Zizhan Zheng
Zizhan Zheng
Verified email at tulane.edu - Homepage
TitleCited byYear
Steady and fair rate allocation for rechargeable sensors in perpetual sensor networks
KW Fan, Z Zheng, P Sinha
Proceedings of the 6th ACM conference on Embedded network sensor systems …, 2008
1772008
Maximizing the contact opportunity for vehicular internet access
Z Zheng, Z Lu, P Sinha, S Kumar
2010 Proceedings IEEE INFOCOM, 1-9, 2010
1112010
Perpetual and fair data collection for environmental energy harvesting sensor networks
RS Liu, KW Fan, Z Zheng, P Sinha
IEEE/ACM Transactions on Networking (TON) 19 (4), 947-960, 2011
1022011
Trap coverage: Allowing coverage holes of bounded diameter in wireless sensor networks
P Balister, Z Zheng, S Kumar, P Sinha
IEEE INFOCOM 2009, 136-144, 2009
1012009
Alpha coverage: Bounding the interconnection gap for vehicular internet access
Z Zheng, P Sinha, S Kumar
IEEE INFOCOM 2009, 2831-2835, 2009
782009
Maximizing system throughput by cooperative sensing in cognitive radio networks
S Li, Z Zheng, E Ekici, N Shroff
IEEE/ACM Transactions on Networking 22 (4), 1245-1256, 2013
582013
Towards autonomic computing middleware via reflection
G Huang, T Liu, H Mei, Z Zheng, Z Liu, G Fan
Proceedings of the 28th Annual International Computer Software and …, 2004
562004
Sparse WiFi deployment for vehicular internet access with bounded interconnection gap
Z Zheng, P Sinha, S Kumar
IEEE/ACM Transactions on Networking (TON) 20 (3), 956-969, 2012
362012
A game theoretic model for defending against stealthy attacks with limited resources
M Zhang, Z Zheng, NB Shroff
International Conference on Decision and Game Theory for Security, 93-112, 2015
322015
Provably delay efficient data retrieving in storage clouds
Y Sun, Z Zheng, CE Koksal, KH Kim, NB Shroff
2015 IEEE Conference on Computer Communications (INFOCOM), 585-593, 2015
302015
Stealthy attacks meets insider threats: a three-player game model
X Feng, Z Zheng, P Hu, D Cansever, P Mohapatra
MILCOM 2015-2015 IEEE Military Communications Conference, 25-30, 2015
272015
Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints
M Zhang, Z Zheng, NB Shroff
Tehnical Report, available online at http://www. cse. ohio-state. edu …, 2014
222014
Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud
Z Zheng, NB Shroff
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
172016
Online welfare maximization for electric vehicle charging with electricity cost
Z Zheng, N Shroff
Proceedings of the 5th international conference on Future energy systems …, 2014
132014
XBC: XOR-based buffer coding for reliable transmissions over wireless networks
Z Zheng, P Sinha
2007 Fourth International Conference on Broadband Communications, Networks …, 2007
132007
Maximizing social welfare in operator-based cognitive radio networks under spectrum uncertainty and sensing inaccuracy
S Li, Z Zheng, E Ekici, NB Shroff
2013 Proceedings IEEE INFOCOM, 953-961, 2013
122013
Maximizing Information in Unreliable Sensor Networks under Deadline and Energy Constraints
S Hariharan, Z Zheng, NB Shroff
12*
A signaling game model for moving target defense
X Feng, Z Zheng, D Cansever, A Swami, P Mohapatra
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
112017
Leaksemantic: Identifying abnormal sensitive network transmissions in mobile applications
H Fu, Z Zheng, S Bose, M Bishop, P Mohapatra
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
112017
A stackelberg game and markov modeling of moving target defense
X Feng, Z Zheng, P Mohapatra, D Cansever
International Conference on Decision and Game Theory for Security, 315-335, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20