Cliff Wang

According to our database1, Cliff Wang authored at least 65 papers between 1994 and 2023.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2016, "For leadership in trusted computing and communication systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Toward Fast and Energy-Efficient Access to Cloudlets in Hostile Environments.
IEEE Trans. Wirel. Commun., November, 2023

Remedy or Resource Drain: Modeling and Analysis of Massive Task Offloading Processes in Fog.
IEEE Internet Things J., July, 2023

Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection.
IEEE Trans. Mob. Comput., 2022

MTD '22: 9th ACM Workshop on Moving Target Defense.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Measurement Integrity Attacks Against Network Tomography: Feasibility and Defense.
IEEE Trans. Dependable Secur. Comput., 2021

Introduction to the Minitrack on Cyber Deception and Cyber Psychology for Defense.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks?
IEEE Trans. Wirel. Commun., 2020

Modeling and Analysis of Conflicting Information Propagation in a Finite Time Horizon.
IEEE/ACM Trans. Netw., 2020

Cyber Deception for Computer and Network Security: Survey and Challenges.
CoRR, 2020

Introduction to the Minitrack on Cyber Deception for Defense.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

MTD'20: 7th ACM Workshop on Moving Target Defense.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
SAS: Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019

2018
Cyber Deception: Overview and the Road Ahead.
IEEE Secur. Priv., 2018

Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel Hopping Capability.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Computer-Aided Human Centric Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective.
IEEE/ACM Trans. Netw., 2017

When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

On the Root Cause of Dropout-Induced Contraction Process in D2D-Based Mobile Social Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Modeling and Strategy Design for Spectrum Monitoring over a Geographical Region.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

From Isolation Time to Node Resilience: Impact of Cascades in D2D-Based Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
On the Evolution and Impact of Mobile Botnets in Wireless Networks.
IEEE Trans. Mob. Comput., 2016

How the anti-rumor kills the rumor: Conflicting information propagation in networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Modeling and estimating the structure of D2D-based mobile social networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Divide and Conquer: Leveraging Topology in Control of Epidemic Information Dynamics.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

On the Resilience of D2D-Based Social Networking Service against Random Failures.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

How Robust Is a D2D-Based Messaging Service?
Proceedings of the 2016 IEEE Global Communications Conference, 2016

MTD 2016: Third ACM Workshop on Moving Target Defense.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

Conclusion.
Proceedings of the Digital Fingerprinting, 2016

Introduction.
Proceedings of the Digital Fingerprinting, 2016

2015
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23288-1, 2015

Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming.
IEEE Trans. Dependable Secur. Comput., 2015

War of 2050: a Battle for Information, Communications, and Computer Security.
CoRR, 2015

Will Cybersecurity Dictate the Outcome of Future Wars?
Computer, 2015

On detection and concealment of critical roles in tactical wireless networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
Fundamentals of Sketch-Based Passwords - A General Framework
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-13629-5, 2014

Concluding Thoughts.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Preview.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications.
IEEE Trans. Mob. Comput., 2014

How can botnets cause storms? Understanding the evolution and impact of mobile botnets.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2012
Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks.
IEEE Trans. Mob. Comput., 2012

Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks.
Proceedings of IEEE International Conference on Communications, 2010

Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2008
Attack-Resistant Location Estimation in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Secure target localisation in sensor networks using relaxation labelling.
Int. J. Sens. Networks, 2008

2007
IPsec Security Policy Database Configuration MIB.
RFC, March, 2007

Secure and Resilient Time Synchronization in Wireless Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Secure Tracking in Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

A New Relaxation Labeling Architecture for Secure Localization in Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

2006
Secure and resilient clock synchronization in wireless sensor networks.
IEEE J. Sel. Areas Commun., 2006

Robust Localization of Multiple Events in Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Secure Distributed Cluster Formation in Wireless Sensor Networks.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Protocol for Carrying Authentication for Network Access (PANA) Requirements.
RFC, May, 2005

Definitions of Managed Objects for Network Address Translators (NAT).
RFC, March, 2005

Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2005

Supervised Multispectral Image Segmentation using Active Contours.
Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005

1994
Edge detection in gated cardiac nuclear medicine images.
Proceedings of the Seventh Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'94), 1994


  Loading...