Junxing Zhang

Junxing Zhang
Inner Mongolia University · School of Computer Science (Software Engineering)

PhD

About

24
Publications
1,597
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
350
Citations
Citations since 2017
2 Research Items
102 Citations
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520

Publications

Publications (24)
Conference Paper
Social networking applications running on mobile phones help people to keep in touch with their existing contacts and promote the formation of new relationships among people. However, many of such applications do not have a secure mechanism to verify interpersonal relationships in social networks. To address this problem, a prior work has presented...
Conference Paper
In this paper we present an electronic voting system based on Homomorphic encryption to ensure anonymity, privacy, and reliability in the voting. Homomorphic encryption is a subset of privacy homomorphism. It is capable of computing the encrypted data directly and also encrypting the result of the operation automatically. For this reason it has a w...
Article
Full-text available
New techniques in cross-layer wireless networks are building demand for ubiquitous channel sounding, that is, the capability to measure channel impulse response (CIR) with any standard wireless network and node. Towards that goal, we present a software-defined IEEE 802.11b receiver and CIR measurement system with little additional computational com...
Conference Paper
Perimeter distinction in a wireless network is the ability to distinguish locations belonging to different perimeters. It is complementary to existing localization techniques. A draw-back of the localization method is that when a transmitter is at the edge of an area, an algorithm with isotropic error will estimate its location in the wrong area at...
Conference Paper
We propose an approach where wireless devices, interested in establishing a secret key, sample the channel impulse response (CIR) space in a physical area to collect and combine uncorrelated CIR measurements to generate the secret key. We study the impact of mobility patterns in obtaining uncorrelated measurements. Using extensive measurements in b...
Conference Paper
Full-text available
Location distinction is the ability to determine when a de- vice has changed its position. We explore the opportunity to use sophisticated PHY-layer measurements in wireless net- working systems for location distinction. We rst compare two existing location distinction methods - one based on channel gains of multi-tonal probes, and another on chann...
Article
Heterogeneous computing (HC) systems composed of interconnected machines with varied computational capabilities often operate in environments where there may be inaccuracies in the estimation of task execution times. Makespan (defined as the completion time for an entire set of tasks) is often the performance feature that needs to be optimized in s...
Article
Version control systems play a very important role in maintaining the revision history of software and facilitating software evolution. As the software development process is gradually taking the form of a collaborative effort among several teams hosted over widely dispersed sites, centralized version control systems are gradually giving way to mul...
Article
Version control systems play a very important role in maintaining the revision history of software and facilitating software evolution. As the software development process is gradually taking the form of a collaborative effort among several teams hosted over widely dispersed sites, centralized version control systems are gradually giving way to mul...
Conference Paper
Full-text available
Networked systems are often evaluated on overlay testbeds such as PlanetLab and emulation testbeds such as Emu- lab. Emulation testbeds give users great control over the host and network environments and offer easy reproducibil- ity, but only articial network conditions. Overlay testbeds provide real network conditions, but are not repeatable en- v...
Article
Research prototypes of networked systems are often eval- uated on overlay testbeds and emulation testbeds. Most of the strengths and weaknesses of these two types of testbeds are complementary. We outline the motivation, design, im- plementation, and sample results of an environment that seeks to provides the best of each type. Flexlab couples an e...
Conference Paper
We discuss a collection of mechanized formal proofs of sym- metric key block encryption algorithms (AES, MARS, Twofish, RC6, Serpent, IDEA, and TEA), performed in an implementation of higher order logic. For each algorithm, functional correctness, namely that de- cryption inverts encryption, is formally proved by a simple but eective proof methodol...
Conference Paper
Full-text available
In a distributed heterogeneous computing system, the resources have different capabilities and tasks have different requirements. Different classes of machines used in such systems typically vary in dollar cost based on their computing efficiencies. Makespan (defined as the completion time for an entire set of tasks) is often the performance featur...
Conference Paper
Full-text available
Heterogeneous computing systems composed of interconnected machines with varied computational capabilities often operate in environments where there may be sudden machine failures, higher than expected load, or inaccuracies in estimation of system parameters. Makespan (defined as the completion time for an entire set of tasks) is often the performa...
Article
The software development process is increasingly taking the form of a collaborative effort among several teams which are hosted at widely dispersed sites networked over the Internet. In this model of software development, multi-sited version control systems play a very important role to maintain the revision history of software and facilitate softw...
Article
Experience from teaching a course in Higher Order Logic theorem proving is recounted, from both the student and teacher per-spective.
Article
Full-text available
Location distinction is defined as de- termining when a device has changed its position. Previous work (4), (8) has shown that a wireless network can be exploited to successfully perform location distinction by measuring the characteristics of the SISO radio channel between the wireless device and one or more receivers. We propose methods and metri...
Article
Version control systems play a very important role in maintaining the revision history of software and facilitating software evolution. As the software development process is gradually taking the form of a collaborative effort among several teams hosted over widely dispersed sites, centralized version control systems are gradually giving way to mul...
Article
We study and advance unique representations of physical layer wireless links, and explore opportunities to use them in location distinction, secret key establishment, and perimeter distinction applications. Location distinction is the ability to determine when a device has changed its position. We compare two existing location distinction methods,...
Article
Signature Based Key Generation. Wireless link signature; multiple paths caused by radio waves; their measurements are good signatures of links; link signatures measured almost symmetrically at two ends of wireless link, but cannot be measured from another location; use for secret key establishment; wireless devices sample link signature space in ph...

Network

Cited By