Publications


Refereed Journal Articles

  1. C. Chum, X. Wei, X. Zhang. A split Bloom filter for better performance. J. of Applied Security Research (Routledge), 2019, pp.1-14. DOI: 10.1080/19361610.2019.1613090. Published online Oct 3, 2019.
  2. G. Zhao and X. Zhang. Re-ranking web data per knowledge domain. Int. J. of Service and Knowledge Management, 3(1), 2019, pp. 66-84.
  3. X. Wei, L. Geng, and X. Zhang. Web browser based data visualization scheme for XBee wireless sensor network. Trans. on Networks and Communications, 6(5), 2018, pp. 59-69.
  4. X. Wei, L. Geng, and X. Zhang. An open source data visualization system for wireless sensor network. J. of Computer Science and Information Technology, 5(2), 2017, pp. 10-17.
  5. C. Chum and X. Zhang. Implementations of a hash function based secret sharing scheme. J. of Applied Security Research (Routledge), 10(4), 2015, pp. 525-542.
  6. M. Chan and X. Zhang. Simulations of leveled RFID localization for indoor moving objects. Int. J. of Radio Frequency Identification Technology and Applications (Inderscience), 4(3), 2014, pp. 213-228.
  7. L. Shu, K. Cheng, X. Zhang, and J. Zhou. Periodic Sweep Coverage Scheme Based on Periodic Vehicle Routing Problem. Journal of Networks (Academy Publisher), 9(3), 2014, pp. 726-732.
  8. C. Chum and X. Zhang. Hash function based secret sharing scheme designs. Security and Communication Networks (Wiley), 6(5), 2013, pp. 584-592.
  9. Q. Gao and X. Zhang. A study of distortion effects on fingerprint matching. Computer Science and Engineering (Scientific & Academic Publishing), 2(3), 2012, pp. 37-42.
  10. X. Zhang, Z. Zhang, and X. Wei. An improved lightweight RFID authentication protocol. Int. J. of Applied Logistics (IGI Global). 2(1), 2011, pp. 76-84.
  11. C. Chum and X. Zhang. The Latin squares and the secret sharing schemes. Groups - Complexity - Cryptology. 2(2), 2010, pp. 175-202.
  12. X. Zhang, Q. Gao, and M. Saad. Looking at a class of RFID APs through GNY logic. Int. J. of Security and Networks (Inderscience), Special Issue on Security and Privacy in RFID Systems, 5(2/3), 2010, pp. 135-146.
  13. M. Pinto, H. Wei, and X. Zhang. A teacher's tool for the improvement of curriculum in an introductory computer course in K-12 education. J. for Computing Teachers (JCT). Fall Issue, 2009, pp. 1-6.
  14. Q. Gao, X. Zhang, and M. Anshel. Introduction to geometric intronization as a security technique. Int. J. of Computer Science and Network Security. 8(12), 2008, pp. 19-25.
  15. Q. Gao, X. Zhang, and M. Anshel. Experiments on matching intronized fingerprint minutiae templates. Int. J. of Computer Science and Network Security. 8(9), 2008, pp. 206-213.
  16. A. Kwan, L. Leung, X. Li, X. Zhang, and M. Anshel. A framework on collaboration: an interdisciplinary project across multiple colleges. J. of Systemics, Cybernetics and Informatics, 5(3), 2007, pp. 48-52.
  17. X. Zhang, B. Zhou, T. Nie, and C. Li. An improved MAC protocol for wireless ATM networks. J. of the China Railway Society, 21(5), 1999, pp. 51-54. (In Chinese)
  18. X. Zhang and T. Nie. Research on wireless ATM transmission convergence sublayer based on CDMA techniques. J. of the China Railway Society, 21(3), 1999, pp. 48-51. (In Chinese)
  19. J. Lu, X. Zhang, T. Nie, and C. Li. Smart Antennas of Software Radio Architecture in CDMA Systems. J. of the China Railway Society, 21(2), 1999, pp. 50-53. (In Chinese)
  20. X. Zhang, J. Lu, L. Yang, and C. Li. Performance analysis of hybrid DS-SFH CDMA signal in multipath fading channel. J. of Northern Jiaotong University, 22(5), 1998, pp. 1-6. (In Chinese)
  21. X. Zhang, J. Lu, T. Nie, and C. Li. A class of modified Logistic-map chaotic spread-spectrum sequences. J. of the China Railway Society, 20(3), 1998, pp. 76-81. (In Chinese)
  22. X. Zhang, J. Ni, L. Yang, and C. Li. Some performance evaluation for cellular DS-SFH systems. Chinese J. of Radio Science, 13(3), 1998, pp. 275-279.
  23. L. Yang, X. Zhang, and T. Nie. Performance of a residue number system spread-spectrum multiple access system. J. of the China Railway Society, 19(5), 1997, pp. 70-76. (In Chinese)
  24. H. Wang and X. Zhang. Development of VBX controls. Software World, 13(8), 1996, pp. 12-14. (In Chinese)
  25. X. Zhang and H. Wang. Call waiting system for PABX. Application of Electronic Technique, 21(2), 1995, pp. 29-31. (In Chinese)
  26. X. Zhang and Y. Chen. Wireless paging system's design inside high floor building. Application of Electronic Technique, 19(1), 1993, pp. 26-28. (In Chinese)

Books and Book Chapters

  1. C. Chum, B. Fine, and X. Zhang. A survey: Shamir threshold scheme and its enhancements. Infinite Group Theory - From the Past to the Future, World Scientific Publishing, February 2018, pp. 19-41. ISBN: 978-981-3204-04-1. (Chapter 2) PREPRINT
  2. X. Zhang. Stream Ciphers by using the Multi-map Orbit Hopping Mechanism - Designing, Implementing and Cryptanalyzing. LAP LAMBERT Academic Publishing (May 2011), ISBN-10: 3844396586, ISBN-13: 978-3844396584. Paperback, 116 pages.

Refereed Proceedings

  1. M. Bicer and X. Zhang. An efficient, hybrid, double-hash string-matching algorithm. Proc. of the 15th IEEE Long Island Systems, Applications and Technology Conf. (LISAT 2019), Farmingdale, NY, May 3, 2019, pp. 1-5.
  2. C. McMahon and X. Zhang. Modern network security practices: using rainbow tables to solve organizational issues. Proc. of the 39th IEEE Sarnoff Symposium (Sarnoff 2018), Newark, NJ, Sept 24-25, 2018, pp. 1-5.
  3. G. Zhao and X. Zhang. Domain-specific ontology concept extraction and hierarchy extension. Proc. of the 2nd Int. Conf. on Natural Language Processing and Information Retrieval (NLPIR 2018), Bangkok, Thailand, Sept 7-9, 2018, pp. 60-64. (ACM DL).
  4. B. Weber and X. Zhang. Parallel hash collision search by rho method with distinguished points. Proc. of the 14th IEEE LISAT 2018, Farmingdale, NY, May 4, 2018, pp. 1-7.
  5. G. Zhao and X. Zhang. A domain-specific web document re-ranking algorithm. Proc. of the 6th IIAI International Congress on Advanced Applied Informatics, Hamamatsu, Japan, July 9-13, 2017, pp. 385-390. (IEEE Xplore).
  6. M. Cantu, J. Kim, and X. Zhang. Finding hash collisions using MPI on HPC clusters. Proc. of the 13th IEEE LISAT 2017, Farmingdale, NY, May 5, 2017, pp. 1-6.
  7. M. Chan and X. Zhang. Reader leveled RFID localization approaches and their simulation. Proc. of the 13th IEEE LISAT 2017, Farmingdale, NY, May 5, 2017, pp. 1-6.
  8. V. Chiriaco, A. Franzen, R. Thayil, and X. Zhang. Finding partial hash collisions by brute force parallel programming. Proc. of the 13th IEEE LISAT 2017, Farmingdale, NY, May 5, 2017, pp. 1-6.
  9. C. Chum and X. Zhang. A new Bloom filter structure for searchable encryption schemes. Proc. of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, Mar 22-24, 2017, pp. 143-145.
  10. V. Chiriaco, A. Franzen, R. Thayil, and X. Zhang. Finding partial hash collisions by brute force parallel programming. Proc. of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, Sept 19-21, 2016, pp. 1-2. [2 pages poster paper]
  11. M. Chan, H.Elsherbini, and X. Zhang. User density and spatial cloaking algorithm selection: improving privacy protection of mobile users. Proc. of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, Sept 19-21, 2016, pp. 1-2. [2 pages poster paper]
  12. C. Chum and X. Zhang. A new multi-server scheme for private information retrieval. Contemporary Mathematics (AMS), Vol. 677 - Algebra and Computer Science, 2016, pp. 45-50.
  13. C. Chum, B. Fine, A. Moldenhauer, G. Rosenberger, and X. Zhang. On secret sharing protocols. Contemporary Mathematics (AMS), Vol. 677 - Algebra and Computer Science, 2016, pp. 51-78.
  14. P. Adluru, S. Datla, and X. Zhang. Hadoop eco system for big data security and privacy. Proc. of the 11th IEEE LISAT 2015, Farmingdale, NY, May 1, 2015, pp. 1-6.
  15. G. Zhao, X. Zhang, and A. Tansel. Open km-learning: using semantic web technologies to facilitate e-learning. Proc of the 2014 Int. Conf. on Semantic Web and Web Services, Las Vegas, NV, July 2014, pp. 1-5.
  16. C. Chum, C. Jun, and X. Zhang. Implementation of randomize-then-combine constructed hash function. Proc of the 23rd IEEE Wireless and Optical Communication Conf. (WOCC 2014), Newark, NJ, May 9-10, 2014, pp. 1-6.
  17. M. Chan and X. Zhang. Experiments for leveled RFID localization for indoor stationary objects. Proc of the 11th Int. Conf. on Information Technology: New Generations (ITNG 2014), IEEE Computer Society. Las Vegas, NV, April 7-9, 2014, pp. 163-169.
  18. A. Hassan and X. Zhang. Design and build a secure e-voting infrastructure. Proc. of the 9th IEEE LISAT 2013, Farmingdale, NY, May 3, 2013, pp. 1-7.
  19. C. Chum and X. Zhang. Improving Latin square based secret sharing schemes. Contemporary Mathematics (AMS), Vol. 582 - Computational and Combinatorial Group Theory and Cryptography, 2012, pp. 51-64.
  20. C. Chum, B. Fine, G. Rosenberger, and X. Zhang. A proposed alternative to the Shamir secret sharing scheme. Contemporary Mathematics (AMS), Vol. 582 - Computational and Combinatorial Group Theory and Cryptography, 2012, pp. 47-50.
  21. M. Chan and X. Zhang. Leveled indoor localization algorithms based on passive RFID. Proc. of the 2012 Int. Conf. on Wireless Networks (ICWN 2012), Las Vegas, NV, July 16-19, 2012, pp. 275-281.
  22. A. Hassan and X. Zhang. Bypassing web-based wireless authentication systems. Proc. of the 7th IEEE LISAT 2011, Farmingdale, NY, May 6, 2011, pp. 1-4.
  23. C. Chum and X. Zhang. A new scheme for hash function construction. In Proc. of the 2010 Int. Conf. on Security and Management (SAM 2010), Las Vegas, NV, July 12-15, 2010, pp.211-217.
  24. C. Chum and X. Zhang. Applying hash functions in the Latin square based secret sharing schemes. Proc. of SAM 2010, Las Vegas, NV, July 12-15, 2010, pp.197-203.
  25. P. Koshy, J. Valentin, and X. Zhang. Implementation and performance testing of the SQUASH RFID authentication protocol. In Proc. of the 6th IEEE LISAT 2010, Farmingdale, NY, May 7, 2010, pp. 1-5.
  26. Q. Gao, X. Zhang, and M. Anshel. Biological one-way functions. Proc. of American Society for Engineering Education (ASEE) Fall-2009 Mid-Atlantic Section Conf., King of Prussia, PA, Oct 23-24, 2009, pp. 1-8.
  27. X. Zhang, G. Gao, and M. Saad. Analysis of RFID authentication protocols based on static and dynamic shared secret. Proc. of SAM 2009. Las Vegas, NV, July 13-16, 2009, pp. 370-376.
  28. X. Zhang, L. Leung, and X. Li. Logic Analysis of two RFID authentication protocols. Proc. of the 6th Int. Conf. on Cybernetics and Information Technologies, Systems and Applications (CITSA2009). Orlando, FL, July 10 ~ 13, 2009, pp 159-164. (Best Paper Award)
  29. X. Zhang, L. Shu, and K. Tang. Multi-map orbit hopping chaotic cipher. Proc. of SAM 2008. Las Vegas, NV, July 14-17, 2008, pp 327-332.
  30. X. Zhang. The multi-map orbit hopping mechanism. Proc. of the 2008 Int. Conf. on Security and Management (SAM2008). Las Vegas, NV, July 14-17, 2008, pp 391-394.
  31. X. Zhang, L. Shu, and K. Tang. A chaotic cipher Mmohocc and its security analysis. Proc. of SPIE Vol. 6579, Orlando, FL, Apr 2007, pp. 65790H.1-12.
  32. X. Zhang, X. Xu, K. Tang, A. Kwan, P. Ji, L. Leung, X. Li, and M. Anshel. A simple secure quantum authorization scheme. Proc. of SPIE Vol. 6573, Orlando, April 2007, pp. 65730R.1-8.
  33. K. Tang, P. Ji, and X. Zhang. Quantum entanglement assisted key distribution. Proc. of SPIE Vol. 6573, Orlando, April 2007, pp. 65730S.1-8.
  34. A. Kwan, L. Leung, X. Li, C. Chum, X. Zhang, K. Tang, D. Kahanda, and M. Anshel. A framework on collaboration: an interdisciplinary project across multiple colleges. Proc. of the 1st Int. Symposium on Knowledge Communication and Peer Reviewing, Orlando, FL, July 2006, pp. 1-7.
  35. X. Li, L. Leung, A. Kwan, X. Zhang, D. Kahanda, and M. Anshel. Post-quantum Diffie-Hellman and symmetric key exchange protocols. Proc. of the 7th IEEE Workshop on Information Assurance. New York, NY, June 2006, pp. 382-383.
  36. X. Zhang, K. Tang, and L. Shu. A chaotic cipher Mmohocc and its randomness evaluation. Proc. of 6th Int. Conf. on Complex Systems, Boston, MA, June 2006, pp.1-8.
  37. X. Li, L. Leung, A. Kwan, X. Zhang, D. Kahanda, and M. Anshel. Post-quantum key exchange protocols. Proc. of SPIE Vol. 6244, Orlando, FL, Apr 2006, pp. 62440N.1-11.
  38. X. Zhang, L. Ren, T. Nie, and C. Li. A class of RS-RNS concatenated codes: construction and performance. Proc. of the 1998 IEEE Int. Conf. on Communication Technology (ICCT 1998), Beijing, China, Oct 1998, pp. S38.09.1-5.
  39. X. Zhang, J. Lu, T. Nie, and C. Li. Performance analysis of cellular DS-SFH systems. Proc. of IEEE ICCT 1998, Beijing, China, Oct 1998, pp. S18.04.1-4.
  40. X. Zhang, J. Lu, T. Nie, and C. Li. Chebyshev-map chaotic spread spectrum sequences. Proc. of the 1998 Int. Conf. on Personal, Mobile and Spread Spectrum Communications (ICPMSC 1998), Shanghai, China, June 1998, pp. 6.4.1-4.
  41. X. Zhang, J. Lu, and C. Li. MC-CDMA with chaotic SS sequences for wireless ATM networks. Proc. of ICPMSC 1998, Shanghai, China, June 1998, pp. 4.4.1-4.
  42. J. Lu, X. Zhang, and C. Li. Smart antenna arrays for CDMA systems based on software radio technologies. Proc. of ICPMSC 1998, Shanghai, China, June 1998, pp. 6.7.1-4.
  43. J. Lu, X. Zhang, and C. Li. A method of reference-signal generation for smart antenna arrays in CDMA systems. Proc. of ICPMSC 1998, Shanghai, China, June 1998, pp. 6.8.1-4.
  44. X. Zhang, J. Lu, J. Ni, and C. Li. Wireless ATM communication networks and CDMA techniques. Proc. of the 1997 National Conf. on Wireless Communication and Wireless Communication Theory (NCWCT 1997), Zhangjiajie, China, Sept 1997, pp. 156-160. (In Chinese)
  45. X. Zhang, J. Lu, T. Nie, and C. Li. A class of modified Logistic-map chaotic spread-spectrum sequences and their correlation characteristics. Proc. of NCWCT 1997, Zhangjiajie, China, Sept 1997, pp. 241-245. (In Chinese)

Others

  1. C. Chum and X. Zhang. Bloom filters and their applications in searchable encryption schemes. 1129TH AMS Meeting, Abstract: 1129-94-186. AMS 2017 Spring Eastern Sectional Meeting, Cryptography III, CUNY-Hunter College, New York, NY, May 6-7, 2017. (Abstract)
  2. C. Chum and X. Zhang. Improving Latin square based secret sharing schemes. 1072ND AMS Meeting, Abstract: 1072-68-155. AMS 2011 Fall Eastern Sectional Meeting, Cornell University, Ithaca, NY, Sept 10-11, 2011. (Abstract)
  3. X. Zhang, Q. Gao, and M. Anshel. What is wrong with these RFID authentication protocols? Proc. of the 3rd Annual Conf. on Computer and Human Error (CHE 2007), New York, NY, Dec 2007, pp. 1-4.