Aerial View of the George Mason Fairfax Campus

Publications

Books

  1. K. Zeng, W. Lou, and M. Li, "Multihop Wireless Networks: Opportunistic Routing", John Wiley and Sons, Inc., 2011. Link

Journal papers

  1. Y. Pan, Y. Hou, M. Li, R. Gerdes, K. Zeng, M. Towfiq, and B. Cetiner, "Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization", to appear in IEEE Transactions on Dependable and Secure Computing, 2017.
  2. R. Jin, Xianru Du, K. Zeng, L. Huang, L. Xiao, and J. Xu, "Delay Analysis of Physical Layer Key Generation in Dynamic Roadside-to-Vehicle Networks", IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2526-2535, March 2017. PDF
  3. R. Jin, K. Zeng, A. Pande, and P. Mohapatra, "MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers", IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1306-1320, June 2016. PDF
  4. R. Jin, X. Du , Z. Deng, K. Zeng, and J. Xu, "Practical Secret Key Agreement for Full-Duplex Near Field Communications", IEEE Transactions on Mobile Computing, vol. 15, no. 4, pp. 938-951, April 2016. PDF
  5. J. Xu, Q. Wang, K. Zeng, and M. Liu, "Sniffer Channel Assignment with Imperfect Monitoring for Cognitive Radio Networks", IEEE Transactions on Wireless Communications (TWC), vol. 15, no. 3, pp. 1703-1715, March 2016. PDF
  6. K. Zeng, "Physical Layer Key Generation in Wireless Networks: Challenges and Opportunities", IEEE Communications Magazine, vol. 53, no. 6, pp. 33-39, June 2015. PDF
  7. S. Chen, A. Pande, K. Zeng, and P. Mohapatra, "Live Video Forensics: Source Identification in Lossy Wireless Networks", IEEE Tansactions on Information Forensics and Security, vol. 10, no. 1, pp. 28-39, Jan. 2015. PDF
  8. S. Chen, K. Zeng, and P. Mohapatra, "Efficient Data Capturing for Network Forensics in Cognitive Radio Networks", IEEE/ACM Transactions on Networking, vol. 22, no. 6, pp. 1988-2000, Dec. 2014. PDF
  9. D. Shan, K. Zeng, P. Richardson, and W. Xiang, "Detecting Multi-Channel Wireless Microphone User Emulation Attacks in White Space with Noise", EAI Endorsed Transactions on Cognitive Communications, vol. 1, no. 1, pp. 1-13, July, 2014. PDF
  10. D. Shan, P. Richardson, W. Xiang, K. Zeng, H. Qian, and S. Addepalli, "Time-varying channel estimation through optimal piece-wise time-invariant approximation for high-speed train wireless communications", Vehicular Communications, vol. 1, no. 2, pp. 67-77, April, 2014.
  11. S. Jana, K. Zeng, W. Cheng, and P. Mohapatra, "Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks", IEEE Transactions on Information Forensics and Security, vol. 8, no. 9, pp. 1497-1507, Sept. 2013. PDF
  12. D. Shan, K. Zeng, W. Xiang, P. Richardson, and Y. Dong, "PHY-CRAM: Physical Layer Challenge-Response Authentication for Wireless Networks", IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1817-1827, Sept. 2013. PDF
  13. S. Chen, K. Zeng, and P. Mohapatra, "Hearing is Believing: Detecting Wireless Microphone Emulation Attack in White Space", IEEE Transactions on Mobile Computing, vol.12, no.3, pp. 401- 411, March 2013. PDF
  14. Y. Wei, K. Zeng, and P. Mohapatra, "Adaptive Wireless Channel Probing for Shared Key Generation based on PID Controller", IEEE Transactions on Mobile Computing (TMC), vol. 12, no. 9, pp. 1842- 1852, Sept. 2013. PDF
  15. K. Zeng, J. Yang, and W. Lou, "On Energy Efficiency of Geographic Opportunistic Routing in Lossy Multihop Wireless Networks", ACM WINET, vol. 18, no. 8, pp 967-983, Nov. 2012.
  16. M. Li, K. Zeng and W. Lou, "OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links", Elsevier Computer Networks (COMNET), Vol. 55, pp. 2443-2464, July 2011.
  17. K. Govindan, K. Zeng, and P. Mohapatra, "Probability Density of the Received Power in Mobile Networks", IEEE Transactions on Wireless Communications, Vol. 10, No. 11, pp 3613-3619, 2011.
  18. K. Zeng, K. Govindan, and P. Mohapatra, "Non-cryptographic Authentication and Identification in Wireless Networks". IEEE Wireless Communications, vol. 17, no. 5, pp. 56-62, Oct. 2010. PDF
  19. K. Zeng, Z. Yang, and W. Lou, "Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks", IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3512-3521, Oct. 2010. PDF
  20. K. Zeng, Z. Yang, and W. Lou, "Location-aided opportunistic forwarding in multirate and multihop wireless networks", IEEE Transactions on Vehicular Technology (TVT),vol. 58, no. 6, pp. 3032-3040,July 2009. PDF
  21. K. Zeng, K. Ren, W. Lou, and P. J. Moran, "Energy aware efficient geographical routing in lossy wireless sensor networks with environmental energy supply", ACM Wireless Networks (WINET), vol. 15 , no. 1, Jan. 2009. PDF
  22. K. Zeng, W. Lou, and H. Zhai, "Capacity of opportunistic routing in multi-rate and multi-hop wireless networks", IEEE Transactions on Wireless Communications (TWC), vol. 7, no. 12, Dec., 2008. PDF
  23. K. Ren, K. Zeng, and W. Lou, "Secure and Fault-tolerant Event Boundary Detection in Wireless Sensor Networks", IEEE Transactions on Wireless Communications (TWC), Vol. 7, no. 1, Jan. 2008.
  24. K. Zeng, W. Lou, J. Yang, and D. R. Brown III, "On throughput efficiency of geographic opportunistic routing in multihop wireless networks", ACM Mobile Networks and Applications (MONET), vol. 12 , no. 5, pp. 347-357, Dec. 2007.
  25. K. Ren, W. Lou, K. Zeng, and P. J. Moran, "On Broadcast Authentication in Wireless Sensor Networks", IEEE Transactions on Wireless Communications (TWC), Vol. 6, No. 11, pp. 4136-4144, Nov. 2007.
  26. K. Ren, W. Lou, K. Zeng, F. Bao, J. Zhou, and R. H. Deng, "Routing optimization security in mobile IPv6", Computer Networks, vol. 50, issue 13, pp.2401-2419, 2006.
  27. K. Ren, K. Zeng, W. Lou, "A new approach for random key pre-distribution in large-scale wireless sensor networks", Journal of Wireless Communication and Mobile Computing (Special Issue on Wireless Networks Security), vol. 6, issue 3, pp. 307-318, 2006.
  28. Zeng Kai, Zhao Erdun, Shi Bingxin, "Study of Admission Control in Mobile Wireless Cellular Networks with Reconnection Phenomenon", Journal of HUST, March 2004.

Conference papers

  1. Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, and Kai Zeng, "Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis", International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Warsaw, Poland, Aug. 28 - 30, 2017. PDF
  2. Eric Wang, William Xu, Suhas Sastry, Songsong Liu, and Kai Zeng, "Hardware module-based message authentication in intra-vehicle networks", The ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS’17), Pittsburgh, Pennsylvania, April 18 - 20, 2017. PDF
  3. Yantian Hou, Ming Li, and Kai Zeng, "Throughput optimization in multi-hop wireless networks with reconfigurable antennas", International Conference on Computing, Networking and Communications (ICNC'17), Silicon Valley, USA, Jan. 26 - 29, 2017. PDF
  4. Amir Alipour-Fanid, Monireh Dabaghchian, Hengrun Zhang, and Kai Zeng, "String stability analysis of cooperative adaptive cruise control under jamming attacks", IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, Jan. 12 - 14, 2017. PDF
  5. M. Dabaghchian, S. Liu, A. Alipour-Fanid, K. Zeng, X. Li, and Y. Chen, "Intelligence Measure of Cognitive Radios with Learning Capabilities", IEEE GlobeCom 2016, Washington DC, Dec. 4 - 8, 2016. PDF
  6. M. Dabaghchian, A. Alipour-Fanid, K. Zeng, and Q. Wang, "Online Learning-Based Optimal Primary User Emulation Attacks in Cognitive Radio Networks", IEEE Conference on Communications and Network Security (IEEE CNS'16), Philadelphia, PA, Oct. 17 - 19, 2016. PDF
  7. X. Li, Y. Chen and K. Zeng, "Integration of Machine Learning and Human Learning for Training Optimization in Robust Linear Regression", The 41st IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'16), Shanghai, China, March 20 - 25, 2016. PDF
  8. R. Jin and K. Zeng, "SecNFC: Securing Inductively-Coupled Near Field Communication at Physical Layer", IEEE Conference on Communications and Network Security (IEEE CNS'15), Florence, Italy, Sept. 28 - 30, 2015. PDF
  9. R. Jin and K. Zeng, "Physical Layer Key Agreement under Signal Injection Attack", IEEE Conference on Communications and Network Security (IEEE CNS'15), Florence, Italy, Sept. 28 - 30, 2015. PDF
  10. J. Xu, K. Zeng, and W. Liu, "Online Learning for Unreliable Passive Monitoring in Multi-Channel Wireless Networks", IEEE ICC 2015, London, UK, June 8 - 12, 2015. PDF
  11. Y. Hou, M. Li, R. Chauhan, R. M. Gerdes, and K. Zeng, "Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice", the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS'15), Singapore, Apr. 2015.
  12. R. Jin, L. Shi, K. Zeng, A. Pande, and P. Mohapatra, "MagPairing: Exploiting Magnetometers for Pairing Smartphones in Close Proximity", IEEE Conference on Commnunications and Network Security (IEEE CNS'14), San Francisco, CA, Oct. 29 - 31, 2014. PDF
  13. R. Jin, X. Du, Z. Deng, K. Zeng, and J. Xu, "Practical Secret Key Agreement for Full-Duplex Near Field Communications", ACM ASIACCS 2014, Kyoto, Japan, June 4 - 6, 2014. PDF
  14. J. Xu, Q. Wang, R. Jin, K. Zeng, and M. Liu, "Secondary User Data Capturing for Cognitive Radio Network Forensics under Capturing Uncertainty", Milcom 2014, Baltimore, MD, Oct. 6 - 8, 2014. PDF
  15. R. Jin, X. Du, K. Zeng, L. Xiao, and J. Xu, "Delay Analysis of Physical Layer Key Generation in Multi-user Dynamic Wireless Networks", IEEE ICC 2014, Sydney, Australia, June 10 - 14, 2014. PDF
  16. X. Du, D. Shan, K. Zeng, and L. Huie, "Physical Layer Challenge-Response Authentication in Wireless Networks with Relay", IEEE Infocom 2014, Toronto, Canada, April 27 - May 2, 2014. PDF
  17. D. Shan, K. Zeng, P. Richardson, and W. Xiang, "iSens: Detecting Hidden Busy Channels in WM Systems with Interactive Sensing for CRN", IEEE GlobeCom 2013, Atlanta, GA, Dec. 9-13, 2013. PDF
  18. D. Shan, K. Zeng, P. Richardson, and W. Xiang, "Detecting Multi-Channel Wireless Microphone User Emulation Attacks in White Space with Noise", The 8th International Conference on Cognitive Radio Oriented Wireless Networks (CrownCom) 2013, Washington DC, July 8 - 10, 2013. PDF
  19. S. Chen, A. Pande, K. Zeng, and P. Mohapatra, "Video Source Identification in Lossy Wireless Networks", IEEE Infocom 2013, Mini-Conference, Turin, Italy, Apr. 14-19, 2013. PDF
  20. X. Wang, K. Zeng, K. Govindan, and P. Mohapatra, "Chaining for Securing Data Provenance in Distributed Information Networks", IEEE Milcom 2012, Orlando, FL, Oct. 29 - Nov. 1, 2012. PDF
  21. L. Zhang, K. Tan, K. Zeng, and P. Mohapatra, "Fast Rendezvous for Cognitive Radios by Exploiting Power Leakage At Adjacent Channels", IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Sydney, Australia, Sept. 9-12, 2012.
  22. K. Tan, K. Zeng, D. Wu, and P. Mohapatra, "Detecting Spectrum Misuse in Wireless Networks", The Ninth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012), Las Vegas, Nevada, USA, October 8-11, 2012. PDF
  23. S. Yi, K. Zeng, and J. Xu, "Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models", The 7th International Conference on Wireless Algorithms, Systems, and Applications, Yellow Mountains, Anhui, P.R. China, Aug. 8 10, 2012. PDF
  24. R. Sivaraj, A. Pande, K. Zeng, K. Govindan, and P. Mohapatra, "Edge-prioritized Channel- and Traffic-aware Uplink Carrier Aggregation in LTE-Advanced Systems", IEEE WoWMoM 2012, San Francisco, CA, June 25 - 28, 2012. PDF
  25. J. Zhu, K. Zeng, K. Kim, and P. Mohapatra, "Improving Crowd-Sourced Wi-Fi Localization Systems using Bluetooth Beacons", IEEE SECON 2012, Seoul, Korea, June 18-21, 2012. PDF
  26. S. Chen, K. Zeng, N. Cheng, and P. Mohapatra, "Transmit Power Estimation with a Single Monitor in Multi-band Networks", IEEE SECON 2012, Seoul, Korea, June 18-21, 2012. PDF
  27. S. Jana, K. Zeng, and P. Mohapatra, "Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks", IEEE Infocom 2012, Mini-Conference, Florida, March 25-30, 2012. PDF
  28. K. Govindan, X. Wang, M. Khan, G. Dogan, K. Zeng, G. Powell, T. Brown, T. Abdelzaher, and P. Mohapatra, "PRONET: Network Trust Assessment Based on Incomplete Provenance". IEEE Milcom 2011, Baltimore, MD, Nov. 7 - Nov. 10, 2011. PDF
  29. S. Chen, K. Zeng, and P. Mohapatra, "Efficient Data Capturing for Network Forensics in Cognitive Radio Networks". IEEE ICNP 2011, Vancouver, Canada, Oct. 17 - 20, 2011. PDF
  30. K. Zeng, K. Govindan, D. Wu, and P. Mohapatra, "Identity-based Attack Detection in Mobile Wireless Networks". IEEE Infocom 2011, Shanghai, China, April 10-15, 2011. (Acceptance Ratio: 291/1823 = 15.9%) PDF
  31. Y. Wei, K. Zeng, and P. Mohapatra, "Adaptive Wireless Channel Probing for Shared Key Generation". IEEE Infocom 2011, Shanghai, China, April 10-15, 2011. PDF
  32. S. Chen, K. Zeng, and P. Mohapatra, "Hearing is Believing: Detecting Mobile Primary User Emulation Attack in White Space". IEEE Infocom 2011, Mini-Conference, Shanghai, China, April 10-15, 2011. PDF
  33. L. Cai, K. Zeng, H. Chen, P. Mohapatra, "Good Neighbor: Ad-Hoc Pairing of Nearby Wireless Devices by Multiple Antennas", NDSS Symposium 2011, San Diego, CA, February 6-9, 2011. (Acceptance Ratio: 28/139 = 20%). PDF
  34. L. Zhang, K. Zeng, and P. Mohapatra , "Opportunistic Spectrum Scheduling for Mobile Cognitive Radio Networks in White Space". IEEE WCNC 2011, Quintana Roo, Mexico, March 28-31, 2011. PDF
  35. K. Zeng, D. Wu, A. Chan, P. Mohapatra, "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks'', IEEE Infocom 2010, San Deigo, CA, March 15-19, 2010. (Acceptance Ratio: 276/1575 = 17.5%) PDF
  36. A. Chan, K. Zeng, P. Mohapatra, S. J. Lee, and S. Banerjee, "Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks'', IEEE Infocom 2010, San Deigo, CA, March 15-19, 2010.(Acceptance Ratio: 276/1575 = 17.5%) PDF
  37. K. Zeng, Z. Yang, and W. Lou, "Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks", IEEE Infocom 2010, Mini-Conference, San Deigo, CA, March 15-19, 2010. PDF
  38. S. Chen, K. Zeng, P. Mohapatra, "Jamming-Resistant Communication: Channel Surfing without Negotiation", IEEE ICC 2010, Cape Town, South Africa, May 23-27, 2010. PDF
  39. K. Zeng, D. Wu, A. Chan, P. Mohapatra, "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks", Poster in IEEE ICNP 2009, Princeton, NJ, Oct. 13-16, 2009.
  40. M. Li, W. Lou, and K. Zeng, "OppCast: Opportunistic broadcast of warning messages in VANETs with unreliable links", MASS 2009, Macau SAR, China, Oct. 12-15, 2009. PDF
  41. Z. Yang, K. Zeng, and W. Lou, "FSA: A Fast Coordination Scheme for Opportunistic Routing", IEEE ICC 2009, Dresden, Germany, June 2009. PDF
  42. K. Zeng, S. Yu, K. Ren, W. Lou, and Y. Zhang, "Towards secure link quality measurement in multihop wireless networks", IEEE GLOBECOM 2008, New Orleans, LA, Nov., 2008. PDF
  43. K. Zeng, W. Lou, and H. Zhai, "On End-to-end Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks", IEEE Infocom 2008, Phoenix, AZ, April 15-17, 2008. (Acceptance Ratio: 236/1152 = 20.5%) PDF
  44. K. Zeng, W. Lou, and Y. Zhang, "Multi-rate geographic opportunistic routing in wireless ad hoc networks", IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, October 29-31, 2007. PDF
  45. K. Zeng, W. Lou, J. Yang, and D. R. Brown III, "On throughput efficiency of geographic opportunistic routing in multihop wireless networks", The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security, and Robustness (QShine 2007), Vancouver, British Columbia, Canada, August 14-17, 2007. Best Paper Runner-up. PDF
  46. K. Zeng, W. Lou, J. Yang, and D. R. Brown III, "On geographic collaborative forwarding in wireless ad hoc and sensor networks", International Conference on Wireless Algorithms, Systems, and Applications (WASA 2007), Chicago, IL, USA, August 1-3, 2007. PDF
  47. K. Zeng, K. Ren and W. Lou, "Energy Aware Efficient Geographic Routing in Lossy Wireless Sensor Networks with Environmental Energy Supply", The Third International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine 2006), Waterloo, Ontario, Canada, August 7-9, 2006. PDF
  48. K. Ren, K. Zeng, W. Lou, "Fault-tolerant event boundary detection in wireless sensor networks", IEEE Global Telecommunications Conference (GLOBECOM 2006), November 27-December 1, 2006, San Francisco, CA, USA.
  49. K. Zeng, W. Lou, K. Ren, and P. J. Moran, "Energy-efficient geographic routing in environmentally powered wireless sensor networks", IEEE Military Communication Conference (MILCOM 2006), Washington, DC, October 23-25, 2006. PDF
  50. K. Ren, K. Zeng, W. Lou, and P. J. Moran, "On broadcast authentication in wireless sensor networks", Lecture Notes in Computer Science, vol. 4138, pp. 502-514. International Conference on Wireless Algorithms, Systems, and Applications (WASA 2006), Xi'an, China , August 15-18, 2006. Best Paper Award. PDF
  51. K. Zeng, K. Ren and W. Lou, "Geographic on-demand disjoint multipath routing in wireless ad hoc networks", IEEE MILCOM 2005, October 17-20, 2005, Atlantic City, NJ. PDF
  52. K. Ren, K. Zeng and W. Lou, "On efficient key pre-distribution in large scale wireless sensor networks", IEEE MILCOM 2005, October 17-20, 2005, Atlantic City, NJ. PDF
  53. K. Zeng, J. Yang, B. Shi. "Priority Admission Scheme for Mobile Cellular Networks with Retrial Phenomenon", IEE International Conference on Computer and Devices for Communication 2004 (CODEC-04), January 1-3, 2004, Kolkata, India.
  54. K. Zeng, L. Zou, "The Simulation and Analysis of the Wireless Packet Fair Queuing Algorithm on NS-2", Future Telecommunications Conference 2001, November 29-30, Beijing, China.