Welcome to Prof. Jing Deng's Homepage

Home | Teaching | Research | Publications | CV | Misc
Picture Associate Professor
Department of Computer Science
University of North Carolina at Greensboro
167 Petty Building
Greensboro, NC 27402

Email: jing.deng@ieee.org jing.deng@uncg.edu
Office: 164 Petty Building
Office Hours (Spring 2016): Wednesdays 10:00-12:00, or email for appointment
Phone: (336) 256-1112
Fax: (336) 256-0439


Short Bio:

Dr. Jing Deng is an associate professor in the Department of Computer Science (CS) at the University of North Carolina at Greensboro (UNCG). Dr. Deng visited the Department of Electrical Engineering at Princeton University and the Department of Electrical and Computer Engineering, WINLAB at Rutgers University in Fall of 2005. He was with the Department of Computer Science at the University of New Orleans from 2004 to 2008. He served as a Research Assistant Professor in the Department of Electrical Engineering & Computer Science at Syracuse University from 2002 to 2004. He received his Ph.D. degree from School of Electrical and Computer Engineering at Cornell University, Ithaca, NY in January, 2002.

New In 2015, Dr. Deng's joint paper (with Dr. Fu and Mr. Yang) on social network received the best paper award in IARIA's Third International Conference on Building and Exploring Web Based Environments (WEB'15).

In 2013, Dr. Deng received the prestigious Test-of-Time Award presented by the ACM Special Interest Group on Security, Audit and Control (SIGSAC) for his joint publication with Drs. Du, Han, and Varshney in the area of key predistribution in wireless sensor networks, published in CCS 2003.

Dr. Deng is an editor of IEEE Transactions on Vehicular Technology (TVT). He is a senior member of the IEEE.

Dr. Deng's research focuses include wireless network security, information assurance, mobile ad hoc networks, and social networks.

Graduate Assistant Position:

Students (M.S. applicants or current M.S. students) are welcome to contact me for their interests in my research. The availability of Graduate Research Assistant (GRA/GA/RA) openings with financial support, which include monthly stipend and full tuition waiver, varies over time.

Recent Publications:

  1. New M. R. Khalili Shoja, G. Amariucai, S. Wei, and J. Deng, "Secret Common Randomness from Routing Metadata in Ad-Hoc Networks," IEEE Transactions on Information Forensics & Security, 2016. in press. [PDF] [BibTeX]
  2. New K. Lin, M. Chen, J. Deng, M. M. Hasan, and G. Fortino, "Enhanced Fingerprinting and Trajectory Prediction for IoT Localization in Smart Buildings," IEEE Transactions on Automation Science and Engineering, special issue on Advances and Applications of Internet of Things for Smart Automated Systems, 2016. in press. [PDF] [BibTeX]
  3. New A. Moharrer, S. Wei, G. Amariucai, and J. Deng, "Extractable Common Randomness from Gaussian Trees: Topological and Algebraic Perspectives," IEEE Transactions on Information Forensics & Security, 2016. in press. [PDF] [BibTeX]
  4. F. Xia, H. B. Liaqat, J. Deng, J. Wan, and S. K. Das, "Overhead Control with Reliable Transmission of Popular Packets in Ad-Hoc Social Networks," IEEE Transactions on Vehicular Technology, 2015. in press. [PDF] [BibTeX]
  5. C. Lin, K. Liu, G. Wu, and J. Deng, "VCLT: An Accurate Trajectory Tracking Attack based on Crowdsourcing in VANETs," in Proc. of the 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP '15), Zhangjiajie, China, November 18-20, 2015, pp. 297-310, doi: 10.1007/978-3-319-27137-8_23. [PDF] [BibTeX]
  6. L. Yao, Y. Man, Z. Huang, J. Deng, and X. Wang, "Secure Routing based on Social Similarity in Opportunistic Networks," IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 594-605, January 2016, doi: 10.1109/TWC.2015.2476466. [PDF] [BibTeX]
  7. J. Ruan, J. Deng, G. A. Amariucai, and S. Wei, "Efficient Link Cuts in Online Social Networks," in Proc. of IEEE Global Telecommunications Conference - Special Areas in Communications - Social Networks (GLOBECOM '15), San Diego, CA, USA, December 6-10, 2015, pp. 1-6, doi: 10.1109/GLOCOM.2015.7417589. [PDF] [BibTeX]
  8. A. Moharrer, S. Wei, G. A. Amariucai, and J. Deng, "Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints," in Proc. of IEEE Global Telecommunications Conference - Communications and Information System Security (GLOBECOM '15), San Diego, CA, USA, December 6-10, 2015, pp. 1-6, doi: 10.1109/GLOCOM.2015.7417559. [PDF] [BibTeX]
  9. C. Lin, B. Xue, Z. Wang, D. Han, J. Deng, and G. Wu, "DWDP: A Double Warning Thresholds with Double Preemptive Scheduling Scheme for Wireless Rechargeable Sensor Networks," in Proc. of the International Conference on High Performance Computing and Communications (HPCC '15), New York City, NY, USA, August 24-26, 2015, pp. 503-508, doi: 10.1109/HPCC-CSS-ICESS.2015.115. [PDF] [BibTeX]
  10. L. Yao, J. Deng, J. Wang, and G. Wu, "A-CACHE: an Anchor-based Public Key Caching Scheme in Large Wireless Networks," Elsevier Computer Networks, vol. 87, pp. 78-88, July 2015, doi: 10.1016/j.comnet.2015.06.001. [PDF] [BibTeX]
  11. J. Deng, L. Fu, and Y. Yang, "ZLOC: Detection of Zombie Users in Online Social Networks Using Location Information," in Proc. of the third IARIA International Conference on Building and Exploring Web Based Environments (WEB 2015), Rome, Italy, May 24-29, 2015, pp. 24-28. This paper received the sole Best Paper Award of the conference. [PDF] [BibTeX]
  12. L. Fu and J. Deng, "ROBE: Knitting a Tight Hub for Shortest-Path Discovery in Large Social Graphs," in Proc. of 17th International Conference on Enterprise Information Systems (ICEIS '15), Barcelona, Spain, April 27-30, 2015, pp. 97-107, doi: 10.5220/0005353500970107. [PDF] [BibTeX]
  13. K. Zhao, X. Zhao, and J. Deng, "Online Price Dispersion Revisited: How Do Transaction Prices Differ from Listing Prices?" Journal of Management Information Systems, vol. 32, no. 1, pp. 261-290, summer 2015, doi: 10.1080/07421222.2015.1029397. [PDF] [BibTeX]
  14. A. Moharrer, S. Wei, G. T. Amariucai, and J. Deng, "Evaluation of Security Robustness Against Information Leakage in Gaussian Polytree Graphical Models," in Proc. of IEEE Wireless Communications & Networking Conference, Mobile and Wireless Networks (WCNC '15), New Orleans, LA, USA, March 9-12, 2015, pp. 1404-1409, doi: 10.1109/WCNC.2015.7127674. [PDF] [BibTeX]
  15. G. Wu, Z. Liu, L. Yao, and J. Deng, "A Trust Routing for Multimedia Social Networks," Computer Journal, vol. 58, no. 4, pp. 688-699, April 2015, doi: 10.1093/comjnl/bxu091. [PDF] [BibTeX]
  16. K. Lee, J. Deng, and R. S. Sudhaakar, "Fast Authentication in Multi-Hop Infrastructure-based Communication," in Proc. of IEEE International Conference on Communications - Communication and Information Systems Security Symposium (ICC '14), Sydney, Australia, June 10-14, 2014, pp. 665-670, doi: 10.1109/ICC.2014.6883395. [PDF] [BibTeX]
  17. Y. Liu, M. Liu, and J. Deng, "Revisiting Optimal Power Control: Dual Effects of SNR and Contention," in Proc. of the 10th International Workshop on Wireless Network Measurements and Experimentation (WiNMeE '14) in conjunction with the 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '14), Hammamet, Tunisia, May 12, 2014, pp. 143-150, doi: 10.1109/WIOPT.2014.6850292. [PDF] [BibTeX]
  18. D.-F. Tseng, Y. S. Han, W. H. Mow, P.-N. Chen, J. Deng, and A. J. Han Vinck, "Robust Decoding for Convolutionally Coded Systems Impaired by Memoryless Impulsive Noise," IEEE Transactions on Communications, vol. 61, no. 11, pp. 4640-4652, November 2013, doi: 10.1109/TCOMM.2013.101813.130122. [PDF] [BibTeX]
  19. L. Fu and J. Deng, "Graph Calculus: Scalable Shortest Path Analytics for Large Social Graphs through Core Net," in Proc. of IEEE/WIC/ACM International Conference on Web Intelligence (WI '13), Atlanta, GA, USA, November 17-20, 2013, pp. 417-424, doi: 10.1109/WI-IAT.2013.59. [PDF] [BibTeX]
  20. L. Yao, X. Zou, J. Deng, and S. Suthaharan, "PeB: Periodic Broadcast for Information Distribution in Large Wireless Networks," in Proc. of IEEE Global Telecommunications Conference - Wireless Networking Symposium (GLOBECOM '13), Atlanta, GA, USA, December 9-13, 2013, pp. 4514-4519, doi: 10.1109/GLOCOMW.2013.6855650. [PDF] [BibTeX]
  21. Y. Liu, M. Liu, and J. Deng, "Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth the Pain?" in IEEE Journal on Selected Areas in Communications - Cognitive Radio Series, vol. 31, no. 11, pp. 2301-2311, November 2013, doi: 10.1109/JSAC.2013.131122. [PDF] [BibTeX]
  22. L. Yao, L. Kang, F. Deng, J. Deng, and G. Wu, "Protecting Source-Location Privacy Based on Multi-Rings in Wireless Sensor Networks," Wiley's Concurrency and Computation: Practice and Experience, Special Issue on Trust and Security in Wireless Sensor Networks, June 2013, doi: 10.1002/cpe.3075. [PDF] [BibTeX]
  23. L. Yao, C. Lin, J. Deng, F. Deng, J. Miao, and K. Yim, "Biometrics-based Data Link Layer Anonymous Authentication in VANETs," in Proc. of the 7th International Conference on Complex, Intelligent, and Software Intensive System (IMIS'13), Taichung, Taiwan, July 3-5, 2013, pp. 182-187, doi: 10.1109/IMIS.2013.38. [PDF] [BibTeX]
  24. J. Deng and Y. S. Han, "Cooperative Secret Delivery in Wireless Sensor Networks," International Journal of Ad Hoc and Ubiquitous Computing, vol. 14, no. 4, pp. 226-237, 2013, doi: 10.1504/IJAHUC.2013.058504. [PDF] [BibTeX]

Maintained by Jing Deng. Last Modified: April 29, 2016.