Helen Tang
Orcid: 0000-0003-3589-3980
  According to our database1,
  Helen Tang
  authored at least 51 papers
  between 2006 and 2020.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2020
A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community.
    
  
    IEEE Open J. Commun. Soc., 2020
    
  
  2019
A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges.
    
  
    IEEE Commun. Surv. Tutorials, 2019
    
  
    IEEE Commun. Surv. Tutorials, 2019
    
  
Mitigating Routing Misbehavior using Blockchain-Based Distributed Reputation Management System for IoT Networks.
    
  
    Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019
    
  
  2018
A Deep Reinforcement Learning-based Trust Management Scheme for Software-defined Vehicular Networks.
    
  
    Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2018
    
  
    Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
    
  
  2017
Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying.
    
  
    Wirel. Commun. Mob. Comput., 2017
    
  
  2016
Compensation of imperfect channel reciprocity through MMSE prediction for physical-layer confidentiality enhancement.
    
  
    Proceedings of the International Conference on Military Communications and Information Systems, 2016
    
  
Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing.
    
  
    Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
    
  
    Proceedings of the Ad Hoc Networks - 8th International Conference, 2016
    
  
    Proceedings of the Ad Hoc Networks - 8th International Conference, 2016
    
  
  2015
    Secur. Commun. Networks, 2015
    
  
    Proceedings of the 34th IEEE Military Communications Conference, 2015
    
  
    Proceedings of the 34th IEEE Military Communications Conference, 2015
    
  
Secure and efficient routing by Leveraging Situational Awareness Messages in tactical edge networks.
    
  
    Proceedings of the International Conference on Military Communications and Information Systems, 2015
    
  
A trust based framework for both spectrum sensing and data transmission in CR-MANETs.
    
  
    Proceedings of the IEEE International Conference on Communication, 2015
    
  
Privacy-preserving distributed cooperative spectrum sensing in multi-channel cognitive radio MANETs.
    
  
    Proceedings of the 2015 IEEE International Conference on Communications, 2015
    
  
  2014
    Wirel. Commun. Mob. Comput., 2014
    
  
A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks.
    
  
    IEEE Trans. Wirel. Commun., 2014
    
  
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning.
    
  
    IEEE Trans. Veh. Technol., 2014
    
  
Trust Establishment Based on Bayesian Networks for Threat Mitigation in Mobile Ad Hoc Networks.
    
  
    Proceedings of the 2014 IEEE Military Communications Conference, 2014
    
  
    Proceedings of the IEEE International Conference on Communications, 2014
    
  
  2013
Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks.
    
  
    EURASIP J. Wirel. Commun. Netw., 2013
    
  
    Proceedings of the 32th IEEE Military Communications Conference, 2013
    
  
  2012
    Wirel. Networks, 2012
    
  
A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions.
    
  
    Proc. IEEE, 2012
    
  
Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks.
    
  
    IET Commun., 2012
    
  
Joint authentication and quality of service provisioning in cooperative communication networks.
    
  
    Comput. Commun., 2012
    
  
A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications.
    
  
    Proceedings of the 31st IEEE Military Communications Conference, 2012
    
  
    Proceedings of the 31st IEEE Military Communications Conference, 2012
    
  
  2011
Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks.
    
  
    IEEE Trans. Wirel. Commun., 2011
    
  
Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks.
    
  
    IEEE Trans. Veh. Technol., 2011
    
  
Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios
    
  
    CoRR, 2011
    
  
Robust physical layer authentication using inherent properties of channel impulse response.
    
  
    Proceedings of the MILCOM 2011, 2011
    
  
    Proceedings of IEEE International Conference on Communications, 2011
    
  
A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-Hoc Networks.
    
  
    Proceedings of IEEE International Conference on Communications, 2011
    
  
  2010
Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks.
    
  
    Wirel. Networks, 2010
    
  
A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks.
    
  
    IEEE Trans. Netw. Serv. Manag., 2010
    
  
Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios.
    
  
    IEEE Netw., 2010
    
  
Combined Authentication and Quality of Service in Cooperative Communication Networks.
    
  
    Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
    
  
    Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
    
  
  2009
Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks.
    
  
    IEEE Trans. Wirel. Commun., 2009
    
  
Enhancing interoperability in heterogeneous mobile wireless networks for disaster response.
    
  
    IEEE Trans. Wirel. Commun., 2009
    
  
Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks.
    
  
    Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
    
  
  2008
    Secur. Commun. Networks, 2008
    
  
    Proceedings of the 9th International Conference for Young Computer Scientists, 2008
    
  
A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks.
    
  
    Proceedings of IEEE International Conference on Communications, 2008
    
  
  2007
    Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007
    
  
QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical Infrastructures.
    
  
    Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
    
  
  2006
    Proceedings of the IEEE 11th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2006