Follow
Feng Zhu
Title
Cited by
Cited by
Year
Service discovery in pervasive computing environments
F Zhu, MW Mutka, LM Ni
IEEE Pervasive computing 4 (4), 81-90, 2005
6152005
Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services
F Zhu, M Mutka, L Ni
Proceedings of the First IEEE International Conference on Pervasive …, 2003
1552003
A private, secure, and user-centric information exposure model for service discovery protocols
F Zhu, MW Mutka, LM Ni
IEEE Transactions on Mobile Computing 5 (4), 418-429, 2006
882006
PrudentExposure: A private and user-centric service discovery protocol
F Zhu, M Mutka, L Ni
Second IEEE Annual Conference on Pervasive Computing and Communications …, 2004
802004
Expose or not? A progressive exposure approach for service discovery in pervasive computing environments
F Zhu, W Zhu, MW Mutka, L Ni
Third IEEE International Conference on Pervasive Computing and …, 2005
472005
Private and secure service discovery via progressive and probabilistic exposure
F Zhu, W Zhu, MW Mutka, LM Ni
IEEE Transactions on Parallel and Distributed Systems 18 (11), 1565-1577, 2007
402007
Understanding identity exposure in pervasive computing environments
F Zhu, S Carpenter, A Kulkarni
Pervasive and Mobile Computing 8 (5), 777-794, 2012
352012
Reducing online identity disclosure using warnings
S Carpenter, F Zhu, S Kolimi
Applied ergonomics 45 (5), 1337-1342, 2014
342014
Facilitating secure ad hoc service discovery in public environments
F Zhu, M Mutka, L Ni
Journal of Systems and Software 76 (1), 45-54, 2005
282005
The master key: A private authentication approach for pervasive computing environments
F Zhu, MW Mutka, LM Ni
Fourth Annual IEEE International Conference on Pervasive Computing and …, 2006
222006
Private entity authentication for pervasive computing environments
MW Mutka, F Zhu, L Ni
US Patent 8,966,252, 2015
192015
Reciprocity attacks
F Zhu, S Carpenter, A Kulkarni, S Kolimi
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011
172011
Understanding and minimizing identity exposure in ubiquitous computing environments
F Zhu, S Carpenter, A Kulkarni, C Chidambaram, S Pathak
2009 6th Annual International Mobile and Ubiquitous Systems: Networking …, 2009
162009
Private Entity Authentication for Pervasive Computing Environments.
F Zhu, MW Mutka, LM Ni
Int. J. Netw. Secur. 14 (2), 86-100, 2012
142012
Designing warnings to reduce identity disclosure
S Carpenter, M Shreeves, P Brown, F Zhu, M Zeng
International Journal of Human–Computer Interaction 34 (11), 1077-1084, 2018
122018
Contexts and sharing/not sharing private information
S Kolimi, F Zhu, S Carpenter
Proceedings of the 50th Annual Southeast Regional Conference, 292-297, 2012
112012
Systems and methods for providing gaze-based notifications
F Zhu, M Zeng, S Carpenter
US Patent 10,162,651, 2018
92018
Rational exposure: A game theoretic approach to optimize identity exposure in pervasive computing environments
F Zhu, W Zhu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
82009
Understanding and improving secure coding behavior with eye tracking methodologies
D Davis, F Zhu
Proceedings of the 2020 ACM Southeast Conference, 107-114, 2020
72020
Do you see the warning? Cybersecurity warnings via nonconscious processing
N Agrawal, F Zhu, S Carpenter
Proceedings of the 2020 ACM Southeast Conference, 260-263, 2020
72020
The system can't perform the operation now. Try again later.
Articles 1–20