Cong Pu

Orcid: 0000-0002-7952-0038

According to our database1, Cong Pu authored at least 56 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
liteGAP: Lightweight Group Authentication Protocol for Internet of Drones Systems.
IEEE Trans. Veh. Technol., April, 2024

GAN-Based Channel Estimation for IRS-Aided Communication Systems.
IEEE Trans. Veh. Technol., April, 2024

A Systematic Investigation of Thermal Effects of High-Intensity Focused Ultrasound Therapy for Ultrasound Neuromodulation.
IEEE Trans. Instrum. Meas., 2024

Chebyshev Polynomial and Private Blockchain Based Cross-Domain Authentication Protocol for IoD Networks.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

A Lightweight Aggregate Authentication Protocol for Internet of Drones.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Deep Learning Assisted Channel Estimation for Cell-Free Distributed MIMO Networks.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

Resource-Efficient and Data Type-Aware Authentication Protocol for Internet of Things Systems.
Proceedings of the 5th IEEE International Conference on Trust, 2023

A Featherweight Authentication and Key Agreement Scheme for Internet of Drones Applications.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

Privacy-Preserving and Fault-Tolerant Data Aggregation Protocol for Internet of Drones.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

2022
DarkSky: Privacy-preserving target tracking strategies using a flying drone.
Veh. Commun., 2022

Dynamic Resource Allocation for IRS Assisted Energy Harvesting Systems With Statistical Delay Constraint.
IEEE Trans. Veh. Technol., 2022

Drone Helps Privacy: Sky Caching Assisted $k$-Anonymity in Spatial Querying.
IEEE Syst. J., 2022

A Lightweight and Anonymous Authentication and Key Agreement Protocol for Wireless Body Area Networks.
IEEE Internet Things J., 2022

A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment.
IEEE Internet Things J., 2022

Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function.
Comput. Secur., 2022

Mitigating Routing Misbehavior in the Internet of Drones Environment.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Low Complexity Resource Allocation for Multiuser Uplink Communication Systems.
Proceedings of the 45th International Conference on Telecommunications and Signal Processing, 2022

SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones.
Proceedings of the 23rd IEEE International Conference on Mobile Data Management, 2022

A Reinforcement Learning Based Service Scheduling Algorithm for Internet of Drones.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

2021
Psched: A Priority-Based Service Scheduling Scheme for the Internet of Drones.
IEEE Syst. J., 2021

Pro NDN : MCDM-Based Interest Forwarding and Cooperative Data Caching for Named Data Networking.
J. Comput. Networks Commun., 2021

A Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks: Design, Analysis, and Evaluation.
IEEE Access, 2021

A Novel Blockchain-Based Trust Management Scheme for Vehicular Networks.
Proceedings of the Wireless Telecommunications Symposium, 2021

Defending against Flooding Attacks in the Internet of Drones Environment.
Proceedings of the IEEE Global Communications Conference, 2021

2020
MQry: Elastic Validity Region for Querying Mobile Point-of-Interests in Infrastructure-Less Networks.
IEEE Syst. J., 2020

Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses.
IEEE Internet Things J., 2020

Lightweight Authentication Protocol for Unmanned Aerial Vehicles Using Physical Unclonable Function and Chaotic System.
Proceedings of the 26th IEEE International Symposium on Local and Metropolitan Area Networks, 2020

A Theil Index-Based Countermeasure Against Advanced Vampire Attack in Internet of Things.
Proceedings of the 21st IEEE International Conference on High Performance Switching and Routing, 2020

Lightweight Digital Signature Solution to Defend Micro Aerial Vehicles Against Man-In-The-Middle Attack.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020

2019
Active detection in mitigating routing misbehavior for MANETs.
Wirel. Networks, 2019

To Route or To Ferry: A Hybrid Packet Forwarding Algorithm in Flying Ad Hoc Networks.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Digital Signature Based Countermeasure Against Puppet Attack in the Internet of Things.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Self-Adjusting Share-Based Countermeasure to Interest Flooding Attack in Named Data Networking.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Energy Depletion Attack in Low Power and Lossy Networks: Analysis and Defenses.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Spam DIS Attack Against Routing Protocol in the Internet of Things.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

RescueMe: Smartphone-Based Self Rescue System for Disaster Rescue.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

Energy Depletion Attack Against Routing Protocol in the Internet of Things.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
A holistic approach to the exploitation of energy harvesting motivated networks: Protocols and countermeasures to DoS attacks.
PhD thesis, 2018

A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation.
IEEE Syst. J., 2018

Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses.
Sensors, 2018

EYES: Mitigating forwarding misbehavior in energy harvesting motivated networks.
Comput. Commun., 2018

VRSense: Validity region sensitive query processing strategies for static and mobile point-of-interests in MANETs.
Comput. Commun., 2018

Jamming-Resilient Multipath Routing Protocol for Flying Ad Hoc Networks.
IEEE Access, 2018

A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Evacuation Assisting Strategies in Vehicular Ad Hoc Networks.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Mitigating Suppression Attack in Multicast Protocol for Low Power and Lossy Networks.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Hatchetman Attack: A Denial of Service Attack Against Routing in Low Power and Lossy Networks.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

Link-Quality and Traffic-Load Aware Routing for UAV Ad Hoc Networks.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Mitigating DAO inconsistency attack in RPL-based low power and lossy networks.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Mitigating stealthy collision attack in energy harvesting motivated networks.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

2016
Validity region sensitive query processing strategies in mobile ad hoc networks.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
Lightweight Forwarding Protocols in Energy Harvesting Wireless Sensor Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014


  Loading...