On defending peer-to-peer system-based active worm attacks. P-3-Coupon: a Probabilistic System for Prompt and Privacy-preserving Electronic Coupon Distribution. Zheng and Dong Xuan Robust Video-based Face Recognition by Sequential Sample Consensus. PerFallD: A pervasive fall detection system using mobile phones. The outcome of these studies includes dozens of publications and three patents. The ultrafine-grained structure was observed on the welded interface. A Placement Vulnerability Study in Multi-tenant Public Clouds.
A dynamic geographic hash table for data-centric storage in sensor networks. A new cell-counting-based attack against tor. Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity k. Policy-driven physical attacks in sensor networks: Modeling and measurement. Lai and Weijia Jia Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity k less than or equal to 6 Wireless Sensor Networks.
Query aggregation for providing efficient data services in sensor networks. Face Flashing: A Secure Liveness Detection Protocol based on Light Reflections. Outside work, I like playing basketball and video games. The flyer plate undergoes flanging and welding at once. Multimedia Tools Applications 76, no. Also, heat is generated both by Joule heating as well as by plastic deformation, and peak temperatures can be quite high.
TurfCast: A service for controlling information dissemination in wireless networks. Enclave: Promoting unobtrusive and secure mobile communications with a ubiquitous electronic world. . Champion, Junda Zhu and Dong Xuan Flash-Loc: Flashing Mobile Phones for Accurate Indoor Localization. The final exam will be on Monday, December 12, 10:00-11:45am in class.
Connected Coverage in Wireless Networks with Directional Antennas. Analytical and empirical analysis of countermeasures to traffic analysis attacks. On Wireless Network Coverage in Bounded Areas. Mitigating storage side channels using statistical privacy mechanisms. A Dynamic Geographic Hash Table for Data-Centric Storage in Sensor Networks. The normalized period and amplitude of the undulations increase with increasing impact energy density.
Zheng E-V: Efficient Visual Surveillance with Electronic Footprints. TurfCast: A Service for Controlling Information Dissemination in Wireless Networks. Mobile phone based drunk driving detection. Mitigating Storage Side Channels Using Statistical Privacy Mechanisms. Lai and Dong Xuan, 2009, Measuring and Guaranteeing Quality of Barrier Coverage for General Belts with Wireless Sensors. Magnetic pulse welding can also elegantly collision weld flanged metal sheet to form a simultaneously hemmed and welded joint. Primary current in the actuator produces a Lorentz force on the thinner leg that can accelerate the flanged flyer against the central target workpiece.
Department of Energy DoE , 2018 to 2019. Personal Interests: Like to read interesting books and Sunday newspapers, work on robots, radars and images, and drive on highways. Integrated routing algorithms for anycast messages. However, the effects of strain rate var- iation and electric current charging were separately considered in above investigations, without a consideration of their coupling effect. Homeworks are usually pretty short but graded kind hard. The welded aluminum alloy 6061 interface exhibits extremely fine grains and an extremely high dislocation density. Effective detection of active worms with Varying Scan Rate.
Measuring and Guaranteeing Quality of Barrier-Coverage in Wireless Sensor Networks. Revealing mechanisms of microbial lethality by emerging food preservation technologies Technologies investigated include ultra-high pressure and pulsed electric fields. Santhanam, Riccardo Bettati and Wei Zhao An Integrated Middleware-Based Solution for Supporting Secured Dynamic-Coalition Applications in Heterogeneous Environments. Next year, I am looking for applicants who have been taking classes or research experience in one of the following areas: 1 Power engineering: power electronics, electric machines, drives, power systems, high voltage engineering. Champion, Dong Xuan, ; Cao, Y. Selected Recent Publications Professor Zheng has published more than 300 papers in his fields of research including two books and 106 referred journal papers. Peer-to-Peer system-based active worm attacks: Modeling and analysis.
Society Services and Awards From 1996 to 1999, Professor Zheng served as the Vice-President for Technical Affairs of the. Cares for students to do well. DoS attacks on your memory in the cloud. Zheng Winbigler Designated Chair Professor Department of Electrical and Computer Engineering The Ohio State University 2015 Neil Ave. A New Cell-Counting-Based Attack Against Tor. This rapid temperature rise is very important to the material response because the short time scales largely preclude the material from recovery and recrystallization processes, and precipitates cannot dissolve as they normally would in an age-hardening alloy in these time scales. I work in system security, specializing in cloud security.