also known as JZ :-)

Assistant Professor
School of Computer Science and Engineering
Nanyang Technological University (NTU)
 
PhD degree from Carnegie Mellon University (CMU), USA
Office: Block N4, Room 02C-111,
50 Nanyang Ave, Singapore 639798
Email: JunZhao@NTU.edu.sg
JunZhao@alumni.CMU.edu
WeChat: http://www.ntu.edu.sg/home/junzhao/wechat.jpg  
Phone: 8648 3534 (The area code of Singapore is 65.)

Openings for PhD students, postdocs, research assistants/associates, and visiting students/scholars are available.

Please contact me at JunZhao@NTU.edu.sg or add my Wechat at http://www.ntu.edu.sg/home/junzhao/wechat.jpg

 

Member of Team PrivBayes, winning 3rd Place in the 2018 USA NIST differential privacy synthetic data competition  

(Team Members: Boiling Ding, Xiaokui Xiao, Jun Zhao, Ergute Bao, and Xuejun Zhao) 

https://www.nist.gov/communications-technology-laboratory/pscr/funding-opportunities/open-innovation-prize-challenges-1

Group members:

Zehui Xiong (with Prof. Dusit Niyato), ZXIONG002 [AT] e.ntu.edu.sg

Huimei Han, hmhan1215 [AT] zjut.edu.cn

Yang Liu, liuocean613 [AT] gmail.com

Tao Bai, taobai2078 [AT] gmail.com

Yang Zhao, yangzhaohnu [AT] gmail.com

Muhammad Baqer Mollah, muhd.baqer [AT] ntu.edu.sg

Collaborators:

Mengmeng Yang(with Prof. Kwok-Yan Lam), melody.yang [AT] ntu.edu.sg

Teng Wang (with Prof. Kwok-Yan Lam), wangteng0610 [AT] gmail.com

 

NTU PhD Applications: 

http://admissions.ntu.edu.sg/graduate/scholarships/Pages/default.aspx 

http://www.ntu.edu.sg/alibaba-NTU/PhD-application/Pages/index.aspx

http://scse.ntu.edu.sg/Programmes/CurrentStudents/Graduate/Pages/SalesforceNTUTalentProgramme.aspx

https://admissions.ntu.edu.sg/graduate/scholarships/Pages/Commonwealth-Scholarship.aspx

http://scse.ntu.edu.sg/Programmes/CurrentStudents/Graduate/Pages/msc-research.aspx
 

Experiences:

\begin{IEEEbiography} 
{Jun Zhao} (S'10-M'15) is currently an Assistant Professor in the School of Computer Science and Engineering at Nanyang Technological University (NTU) in Singapore. He received a PhD degree in Electrical and Computer Engineering from Carnegie Mellon University (CMU) in the USA (advisors: Virgil Gligor, Osman Yagan; collaborator: Adrian Perrig), affiliating with CMU's renowned 
CyLab Security & Privacy Institute, and a bachelor's degree from Shanghai Jiao Tong University in China. Before joining NTU first as a postdoc with Xiaokui Xiao and then as a faculty member, he was a postdoc at Arizona State University as an Arizona Computing PostDoc Best Practices Fellow (advisors: Junshan Zhang, Vincent Poor). His research interests are listed below. One of his first-authored papers was shortlisted for the best student paper award in IEEE International Symposium on Information Theory (ISIT) 2014, a prestigious conference in information theory. 
\end{IEEEbiography}

 
 
Research:
  • Communications & Networks (intelligent surfaces, 6G, edge/fog computing, wireless, IoT, CPS, graphs)
  • Security (blockchains, adversarial machine learning, differential privacy, applied cryptography)
  • AI (adversarial machine learning, privacy-preserving machine/deep/federated learning)
Other topics:
 
 
About me

PhD degree from Carnegie Mellon University (CMU), USA 美国卡内基梅隆大学

BE degree from Shanghai Jiao Tong University, China 中国上海交通大学

 

 

            JunZhao@NTU.edu.sg

            JunZhao@alumni.CMU.edu

Working/Submitted:

Huimei Han, Jun Zhao, Dusit Niyato, Marco Di Renzo, Quoc-Viet Pham.

Intelligent Reflecting Surface Aided Network: Power Control for Physical-Layer Broadcasting

https://arxiv.org/abs/1910.14383

Intelligent Reconfigurable Surface Aided Power Control for Physical-Layer Broadcasting. https://arxiv.org/pdf/1912.03468.pdf

J. Zhao. Optimizations with Reconfigurable Intelligent Surfaces (RISs) in 6G Wireless Networks: Power Control, Quality of Service, Max-Min Fair Beamforming for Unicast, Broadcast, and Multicast with Multi-antenna Mobile Users and Multiple RISs. https://arxiv.org/abs/1908.03965

J. Zhao. A Survey of Reconfigurable Intelligent Surfaces: Towards 6G Wireless Communication Networks with Massive MIMO 2.0. https://arxiv.org/pdf/1907.04789.pdf

Artificial Intelligence-Enabled Intelligent 6G Networks. http://arxiv.org/pdf/1912.05744.pdf

J. Zhao, Junshan Zhang, Vincent Poor. “Dependent differential privacy,”
submitted to IEEE Transactions on Information Theory.

 

J. Zhao, O. Yagan, and V. Gligor. “On asymptotically exact probability of k-connectivity in random
key graphs intersecting Erdos–Rényi graphs.”

Resource Allocation in Mobility-Aware Federated Learning Networks: A Deep Reinforcement Learning Approach. https://arxiv.org/abs/1910.09172

"Contract Design in Hierarchical Game for Sponsored Content Service Market," submitted to IEEE Transactions on Mobile Computing.

Zehui Xiong, Jun Zhao, Dusit Niyato, Ruilong Deng, and Junshan Zhang, ''Reward optimization for content providers with mobile data subsidization: A hierarchical game approach", IEEE Transactions on Network Science and Engineering, under review.

Teng Wang, Jun Zhao, Han Yu, Jinyan Liu, Xinyu Yang, Xuebin Ren, and Shuyu Shi. Privacy-preserving Crowd-guided AI Decision-making in Ethical Dilemmas. Full paper in ACM International Conference on Information and Knowledge Management (CIKM), 2019. Acceptance rate: 200/1030 ≈ 19.4%. https://arxiv.org/abs/1906.01562

Locally Differentially Private Data Collection and Analysis. https://arxiv.org/abs/1906.01777

 

Distributed Clustering in the Anonymized Space with Local Differential Privacy. https://arxiv.org/abs/1906.11441

Conditional Analysis for Key-Value Data with Local Differential Privacy. https://arxiv.org/abs/1907.05014 

Reviewing and Improving the Gaussian Mechanism for Differential Privacy.

Faster Convergence of Differentially Private Deep Learning Algorithms Using RMSProp.

Mobile Edge Computing, Blockchain and Reputation-based Crowdsourcing IoT Federated Learning: A Secure, Decentralized and Privacy-preserving System. http://arxiv.org/abs/1906.10893 

"Internet of Things Service Market: A Game-Theoretic Analysis".

Blockchain for Future Smart Grid: A Comprehensive Survey. https://arxiv.org/pdf/1911.03298.pdf

'Adaptive Differentially Private Data Stream Publishing in Spatio-temporal Monitoring of IoT'. IPCCC 2019.

An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound.   https://arxiv.org/pdf/1909.06587.pdf

 

Journal Articles:

 

Zhongjin Li, Binbin Huang, Haiyang Hu, Jun Zhao, Peng Tang, Shangguang Wang, Victor Chang, Wanqing Li. “Security modeling and efficient computation offloading for service workflow in mobile edge computing,” accepted to Future Generation Computer Systems, 2019. [PDF]

 

J. Kang, Z. Xiong, D. Niyato, D. Ye, D. In Kim, and J. Zhao.  "Towards Secure Blockchain-enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory," accepted to IEEE Transactions on Vehicular Technology, 2019. [PDF]

 

J. Zhao. “Probabilistic key predistribution in mobile networks resilient to node-capture attacks,”
IEEE Transactions on Information Theory, 2017.
http://doi.org/10.1109/TIT.2017.2721424


J. Zhao and Junshan Zhang. “Preserving privacy enables ‘co-existence equilibrium’ of competitive diffusion in social networks,”
IEEE Transactions on Signal and Information Processing over Networks, 2017.
http://doi.org/10.1109/TSIPN.2017.2697819


J. Zhao. “On resilience and connectivity of secure wireless sensor networks under node capture
attacks,”
IEEE Transactions on Information Forensics and Security, 2017.
http://doi.org/10.1109/TIFS.2016.2613841


J. Zhao, O. Yagan, and V. Gligor. “k-Connectivity in random key graphs with unreliable links,”
IEEE Transactions on Information Theory, 2015. 
http://doi.org/10.1109/TIT.2015.2425395

 

J. Zhao, O. Yagan, and V. Gligor. “On connectivity and robustness in random intersection
graphs,”

IEEE Transactions on Automatic Control, 2016. 
http://doi.org/10.1109/TAC.2016.2601564

 

J. Zhao. “Topological properties of secure wireless sensor networks under the q-composite key
predistribution scheme with unreliable links,”
IEEE/ACM Transactions on Networking, 2017. 
http://doi.org/10.1109/TNET.2017.2653109

 

J. Zhao. “On secure communication in sensor networks under q-composite key predistribution with unreliable links,”

IEEE Transactions on Communications, 2017.

http://doi.org/10.1109/TCOMM.2017.2778718

J. Zhao. “Analyzing resilience of interest-based social networks against node and link failures,”
IEEE Transactions on Signal and Information Processing over Networks, 2017.
http://doi.org/10.1109/TSIPN.2017.2697827

J. Zhao. “Analyzing connectivity of heterogeneous secure sensor networks,”
IEEE Transactions on Control of Network Systems, 2016. 
http://doi.org/10.1109/TCNS.2016.2641799

J. Zhao. “Transitional behavior of q-composite random key graphs with applications to networked control,”
IEEE Transactions on Control of Network Systems, 2017.
http://doi.org/10.1109/TCNS.2017.2754379

F. Yavuz, J. Zhao, O. Yagan, and V. Gligor. “Towards k-connectivity of the random graph induced
by a pairwise key predistribution scheme with unreliable links,”
IEEE Transactions on Information Theory, 2015. 
http://doi.org/10.1109/TIT.2015.2471295

F. Yavuz, J. Zhao, O. Yagan, and V. Gligor. “k-Connectivity in random K-out graphs intersecting
Erdos–Rényi graphs,”
IEEE Transactions on Information Theory, 2016. 
http://doi.org/10.1109/TIT.2016.2634422

X. Liu, K. Zheng, J. Zhao, X. Liu, X. Wang, X Di. “Information-centric networks with correlated
mobility,”
IEEE Transactions on Vehicular Technology, 2017. 
http://doi.org/10.1109/TVT.2016.2602373

S. Ma, G. Chen, L. Fu, W. Wu, X. Tian, J. Zhao, X. Wang. “Seeking powerful information initial
spreaders in online social networks: A dense group perspective,”
Wireless Networks (Springer), 2017. 
http://doi.org/10.1007/s11276-017-1478-1

J. Zhao, V. Gligor, A. Perrig, and J. Newsome. “ReDABLS: Revisiting device attestation with
bounded leakage of secrets,”
Lecture Notes in Computer Science (for Cambridge Workshop on Security Protocols), 2013.
http://doi.org/10.1007/978-3-642-41717-7_12

V. Gligor, A. Perrig, and J. Zhao. “Brief encounters with a random key graph,”
Lecture Notes in Computer Science, 2013. 
http://doi.org/10.1007/978-3-642-36213-2_20

Conference/Workshop Papers:

Recent Workshop Papers:

J. Zhao, J. Zhang, and V. Poor. “Dependent differential privacy for correlated data,” accepted.

 

Linshan Jiang, Xin Lou, Rui Tan, Jun Zhao. “Differentially private collaborative learning for the IoT edge,” International Workshop on Crowd Intelligence for Smart Cities: Technology and Applications (CICS), held in conjunction with International Conference on Embedded Wireless Systems and Networks (EWSN), Beijing, China, February 2019. Workshop program: http://bit.ly/2CXrKQN Manuscript: http://bit.ly/2C3iQ28

 

 

Published/Accepted Conference Papers:

 

Zhiying Xu, Shuyu Shi, Alex X. Liu, Jun Zhao, Lin Chen, "An Adaptive and Fast Convergent Approach to Differentially Private Deep Learning", IEEE INFOCOM 2020.

 

Privacy-preserving Crowd-guided AI Decision-making in Ethical Dilemmas. Full paper in ACM International Conference on Information and Knowledge Management (CIKM), 2019. Acceptance rate: 200/1030 ≈ 19.4%. https://arxiv.org/abs/1906.01562

 

 

Renchi Yang, Xiaokui Xiao, Zhewei Wei, Sourav Bhowmick, Jun Zhao, and Rong-Hua Li. "Efficient Algorithms for Local Clustering via Heat Kernels". Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), 2019. [PDF]

 

N. Wang, X. Xiao, Y. Yang, J. Zhao, S. Cheung Hui, H. Shin, J. Shin, and G. Yu. “Collecting and analyzing multidimensional data with local differential privacy,” accepted to IEEE International Conference on Data Engineering (ICDE) 2019. [PDF]

 

 

S. Shi, Y. Xie, A. Liu, J. Zhao, and M. Li, "Synthesizing wider WiFi bandwidth for respiration rate monitoring in dynamic environments", IEEE INFOCOM 2019.

 

J. Zhao. "Analyzing the robustness of deep learning against adversarial examples", IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2018.

 

Wubing Chen, Xian Shi, Zhiying Xu, Shuyu Shi, Yang Zhao, "A Survey of Blockchain Applications in Different Domains", International Conference on Blockchain Technology and Application, 2018.

 

J. Zhao. “Adaptive statistical learning with Bayesian differential privacy,”

in ACM 16th Annual CCS Workshop on Privacy in the Electronic Society, held in conjunction with ACM SIGSAC 25th Annual Conference on Computer and Communications Security (CCS), Dallas, Texas, US, October 2017.

 

J. Zhao. “Relations among different privacy notions,”

in IEEE 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), UIUC, Illinois, US, October 2017.

 

J. Zhao. “Composition properties of Bayesian differential privacy,”

in IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, Quebec, Canada, October 2017. 

J. Zhao. “Secure connectivity of wireless sensor networks under q-composite key predistribution with on/off channels,”
in IEEE International Conference on Distributed Computing Systems (ICDCS), 2017.
http://doi.org/10.1109/ICDCS.2017.186

J. Zhao. “Modeling interest-based social networks: Superimposing Erdos–Rényi graphs over random
intersection graphs,”
in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.
http://doi.org/10.1109/ICASSP.2017.7952848

 

J. Zhao. “Designing secure networks with q-composite key predistribution under different link
constraints,”
in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.
http://doi.org/10.1109/ICASSP.2017.7952522

 

J. Zhao. “A comprehensive guideline for choosing parameters in the Eschenauer–Gligor key
predistribution,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2016.
http://doi.org/10.1109/ALLERTON.2016.7852380

 

J. Zhao. “On the resilience to node capture attacks of secure wireless sensor networks,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2015.
http://doi.org/10.1109/ALLERTON.2015.7447100

 

J. Zhao. “Sharp transitions in random key graphs,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2015.
http://doi.org/10.1109/ALLERTON.2015.7447142

 

J. Zhao. “Threshold functions in random s-intersection graphs,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2015.
http://doi.org/10.1109/ALLERTON.2015.7447166

 

J. Zhao. “The absence of isolated node in geometric random graphs,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2015.
http://doi.org/10.1109/ALLERTON.2015.7447099

 

J. Zhao. “Critical behavior in heterogeneous random key graphs,”
in IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2015.
http://doi.org/10.1109/GlobalSIP.2015.7418321

 

J. Zhao. “Parameter control in predistribution schemes of cryptographic keys,”
in IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2015.
http://doi.org/10.1109/GlobalSIP.2015.7418320

 

J. Zhao, O. Yagan, and V. Gligor. “Exact analysis of k-connectivity in secure sensor networks with
unreliable links,”
in IEEE International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless
Networks (WiOpt), 2015. http://doi.org/10.1109/WIOPT.2015.7151072

 

J. Zhao, O. Yagan, and V. Gligor. “On k-connectivity and minimum vertex degree in random
s-intersection graphs,”
in ACM-SIAM Meeting on Analytic Algorithmics & Combinatorics (ANALCO), 2015.
http://dx.doi.org/10.1137/1.9781611973761.1

 

J. Zhao, O. Yagan, and V. Gligor. “On topological properties of wireless sensor networks under the
q-composite key predistribution scheme with on/off channels,”
in IEEE International Symposium on Information Theory (ISIT), 2014
(a finalist for the best student paper award). http://doi.org/10.1109/ISIT.2014.6875009

 

J. Zhao. “Minimum node degree and k-connectivity in wireless networks with unreliable links,”
in IEEE International Symposium on Information Theory (ISIT), 2014.
http://doi.org/10.1109/ISIT.2014.6874832

 

J. Zhao, O. Yagan, and V. Gligor. “On the strengths of connectivity and robustness in general random
intersection graphs,”
in IEEE Conference on Decision and Control (CDC), 2014.
http://doi.org/10.1109/CDC.2014.7039959

 

J. Zhao, O. Yagan, and V. Gligor. “Connectivity in secure wireless sensor networks under
transmission constraints,”
in IEEE Allerton Conference on Communication, Control, and Computing (Allerton), 2014.
http://doi.org/10.1109/ALLERTON.2014.7028605

 

J. Zhao, O. Yagan, and V. Gligor. “Secure k-connectivity in wireless sensor networks under an
on/off channel model,”
in IEEE International Symposium on Information Theory (ISIT), 2013.
http://doi.org/10.1109/ISIT.2013.6620734

 

F. Yavuz, J. Zhao, O. Yagan, and V. Gligor. “Designing secure and reliable wireless sensor networks
under a pairwise key predistribution scheme,”
in IEEE International Conference on Communications (ICC), 2015.
http://doi.org/10.1109/ICC.2015.7249324

 

F. Yavuz, J. Zhao, O. Yagan, and V. Gligor. “On secure and reliable communications in wireless
sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme,”
in IEEE International Symposium on Information Theory (ISIT), 2014.
http://doi.org/10.1109/ISIT.2014.6875260

 

X. Wang, X. Wang, and J. Zhao. “Impact of mobility and heterogeneity on coverage and energy
consumption in wireless sensor networks,”
in IEEE International Conference on Distributed Computing Systems (ICDCS), 2011.
http://doi.org/10.1109/ICDCS.2011.17

 

C. Hu, X. Wang, D. Nie, and J. Zhao. “Multicast scaling laws with hierarchical cooperation,”
in IEEE Conference on Computer Communications (INFOCOM), 2010.
http://doi.org/10.1109/INFCOM.2010.5462000

Publications

This site was designed with the
.com
website builder. Create your website today.
Start Now