rui

Rui Zhang

Associate Professor
Office: 100 S Main St, Suite 109, Rm 108
Computer and Information Sciences Department
Phone: 302-831-2010
University of Delaware Fax: 302-831-8458
Newark, DE 19716
Email: email


I am always looking for highly self-motivated Ph.D. students who are strongly committed to research. If you are interested, please send your resume or CV, transcripts, TOEFL and GRE scores, and everything else that you believe will help your application to me in one email. Visiting scholars and students are also welcome.

Biography

Rui Zhang received his Ph.D. degree in Electrical Engineering from the Arizona State University in 2013. He received the B.E. degree in Communication Engineering and the M.E. degree in Communication and Information Systems both from Huazhong University of Science and Technology, China, in 2001 and 2005, respectively. He was an assistant professor in the Department of Electrical Engineering at the University of Hawaii from 2013 to 2016 and a software engineer at UTStarcom, Shenzhen, from 2005 to 2007. He received the NSF CAREER Award in 2017.

What's New
Teaching
Research Interests

Security and privacy issus in wireless networks, mobile crowdsourcing, mobile systems for disabled people, cloud computing, and social networks

Research Projects
Students
Publications

Journal Article

  1. (In)secure acoustic mobile authentication [pdf]
    Dianqi Han, Ang Li, Lili Zhang, Yan Zhang, Jiawei Li, Tao Li, Rui Zhang, and Yanchao Zhang, to appear at IEEE Transactions on Mobile Computing

  2. Verifiable Query Processing Over Outsourced Social Graph [pdf]
    Xin Yao, Rui Zhang, Dingquan Huang, and Yanchao Zhang, IEEE/ACM Transactions on Networking, vol. 29, no. 5, pp. 2313-2326, Oct. 2021,.

  3. Privacy Preserving Collaborative Machine Learning [pdf]
    Zheyuan Liu and Rui Zhang, EAI Endorsed Transactions on Security and Safety, 8 (28). e3. 2021

  4. A Spatiotemporal Approach for Secure Crowdsourced Radio Environment Map Construction [pdf]
    Yidan Hu and Rui Zhang, IEEE/ACM Transactions on Networking, vol. 28, no. 4, pp. 1790-1803, Aug. 2020.

  5. IndoorWaze: A Crowdsourcing-Based Context-Aware Indoor Navigation System [pdf]
    Tao Li, Dianqi Han, Yimin Chen, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, IEEE Transactions on Wireless Communications, vol. 19, no. 8, pp. 5461-5472, Aug. 2020.

  6. Verifiable outsourced computation over encrypted data [pdf]
    Xixun Yu, Zheng Yan, and Rui Zhang, Information Sciences, vol. 479, pp. 372-385, April 2019.

  7. Beware of what you share: inferring user locations in Venmo [pdf]
    Xin Yao, Yimin Chen, Rui Zhang, Yanchao Zhang, and Yaping Lin, IEEE Internet of Things Journal, vol. 5, no. 6, pp. 5109-5118, Dec. 2018.

  8. SpecGuard: Spectrum misuse detection in dynamic spectrum access systems [pdf]
    Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Chi Zhang, IEEE Transactions on Mobile Computing , vol. 17, no. 12, pp. 2925-2938, 1 Dec. 2018.

  9. The rise of social botnets: Attacks and countermeasures [pdf]
    Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan, IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 6, pp. 1068-1082, 1 Nov.-Dec. 2018.

  10. A multisecret value access control framework for airliner in multinational air traffic management [pdf]
    Depeng Li, Rui Zhang, Yingfei Dong, Fangjin Zhu, and Dusko Pavlovic, IEEE Internet of Things Journal, vol. 4, no. 7, pp. 1853-1867, December 2017.

  11. Privacy-preserving spatiotemporal matching for secure device-to-device communications [pdf]
    Jingchao Sun, Rui Zhang, and Yanchao Zhang, IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1048-1060, December 2016.

  12. TrueTop: A sybil-resilient system for user influence measurement on Twitter [pdf]
    Jinxue Zhang, Rui Zhang, Jingchao Sun, Yanchao Zhang, and Chi Zhang, IEEE/ACM Transactions on Networking.vol. 24, no. 5, pp. 2834-2846, October 2016

  13. SecureFind: Secure and privacy-preserving object finding via mobile crowdsourcing [pdf]
    Jingchao Sun, Rui Zhang, Xiaocong Jin, and Yanchao Zhang, IEEE Transactions on Wireless Communications, vol. 15, no. 3, pp. 1716-1728, March 2016.

  14. Jamming-resistant secure neighbor discovery in mobile ad hoc networks [pdf]
    Rui Zhang, Jingchao Sun, Yanchao Zhang, and Xiaoxia Huang, IEEE Transactions on Wireless Communications, vol. 14, no. 10, pp. 5588-5601, Oct. 2015.

  15. Secure spatial top-k query processing via untrusted location-based service provider [pdf]
    Rui Zhang, Jingchao Sun, Yanchao Zhang, and Chi Zhang, IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 111-124, January/February 2015.

  16. Secure top-k query processing in unattended tiered sensor networks [pdf]
    Rui Zhang, Jing Shi, Yanchao Zhang, and Xiaoxia Huang, IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4681-4693, Nov. 2014.

  17. TIGHT: A geographic routing protocol for cognitive radio mobile ad hoc networks [pdf]
    Xiaocong Jin, Rui Zhang, Jingchao Sun, and Yanchao Zhang, IEEE Transactions on Wireless Communications, vol. 13, no. 8, pp. 4670-4681, Aug. 2014.

  18. Verifiable privacy-preserving aggregation in people-centric urban sensing systems [pdf]
    Rui Zhang, Jing Shi, Yanchao Zhang, and Chi Zhang, IEEE Journal on Selected Areas in Communications, Special Issue on Emerging Technologies, vol. 31, no. 9, pp. 268-278, Sep. 2013.

  19. Privacy-preserving profile matching for proximity-based mobile social networking [pdf]
    Rui Zhang, Jinxue Zhang, Yanchao Zhang, Jinyuan Sun, and Guanhua Yan, IEEE Journal on Selected Areas in Communications, Special Issue on Emerging Technologies, vol. 31, no. 9, pp. 656-668, Sep. 2013.

  20. Distributed privacy-preserving access control in sensor networks [pdf]
    Rui Zhang, Yanchao Zhang, and Kui Ren, IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1427-1438, August 2012.

  21. Secure cooperative data storage and query processing in unattended tiered sensor networks [pdf]
    Rui Zhang, Jing Shi, Yanchao Zhang, and Jinyuan Sun, IEEE Journal on Selected Areas in Communications, Special Issue on Cooperative Networking Challenges and Applications, vol. 30, no. 2, pp. 433-441, February 2012.

  22. AOS: An anonymous overlay system for mobile ad hoc networks [pdf]
    Rui Zhang, Yanchao Zhang, and Yuguang Fang, ACM Wireless Networks, vol. 17, pp. 843-859, May 2011.

  23. A spatiotemporal approach to secure range queries in tiered sensor networks [pdf]
    Jing Shi, Rui Zhang, and Yanchao Zhang, IEEE Transactions on Wireless Communications, vol. 10, no. 1 pp. 264-273, January 2011.

Conference Papers

  1. ImPos: An image-based indoor positioning system [pdf]
    Yunzhi Li, Rajeswari Kambhamettu, Yidan Hu, and Rui Zhang, to appear at IEEE Consumer Communications & Networking Conference (CCNC), Virtual, January 2022.

  2. SecQSA: Secure sampling-based quantile summary aggregation in wireless sensor networks [pdf]
    Xin Yao, Rui Zhang, and Yanchao Zhang, to appear at International Conference on Mobility, Sensing and Networking (MSN), Virtual, December 2021.

  3. Differential privacy-preserving user linkage across online social networks [pdf]
    Xin Yao, Rui Zhang, and Yanchao Zhang, IEEE/ACM International Symposium on Quality of Service (IWQoS), Virtual, June 2021.

  4. Secure outsourced top-$k$ selection queries against untrusted cloud service providers [pdf]
    Xixun Yu, Yidan Hu, Rui Zhang, Zheng Yan, and Yanchao Zhang, IEEE/ACM International Symposium on Quality of Service (IWQoS), Virtual, June 2021.

  5. Your home is insecure: practical attacks on wireless home alarm systems [pdf]
    Tao Li, Dianqi Han, Jiawei Li, Ang Li, Yan Zhang, Rui Zhang, and Yanchao Zhang, IEEE Conference on Computer Communications (INFOCOM), Virtual, May 2021.

  6. Secure Connected Vehicle-based traffic signal systems against data spoofing attacks [pdf]
    Tianye Ma, Rui Zhang, and Mark Nejad, IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, Chia, March-April 2021.

  7. KV-Fresh: Freshness authentication for outsourced multi-version key-value stores [pdf]
    Yidan Hu, Rui Zhang, and Yanchao Zhang, IEEE Conference on Computer Communications (INFOCOM), Virtual, July 2020.

  8. RF-Rhythm: Secure and usable two-factor RFID authentication [pdf]
    Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, and Yanchao Zhang, IEEE Conference on Computer Communications (INFOCOM), Virtual, July 2020.

  9. A blockchain-based architecture for traffic signal control systems [pdf]
    Wanxin Li, Mark Nejad, and Rui Zhang, IEEE International Congress on Internet of Things (ICIOT), Milan, Italy, July 2019.

  10. Secure indoor positioning against signal strength attacks via optimized multi-voting [pdf]
    Yunzhi Li, Yidan Hu, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, the IEEE/ACM International Symposium on Quality of Service (IWQoS), Phoenix, AZ, June 2019.

  11. Secure data aggregation in wireless sensor networks: enumeration attack and countermeasure [pdf]
    Aishah Aseeri and Rui Zhang, IEEE International Conference on Communications (ICC), Shanghai, China, May 2019.

  12. Differentially-private incentive mechanism for crowdsourced Radio Environment Map construction [pdf]
    Yidan H and Rui Zhang, to appear at IEEE Conference on Computer Communications (INFOCOM), Paris, France, April-May 2019.

  13. Proximity-Proof: Secure and usable mobile two-factor authentication [pdf]
    Dianqi Han, Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, ACM Annual International Conference on Mobile Computing and Networking (MobiCom), New Delhi, India, October 2018.

  14. Secure RSS-fingerprint-based indoor positioning: attacks and ountermeasures [pdf]
    Lizhou Yuan, Yidan Hu, Yunzhi Li, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, IEEE Conference on Communications and Network Security (CNS), Beijing, China, May-June 2018.

  15. EyeTell: Video-assisted touchscreen keystroke inference from eye movements [pdf]
    Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, May 2018.

  16. Secure crowdsourced indoor positioning systems [pdf]
    Tao Li, Yimin Chen, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth, IEEE Conference on Computer Communications (INFOCOM), Honolulu, HI, April 2018.

  17. Privacy-preserving social media data outsourcing [pdf]
    Jinxue Zhang, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Xia Hu, IEEE Conference on Computer Communications (INFOCOM), Honolulu, HI, April 2018.

  18. Secure crowdsourced Radio Environment Map construction [pdf]
    Yidan Hu and Rui Zhang, IEEE International Conference on Network Protocols (ICNP), Toronto, Canada, October 2017.

  19. Your face your feart: Secure mobile face authentication with photoplethysmograms [pdf]
    Yimin Chen, Jingchao Sun, Xiaocong Jin, Tao Li, Rui Zhang, and Yanchao Zhang, IEEE Conference on Computer Communications (INFOCOM), Atlanta, GA, May 2017.

  20. POWERFUL: Mobile app fingerprinting via power analysis [pdf]
    Yimin Chen, Xiaocong Jin, Jingchao Sun, Rui Zhang, and Yanchao Zhang, IEEE Conference on Computer Communications (INFOCOM), Atlanta, GA, May 2017.

  21. Verifiable Social Data Outsourcing [pdf]
    Xin Yao, Rui Zhang, Yanchao Zhang, and Yaping Lin, IEEE Conference on Computer Communications (INFOCOM), Atlanta, GA, May 2017.

  22. DPSense: Differentially private crowdsourced spectrum sensing [pdf]
    Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, and Yanchao Zhang, ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, October 2016.

  23. PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control [pdf]
    Tao Li, Rui Zhang, and Yanchao Zhang IEEE Conference on Communications and Network Security (CNS), San Philadelphia, PA, October 2016.

  24. A framework to mitigate airliner risk in air traffic management[pdf]
    Depeng Li and Rui Zhang, IEEE Conference on Communications and Network Security (CNS), San Philadelphia, PA, October 2016.

  25. Secure outsourced skyline query processing via untrusted cloud service providers [pdf]
    Wenxin Chen*, Mengjun Liu*, Rui Zhang, Yanchao Zhang, and Shubo Liu, IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, April 2016 (The first two authors contributed equally to this work).

  26. PriStream: Privacy-preserving distributed stream monitoring of thresholded percentile statistics [pdf]
    Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang, IEEE International Conference on Computer Communications (INFOCOM), San Francisco, CA, April 2016.

  27. VISIBLE: Video-assisted keystroke inference from tablet backside motion [pdf]
    Jingchao Sun, Xiaocong Jin, Yimin Chen, Jinxue Zhang, Rui Zhang, and Yanchao Zhang, ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2016.

  28. SafeDSA: Safeguard dynamic spectrum access against fake secondary users [pdf]
    Xiaocong Jin, Jingchao Sun, Rui Zhang, and Yanchao Zhang, ACM Conference on Computer and Communications Security (CCS), Denver, CO, October 2015.

  29. Your actions tell where you are: Uncovering Twitter users in a large metropolitan area [pdf]
    Jinxue Zhang, Jingchao Sun, Rui Zhang, and Yanchao Zhang, IEEE Conference on Communication and Network Security (CNS), Florence, Italy, September 2015.

  30. SpecGuard: Spectrum misuse detection in dynamic spectrum access systems [pdf]
    Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Chi Zhang, IEEE International Conference on Computer Communications (INFOCOM), Hong Kong, China, April 2015.

  31. Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices [pdf]
    Yimin Chen, Jingchao Sun, Rui Zhang, and Yanchao Zhang, IEEE International Conference on Computer Communications (INFOCOM), Hong Kong, China, April 2015.

  32. TouchIn: Sightless two-factor authentication on multi-touch mobile devices [pdf]
    Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang, IEEE Conference on Communication and Network Security (CNS), San Francisco, CA, October 2014.

  33. On the impact of social botnets for spam distribution and digital-influence manipulation[pdf]
    Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan, IEEE Conference on Communication and Network Security (CNS), Washington, D.C., October 2013.

  34. Secure crowdsourcing-based cooperative spectrum sensing [pdf]
    Rui Zhang, Jinxue Zhang, Yanchao Zhang, and Chi Zhang, IEEE International Conference on Computer Communications (INFOCOM), Turlin, Italy, April 2013.

  35. Privacy-preserving spatiotemporal matching [pdf]
    Jingchao Sun, Rui Zhang and Yanchao Zhang, IEEE International Conference on Computer Communications (INFOCOM), Turlin, Italy, April 2013.

  36. Secure top-k query processing via untrusted location-based service providers [pdf]
    Rui Zhang, Yanchao Zhang, and Chi Zhang, IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, March 2012.

  37. Fine-grained private matching for proximity-based mobile social networking [pdf]
    Rui Zhang, Yanchao Zhang, Jinyuan Sun, and Guanhua Yan, IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, March 2012.

  38. Fast identification of the missing tags in a large RFID system [pdf]
    Rui Zhang, Yunzhong, Yanchao Zhang, and Jinyuan Sun, Annual IEEE Communication Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), Salt Lake City, Utah, June 2011.

  39. LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks [pdf]
    Rui Zhang
    and Yanchao Zhang, International Conference on Distributed Computing Systems (ICDCS), Minneapolis, MN, June 2011.

  40. JR-SND: Jamming-resilient secure neighbor discovery in mobile ad hoc networks [pdf]
    Rui Zhang, Yanchao Zhang, and Xiaoxia Huang, Internatinal Conference on Distributed Computing Systems (ICDCS), Minneapolis, MN, June 2011.

  41. Fast traffic inference in anonymous MANETs [pdf]
    Yunzhong Liu, Rui Zhang, Jing Shi, and Yanchao Zhang, Annual IEEE Communication Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), Boston, MA, June 2010.

  42. Wormhole-resilient secure neighbor discovery in underwater acoustic networks [pdf]
    Rui Zhang and Yanchao Zhang, IEEE International Conference on Computer Communications (INFOCOM), San Diego, CA, March 2010.

  43. Verifiable fine-grained top-k queries in tiered sensor networks [pdf]
    Rui Zhang and Yanchao Zhang, IEEE International Conference on Computer Communications (INFOCOM), San Diego, CA, March 2010.

  44. PriSense: Privacy-preserving data aggregation in people-centric urban sensing system [pdf]
    Jing Shi, Rui Zhang, Yunzhong Liu, and Yanchao Zhang, IEEE International Conference on Computer Communications (INFOCOM), San Diego, CA, March 2010.

  45. Secure multidimensional range queries in sensor networks [pdf]
    Rui Zhang, Jing Shi, and Yanchao Zhang,ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), New Orleans, LA, May 2009.

  46. DP2AC: Distributed privacy-preserving access control in sensor networks [pdf]
    Rui Zhang, Yanchao Zhang, and Kui Ren, IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 2009.

  47. Secure range queries in tiered sensor networks [pdf]
    Jing Shi, Rui Zhang, and Yanchao Zhang,IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 2009.

Professional Services

 COPYRIGHT 2021 Rui Zhang