Publication statistics

Pub. period:2003-2011
Pub. count:6
Number of co-authors:6



Co-authors

Number of publications with 3 favourite co-authors:

Lionel M. Ni:4
Matt W. Mutka:4
Wei Zhu:2

 

 

Productive colleagues

Feng Zhu's 3 most productive colleagues in number of publications:

Lionel M. Ni:15
Matt W. Mutka:14
Wei Zhu:4
 
 
 
Jul 13

A general principle for all user interface design is to go through all of your design elements and remove them one at a time. If the design works as well without a certain design element, kill it.

-- Jakob Nielsen, Designing Web Usability, p. 22.

 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

Kumar and Herger 2013: Gamification at Work: Designing Engaging Business Software...
by Janaki Mythily Kumar and Mario Herger

 
Start reading

Whitworth and Ahmad 2013: The Social Design of Technical Systems: Building technologies for communities...
by Brian Whitworth and Adnan Ahmad

 
Start reading

Soegaard and Dam 2013: The Encyclopedia of Human-Computer Interaction, 2nd Ed....
by Mads Soegaard and Rikke Friis Dam

 
Start reading
 
 

Help us help you!

 
 

Feng Zhu

Add description
Add publication

Publications by Feng Zhu (bibliography)

 what's this?
2011
 
Edit | Del

Zhu, Feng, Carpenter, Sandra, Kulkarni, Ajinkya and Kolimi, Swapna (2011): Reciprocity attacks. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 9.

In mobile and pervasive computing environments, users may easily exchange information via ubiquitously available computers ranging from sensors, embedded processors, wearable and handheld devices, to servers. The unprecedented level of interaction between users and intelligent environments poses unparalleled privacy challenges. We identify a new attack that can be used to acquire users' private information -- using reciprocity norms. By mutually exchanging information with users, an attacker may use a psychological method, the norm of reciprocity, to acquire users' private information. We implemented software to provide a rich shopping experience in a mobile and pervasive computing environment and embedded the reciprocity attack. Our experiments showed that participants were more willing to provide some types of private information under reciprocity attacks. To the best of our knowledge, this is the first attempt to understand the impact of the norm of reciprocity as an attack in mobile and pervasive computing environments. These human factors should be taken into consideration when designing security measures to protect people's privacy.

© All rights reserved Zhu et al. and/or ACM Press

2010
 
Edit | Del

Zhu, Feng and Zhu, Wei (2010): Secure and Private Service Discovery in Pervasive Computing Environments. In IJAPUC, 2 (3) pp. 46-59.

2006
 
Edit | Del

Zhu, Feng, Mutka, Matt W. and Ni, Lionel M. (2006): The Master Key: A Private Authentication Approach for Pervasive Computing Environments. In: PerCom 2006 - 4th IEEE International Conference on Pervasive Computing and Communications 13-17 March, 2006, Pisa, Italy. pp. 212-221.

2005
 
Edit | Del

Zhu, Feng, Zhu, Wei, Mutka, Matt W. and Ni, Lionel M. (2005): Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments. In: PerCom 2005 - 3rd IEEE International Conference on Pervasive Computing and Communications 8-12 March, 2005, Kauai Island, HI, USA. pp. 225-234.

2004
 
Edit | Del

Zhu, Feng, Mutka, Matt W. and Ni, Lionel M. (2004): PrudentExposure: A Private and User-centric Service Discovery Protocol. In: PerCom 2004 - Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications 14-17 March, 2004, Orlando, FL, USA. pp. 329-340.

2003
 
Edit | Del

Zhu, Feng, Mutka, Matt W. and Ni, Lionel M. (2003): Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services. In: PerCom03 - Proceedings of the First IEEE International Conference on Pervasive Computing and Communications March 23-26, 2003, Fort Worth, Texas, USA. pp. 235-242.

 
Add publication
Show list on your website
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
 
 
 

Changes to this page (author)

05 Apr 2012: Modified
14 Dec 2011: Modified
14 Dec 2011: Modified
24 Aug 2009: Added
24 Aug 2009: Modified
24 Aug 2009: Modified
24 Aug 2009: Modified

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/feng_zhu.html

Publication statistics

Pub. period:2003-2011
Pub. count:6
Number of co-authors:6



Co-authors

Number of publications with 3 favourite co-authors:

Lionel M. Ni:4
Matt W. Mutka:4
Wei Zhu:2

 

 

Productive colleagues

Feng Zhu's 3 most productive colleagues in number of publications:

Lionel M. Ni:15
Matt W. Mutka:14
Wei Zhu:4
 
 
 
Jul 13

A general principle for all user interface design is to go through all of your design elements and remove them one at a time. If the design works as well without a certain design element, kill it.

-- Jakob Nielsen, Designing Web Usability, p. 22.

 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

Kumar and Herger 2013: Gamification at Work: Designing Engaging Business Software...
by Janaki Mythily Kumar and Mario Herger

 
Start reading

Whitworth and Ahmad 2013: The Social Design of Technical Systems: Building technologies for communities...
by Brian Whitworth and Adnan Ahmad

 
Start reading

Soegaard and Dam 2013: The Encyclopedia of Human-Computer Interaction, 2nd Ed....
by Mads Soegaard and Rikke Friis Dam

 
Start reading
 
 

Help us help you!