Helen Tang

According to our database1, Helen Tang authored at least 47 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges.
IEEE Commun. Surv. Tutorials, 2019

Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges.
IEEE Commun. Surv. Tutorials, 2019

Mitigating Routing Misbehavior using Blockchain-Based Distributed Reputation Management System for IoT Networks.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

2018
A Deep Reinforcement Learning-based Trust Management Scheme for Software-defined Vehicular Networks.
Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2018

Security and Privacy of Smart Cities: Issues and Challenge.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying.
Wirel. Commun. Mob. Comput., 2017

2016
Security Schemes in Vehicular Ad hoc Networks with Cognitive Radios.
CoRR, 2016

Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Secure Data Sharing for Vehicular Ad-hoc Networks Using Cloud Computing.
Proceedings of the Ad Hoc Networks - 8th International Conference, 2016

A Prototype Implementation of Continuous Authentication for Tactical Applications.
Proceedings of the Ad Hoc Networks - 8th International Conference, 2016

2015
Reliability enhancement for CIR-based physical layer authentication.
Secur. Commun. Networks, 2015

HMS: Holistic MPR selection and network connectivity for tactical edge networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

An architecture for secure interoperability between coalition tactical MANETs.
Proceedings of the 34th IEEE Military Communications Conference, 2015

A trust based framework for both spectrum sensing and data transmission in CR-MANETs.
Proceedings of the IEEE International Conference on Communication, 2015

Privacy-preserving distributed cooperative spectrum sensing in multi-channel cognitive radio MANETs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Trust establishment in cooperative wireless relaying networks.
Wirel. Commun. Mob. Comput., 2014

A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks.
IEEE Trans. Wirel. Commun., 2014

Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning.
IEEE Trans. Veh. Technol., 2014

Trust establishment with data fusion for secure routing in MANETs.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks.
EURASIP J. Wirel. Commun. Netw., 2013

Cross-Layer Security Management Framework for Mobile Tactical Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2012
Optimal reliable relay selection in multiuser cooperative relaying networks.
Wirel. Networks, 2012

A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions.
Proc. IEEE, 2012

Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks.
IET Commun., 2012

Joint authentication and quality of service provisioning in cooperative communication networks.
Comput. Commun., 2012

A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications.
Proceedings of the 31st IEEE Military Communications Conference, 2012

LAA: Link-layer anonymous access for tactical MANETs.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2011
Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks.
IEEE Trans. Wirel. Commun., 2011

Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011

Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios
CoRR, 2011

Robust physical layer authentication using inherent properties of channel impulse response.
Proceedings of the MILCOM 2011, 2011

Continuous Physical Layer Authentication Using a Novel Adaptive OFDM System.
Proceedings of IEEE International Conference on Communications, 2011

A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2011

2010
Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks.
Wirel. Networks, 2010

A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks.
IEEE Trans. Netw. Serv. Manag., 2010

Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios.
IEEE Netw., 2010

Combined Authentication and Quality of Service in Cooperative Communication Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Trust Management in Wireless Mobile Networks with Cooperative Communications.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks.
IEEE Trans. Wirel. Commun., 2009

Enhancing interoperability in heterogeneous mobile wireless networks for disaster response.
IEEE Trans. Wirel. Commun., 2009

Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Biometric-based user authentication in mobile <i>ad hoc</i> networks.
Secur. Commun. Networks, 2008

Lightweight Integrated Authentication for Tactical MANETs.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

2007
Optimal Biometric-Based Continuous Authentication in Mobile Ad Hoc Networks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical Infrastructures.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

2006
Performance evaluation of VSQ: a fair MAC scheme for packet ring networks.
Proceedings of the IEEE 11th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2006


  Loading...