Dr. Xiaowen Zhang is an Associate Professor of Computer Science at the College of Staten Island and a Doctoral Faculty Member at the Graduate Center / CUNY. He received a Ph.D. in Computer Science (2007) from the City University of New York and a Ph.D. in Electrical Engineering (1999) from Northern Jiaotong University. His research interests include Cryptography, Information Security, Cybersecurity, Secure Biometrics, RFID Security & Privacy, Information Retrieval, Wireless Sensor Networks, and Wireless Communications.

### Degrees

Ph.D., CUNY Graduate Center

Ph.D., Northern Jiaotong University

M.A., CUNY Queens College

M.S., Northern Jiaotong University

B.S., Shanxi University

### Scholarship / Publications

**Recent Publications: **

J1. X. Wei, X. Zhang, and L. Geng. Smart building temperature monitoring system using Matplotlib. J. of Computer Science and Information Technology, 7(2), 2019, pp. 37-48.

J2. C. Chum, X. Wei, and X. Zhang. A split Bloom filter for better performance. J. of Applied Security Research (Taylor & Francis), 2019, pp.1-14. DOI: 10.1080/19361610.2019. 1613090. Published online Oct 3, 2019.

J3. G. Zhao and X. Zhang. Re-ranking web data per knowledge domain. Int. J. of Service and Knowledge Management, 3(1), 2019, pp. 66-84.

J4. X. Wei, L. Geng, and X. Zhang. Web browser based data visualization scheme for XBee wireless sensor network. Trans. on Networks and Communications, 6(5), 2018, pp. 59-69.

J5. X. Wei, L. Geng, and X. Zhang. An open source data visualization system for wireless sensor network. J. of Computer Science and Information Technology, 5(2), 2017, pp. 10-17.

J6. C. Chum and X. Zhang. Implementations of a hash function based secret sharing scheme. J. of Applied Security Research (Taylor & Francis), 10(4), 2015, pp. 525-542.

J7. M. Chan and X. Zhang. Simulations of leveled RFID localization for indoor moving objects. Int. J. of Radio Frequency Identification Technology and Applications (Inderscience), 4(3), 2014, pp. 213-228.

J8. L. Shu, K.Cheng, X. Zhang,and J.Zhou. Periodicsweep coverage scheme based on periodic vehicle routing problem. Journal of Networks (Academy Publisher), 9(3), 2014, pp. 726-732.

J9. C. Chum and X. Zhang. Hash function based secret sharing scheme designs. Security and Communication Networks (Wiley), 6(5), 2013, pp. 584-592.

J10. Q. Gao and X. Zhang. A study of distortion effects on fingerprint matching. Computer Science and Engineering (Scientific & Academic Publishing), 2(3), 2012, pp. 37-42.

J11. X. Zhang, Z. Zhang, and X. Wei. An improved lightweight RFID authentication protocol. Int. J. of Applied Logistics (IGI Global). 2(1), 2011, pp. 76-84.

J12. C. Chum and X. Zhang. The Latin squares and the secret sharing schemes. Groups - Complexity - Cryptology. 2(2), 2010, pp. 175-202.

J13. X. Zhang, Q. Gao, and M. Saad. Looking at a class of RFID APs through GNY logic. Int. J. of Security and Networks (Inderscience), Special Issue on Security and Privacy in RFID Systems, 5(2/3), 2010, pp. 135-146.

B1. C. Chum, B. Fine, and X. Zhang. A survey: Shamir threshold scheme and its enhancements. Infinite Group Theory - From the Past to the Future, World Scientific Publishing, Feb 2018, pp. 19-41. ISBN: 978-981-3204-04-1.

P1. M. Bicer and X. Zhang. An efficient, hybrid, double-hash string-matching algorithm. Proc. of the 15th IEEE Long Island Systems, Applications and Technology Conf. (LISAT 2019), Farmingdale, NY, May 3, 2019, pp. 1-5.

P2. C. McMahon and X. Zhang. Modern network security practices: using rainbow tables to solve organizational issues. Proc. of the 39th IEEE Sarnoff Symposium (Sarnoff 2018), Newark, NJ, Sept 24-25, 2018, pp. 1-5.

P3. G. Zhao and X. Zhang. Domain-specific ontology concept extraction and hierarchy extension. Proc. of the 2nd Int. Conf. on Natural Language Processing and Information Retrieval (NLPIR 2018), Bangkok, Thailand, Sept 7-9, 2018, pp. 60-64. (ACM DL)

P4. B. Weber and X. Zhang. Parallel hash collision search by rho method with distinguished points. Proc. of the 14th IEEE LISAT 2018, Farmingdale, NY, May 4, 2018, pp. 1-7.

P5. G. Zhao and X. Zhang. A domain-specific web document re-ranking algorithm. Proc. of the 6th IIAI International Congress on Advanced Applied Informatics, Hamamatsu, Japan, July 9-13, 2017, pp. 385-390. (IEEE Xplore)

P6. M. Cantu, J. Kim, and X. Zhang. Finding hash collisions using MPI on HPC clusters. Proc. of the 13th IEEE LISAT 2017, Farmingdale, NY, May 5-6, 2017, pp. 1-6.

P7. M. Chan and X. Zhang. Reader leveled RFID localization approaches and their simulation. Proc. of the 13th IEEE LISAT 2017, Farmingdale, NY, May 5-6, 2017, pp. 1-6.

P8. V. Chiriaco, A. Franzen, R. Thayil, and Xiaowen Zhang. Finding partial hash collisions by brute force parallel programming. Proc. of the 13th IEEE LISAT 2017, Farmingdale, NY, May 5-6, 2017, pp. 1-6.

P9. C. Chum and X. Zhang. A new Bloom filter structure for searchable encryption schemes. Proc. of the 7th ACM Conf. on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, Mar 22-24, 2017, pp. 143-145.

P10. V. Chiriaco, A. Franzen, R. Thayil, and X. Zhang. Finding partial hash collisions by brute force parallel programming. Proc. of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, Sept 19-21, 2016, pp. 1-2. [2 pages poster paper]

P11. M. Chan, H. Elsherbini, and X. Zhang. User density and spatial cloaking algorithm selection: improving privacy protection of mobile users. Proc. of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, Sept 19-21, 2016, pp. 1-2. [2 pages poster paper]

P12. C. Chum and X. Zhang. A new multi-server scheme for private information retrieval. Contemporary Mathematics (AMS), Vol. 677–Algebra and Computer Science, 2016, pp. 45-50.

P13. C. Chum, B. Fine, A. Moldenhauer, G. Rosenberger, and X. Zhang. On secret sharing protocols. Contemporary Mathematics (AMS), Vol. 677–Algebra and Computer Science, 2016, pp. 51-78.

P14. P. Adluru, S. Datla, and X. Zhang. Hadoop eco system for big data security and privacy. Proc. of the 11th IEEE LISAT 2015, Farmingdale, NY, May 1, 2015, pp. 1-6.

P15. G. Zhao, X. Zhang, and A. Tansel. Open km-learning: using semantic web technologies to facilitate e-learning. Proc. of the 2014 Int. Conf. on Semantic Web and Web Services, Las Vegas, NV, July 2014, pp. 1-5.

P16. C. Chum, C. Jun, and X. Zhang. Implementation of randomize-then-combine constructed hash function. Proc. of the 23rd IEEE Wireless and Optical Communication Conf. (WOCC 2014), Newark, NJ, May 9-10, 2014, pp. 1-6.

P17. M. Chan and X. Zhang. Experiments for leveled RFID localization for indoor stationary objects. Proc. of the 11th Int. Conf. on Information Technology: New Generations (ITNG 2014), IEEE Computer Society, Las Vegas, NV, Apr 7-9, 2014, pp. 163-169.

P18. A. Hassan and X. Zhang. Design and build a secure e-voting infrastructure. Proc. of the 9th IEEE LISAT 2013, Farmingdale, NY, May 3, 2013, pp. 1-7.

P19. C. Chum and X. Zhang. Improving Latin square based secret sharing schemes. Contemporary Mathematics (AMS), Vol. 582-Computational and Combinatorial Group Theory and Cryptography, 2012, pp. 51-64.

P20. C. Chum, B. Fine, G. Rosenberger, and X. Zhang. A proposed alternative to the Shamir secret sharing scheme. Contemporary Mathematics (AMS), Vol. 582-Computational and Combinatorial Group Theory and Cryptography, 2012, pp. 47-50.

P21. M. Chan and X. Zhang. Leveled indoor localization algorithms based on passive RFID. Proc. of the 2012 Int. Conf. on Wireless Networks (ICWN 2012), Las Vegas, NV, July 16-19, 2012, pp. 275-281.

P22. A. Hassan and X. Zhang. Bypassing web-based wireless authentication systems. Proc. of the 7th IEEE LISAT 2011, Farmingdale, NY, May 6, 2011, pp. 1-4.

P23. C. Chum and X. Zhang. A new scheme for hash function construction. In Proc. of the 2010 Int. Conf. on Security and Management (SAM 2010), Las Vegas, NV, July 12-15, 2010, pp.211-217.

P24. C. Chum and X. Zhang. Applying hash functions in the Latin square based secret sharing schemes. Proc. of SAM 2010, Las Vegas, NV, July 12-15, 2010, pp.197-203.

P25. P. Koshy, J. Valentin, and X. Zhang. Implementation and performance testing of the SQUASH RFID authentication protocol. In Proc. of the 6th IEEE LISAT 2010, Farmingdale, NY, May 7, 2010, pp. 1-5.