Publication statistics

Pub. period:2003-2011
Pub. count:6
Number of co-authors:6



Co-authors

Number of publications with 3 favourite co-authors:

Lionel M. Ni:4
Matt W. Mutka:4
Wei Zhu:2

 

 

Productive colleagues

Feng Zhu's 3 most productive colleagues in number of publications:

Lionel M. Ni:15
Matt W. Mutka:14
Wei Zhu:4
 
 
 

Upcoming Courses

go to course
Quality Web Communication: The Beginner's Guide
89% booked. Starts in 6 days
go to course
User-Centred Design - Module 2
83% booked. Starts in 12 days
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Feng Zhu

Add description
Rename / change spelling
Add publication
 

Publications by Feng Zhu (bibliography)

 what's this?
2011
 
Edit | Del

Zhu, Feng, Carpenter, Sandra, Kulkarni, Ajinkya and Kolimi, Swapna (2011): Reciprocity attacks. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 9.

In mobile and pervasive computing environments, users may easily exchange information via ubiquitously available computers ranging from sensors, embedded processors, wearable and handheld devices, to servers. The unprecedented level of interaction between users and intelligent environments poses unparalleled privacy challenges. We identify a new attack that can be used to acquire users' private information -- using reciprocity norms. By mutually exchanging information with users, an attacker may use a psychological method, the norm of reciprocity, to acquire users' private information. We implemented software to provide a rich shopping experience in a mobile and pervasive computing environment and embedded the reciprocity attack. Our experiments showed that participants were more willing to provide some types of private information under reciprocity attacks. To the best of our knowledge, this is the first attempt to understand the impact of the norm of reciprocity as an attack in mobile and pervasive computing environments. These human factors should be taken into consideration when designing security measures to protect people's privacy.

© All rights reserved Zhu et al. and/or ACM Press

2010
 
Edit | Del

Zhu, Feng and Zhu, Wei (2010): Secure and Private Service Discovery in Pervasive Computing Environments. In IJAPUC, 2 (3) pp. 46-59.

2006
 
Edit | Del

Zhu, Feng, Mutka, Matt W. and Ni, Lionel M. (2006): The Master Key: A Private Authentication Approach for Pervasive Computing Environments. In: PerCom 2006 - 4th IEEE International Conference on Pervasive Computing and Communications 13-17 March, 2006, Pisa, Italy. pp. 212-221.

2005
 
Edit | Del

Zhu, Feng, Zhu, Wei, Mutka, Matt W. and Ni, Lionel M. (2005): Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments. In: PerCom 2005 - 3rd IEEE International Conference on Pervasive Computing and Communications 8-12 March, 2005, Kauai Island, HI, USA. pp. 225-234.

2004
 
Edit | Del

Zhu, Feng, Mutka, Matt W. and Ni, Lionel M. (2004): PrudentExposure: A Private and User-centric Service Discovery Protocol. In: PerCom 2004 - Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications 14-17 March, 2004, Orlando, FL, USA. pp. 329-340.

2003
 
Edit | Del

Zhu, Feng, Mutka, Matt W. and Ni, Lionel M. (2003): Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services. In: PerCom03 - Proceedings of the First IEEE International Conference on Pervasive Computing and Communications March 23-26, 2003, Fort Worth, Texas, USA. pp. 235-242.

 
Add publication
Show list on your website
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 
 

Changes to this page (author)

05 Apr 2012: Modified
14 Dec 2011: Modified
14 Dec 2011: Modified
24 Aug 2009: Added
24 Aug 2009: Modified
24 Aug 2009: Modified
24 Aug 2009: Modified

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/feng_zhu.html

Publication statistics

Pub. period:2003-2011
Pub. count:6
Number of co-authors:6



Co-authors

Number of publications with 3 favourite co-authors:

Lionel M. Ni:4
Matt W. Mutka:4
Wei Zhu:2

 

 

Productive colleagues

Feng Zhu's 3 most productive colleagues in number of publications:

Lionel M. Ni:15
Matt W. Mutka:14
Wei Zhu:4
 
 
 

Upcoming Courses

go to course
Quality Web Communication: The Beginner's Guide
89% booked. Starts in 6 days
go to course
User-Centred Design - Module 2
83% booked. Starts in 12 days
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading