UB - University at Buffalo, The State University of New York Computer Science and Engineering
  • Photo of Sheng Zhong
  • Sheng Zhong

  • Computer Science And Engineering
    University at Buffalo, The State University of New York
    No Current Address
    Buffalo, NY 14260
    U.S.A.

Research Areas

Computer Networks and Distributed Systems
image of comnet

Networking architectures, protocols, network control and management issues, and performance evaluation. Convergence of computer communications and telecommunications in WDM optical networks, mobile/wireless networks, the Internet, and other technologies like ATM and parallel and distributed processing. Peer-to-peer alternatives to traditional client-server models, ubiquitous computing with location-based services at the application-program level, mining for patterns in wireless and web, performance analysis of component models in application servers, and adaptive interfaces for collaborative systems. | More »

Computer Security and Information Assurance
image of security

Cryptography, trust, privacy and information survivability issues such as threat modeling, intrusion detection, assessment and recovery in networked computers and wireless networks. Assessment of performance, reliability, availability, and security is a key step in the design, analysis, and redesign of computer systems. | More »

Theory and Algorithms
image of theory

Methods and techniques for developing efficient algorithms, especially graph algorithms, parallel algorithms and architectures, graph drawing, computational geometry, and group testing algorithms. Obstacles to proving non-trivial lower bounds in complexity theory. Properties of complexity classes, with relationships between classes and with identification of properties of problems that affect their computational complexity. | More »

News

Technical Reports

2013-02
Zhao, Yangming; Qiao, Chunming; Xiao, Xun; Zhong, Sheng; Wang, Jianping; Wang, Sheng. Mobility-Enabled Topology Control and Routing to Defend MANETs based on Game Theoretic Analysis, July 26, 2013.
2011-05
Chen, Tingting; Wu, Fan; Zhong, Sheng. On Designing Protocols for Non-cooperative Multi-Radio Channel Assignment in Multiple Collision Doma, August 13, 2011.
2011-04
Chen, Tingting; Zhong, Sheng. On Designing Truthful Spectrum Auctions for Variable Bandwidths, July 28, 2011.
2011-03
Hao, Zhuo; Zhong, Sheng; Li, Li; Yao, Haifan; Yu, Nenghai. Towards Wireless Security without Computational Assumptions, April 28, 2011.
2011-02
Chen, Tingting; Zhong, Sheng. Privacy-Preserving Models for Comparing Survival Curves Using the Logrank Test, April 19, 2011.
2011-01
Chen, Tingting; Zhong, Sheng. On Fairness of Incentive-Compatible Multi-Radio Channel Assignment in Multiple Collision Domains, February 6, 2011. Modified Version
2010-12
Chen, Tingting ; Zhu, Liehuang; Wu, Fan; Zhong, Sheng. Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach, November 12, 2010.
2010-11
Hao, Zhuo; Zhong, Sheng; Yu, Nenghai. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiabi, October 5, 2010.
2010-08
Chen, Tingting; Zhong, Sheng. On Designing Truthful and Optimal Spectrum Assignment Mechanisms for Dynamic Spectrum Access, July 29, 2010.
2010-06
Hao, Zhuo; Zhong, Sheng; Li, Li Erran. An Oblivious Transfer Protocol Based on an Unauthenticated Wireless Channel, July 17, 2010. Modified Version
2010-05
Hao, Zhuo; Zhong, Sheng; Li, Li Erran. An Oblivious Transfer Protocol Based on an Unauthenticated Wireless Channel, July 5, 2010.
2010-02
Chen, Tingting; Zhong, Sheng. On Fairness of Incentive-Compatible Multi-Radio Channel Assignment in Multiple Collision Domains, May 27, 2010.
2009-04
Chen, Tingting; Zhong, Sheng. INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding, July 31, 2009.
2007-08
Zhong, Sheng; Jadliwala, Murtuza; Upadhyaya, Shambhu; Qiao, Chunming. LOCOMO: Distance-based Localization against Malicious Beacon Nodes, July 2, 2007.
2006-34
Wu, Fan; Zhong, Sheng; Liu, Jiqiang. Cost-effective Trac Assignment for Multipath Routing in Selsh Networks, November 22, 2006.
2006-20
Zhong, Sheng. On Distributed k-Anonymization., July 27, 2006.
2006-19
Zhong, Sheng; Shah, Divyesh. Benchmarking Security Computations on Wireless Devices., July 27, 2006.
Valid XHTML 1.0 Transitional