Publications

Journal Papers

  1. Q. Liang, S. Zhao, J. Zhang, and H. Deng, “Unsupervised BLSTM Based Electricity Theft Detection with Training Data Contaminated,” accepted to ACM Transactions on Cyber-Physical Systems, 2023.

  2. Y. Jiang and J. Zhang, “Distributed Detection Over Blockchain-Aided Internet of Things in the Presence of Attacks,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3445-3460, 2023.

  3. B. Xiong, Z. Zhang, H. Jiang, J. Zhang, L. Wu, and J. Dang, “A 3D Non-Stationary MIMO Channel Model for Reconfigurable Intelligent Surface Auxiliary UAV-to-Ground mmWave Communications,” IEEE Transactions on Wireless Communications, vol. 21, no. 7, pp. 5658-5672, July 2022.

  4. B. Xiong, Z. Zhang, H. Jiang, J. Zhang, J. Dang, and L. Wu, “A Statistical MIMO Channel Model for Reconfigurable Intelligent Surface Assisted Wireless Communications,” IEEE Transactions on Communications, vol. 70, no. 2, pp. 1360-1375, Feb. 2022.

  5. H. Jiang, B. Xiong, Z. Zhang, J. Zhang, H. Zhang, J. Dang, and L. Wu, “Novel Statistical Wideband MIMO V2V Channel Modeling Using Unitary Matrix Transformation Algorithm,” IEEE Transactions on Wireless Communications, vol. 20, no. 8, pp. 4947-4961, Aug. 2021.

  6. J. Zhang and X. Wang, “Low-complexity quickest change detection in linear systems with unknown time-varying pre- and post-change distributions,” IEEE Transactions on Information Theory, vol. 67, no. 3, pp. 1804-1824, March 2021.

  7. J. Zhang and X. Wang, “Consensus-based distributed quickest detection of attacks with unknown parameters,” IEEE Transactions on Information Theory, vol. 67, no. 3, pp. 1864-1885, March 2021.

  8. X. Pan, Y. Shen, and J. Zhang, “IoUT based underwater target localization in the presence of time synchronization attacks,” IEEE Transactions on Wireless Communications, vol. 20, no. 6, pp. 3958-3973, June 2021.

  9. B. Xiong, Z. Zhang, J. Zhang, H. Jiang, J. Dang, and L. Wu, “Novel multi-mobility V2X channel model in the presence of randomly moving clusters,” IEEE Transactions on Wireless Communications, vol. 20, no. 5, pp. 3180-3195, May 2021.

  10. Y. Cui, J. Wang, H. Sun, H. Jiang, K. Yang, and J. Zhang, “Gridless underdetermined DOA estimation of wideband LFM signals with unknown amplitude distortion based on fractional Fourier Transform,” IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11612-11625, Dec. 2020.

  11. H. Jiang, Z. Zhang, C. Wang, J. Zhang, J. Dang, L. Wu, and H. Zhang, “A Novel 3D UAV channel model for A2G communication environments using AoD and AoA estimation algorithms,” IEEE Transactions on Communications, vol. 68, no. 11, pp. 7232-7246, Nov. 2020.

  12. J. Zhang and X. Wang, “Asymptotically optimal stochastic encryption for quantized sequential detection in the presence of eavesdroppers,” IEEE Transactions on Information Theory, vol. 66, no. 3, pp. 1530-1548, March 2020.

  13. X. Pan, Y. Bao, Y. Zhu, and J. Zhang, “Deconvolved conventional beamforming and adaptive cubature Kalman filter based distant speech perception system,” IEEE Access, vol. 8, pp. 187948-187958, Oct. 2020.

  14. Y. Chen, R. S. Blum, B. M. Sadler, and J. Zhang, “Testing the structure of a Gaussian graphical model with reduced transmissions in a distributed setting,” IEEE Transactions on Signal Processing, vol. 67, no. 20, pp. 5391-5401,Oct. 2019.

  15. L. Hu, J. Zhang, X. Wang, S. Wang, and E. Zhang, “Decentralized truncated one-sided sequential detection of a non-cooperative moving target,” IEEE Signal Processing Letter, vol. 25, no. 10, pp. 1490-1494, Oct. 2018.

  16. J. Zhang, R. S. Blum, and H. V. Poor, “Approaches to secure inference in the Internet of Things: Performance bounds, algorithms, and effective attacks on IoT sensor networks,” IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 50-63, Sept. 2018.

  17. J. Zhang, X. Wang, R. S. Blum, and L. Kaplan, “Attack detection in sensor network target localization systems with quantized data,” IEEE Transactions on Signal Processing, vol. 66, no. 8, pp. 2070-2085, April 2018.

  18. J. Zhang, R. S. Blum, L. Kaplan, and X. Lu, “A fundamental limitation on maximum parameter dimension for accurate estimation using quantized data,” IEEE Transactions on Information Theory, vol. 64, no. 9, pp. 6180-6195, Sept. 2018.

  19. J. Zhang, Z. Chen, R. S. Blum, X. Lu, and W. Xu, “Ordering for reduced transmission energy detection in sensor networks testing a shift in the mean of a Gaussian graphical model,” IEEE Transactions on Signal Processing, vol. 65, no. 8, pp. 2178-2189, April 2017.

  20. J. Zhang, R. S. Blum, L Kaplan, and X. Lu, “Functional forms of optimum spoofing attacks for vector parameter estimation in quantized sensor networks,” IEEE Transactions on Signal Processing, vol. 65, no. 3, pp. 705-720, Feb. 2017.

  21. B. Alnajjab, J. Zhang, and R. S. Blum, “Attacks on sensor network estimation systems with quantization: Performance and optimum processing,” IEEE Transactions on Signal Processing, vol. 63, no. 24, pp. 6659-6672, Dec. 2015.

  22. J. Zhang, R. S. Blum, X. Lu, and D. Conus, “Asymptotically optimum distributed estimation in the presence of attacks,” IEEE Transactions on Signal Processing, vol. 63, no. 5, pp. 1086-1101, March 2015. (Top 10 most popular paper of IEEE Transactions on Signal Processing in February 2015)

  23. J. Zhang and R. S. Blum, “Asymptotically optimal truncated multivariate Gaussian hypothesis testing with application to consensus algorithms,” IEEE Transactions on Signal Processing, vol. 62, no. 2, pp. 431-442, 2014.

  24. X. Pan, N. Wang, J. Zhang, W. Xu, and X. Gong, “Robust time reversal focusing based on maximin criterion in a waveguide with uncertain water depth,” Science China Physics, Mechanics and Astronomy, vol. 56, no. 10, pp. 1822-1832, 2013.

Conference Papers

  1. J. Zhang, “Secure quantized sequential detection in the Internet of Things with eavesdroppers,” in Proc. IEEE Globecom Workshops (GC Wkshps), Dec. 2019.

  2. J. Zhang, “Quickest detection of time-varying false data injection attacks in dynamic smart grids,” in International Conference on Acoustics, Speech, and Signal Processing (ICASSP), IEEE, 2019.

  3. J. Zhang, R. S. Blum, and L. Kaplan, “Cyber attacks on estimation sensor networks and IoTs: Impact, mitigation and implications to unattacked systems,” in International Conference on Acoustics, Speech, and Signal Processing (ICASSP), IEEE, 2017.

  4. Q. He, J. Zhang, A. Guruswamy, B. Alnajjab, and R. S. Blum, “New contributions to estimation theory with applications in wave energy, IEEE 1588, cybersecurity, MIMO radar and the internet of things,” in Signals, Systems and Computers, 2016 Asilomar Conference on, IEEE, 2016. (Invited Paper)

  5. J Zhang and R. S. Blum, “Distributed joint spoofing attack identification and estimation in sensor networks,” in Signal and Information Processing (ChinaSIP), 2015 IEEE China Summit and International Conference on, IEEE, 2015, pp. 701-705. (Invited Paper)

  6. J Zhang and R. S. Blum, “Distributed estimation in the presence of attacks for large scale sensor networks,” in Information Sciences and Systems (CISS), 2014 48th Annual Conference on, IEEE, 2014, pp. 1-6.

  7. J Zhang and R. S. Blum, “Asymptotically optimal truncated hypothesis test for a large sensor network described by a multivariate Gaussian distribution,” in Signals, Systems and Computers, 2013 Asilomar Conference on, IEEE, 2013, pp. 2012-2016.

  8. J Zhang, C. Wei, and R. S. Blum, “Ordering for shift-in-mean of Gauss-markov random fields with dependent observations,” in Sensor Array and Multichannel Signal Processing Workshop (SAM), 2012 IEEE 7th, IEEE, 2012, pp. 65-68