Kuan Zhang

Contact Information:

Scott Campus (Omaha)
PKI 206B
(402) 554-6005
kuan.zhang@unl.edu

Personal Links:

My Google Scholar

Professional Memberships:

• IEEE Member

Associate Professor

Academic Degrees

  • Ph.D., Electrical and Computer Engineering; University of Waterloo, Canada (2016)
  • M.S., Computer Applied Technology; Northeastern University, China (2011)
  • B.S., Communications Engineering; Northeastern University, China (2009)

Certifications

  • Ph.D.

Open Positions - RA for Ph.D. students

  • I am seeking self-motivated Ph.D. students with strong interests in the area of cyber security, wireless network, AI and data analytics, and embedded/cyber physical systems. If you want to apply for this position, please email me a copy of your resume (including education background, relevant research/working experience, and relevant publications), GPA, GRE score (if applicable), and TOEFL/IELTS score (for international applicants). In your email, please use “Graduate Applicant – Your Name” as the subject, and describe the motivation of your interests. For admission by the Department of Electrical and Computer Engineering, you should submit a formal application to UNL Office of Graduate Studies following the guidelines. Multiple Full RAs will be provided to outstanding applicants, starting from Fall 2025 or Spring 2026.

Curriculum Vitae (CV):

Areas of Research and Professional Interest

  • Cyber security
  • Edge/cloud computing, distributed AI
  • Wireless and mobile network
  • Cyber physical system
  • Dynamic modeling and estimation for Lithium-ion battery
  • Applications: e-healthcare, Intelligent agricultural system, Social network

Research Profiles:

In the News: Powered by the Nebraska Engineering News

Courses Taught

  • ECEN 495/851 - Advanced Topics in Cyber Security -- Spring 2018 - 2024
  • ECEN 4950/8510 - Advanced Topics in Network Design -- Fall 2018, 2019
  • ECEN 352 - Electronic Circuit II -- Fall 2020 - 2024

About Kuan Zhang

Dr. Kuan Zhang joined the Department of Electrical and Computer Engineering at the University of Nebraska–Lincoln (UNL) as an assistant professor in September 2017. Dr. Zhang’s research interests cover broad areas of cyber security and cyber physical systems, including network and system security, privacy, big data analysis, social network, e-healthcare system, vehicular communications, blockchain, cloud/edge computing, and Internet-of-Things. Dr. Zhang was the recipient of Best Paper Award in IEEE WCNC 2013, Securecomm 2016, BigDataSE 2019, and IEEE ICC 2020.

Honors and Awards

IEEE Technical Committee on Scalable Computing (TCSC) Award for Excellence - Outstanding Ph.D Thesis, 2017

Funding

  • "An Intelligent Unmanned Aerial Application System for Site-Specific Weed Management" (co-PI), supported by Deptment of Agriculture and National Institute of Food and Agriculture (NIFA), 7/2021-6/2024.
  • "CPS:Medium: CPS-Enabled Variable Rate Technology" (co-PI), supported by National Science Foundation (NSF) Cyber Physical System (CPS) program and NIFA, 4/2021-3/2024.
  • "SCC-PG: Smart and Connected Childcare" (co-PI), supported by NSF - Smart and Connected Community (SCC) program, 10/2020-9/2021.
  • "E-Healthcare Solutions in the Treatment of Trauma using EMDR" (co-PI), supported by Nebraska Community Foundation Inc. and Blue Cross Blue Sheild, 5/2018-4/2022.

Selected Publications

Referred Journal Papers:

(Student Advisees are marked with*)

2024

  1. C. Yu*, S. Shen*, S. Wang, K. Zhang, and H. Zhao, "Communication-Efficient Hybrid Federated Learning for E-Health With Horizontal and Vertical Data Partitioning", accepted by IEEE Transactions on Neural Networks and Learning Systems.
  2. G. Li, T. H. Luan, X. Li, J. Zheng, C. Lai, Z. Su, and K. Zhang, "Breaking Down Data Sharing Barrier of Smart City: A Digital Twin Approach", IEEE Network, vol. 38, no. 1, pp: 238 - 246, 2024.
  3. G. Wei, K. Fan, K. Zhang, H. Wang, H. Li, and Y. Yang, "Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things", IEEE Network, vol. 11, no. 5, pp: 9213 - 9225, 2024.
  4. H. Zeng, Z. Su, Q. Xu, K. Zhang, and Q. Ye, "Game Theoretical Incentive for USV Fleet-Assisted Data Sharing in Maritime Communication Networks", IEEE Transactions on Network Science and Engineering, vol. 11, no. 2, pp: 1398 - 1412, 2024.
  5. N. Gao, K. Fan, H. Wang, H. Chen, K. Zhang, H. Li, and Y. Yang, "Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT", IEEE Internet of Things Journal, vol. 11, no. 1, pp: 889 - 903, 2024.
  6. Y. Bai, K. Fan, K. Zhang, H. Li, and Y. Yang, "CR-FH-CPABE: Secure File Hierarchy Attribute-Based Encryption Scheme Supporting User Collusion Resistance in Cloud Computing", IEEE Internet of Things Journal, vol. 11, no. 10, pp: 17727 - 17739, 2024.
  7. K. Fan, H. Lu, Y. Bai, Y. Luo, Y. Yang, K. Zhang, and H. Li, "SC-Chain: An Efficient Blockchain Framework for Smart City", IEEE Internet of Things Journal, vol. 11, no. 5, pp: 7863 - 7877, 2024.
  8. Z. Zhang, F. Zhang, Z. Xiong, K. Zhang, and D. Chen, "LsiA3CS: Deep-Reinforcement-Learning-Based Cloud–Edge Collaborative Task Scheduling in Large-Scale IIoT", IEEE Internet of Things Journal, vol. 11, no. 13, pp: 23917 - 23930, 2024.
  9. N. Gao, K. Fan, H. Wang, K. Zhang, H. Li, and Y. Yang, "Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT", IEEE Internet of Things Journal, vol. 11, no. 1, pp: 1065 - 1079, 2024.
  10. K. Fan, Y. Ren, Y. Bai, G. Wei, K. Zhang, H. Li, and Y. Yang, "Fault-Tolerant and Collusion-Resistant Lattice-Based Multidimensional Privacy-Preserving Data Aggregation in Edge-Based Smart Grid", IEEE Internet of Things Journal, vol. 11, no. 6, pp: 9487 - 9504, 2024.
  11. D. Chen, Z. Liao, Z. Xie, R. Chen, Z. Qin, M. Cao, H. Dai, and K. Zhang, "MFSSE: Multi-Keyword Fuzzy Ranked Symmetric Searchable Encryption With Pattern Hidden in Mobile Cloud Computing", accepted by IEEE Transactions on Cloud Computing.
  12. H. Wang, K. Fan, C. Yu, K. Zhang, F. Li, H. Li, Y. Yang, and H. Zhu, "LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing", accepted by IEEE Transactions on Services Computing.
  13. D. Chen, Z. Liao, R. Chen, H. Wang, C. Yu, K. Zhang, N. Zhang. X. Shen, "Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading", accepted by IEEE Transactions on Dependable and Secure Computing.

2023

  1. Y. Jiang*, K. Zhang, Y. Qian, and L. Zhou, "P2AE: Preserving Privacy, Accuracy, and Efficiency in Location-dependent Mobile Crowdsensing", IEEE Transactions on Mobile Computing, vol. 22, no. 4, pp: 2323 - 2339, 2023.
  2. K. Fan, Q. Chen, R. Su, K. Zhang, H. Wang, H. Li, and Y. Yang, "MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid with Cloud-Edge-End", IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp:  1170 - 1181, 2023.
  3. F. Zhou, Z. Wang, D. Chen, and K. Zhang, "Reservoir Inflow Forecasting in Hydropower Industry: A Generative Flow-Based Approach", IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp: 1196 - 1206, 2023.
  4. H. Wang, K. Fan, H. Chen, Q. Chen, K. Zhang, F. Li, H. Li, and Y. Yang, "Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme", IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 3, pp: 2578 - 2592, 2023.
  5. W. Li, M. Wen, Z. Su, and K. Zhang, "Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing", IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 4, pp: 2913 - 2924, 2023.
  6. Y. Bi, K. Fan, K. Zhang, Y. Bai, H. Li, and Y. Yang, "A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects", IEEE Internet of Things Journal, vol. 10, no. 18, pp: 16225 - 16237, 2023.
  7. T. Liu, L. Lei, K. Zheng, and K. Zhang, "Autonomous Platoon Control With Integrated Deep Reinforcement Learning and Dynamic Programming", IEEE Internet of Things Journal, vol. 10, no. 6, pp: 5476 - 5489, 2023.
  8. K. Fan, Y. Bi, Y. Yang, K. Zhang, and H. Li, "Secure and Efficient Lightweight Protocol for Emergency Vehicle Avoidance Based on Cloud", IEEE Network, vol. 37, no. 4, pp: 314 - 322, 2023.
  9. K. Zheng, H. Yang, X. Xiong, J. Mei, L. Hou, and K. Zhang, "Dynamic Beam-Based Random Access Scheme for M2M Communications in Massive MIMO Systems", IEEE Transactions on Vehicular Technology, vol. 72, no. 11, pp: 14531 - 14542, 2023.

2022

  1. C. Yu*, S. Shen*, H. Yang, K. Zhang, and H. Zhao, "Leveraging Energy, Latency and Robustness for Routing Path Selection in Internet of Battlefield Things", IEEE Internet of Things Journal, vol. 9, no. 14, pp: 12601 - 12613, 2022.
  2. Y. Jiang*, K. Zhang, Y. Qian, and L. Zhou, "Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning", IEEE Transactions on Information Forensics and Security, vol. 17, pp: 2227 - 2240, 2022.
  3. Q. Zhou, K. Zheng, K. Zhang, L. Hou, X. Wang, "Vulnerability Analysis of Smart Contract for Blockchain-Based IoT Applications: A Machine Learning Approach", IEEE Internet of Things Journal, vol. 9, no. 24, pp: 24695 - 24707, 2022.
  4. D. Chen, H. Wang, N. Zhang, X. Nie, H. Dai, K. Zhang, and K. Choo, "Privacy-Preserving Encrypted Traffic Inspection with Symmetric Cryptographic Techniques in IoT", IEEE Internet of Things Journal, vol. 9, no. 18, pp: 17265 - 17279, 2022.
  5. H. Wang, K. Fan, K. Zhang, Z. Wang, H. Li, and Y. Yang, "Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground Integrated Vehicular Networks", IEEE Internet of Things Journal, vol. 9, no. 8, pp:  5957 - 5970, 2022.
  6. K. Zheng, H. Yang, S. Liu, K. Zhang, and L. Lei, "A Behavior Decision Method Based on Reinforcement Learning for Autonomous Driving", IEEE Internet of Things Journal, vol. 9, no. 24, pp: 25386 - 25394, 2022.
  7. D. Chen, N. Zhang, H. Wu, K. Zhang, R. Lu, M. Guizani, "Audio-Based Security Techniques for Secure Device-to-Device Communications", IEEE Network, vol. 36, no. 6, pp: 54 - 59, 2022.
  8. B. Hu, Y. Bi, M. Zhi, K. Zhang, F. Yan, Q. Zhang, and Z. Liu, "A Deep One-Class Intrusion Detection Scheme in Software-Defined Industrial Networks", IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp: 4286 - 4296, 2022.
  9. H. Wang, K. Fan, K. Zhang, Z. Wang, H. Li, and Y. Yang, "Secure and Efficient Data Privacy-preserving Scheme for Mobile Cyber Physical Systems", IEEE Internet of Things Journal, vol. 9, no. 22, pp: 22375 - 22388, 2022.
  10. Y. Wang, Z. Su, T. H. Luan, R. Li, and K. Zhang, "Federated Learning With Fair Incentives and Robust Aggregation for UAV-Aided Crowdsensing", IEEE Transactions on Network Science and Engineering, vol. 9, no. 5, pp: 3179 - 3196, 2022.
  11. J. Ni, K. Zhang, Y. Yu, and T. Yang, "Identity-based Provable Data Possession from RSA Assumption for Secure Cloud Storage", IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp: 1753 - 1769, 2022.
  12. Y Jiang*, K Zhang, Y Qian, R Hu, "Privacy-preserving data deduplication in edge-assisted mobile crowdsensing", International Journal of Multimedia Intelligence and Security, vol. 4, no. 1, pp: 1-19, 2022.

  13. Y. Wang, Z. Su, J. Li, N. Zhang, K. Zhang, R. Choo, and Y. Liu, "Blockchain-Based Secure and Cooperative Private Charging Pile Sharing Services for Vehicular Network", IEEE Transactions on Vehicular Technology, vol. 71, no. 2, pp. 1857-1874, 2022.
  14. D. Chen, H. Wang, N. Zhang, X. Nie, H. Dai, K. Zhang, and K. R. Choo, "Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT", IEEE Internet of Things Journal, vol. 9, no. 18, pp: 17265 - 17279, 2022.

2021

  1. S. Shen*, C. Yu*, K. Zhang, and S. Ci, "Adaptive Artificial Intelligence for Resource-constrained Connected Vehicles in Cybertwin-driven 6G Network", IEEE Internet of Things Journal, vol. 8, no. 22, pp: 16269-16278, 2021
  2. S. Shen*, B. Liu, K. Zhang, and S. Ci, "Toward Fast and Accurate SOH Prediction for Lithium-ion Batteries", IEEE Transactions on Energy Conversion, vol. 36, no. 3, pp: 2036-2046, 2021.
  3. S. Shen*, C. Yu*, K. Zhang, J. Ni, and S. Ci, "Adaptive and Dynamic Security in AI-empowered 6G: From an Energy Efficiency Perspective", IEEE Communications Standards Magazine, vol. 5, no. 3, pp: 80-88, 2021.
  4. Y. Jiang*, K. Zhang, Y. Qian, and L. Zhou, "Reinforcement Learning-Based Query Optimization in Differentially Private IoT Data Publishing", IEEE Internet of Things Journal, vol. 8, no. 14, pp: 11163-11176, 2021.
  5. B Hu, Y Bi, M Zhi, K Zhang, F Yan, Q Zhang, and Z Liu, "A Deep One-Class Intrusion Detection Scheme in Software-Defined Industrial Networks", IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp: 4286-4296, 2021.
  6. X. Yuan, J. Chen, K. Zhang, Y. Wu, and T. Yang, "A Stable AI-based Binary and Multiple Class Heart Disease Prediction Model for IoMT", IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp: 2032-2040, 2021.
  7. W. Li, Z. Su, and K. Zhang, "Security Solutions for IoT-Enabled Applications Against Disease Pandemic", IEEE Internet of Things Magazine, vol. 4, no. 4, pp: 100-106, 2021.
  8. B. Wei, K. Li, W. Luo, W. Xu, J. Zhang, and K. Zhang, "No Need of Data Pre-processing: A General Framework for Radio-Based Device-Free Context Awareness", ACM Transactions on Internet of Things, vol. 2, no. 4, pp: 1-26, 2021.
  9. Q. Xu, Z. Su, K. Zhang, and S. Yu, "Fast Containment of Infectious Diseases with E-healthcare Mobile Social Internet of Things", IEEE Internet of Things Journal, vol. 8, no. 22, pp: 16473-16485, 2021.
  10. J. Ni, K. Zhang, and A. Vasilakos, "Security and Privacy for Mobile Edge Caching: Challenges and Solutions", IEEE Wireless Communications, vol. 28, no. 3, pp: 77-83, 2021.
  11. J. Kang, K. Fan, K. Zhang, X. Cheng, H. Li, and Y. Yang, "An ultra light weight and secure RFID batch authentication scheme for IoMT", Computer Communications, vol. 167, pp: 48-54, 2021.

2020

  1. S. Shen*, K. Zhang, S. Ci, and Y. Zhou, "Security in Edge-Assisted Internet-of-Things: Challenges and Solutions", Science China Information Sciences (SCIS), vol. 63, pp:220302, 2020.
  2. H. Yang*, K. Zheng, K. Zhang, and Y. Qian, "Joint Frame Design and Resource Allocation for Ultra-Reliable and Low-Latency Vehicular Networks", accepted by IEEE Transactions on Wireless Communications, vol. 19, no. 5, pp: 3607-3622, 2020.
  3. H. Yang*, K. Zhang, K. Zheng, Y. Qian, "Leveraging Linear Quadratic Regulator Cost and Energy Consumption for Ultra-Reliable and Low-Latency IoT Control Systems", IEEE Internet of Things Journal, vol. 7 no. 9, pp: 8356-8371, 2020.
  4. W. Li, Z. Su, K. Zhang, and Q. Xu, "Abnormal Crowd Traffic Detection for Crowdsourced Indoor Positioning in Heterogeneous Communications Networks", IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp: 2494-2505, 2020.
  5. W. Li, Z. Su, R. Li, K. Zhang, and Y. Wang, "Blockchain-Based Data Security for Artificial Intelligence Applications in 6G Networks", IEEE Network, vol. 34, no. 6, pp: 31-37, 2020.
  6. L. Lei, Y. Tan, K. Zheng, S. Liu, K. Zhang, and X. Shen, "Deep Reinforcement Learning for Autonomous Internet of Things: Model, Applications and Challenges", IEEE Communications Surveys & Tutorials, vol.22, no.3, pp:1722-1760, third quarter 2020.
  7. W. Li, Z. Su, K. Zhang, and A. Benslimane, "Defending Malicious Check-in Using Big Data Analysis of Indoor Positioning System: An  Access Point Selection Approach", IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp: 2642-2655, 2020.
  8. Q. Chen, K. Fan, K. Zhang, H. Wang, H. Li, and Y. Yang, "Privacy-preserving searchable encryption in the intelligent edge computing", Computer Communications, vol. 164, pp: 31-41, 2020.
  9. Y. Tan, C. Hu, K. Zhang, K. Zheng, E. Davis, and J. Park, "LSTM-based Anomaly Detection for Non-linear Dynamical System", IEEE Access, no. 8, pp: 103301-103308, 2020.
  10. P. Huang, K. Fan, H. Yang, K. Zhang, H. Li, and Y. Yang, "A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System", IEEE Access, vol. 8, pp: 94780-94794, 2020.
  11. M. Huang, K. Zhang, Z. Zeng, T. Wang, and Y. Liu, "An AUV-assisted Data Gathering Scheme based on Clustering and Matrix Completion for Smart Ocean", IEEE Internet-of-Things Journal, vol. 7, no. 10, pp: 9904-9918, 2020.
  12. K. Fan, K. Zhang, Y. Yang, and H. Li, "A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks", IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp: 5826-5835, 2020.
  13. H. Yang*, K. Zheng, K. Zhang, J. Mei, and Y. Qian, "Ultra-Reliable and Low-Latency Communications for Connected Vehicles: Challenges and Solutions", IEEE Network, vol. 34, no. 3, pp: 92-100, 2020.
  14. J. Ni, K. Zhang, Q. Xia, X. Lin, and X. Shen, "Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing", IEEE Transactions on Mobile Computing, vol. 19, no. 6, pp: 1317-1331, 2020.
  15. K. Fan, Q. Luo, K. Zhang, and Y. Yang, "Cloud-based lightweight secure RFID mutual authentication protocol in IoT", Information Sciences, vol. 527, pp: 329-340, 2020.
  16. D. Chen, N. Zhang, N. Cheng, K. Zhang, Z. Qin, and X. Shen, "Physical Layer based Message Authentication with Secure Channel Codes", accepted by IEEE Transactions on Dependable and Secure Computing.
  17. W. Tang, J. Ren, K. Zhang, D. Zhang, Y. Zhang, and X. Shen, "Efficient and Privacy-preserving Fog-assisted Health Data Sharing Scheme", ACM Transactions on Intelligent Systems and Technology, vol. 10, no. 6, pp: (68)1-23, 2020.
  18. Q. Xu, Z. Su, K. Zhang, and P. Li, "Intelligent Cache Pollution Attacks Detection for Edge Computing enabled Mobile Social Networks", IEEE Transaction on Emerging Topics in Computational Intelligence, vol. 4, no. 3, pp: 241-252, 2020.
  19. W. Tang, K. Zhang, J. Ren, Y. Zhang, and X. Shen, "Privacy-Preserving Task Recommendation with Win-win Incentives for Mobile Crowdsourcing", Information Science, vol. 527, pp: 477-492, 2020.
  20. K. Fan, Y. Liu, K. Zhang, H. Li, and Y. Yang, "A secure and efficient outsourced computation on data sharing scheme for privacy computing", Journal of Parallel and Distributed Computing, vol. 135, pp: 169-176, 2020.

2019

  1. K. Fan, S. Zhu, K. Zhang, H. Li and Y. Yang, "A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems", IEEE Network, vol. 33, no. 2, pp: 44-49, 2019.
  2. W. Tang, K. Zhang, D. Zhang, J. Ren, Y. Zhang, and X. Shen, "Fog-enabled Smart Health: Towards Cooperative and Secure Healthcare Service Provision", IEEE Communications Magazine, vol. 57, no. 5, pp: 42-48, 2019.
  3. Q. Jiang, X. Huang, N. Zhang, K. Zhang, X. Ma, and J. Ma, "Shake to Communicate: Secure Handshake Acceleration-based Pairing Mechanism for Wrist Worn Devices", IEEE Internet of Things Journal, vol. 6, no. 3, pp: 5618-5630, 2019.
  4. Q. Xu, Z. Su, Q. Zheng, M. Luo, B. Dong, and K. Zhang, "Game Theoretical Secure Caching Scheme in Multi-homing Edge Computing-enabled Heterogeneous Networks", IEEE Internet of Things Journal, vol. 6, no. 3, pp: 4536-4546, 2019.
  5. J. Qiu, K. Fan, K. Zhang, Q. Pan, H. Li and Y. Yang, "An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT", IEEE Access, vol. 7, pp: 180205-180217, 2019.
  6. Z. Yang, K. Zhang, L. Lei, and K. Zheng, "A Novel Classifier Exploiting Mobility Behaviors for Sybil Detection in Connected Vehicle Systems", IEEE Internet of Things Journal, vol. 6, no. 2, pp: 2626-2636, 2019.
  7. Z. Qin, L. Hu, N. Zhang, D. Chen, K. Zhang, Z. Qin, and K. Choo, "Learning Aided User Identification Using Smartphone Sensors for Smart Homes", IEEE Internet of Things Journal, vol. 6, no. 5, pp: 7760-7772, 2019.
  8. J. Ni, K. Zhang, X. Lin, and X. Shen, "Balancing Security and Efficiency for Smart Metering against Misbehaving Collectors", IEEE Transactions on Smart Grid, vol. 10 , no. 2, pp.1225 - 1236, 2019.
  9. K. Fan, S. Zhu, K. Zhang, H. Li, and Y. Yang, "A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems", IEEE Network, vol. 33, no. 2, pp: 44-49, 2019.
  10. W. Tang, K. Zhang, J. Ren, Y. Zhang, and X. Shen, "Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features",  IEEE Transactions on Mobile Computing, vol. 18, no. 4, pp: 845-856, 2019.

2018

  1. K. Zhang, X. Liang, J. Ni, K. Yang, and X. Shen, "Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage", IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp: 607-620, 2018.
  2. D. Chen, N. Zhang, R. Lu, X. Fang, K. Zhang, Z. Qin, and X. Shen, "An LDPC code based physical layer message authentication scheme with prefect security", IEEE Journal on Selected Areas in Communications, vol. 36, no.4, pp: 748-761, 2018.
  3. X. Yuan, C. Li, Q. Ye, K. Zhang, N. Cheng, N. Zhang, and X. Shen, "Performance Analysis of IEEE 802.15.6-Based Coexisting Mobile WBANs With Prioritized Traffic and Dynamic Interference", IEEE Transactions on Wireless Communications, vol. 17, no. 8, pp: 5637-5652, 2018.
  4. K. Fan, J. Yin, K. Zhang, H. Li, and Y. Yang, "EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing", Sensors, Vol. 18, No. 11, pp: 1-16, 2018.
  5. Y. Wu, X. Chen, J. Shi, K. Ni, L. Qian, L. Huang, and K. Zhang, "Optimal Computational Power Allocation in Multi-Access Mobile Edge Computing for Blockchain", Sensors, vol. 18, no. 10, 2018, pp: 1-19.
  6. Y. Liu, K. Ota, K. Zhang, M. Ma, N. Xiong, A. Liu, and J. Long, "QTSAC: An energy-efficient mac protocol for delay minimization in wireless sensor networks", IEEE Access, vol. 6, 2018, pp: 8273-8291.
  7. H. Teng, K. Zhang, M. Dong, K. Ota, A. Liu, M. Zhao, and T. Wang, "Adaptive transmission range based topology control scheme for fast and reliable data collection", Wireless Communications and Mobile Computing, Vol. 2018, pp:1-21.
  8. J. Ni, K. Zhang, X. Lin, and X. Shen, “Securing Fog Computing for Internet of Things Applications: Challenges and Solutions”, IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 601-628, 2018.

2017

  1. K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. Shen, "Security and Privacy for Smart City Applications: Challenges and Solutions", IEEE Communications Magazine, vol. 55, no. 1, pp. 122-129, 2017.
  2. J. Ni, K. Zhang, K. Alharbi, X. Lin, N. Zhang, and X. Shen, "Differentially Private Smart Metering with Fault Tolerance and Range-Based Filtering", IEEE Trans.on Smart Grid, Vol. 8, No. 5, pp. 2483-2493, 2017.
  3. C. Lai, K. Zhang, N. Cheng, H. Li, and X. Shen, "SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs", IEEE Transactions on Intelligent Transportation Systems, Vol. 18, No. 6, pp. 1559-1574, 2017.

2016 and before

  1. J. Ren, Y. Zhang, K. Zhang, and X. Shen, "Adaptive and Channel-aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks", IEEE Transactions on Wireless Communications, vol.15, no.5, pp.3718-3731, 2016.
  2. J. Ren, Y. Zhang, K. Zhang, A. Liu, J. Chen, and X. Shen, "Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks", IEEE Transactions on Industry Informatics, vol.12, no.2, pp.788-800, 2016.
  3. K. Zheng, Z. Yang, K. Zhang, P. Chatzimisios, W. Xiang, and K. Yang, "Big Data Driven Optimization for Mobile Networks towards 5G", IEEE Network Magazine, vol.30, no.1, pp.44-51, 2016.
  4. K. Zhang, X. Liang, R. Lu, and X. Shen, "PIF: A Personalized Fine-grained Spam Filtering Scheme with Privacy Preservation in Mobile Social Network", IEEE Transactions on Computational Social Systems, vol.2, no.3, pp.41-52, 2015.
  5. K. Zhang, K. Yang, X. Liang, Z. Su, X. Shen, and H. Luo, "Security and Privacy for Mobile Healthcare Networks — from Quality-of-Protection Perspective", IEEE Wireless Communications, vol.22, no.4, pp.104-112, 2015.
  6. Q. Xu, Z. Su, K. Zhang, P. Ren, and X. Shen, "Epidemic Information Dissemination in Mobile Social Networks with Opportunistic Links", IEEE Transactions on Emerging Topics on Computing, vol.3, no.3, pp.399-409, 2015.
  7. K. Yang, K. Zhang, J. Ren and X. Shen, "Security and Privacy in Mobile Crowdsourcing Networks: Challenges and Opportunities", IEEE Communications Magazine, vol.53, no.8, pp.75-81, 2015.
  8. J. Ren, Y. Zhang, K. Zhang, and X. Shen, "Exploiting Mobile Crowdsourcing for Pervasive Cloud Services: Challenges and Solutions", IEEE Communications Magazine, vol.53, no.53, pp.98-105, 2015.
  9. N. Zhang, N. Cheng, A. Gamage, K. Zhang, J. W. Mark, X. Shen, "Cloud Assisted HetNets Toward 5G Wireless Networks", IEEE Communications Magazine, vol.53, no.6, pp.59-65, 2015.
  10. K. Zhang, X. Liang, R. Lu, and X. Shen, "Exploiting Multimedia Services in Mobile Social Network from Security and Privacy Perspectives", IEEE Communications Magazine, vol.52, no.3, pp.58-65, 2014.
  11. K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil Attacks and Their Defenses in the Internet of Things", IEEE Internet of Things Journal, vol.1, no.5, pp.372-383, 2014.
  12. K. Zhang, X. Liang, M. Barua, R. Lu, and X. Shen, "PHDA: A Priority Based Health Data Aggregation with Privacy Preservation for Cloud Assisted WBANs", Information Sciences, Elsevier, vol.284, pp.130-141, 2014.
  13. X. Liang, K. Zhang, X. Shen, and X. Lin, "Security and Privacy in Mobile Social Networks: Challenges and Solutions", IEEE Wireless Communications, vol.21, no.1, pp.33-41, 2014.
  14. X. Liang, X. Li, K. Zhang, R. Lu, X. Lin, and X. Shen, "Fully Anonymous Profile Matching in Mobile Social Networks," IEEE Journal on Selected Areas in Communications, vol.31, no.9, pp.641-655, 2013.
  15. X. Liang, K. Zhang, R. Lu, X. Lin, and X. Shen, "EPS: An Ecient and Privacy-Preserving Service Searching Scheme for Smart Community," IEEE Sensors Journal, vol.13, no.10, pp.3702-3710, 2013.
  16. M. Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, "PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid", IEEE Transactions on Emerging Topics in Computing, vol.1, no.1, pp.178-191, 2013.



Referred Conference Papers:

(Student Advisees are marked with*)

2024

  1. Z. Meng*, W. Zhang*, S. Shen*, C. Yu*, and K. Zhang, "Secure Interaction-Based Feature Selection for Vertical Federated Learning", Proc. of IEEE of ICC'24, Denver, CO, June 9-13, 2024.
  2. W. Zhang*, C. Yu*, Z. Meng*, S. Shen*, and K. Zhang, "Explore Patterns to Detect Sybil Attack during Federated Learning in Mobile Digital Twin Network", Proc. of IEEE of ICC'24, Denver, CO, June 9-13, 2024.

2022

  1. C. Yu*, S. Shen*, S. Wang, K. Zhang, and H. Zhao, "Efficient Multi-Layer Stochastic Gradient Descent Algorithm for Federated Learning in E-health", Proc. of IEEE of ICC'22, Seoul, Korea, May 16-20, 2022.
  2. S. Shen*, C. Yu*, K. Zhang, and S. Ci, "Collaborative Edge Caching with Personalized Modeling of Content Popularity over Indoor Mobile Social Networks", Proc. of IEEE of ICC'22, Seoul, Korea, May 16-20, 2022.
  3. W. Huang, W. Tang, K. Zhang, H. Zhu, and Y. Zhang, "Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems", Proc. of IEEE Infocom'22, virtual conference, May 2-5, 2022.
  4. C. Yu*, S. Shen*, K. Zhang, H. Zhao, and Y. Shi, "Energy-Aware Device Scheduling for Joint Federated Learning in Edge-assisted Internet of Agriculture Things", Proc. of IEEE WCNC'22, Austin, TX, April 10-13, 2022.
  5. Y. Jiang*, K. Zhang, Y. Qian, and R. Hu, "Preserving Location Privacy and Accurate Task Allocation in Edge-assisted Mobile Crowdsensing", Proc. of IEEE WCNC'22, Austin, TX, April 10-13, 2022.

2021

  1. Y. Jiang*, K. Zhang, Y. Qian, and R. Hu, "Cooperative Task Allocation in Edge Computing Assisted Vehicular Crowdsensing", Proc. of IEEE Globecom'21, Madrid, Spain, December 7-11, 2021.
  2. W. Yao, K. Zhang, C. Yu*, and H. Zhao, "Exploiting Ensemble Learning for Edge-assisted Anomaly Detection Scheme in e-healthcare System", Proc. of IEEE Globecom'21, Madrid, Spain, December 7-11, 2021.
  3. S. Shen*, C. Yu*, K. Zhang, and S. Ci, "Exploiting Feature Interactions for Malicious Website Detection with Overhead-accuracy Tradeoff", Proc. of IEEE ICC'21, Montreal, QC, Canada, June 2021.
  4. S. Shen*, C. Yu*, K. Zhang, X. Chen, H. Chen, and S. Ci, "Communication-Efficient Federated Learning for Connected Vehicles with Constrained Resources", Proc. of IEEE IWCMC, Harbin, China, June 28-July 2, 2021.
  5. Y. Jiang*, K. Zhang, Y. Qian, and R. Hu, "Efficient and Privacy-preserving Distributed Learning in Cloud-Edge Computing Systems", ACM Workshop on Wireless Security and Machine Learning (WiseML), June 28-July 2, 2021.
  6. C. Guo, Y. Yang, Y. Zhou, K. Zhang, and S. Ci, "A Quantitative Study of Energy Consumption for Embedded Security", Proc. of IEEE WCNC'21, Nanjing, China, March 29-April 1, 2021.

2020

  1. Y. Jiang*, K. Zhang, Y. Qian, and L. Zhou, "An Optimization Framework for Privacy-preserving Access Control in Cloud-Fog Computing Systems", Proc. of IEEE VTC'20-Fall, Victoria, BC, Canada, October 2020.
  2. W. Li, Z. Su, K. Zhang, A. Benslimane, "Defending Malicious Check-in Based on Access Point Selection for Indoor Positioning System", Proc. of IEEE ICC'20, Ireland, June 7-11, 2020 (Best Paper Award)

2019

  1. X. Yuan, J. Han, J. Pan, K. Zhang, C. Li, and Q. Ye, "2TM-MAC: A Two-Tier Multi-channel Interference Mitigation MAC Protocol for Coexisting WBANs", Proc. of IEEE Globecom'19, Waikoloa, HI, USA, December 9-13, 2019.
  2. Q. Xu, Z. Su, Y. Wang, and K. Zhang, "Secure Edge Caching for Layered Multimedia Contents in Heterogeneous Networks", Proc. of IEEE Globecom'19, Waikoloa, HI, USA, December 9-13, 2019.
  3. H. Yang*, K. Zhang, K. Zheng, and Y. Qian, "Secure Edge Caching Placement and Delivery for Ultra-Reliable and Low-Latency Vehicular Networks", IEEE Globecom Workshop on Advanced Mobile Edge/Fog Computing for 5G Mobile Networks and Beyond, Waikoloa, HI, USA, December 9-13, 2019.
  4. S. Shen*, K. Zhang, S. Ci, and X. Liang, "Lifecycle Prediction of Second Use Electric Vehicle Batteries Based on ARIMA Model", IEEE Globecom Workshop on Cyber-Physical Energy System for Sustainable ICT (CYPESS), Waikoloa, HI, USA, December 9-13, 2019.
  5. X. Yuan, Z. Ma, W. Li, H. Wang, C. Li, and K. Zhang, "An IEEE 802.15.6-Based MAC Frame Aggregation Approach for Wireless Body Area Networks", in Proc. of IEEE WCSP, Xi’an, China, October 2019.
  6. X. Wang, Y. Zhou, X. Ma, N. Lu, N. Cheng, and K. Zhang, "Smart Cyber Forensics of Rear-End Collision based on Multi-Access Edge Computing", Proc. of IEEE CIC/ICCC'19, Changchun, China, August 11-13, 2019.
  7. X. Yuan, X. Wang, J. Han, J. Liu, H. Chen, K. Zhang, and Q. Ye, "A High Accuracy Integrated Bagging-Fuzzy-GBDT Prediction Algorithm for Heart Disease Diagnosis", Proc. of IEEE CIC/ICCC'19, Changchun, China, August 11-13, 2019.
  8. Y. Wang, Z. Su, and K. Zhang, "A Secure Private Charging Piles Sharing Scheme with Electric Vehicles in Energy Blockchain", in Proc. of IEEE BigDataSE'19, Rotorua, New Zealand, August 5-8, 2019 (Best Paper Award).
  9. Z. Su, Q. Xu, and K. Zhang, "HMM Based Cache Pollution Attack Detection for Edge Computing Enabled Mobile Social Networks", Proc. IEEE ICC'19, Shanghai, China, May 20-24, 2019.
  10. M. Hadian, T. Altuwaiyan, X. Liang, B. Sheng and K. Zhang, "SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis", Proc. IEEE ICNC'19, Honolulu, Hawaii, USA, February 18-21, 2019.

2018

  1. Y. Wu, J. Shi, X. Chen, K. Ni, L. Qian, L. Huang, and K. Zhang, "Optimal Multi-Access Computation Offoading for Mobile Blockchain", Proc. ICCS, Chengdu, China, Dec. 19-21, 2018.
  2. W. Li, K. Zhang, Z. Su, R. Lu, and Y. Wang, "Anomalous Path Detection for Spatial Crowdsourcing based Indoor Navigation System", Proc. IEEE Globecom'18, Abu Dahbi, UAE, December 9-13, 2018.
  3. X. Yuan, C. Li, K. Zhang, Q. Ye, N. Cheng, N. Zhang, and X. Shen, "Dynamic interference analysis of coexisting mobile WBANs for health monitoring", Proc. IEEE ICC'18, Kansas City, MO, May 20-24, 2018.

2017

  1. Q. Li, K. Zhang, M. Cheffena, and X. Shen, "Channel-based Sybil Detection in Industrial Wireless Sensor Networks: a Multi-kernel Approach", Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  2. W. Tang, K. Zhang, J. Ren, Y. Zhang, and X. Shen, "Lightweight and Privacy-preserving Fog-assisted Information Sharing Scheme for Health Big Data", Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  3. Q. Li, K. Zhang, M. Cheffena, and X. Shen, "Channel-based Sampling Rate and Queuing State Control in Delay-Constraint Industrial WSNs", Proc. IEEE Globecom'17, Singapore, Dec. 4-8, 2017.
  4. D. Chen, N. Cheng, N. Zhang, K. Zhang, Z. Qin, and X. Shen, "Multi-Message Authentication over Noisy Channel with Polar Codes", Proc. IEEE MASS, Orlando, Florida, October 22-25, 2017.
  5. J. Ni, K. Zhang, X. Lin, Q. Xia, and X. Shen, "Privacy-Preserving Mobile Crowdsensing for Located-Based Applications", Proc. IEEE ICC'17, Paris, France, May 21-25, 2017.
  6. Q. Li, K. Zhang, M. Cheffena, and X. Shen, "A Measurement-based Boundary Estimation Approach for Localization in Industrial WSNs", Proc. IEEE ICC'17, Paris, France, May 21-25, 2017.
  7. Y. He, K. Zhang, H. Wang, F. Li, B. Niu, and H. Li, "Impact factor-based group recommendation scheme with privacy preservation in MSNs", Proc. IEEE ICC'17, Paris, France, May 21-25, 2017.

2016 and before

  1. J. Ni, X. Lin, K. Zhang, Y. Yu, and X. Shen, "CPARN: Cloud-Based Privacy-Preserving Parking Navigation in Vehicular Ad Hoc Networks", Proc. of Securecomm, Guangzhou, China, 2016 (Best Paper Award).
  2. J. Ni, X. Lin, K. Zhang, and Y. Yu, "Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach", Proc. of IEEE Globecom, Washington D.C., USA, December, 2016.
  3. J. Ni, X. Lin, K. Zhang, and X. Shen, "Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing", Proc. of VTC - Fall, Montreal, Canada, September, 2016.
  4. J. Ni, X. Lin, K. Zhang, Y. Yu, and X. Shen, "Secure Outsourced Data Transfer with Integrity Verification in Cloud Storage", Proc. of IEEE ICCC, Chengdu, China, July, 2016.
  5. J. Ni, X. Lin, K. Zhang, Y. Yu, and X. Shen, "Device-Invisible Two-Factor Authenticated Key Agreement for BYOD", Proc. of IEEE ICCC, Chengdu, China, July, 2016.
  6. Q. Li, K. Zhang, M. Cheffena, and X. Shen, "Exploiting Dispersive Power Gain and Delay Spread for Sybil Detection in Industrial WSNs", Proc. of IEEE ICCC, Chengdu, China, July, 2016.
  7. J. Ni, K. Zhang, X. Lin, H. Yang, and X. Shen, "AMA: Anonymous Mutual Authentication with Traceability in Carpooling Systems", Proc. of IEEE ICC, Kuala Lumpur, Malaysia, May, 2016.
  8. J. Ni, K. Zhang, X. Lin, and X. Shen, "EDAT: Efficient Data Aggregation without TTP for Privacy-Assured Smart Metering", Proc. of IEEE ICC, Kuala Lumpur, Malaysia, May, 2016.
  9. Z. Su, Q. Xu, K. Zhang, K. Yang, and X. Shen, "Dynamic Bandwidth Allocation in Mobile Social Networks with Multiple Homing Access", in Proc. of IEEE WCSP, Nanjing, China, October, 2015.
  10. K. Zhang, X. Liang, R. Lu, K. Yang, and X. Shen, "Exploiting Mobile Social Behaviors for Sybil Detection", in Proc. IEEE INFOCOM, pp.271-279, Hong Kong, China, April 26 - May 1, 2015.
  11. M. He, K. Zhang, X. Shen, "PMQC: A Privacy-Preserving Multi-Quality Charging Scheme in V2G network", in Proc. of IEEE Globecom, Austin, Texas, USA, pp.675-680, December, 2014.
  12. J. Ren, Y. Zhang, K. Zhang, X. Shen, "Exploiting Channel-Aware Reputation System Against Selective Forwarding Attacks in WSNs", in Proc. of IEEE Globecom, Austin, Texas, USA, pp.330-335, December, 2014.
  13. K. Zhang, R. Lu, X. Liang, J. Qiao, and X. Shen, "PARK: A Privacy-preserving Aggregation Scheme with Adaptive Key Management for Smart Grid", in Proc. IEEE ICCC, Xi'An, China, pp.236-241, August 2013.
  14. K. Zhang, X. Liang, R. Lu, and X. Shen, "SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks", in Proc. of IEEE ICC, Budapest, Hungary, pp.6045-6049, June 2013.
  15. Y. Liu, Z. Shi, K. Zhang, Y. Zheng, R. Lu, X Shen, "A Novel Low-power Mixed-mode Implementation of Weight Update in Particle PHD Filters", in Proc. of IEEE WCNC, Shanghai, China, pp.4647-4652, April 2013 (Best Paper Award).
  16. K. Zhang, X. Liang, R. Lu, X. Shen, and H. Zhao, "VSLP: Voronoi-Socialspot-Aided Packet Forwarding Protocol with Receiver Location Privacy in MSNs", in Proc. IEEE Globecom, Anaheim, California, USA, pp.348-353, December, 2012.