Book Chapters & Magazine Articles

  1. Yuguang Fang, Xiaoyan Zhu, and Yanchao Zhang, "Securing resource-constrained wireless ad hoc networks," IEEE Wireless Communications, vol. 16, no. 2, pp. 24-30, April 2009
  2. Kui Ren, Wenjing Lou, and Yanchao Zhang, "Multi-user broadcast authentication in wireless sensor networks," Chapter 15 in Encyclopedia on Ad Hoc and Ubiquitous Computing, edited by Dharma Agrawal and Bin Xie, World Scientific, 2009
  3. Yun Zhou, Yuguang Fang, and Yanchao Zhang, "Securing wireless sensor networks: a survey," IEEE Communications Surveys and Tutorials, vol. 10, no. 3, pp. 6-28, 3rd Quarter, 2008
  4. Yun Zhou, Yanchao Zhang, and Yuguang Fang, "A survey on key management in wireless sensor networks: challenges and solutions," Chapter 5 in Resource, Mobility and Security Management in Wireless Networks and Mobile Communications, edited by Yan Zhang, Honglin Hu, and Masayuki Fujise, CRC Press, 2006
  5. Wenjing Lou, Wei Liu, and Yanchao Zhang, Performance optimization using multipath routing in mobile ad hoc networks and wireless sensor networks," Chap. 4 in Combinatorial Optimization in Communication Networks, edited by M. Cheng, Y. Li, and D-Z. Du, pp. 117-146, Springer, Mar. 2006

Journal Articles

  1. Rui Zhang, Jing Shi, Yanchao Zhang, and Chi Zhang, "Secure top-K query processing in unattended tiered sensor networks," IEEE Transactions on Vehicular Technology, accepted, March 2014
  2. Rui Zhang, Jingchao Sun, Yanchao Zhang, and Chi Zhang, "Secure spatial top-K query processing via untrusted location-based service providers, " IEEE Transactions on Dependable and Secure Computing, accepted, February 2014
  3. Rui Zhang, Jing Shi, Yanchao Zhang, and Chi Zhang, "Verifiable privacy-preserving aggregation in people-centric urban sensing systems," IEEE Journal on Selected Areas in Communications, Special Issue on Emerging Technologies in Communications, vol. 31, no. 9, pp. 268-278, September 2013
  4. Rui Zhang, Jinxue Zhang, Yanchao Zhang, Jinyuan Sun, and Guanhua Yan, "Privacy-preserving profile matching for proximity-based mobile social networking," IEEE Journal on Selected Areas in Communications, Special Issue on Emerging Technologies in Communications, vol. 31, no. 9, pp. 656-668, September 2013
  5. Rui Zhang, Yanchao Zhang, and Kui Ren, "Distributed privacy-preserving access control in sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1427 - 1438, August 2012.
  6. Rui Zhang, Jing Shi, Yanchao Zhang, and Jinyuan Sun, "Secure cooperative data storage and query processing in unattended tiered sensor networks," IEEE Journal on Selected Areas in Communications, Special Issue on Cooperative Networking Challenges and Applications, vol. 30, no. 2, pp. 433 - 441, February 2012.
  7. Rui Zhang, Yanchao Zhang, and Yuguang Fang, "AOS: An anonymous overlay system for mobile ad Hoc networks," ACM Wireless Networks, vol. 17, no. 4, pp. 843--859, May 2011.
  8. Chi Zhang, Yang Song, Yuguang Fang, and Yanchao Zhang, "On the price of security in large-scale wireless ad-hoc networks," IEEE/ACM Transactions on Networking (TON), vol. 19, no. 2, pp. 319-332, Apr. 2011.
  9. Jinyuan Sun, Chi Zhang, Yanchao Zhang, and Yuguang Fang, "SAT: A security architecture achieving anonymity and traceability in wireless mesh networks," IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 8, no. 2, pp. 295-307, March 2011
  10. Jing Shi, Rui Zhang, and Yanchao Zhang, "A spatiotemporal approach to secure range queries in tiered sensor networks," IEEE Transactions on Wireless Communications, vol. 10, no. 1, pp. 264-273, January 2011
  11. Jinyuan Sun, Chi Zhang, Yanchao Zhang, and Yuguang Fang, "An identity-based security system for vehicular ad hoc networks,"  IEEE Transactions on Parallel and Distributed Computing (TPDS), vol. 21, no. 9, pp. 1227-1239, September 2010
  12. Chi Zhang, Yanchao Zhang, and Yuguang Fang, "A coverage inference protocol for wireless sensor networks," IEEE Transactions on Mobile Computing (TMC), vol. 9, no. 6, pp. 850-864, June 2010
  13. Kui Ren, Shucheng Yu, Wenjing Lou, and Yanchao Zhang, "PEACE: A Sophisticated Privacy-enhanced Yet Accountable Security Framework for Wireless Mesh Networks," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 21, no. 2, pp. 203-215, February 2010
  14. Kui Ren, Wenjing Lou, Shucheng Yu, and Yanchao Zhang, "Multi-user Broadcast Authentication in Wireless Sensor Networks," IEEE Transactions on Vehicular Technology (TVT), vol. 58, no. 8, pp. 4554-4464, October 2009
  15. Yanchao Zhang and Kui Ren, "On address privacy in mobile ad hoc networks," ACM/Springer Mobile Networks and Applications (MONET) (invited),  vol. 14, no. 2, pp. 188-197, April 2009
  16. Chi Zhang, Yanchao Zhang, and Yuguang Fang, "Localized coverage boundary detection for wireless sensor networks," ACM Wireless Networks, vol. 15, no. 1, pp. 3-20, January 2009
  17. Wenjing Lou, Wei Liu, Yanchao Zhang, and Yuguang Fang, "SPREAD: improving network security by multipath routing in mobile ad hoc networks," ACM Wireless Networks, vol. 15, no. 3, pp. 279-294, March 2009
  18. Kui Ren, Wenjing Lou, and Yanchao Zhang, "LEDS: providing location-aware end-to-end data security in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 7, no. 5, pp. 585-598, May 2008
  19. Yanchao Zhang, Wenjing Lou, Wei Liu, and Yuguang Fang, "A secure incentive protocol for mobile ad hoc networks," ACM Wireless Networks, vol. 13, no. 5, pp. 569-582, October 2007
  20. Yanchao Zhang and Yuguang Fang, "A secure authentication and billing architecture for wireless mesh networks," ACM Wireless Networks, vol. 13, no. 5, pp. 663-678, October 2007
  21. Yanchao Zhang and Yuguang Fang, "A fine-grained reputation system for reliable service selection in peer-to-peer networks," IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 8, pp. 1134-1145, August 2007
  22. Yun Zhou, Yanchao Zhang and Yuguang Fang, "Access control in wireless sensor networks," Ad Hoc Networks, Special Issue on Security in Ad Hoc and Sensor Networks, vol. 5, no. 1, pp. 3-13, January 2007
  23. Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, "Securing mobile ad hoc networks with certificateless public keys" (Full version), IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 386-399, Oct.-Dec. 2006
  24. Yanchao Zhang and Yuguang Fang, "ARSA: an attack-resilient security architecture for multi-hop wireless mesh networks," IEEE Journal on Selected Areas in Communications, Special Issue on High-Speed Network Security - Architecture, Algorithms, and Implementation, vol. 24, no. 10,  pp. 1916-1928, October 2006
  25. Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, "MASK: anonymous on-demand routing in mobile ad hoc networks," IEEE Transactions on Wireless Communications, vol. 5, no. 9, pp. 2376-2385, September 2006
  26. Wei Liu, Yanchao Zhang, Wenjing Lou, and Yuguang Fang, "A robust and energy-efficient data dissemination framework for wireless sensor networks," ACM Wireless Networks, vol. 12, no. 4, pp. 465-479, August 2006
  27. Yanchao Zhang, Wei Liu, Yuguang Fang, and Dapeng Wu, "Secure localization and authentication in ultra-wideband sensor networks," IEEE Journal on Selected Areas in Communications, Special Issue on UWB Wireless Communications - Theory and Applications, vol. 24, no. 4, pp. 829-835, April 2006
  28. Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks," IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 247-260, February 2006 (We made a few minor corrections, and here is the corrected version.)
  29. Wei Liu, Yanchao Zhang, Kejie Lu, and Yuguang Fang, "Energy conservation through resource-aware movement in heterogeneous mobile ad hoc networks," Journal of Combinatorial Optimization, Special Issue on Wireless Network Applications, vol. 11, no. 1, pp. 7-20, February 2006

Selected Conference Papers (full list)

  1. Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan Zhang, "SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks," IEEE International Conference on Computer Communications (INFOCOM'14), Toronto, Canada, April 2014
  2. Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan, "On the impact of social botnets for spam distribution and digital-influence manipulation," IEEE Conference on Communications and Network Security  (CNS'13), Washington, D.C., October 2013
  3. Xia Hu, Jiliang Tang, Yanchao Zhang, and Huan Liu. "Social spammer detection in microblogging," International Joint Conference on Artificial Intelligence (IJCAI 2013), Beijing, China, August 2013
  4. Rui Zhang, Jinxue Zhang, Yanchao Zhang, and Chi Zhang, "Secure crowdsourcing-based cooperative spectrum sensing," IEEE International Conference on Computer Communications (INFOCOM'13), Turin, Italy, April 2013
  5. Jingchao Sun, Rui Zhang, and Yanchao Zhang, "Privacy-preserving spatiotemporal matching," IEEE International Conference on Computer Communications (INFOCOM'13), Turin, Italy, April 2013
  6. Rui Zhang, Yanchao Zhang, and Chi Zhang, "Secure top-k query processing via untrusted location-based service providers," IEEE International Conference on Computer Communications (INFOCOM'12), Orlando, FL, March 2012 (complete version)
  7. Rui Zhang, Yanchao Zhang, Jinyuan Sun, and Guanhua Yan, "Fine-grained private matching for proximity-based mobile social networking," IEEE International Conference on Computer Communications (INFOCOM'12), Orlando, FL, March 2012
  8. Rui Zhang, Yunzhong Liu, Yanchao Zhang, and Jinyuan Sun, "Fast Identification of the Missing Tags in a Large RFID System," IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Salt Lake City, Utah, June 2011
  9. Rui Zhang, Yanchao Zhang, and Xiaoxia Huang, "JR-SND: Jamming-resilient secure neighbor discovery in mobile ad hoc networks," International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, Minnesota, June 2011. 
  10. Rui Zhang and Yanchao Zhang, "LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks,'' International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, Minnesota, June 2011
  11. Yunzhong Liu, Rui Zhang, Jing Shi, and Yanchao Zhang, "Traffic inference in anonymous mobile ad-hoc Networks," IEEE COMSOC Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'10), Boston, MA, June 2010
  12. Rui Zhang and Yanchao Zhang, "Wormhole-resilient secure neighbor discovery in underwater acoustic networks," IEEE International Conference on Computer Communications (INFOCOM'10), San Diego, CA, March 2010
  13. Rui Zhang, Jing Shi, Yunzhong Liu, and Yanchao Zhang, "Verifiable fine-grained top-k queries in tiered sensor networks," IEEE International Conference on Computer Communications (INFOCOM'10), San Diego, CA, March 2010
  14. Jing Shi, Rui Zhang, Yunzhong Liu, and Yanchao Zhang, "PriSense: privacy-preserving data aggregation in people-centric urban sensing systems," IEEE International Conference on Computer Communications (INFOCOM'10), San Diego, CA, March 2010 (We corrected one typo in Eq. 14 and here is the corrected version)
  15. Rui Zhang, Jing Shi, and Yanchao Zhang, "Secure multidimensional range queries in sensor networks," ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC'09), New Orleans, LA, May 2009
  16. Rui Zhang, Yanchao Zhang, and Kui Ren, "DP^2AC: distributed privacy-preserving access control in sensor networks," IEEE International Conference on Computer Communications (INFOCOM'09), Rio de Janeiro, Brazil, April 2009 (We made one minor correction, and here is the corrected version.)
  17. Jing Shi, Rui Zhang, and Yanchao Zhang, "Secure range queries in tiered sensor networks," IEEE International Conference on Computer Communications (INFOCOM'09), Rio de Janeiro, Brazil, April 2009 (We made some minor corrections, and here is the corrected version.)
  18. Qian Wang, Kui Ren, Wenjing Lou, and Yanchao Zhang, "Dependable and secure sensor data storage with dynamic integrity assurance," IEEE International Conference on Computer Communications (INFOCOM'09), Rio de Janeiro, Brazil, April 2009
  19. Kui Ren, Wenjing Lou, and Yanchao Zhang, "Multi-user broadcast authentication in wireless sensor networks," IEEE COMSOC Conference on Sensor,  Mesh and Ad Hoc Communications and Networks (SECON'07), San Diego, CA, June  2007
  20. Kui Ren, Wenjing Lou, and Yanchao Zhang, "LEDS: providing location-aware end-to-end data security in wireless sensor networks," IEEE International Conference on Computer Communications (INFOCOM'06), Barcelona, Spain, April 2006
  21. Yanchao Zhang, Wei Liu, and Wenjing Lou, "Anonymous communications in mobile ad hoc networks," IEEE International Conference on Computer Communications (INFOCOM'05), Miami, Florida, March 2005