Saide Zhu

Saide Zhu
Gaige Technology and Business Innovation Building, 213

Saide Zhu is an assistant professor of cybersecurity analytics and operations at Penn State Berks. Dr. Zhu received the Ph.D. in Computer Science from Georgia State University, and a master of science degree from Boston University.

Dr. Zhu currently teaches courses on the application development studio, computer system literature, risk analysis in cybersecurity, blockchain, and more.

Dr. Zhu's research builds on applied cryptography, distributed computing, and game theory analysis to solve security and privacy problems in decentralized environments, especially in the blockchain network and mobile computing. Dr. Zhu is a member of IEEE.

Articles in Refereed Journals

Journal Article, Academic/Scholarly

  • Zhu, S., Li, R., Cai, Z., Kim, D., Seo, D., & Li, W. (2022). Secure verifiable aggregation for blockchain-based federated averaging. High-Confidence Computing 2(1), 8. DOI:, ISBN/ISSN: 2667-2952
  • Zhu, S., Cai, Z., Hu, H., Li, Y., & Li, W. (2020). zkCrowd: A Hybrid Blockchain-Based Crowdsourcing Platform. IEEE Transactions on Industrial Informatics 16(6), 4196-4205. DOI: 10.1109/tii.2019.2941735, ISBN/ISSN: 1551-3203
  • Tao, X., Liu, L., Zhao, F., Huang, Y., Liang, Y., & Zhu, S. (2019). Ontology and weighted D-S evidence theory-based vulnerability data fusion method. Journal of Universal Computer Science 25(3), 203--221.\_25\_3/ontology\_and\_weighted\_ds
  • Zhu, S., Li, W., Li, H., Tian, L., Luo, G., & Cai, Z. (2019). Coin Hopping Attack in Blockchain-Based IoT. IEEE Internet of Things Journal 6(3), 4614-4626. DOI: 10.1109/jiot.2018.2872458, ISBN/ISSN: 2327-4662
  • Zhu, S., Li, W., Li, H., Hu, C., & Cai, Z. (2018). A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining. Mathematical Foundations of Computing 1(4), 393-414. DOI: 10.3934/mfc.2018020, ISBN/ISSN: 2577-8838

Refereed Conference Proceedings

  • Zhao, F., Huang, Y., Zhu, S., Malladi, V., & Wu, Y. (2021). A Weighted Federated Averaging Framework to Reduce the Negative Influence from the Dishonest Users. International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. (12382), (pp. 241-250). Springer. DOI: 10.1007/978-3-030-68851-6\_17
  • Sun, G., Xing, X., Qian, Z., Wang, Z., & Zhu, S. (2021). Light intensity based IoT device positioning for indoor monitoring. International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage.. (12382) . Springer. DOI: 10.1007/978-3-030-68851-6\_21
  • Zhang, L., Zhu, S., Li, F., Li, R., Meng, J., & Li, W. (2020). A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries. International Conference on Wireless Algorithms, Systems, and Applications. (pp. 704-715). Springer. DOI: 10.1007/978-3-030-59016-1_58, ISBN/ISSN: 9783030590154
  • Zhu, S., Hu, H., Li, Y., & Li, W. (2019). Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform. 2019 IEEE International Conference on Blockchain. (pp. 26-33). IEEE. DOI: 10.1109/blockchain.2019.00013