Zizhan Zheng
Title
Cited by
Cited by
Year
Steady and fair rate allocation for rechargeable sensors in perpetual sensor networks
KW Fan, Z Zheng, P Sinha
Proceedings of the 6th ACM conference on Embedded network sensor systems …, 2008
1892008
Maximizing the contact opportunity for vehicular internet access
Z Zheng, Z Lu, P Sinha, S Kumar
2010 Proceedings IEEE INFOCOM, 1-9, 2010
1252010
Perpetual and fair data collection for environmental energy harvesting sensor networks
RS Liu, KW Fan, Z Zheng, P Sinha
IEEE/ACM Transactions on Networking 19 (4), 947-960, 2010
1132010
Trap coverage: Allowing coverage holes of bounded diameter in wireless sensor networks
P Balister, Z Zheng, S Kumar, P Sinha
IEEE INFOCOM 2009, 136-144, 2009
1052009
Alpha coverage: Bounding the interconnection gap for vehicular internet access
Z Zheng, P Sinha, S Kumar
IEEE INFOCOM 2009, 2831-2835, 2009
952009
Towards autonomic computing middleware via reflection
G Huang, T Liu, H Mei, Z Zheng, Z Liu, G Fan
Proceedings of the 28th Annual International Computer Software and …, 2004
672004
Maximizing system throughput by cooperative sensing in cognitive radio networks
S Li, Z Zheng, E Ekici, N Shroff
IEEE/ACM Transactions on Networking 22 (4), 1245-1256, 2013
612013
A game theoretic model for defending against stealthy attacks with limited resources
M Zhang, Z Zheng, NB Shroff
International Conference on Decision and Game Theory for Security, 93-112, 2015
542015
Provably delay efficient data retrieving in storage clouds
Y Sun, Z Zheng, CE Koksal, KH Kim, NB Shroff
2015 IEEE Conference on Computer Communications (INFOCOM), 585-593, 2015
432015
Sparse WiFi deployment for vehicular internet access with bounded interconnection gap
Z Zheng, P Sinha, S Kumar
IEEE/ACM Transactions on networking 20 (3), 956-969, 2011
412011
Stealthy attacks meets insider threats: A three-player game model
X Feng, Z Zheng, P Hu, D Cansever, P Mohapatra
MILCOM 2015-2015 IEEE Military Communications Conference, 25-30, 2015
382015
A signaling game model for moving target defense
X Feng, Z Zheng, D Cansever, A Swami, P Mohapatra
IEEE INFOCOM 2017-IEEE conference on computer communications, 1-9, 2017
332017
Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud
Z Zheng, NB Shroff
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
332016
Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints
M Zhang, Z Zheng, NB Shroff
Tehnical Report, available online at http://www. cse. ohio-state. edu …, 2014
272014
Online welfare maximization for electric vehicle charging with electricity cost
Z Zheng, N Shroff
Proceedings of the 5th international conference on Future energy systems …, 2014
262014
A stackelberg game and markov modeling of moving target defense
X Feng, Z Zheng, P Mohapatra, D Cansever
International Conference on Decision and Game Theory for Security, 315-335, 2017
222017
Stealthy attacks with insider information: A game theoretic model with asymmetric feedback
X Feng, Z Zheng, D Cansever, A Swami, P Mohapatra
MILCOM 2016-2016 IEEE Military Communications Conference, 277-282, 2016
202016
Leaksemantic: Identifying abnormal sensitive network transmissions in mobile applications
H Fu, Z Zheng, S Bose, M Bishop, P Mohapatra
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
172017
THEFT DETECTION SYSTEMS AND METHODS
S Kumar, P Sinha, K Plarre, S Mitra, Z Zheng, S Guha, A Ghosh, P Dutta, ...
US Patent 20,130,229,274, 2013
172013
Theft detection systems and methods
S Kumar, P Sinha, K Plarre, S Mitra, Z Zheng, S Guha, A Ghosh, P Dutta, ...
US Patent App. 13/775,803, 2013
172013
The system can't perform the operation now. Try again later.
Articles 1–20