Preserving Mobile Crowdsensing for Located-Based Applications", Proc. IEEE ICC'17, Paris, France, May 21-25, 2017.
  6. Q. Li, K. Zhang, M. Cheffena, and X. Shen, "A Measurement-based Boundary Estimation Approach for Localization in Industrial WSNs", Proc. IEEE ICC'17, Paris, France, May 21-25, 2017.
  7. Y. He, K. Zhang, H. Wang, F. Li, B. Niu, and H. Li, "Impact factor-based group recommendation scheme with privacy preservation in MSNs", Proc. IEEE ICC'17, Paris, France, May 21-25, 2017.

2016 and before

  1. J. Ni, X. Lin, K. Zhang, Y. Yu, and X. Shen, "CPARN: Cloud-Based Privacy-Preserving Parking Navigation in Vehicular Ad Hoc Networks", Proc. of Securecomm, Guangzhou, China, 2016 (Best Paper Award).
  2. J. Ni, X. Lin, K. Zhang, and Y. Yu, "Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach", Proc. of IEEE Globecom, Washington D.C., USA, December, 2016.
  3. J. Ni, X. Lin, K. Zhang, and X. Shen, "Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing", Proc. of VTC - Fall, Montreal, Canada, September, 2016.
  4. J. Ni, X. Lin, K. Zhang, Y. Yu, and X. Shen, "Secure Outsourced Data Transfer with Integrity Verification in Cloud Storage", Proc. of IEEE ICCC, Chengdu, China, July, 2016.
  5. J. Ni, X. Lin, K. Zhang, Y. Yu, and X. Shen, "Device-Invisible Two-Factor Authenticated Key Agreement for BYOD", Proc. of IEEE ICCC, Chengdu, China, July, 2016.
  6. Q. Li, K. Zhang, M. Cheffena, and X. Shen, "Exploiting Dispersive Power Gain and Delay Spread for Sybil Detection in Industrial WSNs", Proc. of IEEE ICCC, Chengdu, China, July, 2016.
  7. J. Ni, K. Zhang, X. Lin, H. Yang, and X. Shen, "AMA: Anonymous Mutual Authentication with Traceability in Carpooling Systems", Proc. of IEEE ICC, Kuala Lumpur, Malaysia, May, 2016.
  8. J. Ni, K. Zhang, X. Lin, and X. Shen, "EDAT: Efficient Data Aggregation without TTP for Privacy-Assured Smart Metering", Proc. of IEEE ICC, Kuala Lumpur, Malaysia, May, 2016.
  9. Z. Su, Q. Xu, K. Zhang, K. Yang, and X. Shen, "Dynamic Bandwidth Allocation in Mobile Social Networks with Multiple Homing Access", in Proc. of IEEE WCSP, Nanjing, China, October, 2015.
  10. K. Zhang, X. Liang, R. Lu, K. Yang, and X. Shen, "Exploiting Mobile Social Behaviors for Sybil Detection", in Proc. IEEE INFOCOM, pp.271-279, Hong Kong, China, April 26 - May 1, 2015.
  11. M. He, K. Zhang, X. Shen, "PMQC: A Privacy-Preserving Multi-Quality Charging Scheme in V2G network", in Proc. of IEEE Globecom, Austin, Texas, USA, pp.675-680, December, 2014.
  12. J. Ren, Y. Zhang, K. Zhang, X. Shen, "Exploiting Channel-Aware Reputation System Against Selective Forwarding Attacks in WSNs", in Proc. of IEEE Globecom, Austin, Texas, USA, pp.330-335, December, 2014.
  13. K. Zhang, R. Lu, X. Liang, J. Qiao, and X. Shen, "PARK: A Privacy-preserving Aggregation Scheme with Adaptive Key Management for Smart Grid", in Proc. IEEE ICCC, Xi'An, China, pp.236-241, August 2013.
  14. K. Zhang, X. Liang, R. Lu, and X. Shen, "SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks", in Proc. of IEEE ICC, Budapest, Hungary, pp.6045-6049, June 2013.
  15. Y. Liu, Z. Shi, K. Zhang, Y. Zheng, R. Lu, X Shen, "A Novel Low-power Mixed-mode Implementation of Weight Update in Particle PHD Filters", in Proc. of IEEE WCNC, Shanghai, China, pp.4647-4652, April 2013 (Best Paper Award).
  16. K. Zhang, X. Liang, R. Lu, X. Shen, and H. Zhao, "VSLP: Voronoi-Socialspot-Aided Packet Forwarding Protocol with Receiver Location Privacy in MSNs", in Proc. IEEE Globecom, Anaheim, California, USA, pp.348-353, December, 2012.