Publication statistics

Pub. period:2003-2011
Pub. count:6
Number of co-authors:6



Co-authors

Number of publications with 3 favourite co-authors:

Lionel M. Ni:4
Matt W. Mutka:4
Wei Zhu:2

 

 

Productive colleagues

Feng Zhu's 3 most productive colleagues in number of publications:

Lionel M. Ni:15
Matt W. Mutka:14
Wei Zhu:4
 
 
 

Upcoming Courses

go to course
Emotional Design: How to make products people will love
Starts the day after tomorrow !
go to course
UI Design Patterns for Successful Software
85% booked. Starts in 10 days
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Feng Zhu

 

Publications by Feng Zhu (bibliography)

 what's this?
2011
 
Edit | Del

Zhu, Feng, Carpenter, Sandra, Kulkarni, Ajinkya and Kolimi, Swapna (2011): Reciprocity attacks. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 9. Available online

In mobile and pervasive computing environments, users may easily exchange information via ubiquitously available computers ranging from sensors, embedded processors, wearable and handheld devices, to servers. The unprecedented level of interaction between users and intelligent environments poses unparalleled privacy challenges. We identify a new attack that can be used to acquire users' private information -- using reciprocity norms. By mutually exchanging information with users, an attacker may use a psychological method, the norm of reciprocity, to acquire users' private information. We implemented software to provide a rich shopping experience in a mobile and pervasive computing environment and embedded the reciprocity attack. Our experiments showed that participants were more willing to provide some types of private information under reciprocity attacks. To the best of our knowledge, this is the first attempt to understand the impact of the norm of reciprocity as an attack in mobile and pervasive computing environments. These human factors should be taken into consideration when designing security measures to protect people's privacy.

© All rights reserved Zhu et al. and/or ACM Press

2010
 
Edit | Del

Zhu, Feng and Zhu, Wei (2010): Secure and Private Service Discovery in Pervasive Computing Environments. In IJAPUC, 2 (3) pp. 46-59. Available online

2006
 
Edit | Del

Zhu, Feng, Mutka, Matt W. and Ni, Lionel M. (2006): The Master Key: A Private Authentication Approach for Pervasive Computing Environments. In: PerCom 2006 - 4th IEEE International Conference on Pervasive Computing and Communications 13-17 March, 2006, Pisa, Italy. pp. 212-221. Available online

2005
 
Edit | Del

Zhu, Feng, Zhu, Wei, Mutka, Matt W. and Ni, Lionel M. (2005): Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments. In: PerCom 2005 - 3rd IEEE International Conference on Pervasive Computing and Communications 8-12 March, 2005, Kauai Island, HI, USA. pp. 225-234. Available online

2004
 
Edit | Del

Zhu, Feng, Mutka, Matt W. and Ni, Lionel M. (2004): PrudentExposure: A Private and User-centric Service Discovery Protocol. In: PerCom 2004 - Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications 14-17 March, 2004, Orlando, FL, USA. pp. 329-340. Available online

2003
 
Edit | Del

Zhu, Feng, Mutka, Matt W. and Ni, Lionel M. (2003): Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services. In: PerCom03 - Proceedings of the First IEEE International Conference on Pervasive Computing and Communications March 23-26, 2003, Fort Worth, Texas, USA. pp. 235-242. Available online

 
Add publication
Show list on your website
 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/feng_zhu.html