Kai Zhou, Yunhui Long, Yan Xu, Bo Li, and Yevgeniy Vorobeychik. Certified robustness of
graph neural networks against structural attacks via edge smoothing. In submission, 2020
Marcin Waniek, Kai Zhou, Yevgeniy Vorobeychik, Esteban Moro, Tomasz P Michalak, and Talal Rahwan, “How to Hide one’s Relationships from Link prediction Algorithms”, Scientific Reports, 2019, Nature Publishing Group.
Ehab Zaghloul, Kai Zhou, and Jian Ren, “P-mod: Secure privilege-based multilevel organizational data-sharing in cloud computing”, IEEE Transactions on Big Data, 2019.
Kai Zhou, and Jian Ren, “Passbio: Privacy-preserving user-centric biometric authentication”, IEEE Transactions on Information Forensics and Security, 2018.
Kai Zhou, and Jian Ren, “CASO: Cost-Aware Secure Outsourcing of General Computational Problems”, IEEE Transactions on Services Computing, 2018.
Mohamed H. Afifi Ibrahim, Kai Zhou, and Jian Ren, “Privacy characterization and quantification in data publishing”, IEEE Transactions on Knowledge and Data Engineering, 2018.
Kai Zhou, M. H. Afifi, and Jian Ren, “ExpSOS: secure and verifiable outsourcing of exponentiation operations for mobile cloud computing”, IEEE Transactions on Information Forensics and Security 12, no. 11 (2017): 2518-2531.
Tianlong Song, Kai Zhou, and Tongtong Li, “CDMA system design and capacity analysis under disguised jamming”, IEEE Transactions on Information Forensics and Security 11, no. 11 (2016): 2487-2498.
Kai Zhou and Yevgeniy Vorobeychik, “Robust Collective Classification against Structural Attacks”, the 36th Conference on Uncertainty in Artificial Intelligence (UAI), 2020
Sixie Yu*, Kai Zhou*, P. Jeffrey Brantingham, and Yevgeniy Vorobeychik, “Computing Equilibria in Binary Networked Public Goods Games“, 34th AAAI Conference on Artificial Intelligence (AAAI), 2020. (* equal contribution)
Kai Zhou, Tomasz P. Michalak , and Yevgeniy Vorobeychik, “Adversarial Robustness of Similarity-Based Link Prediction“, 19th IEEE International Conference on Data Mining (ICDM), 2019. (regular paper acceptance rate: 95/1064, 9.08%)
Kai Zhou, Tomasz P. Michalak, Marcin Waniek, Talal Rahwan, and Yevgeniy Vorobeychik, “Attacking Similarity-Based Link Prediction in Social Networks”, International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2019.
Kai Zhou, and Jian Ren, “Security and Privacy Enhancement for Outsourced Biometric Identification”, IEEE Global Communications Conference (GLOBECOM), 2018
Kai Zhou, and Jian Ren, “Secure fine-grained access control of mobile user data through untrusted cloud”, 25th International Conference on Computer Communication and Networks (ICCCN), 2016.
Kai Zhou, and Jian Ren, “Secure outsourcing of scalar multiplication on elliptic curves”, IEEE International Conference on Communications (ICC), 2016.
Kai Zhou, and Jian Ren, “LinSOS: Secure outsourcing of linear computations based on affine mapping”, IEEE International Conference on Communications (ICC), 2016.
Kai Zhou, Tianlong Song, Jian Ren, and Tongtong Li, “Robust CDMA receiver design under disguised jamming”, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2016.
Jian Li, Kai Zhou, and Jian Ren. “Security and efficiency trade-offs for cloud computing and storage”, IEEE Resilience Week (RWS), 2015.
(Publications before grad school)
Kai Zhou, Xiaohua Tian, Yu Cheng, “A theoretical framework for mitigating delay in 3D wireless data center networks“, IEEE International Conference on Communications (ICC), 2013.
Kai Zhou, Gaofei Sun, Xinbing Wang, and Zhiyong Feng, “Spatial reuse in spectrum sharing: A Matrix Spatial Congestion Games approach“, IEEE International Conference on Communications in China (ICCC), 2012.
Jian Ren, and Kai Zhou, “Cost-aware secure outsourcing”, U.S. Patent Application 15/624,408, filed December 21, 2017.