Kui Wu

Orcid: 0000-0002-2069-0032

Affiliations:
  • University of Victoria, Department of Computer Science, BC, Canada
  • University of Pretoria, Department of Electrical, Electronic and Computer Engineering, South Africa
  • Shanghai University of Electric Power, College of Computer Science and Technology, China (former)
  • University of Alberta, Department of Computer Science, Edmonton, AB, Canada (PhD 2002)


According to our database1, Kui Wu authored at least 235 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Score-VAE: Root Cause Analysis for Federated-Learning-Based IoT Anomaly Detection.
IEEE Internet Things J., January, 2024

Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network.
ACM Trans. Priv. Secur., 2024

2023
6Scan: A High-Efficiency Dynamic Internet-Wide IPv6 Scanner With Regional Encoding.
IEEE/ACM Trans. Netw., August, 2023

Multi-Agent Learning-Based Optimal Task Offloading and UAV Trajectory Planning for AGIN-Power IoT.
IEEE Trans. Commun., July, 2023

Prepartition: Load Balancing Approach for Virtual Machine Reservations in a Cloud Data Center.
J. Comput. Sci. Technol., July, 2023

FedNILM: Applying Federated Learning to NILM Applications at the Edge.
IEEE Trans. Green Commun. Netw., June, 2023

Fast Model Update for IoT Traffic Anomaly Detection With Machine Unlearning.
IEEE Internet Things J., May, 2023

Growable Genetic Algorithm with Heuristic-based Local Search for multi-dimensional resources scheduling of cloud computing.
Appl. Soft Comput., March, 2023

A Learning-Based Discretionary Lane-Change Decision-Making Model With Driving Style Awareness.
IEEE Trans. Intell. Transp. Syst., January, 2023

Efficient Anomaly Detection for High-Dimensional Sensing Data With One-Class Support Vector Machine.
IEEE Trans. Knowl. Data Eng., 2023

Time2State: An Unsupervised Framework for Inferring the Latent States in Time Series Data.
Proc. ACM Manag. Data, 2023

Layered Randomized Quantization for Communication-Efficient and Privacy-Preserving Distributed Learning.
CoRR, 2023

Killing Two Birds with One Stone: Quantization Achieves Privacy in Distributed Learning.
CoRR, 2023

Search in the Expanse: Towards Active and Global IPv6 Hitlists.
Proceedings of the IEEE INFOCOM 2023, 2023

Content-Aided IoT Traffic Anomaly Detection.
Proceedings of the IEEE International Conference on Communications, 2023

2022
GreenEdge: New Perspectives to Energy Management and Supply in Mobile Edge Computing - The First Book on Green Edge Computing
Springer Briefs in Computer Science, Springer, ISBN: 978-981-16-9689-3, 2022

Optimal Task Offloading and Resource Allocation for C-NOMA Heterogeneous Air-Ground Integrated Power Internet of Things Networks.
IEEE Trans. Wirel. Commun., 2022

PLVER: Joint Stable Allocation and Content Replication for Edge-Assisted Live Video Delivery.
IEEE Trans. Parallel Distributed Syst., 2022

Bound Inference and Reinforcement Learning-Based Path Construction in Bandwidth Tomography.
IEEE/ACM Trans. Netw., 2022

TSAGen: Synthetic Time Series Generation for KPI Anomaly Detection.
IEEE Trans. Netw. Serv. Manag., 2022

SNIFF: A Scalable Network Inference Framework for Measuring End-to-End Performance.
IEEE Trans. Netw. Sci. Eng., 2022

BESS Aided Renewable Energy Supply Using Deep Reinforcement Learning for 5G and Beyond.
IEEE Trans. Green Commun. Netw., 2022

Reversible data hiding for JPEG images with minimum additive distortion.
Inf. Sci., 2022

Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles.
IEEE Internet Things J., 2022

GSAN: Graph Self-Attention Network for Learning Spatial-Temporal Interaction Representation in Autonomous Driving.
IEEE Internet Things J., 2022

Modeling and Alleviating Low-Battery Anxiety for Mobile Users in Video Streaming Services.
IEEE Internet Things J., 2022

EdgeSaver: Edge-Assisted Energy-Aware Mobile Video Streaming for User Retention Enhancement.
IEEE Internet Things J., 2022

EviChain: A scalable blockchain for accountable intelligent surveillance systems.
Int. J. Intell. Syst., 2022

Scalable probabilistic truss decomposition using central limit theorem and H-index.
Distributed Parallel Databases, 2022

6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning.
Comput. Networks, 2022

Progressive Construction of k-identifiable Networks.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

Investigating Low-Battery Anxiety of Mobile Users.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

AoI-centric Task Scheduling for Autonomous Driving Systems.
Proceedings of the IEEE INFOCOM 2022, 2022

Nucleus Decomposition in Probabilistic Graphs: Hardness and Algorithms.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Automatic Field Extraction of Extended TLV for Binary Protocol Reverse Engineering.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

HiVT: Hierarchical Vector Transformer for Multi-Agent Motion Prediction.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Leveraging Multiplexing Gain in Network Slice Bundles.
IEEE Trans. Netw. Sci. Eng., 2021

Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems.
IEEE Internet Things J., 2021

Centipede: Leveraging the Distributed Camera Crowd for Cooperative Video Data Storage.
IEEE Internet Things J., 2021

Cloud Resource Scheduling With Deep Reinforcement Learning and Imitation Learning.
IEEE Internet Things J., 2021

Trusted audit with untrusted auditors: A decentralized data integrity Crowdauditing approach based on blockchain.
Int. J. Intell. Syst., 2021

A Generative Car-following Model Conditioned On Driving Styles.
CoRR, 2021

BESS Aided Reconfigurable Energy Supply using Deep Reinforcement Learning for 5G and Beyond.
CoRR, 2021

On the Difficulty of Generalizing Reinforcement Learning Framework for Combinatorial Optimization.
CoRR, 2021

A Whittle Index Approach to Minimizing Age of Multi-Packet Information in IoT Network.
IEEE Access, 2021

Truss Decomposition on Large Probabilistic Networks using H-Index.
Proceedings of the SSDBM 2021: 33rd International Conference on Scientific and Statistical Database Management, 2021

Controlling the Maximum Link Estimation Error in Network Performance Tomography.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Reusing Backup Batteries as BESS for Power Demand Reshaping in 5G and Beyond.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

6Hit: A Reinforcement Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Iterative Learning-Based Decentralized Model Predictive Charging Control for Plug-In Electric Vehicles.
Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems, 2021

Non-Intrusive and High-Efficient Balance Tomography in the Lightning Network.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Route Planning and Power Management for PHEVs With Reinforcement Learning.
IEEE Trans. Veh. Technol., 2020

QoS Guaranteed Edge Cloud Resource Provisioning for Vehicle Fleets.
IEEE Trans. Veh. Technol., 2020

Bound Inference in Network Performance Tomography With Additive Metrics.
IEEE/ACM Trans. Netw., 2020

Learning-Based Dynamic Resource Provisioning for Network Slicing with Ensured End-to-End Performance Bound.
IEEE Trans. Netw. Sci. Eng., 2020

Channel Selective Activity Recognition with WiFi: A Deep Learning Approach Exploring Wideband Information.
IEEE Trans. Netw. Sci. Eng., 2020

Anti-compression JPEG steganography over repetitive compression networks.
Signal Process., 2020

Quantifying Low-Battery Anxiety of Mobile Users and Its Impacts on Video Watching Behavior.
CoRR, 2020

SmartSharing: A CDN with Smart Contract-based Local OTT Sharing.
Proceedings of the 2020 IFIP Networking Conference, 2020

GSAN: Graph Self-Attention Network for Interaction Measurement in Autonomous Driving.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

Rldish: Edge-Assisted QoE Optimization of HTTP Live Streaming with Reinforcement Learning.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Distributed Storage System for Robust, Privacy-Preserving Surveillance Cameras.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Alleviating Low-Battery Anxiety of Mobile Users via Low-Power Video Streaming.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

A Reinforcement Learning Based Approach to Identify Resource Bottlenecks for Multiple Services Interactions in Cloud Computing Environments.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Tapping the Knowledge of Dynamic Traffic Demands for Optimal CDN Design.
IEEE/ACM Trans. Netw., 2019

Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds.
Peer-to-Peer Netw. Appl., 2019

Goldilocks: Learning Pattern-Based Task Assignment in Mobile Crowdsensing.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019

EFusion: correcting unreliable labels with expert knowledge for mobile crowdsensing.
Proceedings of the 2019 IFIP Networking Conference, 2019

Evaluating and Boosting Reinforcement Learning for Intra-Domain Routing.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

GAN-Based Steganography with the Concatenation of Multiple Feature Maps.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Self-Triggered Robust MPC with ISM for Constrained Nonlinear Input-Affine Systems.
Proceedings of the 28th IEEE International Symposium on Industrial Electronics, 2019

Automatic Data Quality Enhancement with Expert Knowledge for Mobile Crowdsensing.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Bound-based Network Tomography with Additive Metrics.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Fast Truss Decomposition in Large-scale Probabilistic Graphs.
Proceedings of the Advances in Database Technology, 2019

Efficient Computation of Probabilistic Core Decomposition at Web-Scale.
Proceedings of the Advances in Database Technology, 2019

SNIFF: A Scalable Network Inference Framework for Measuring End-to-End Performance Based on Matrix Completion.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

2018
Bikeshare Pool Sizing for Bike-and-Ride Multimodal Transit.
IEEE Trans. Intell. Transp. Syst., 2018

Guest Editorial: Introduction to the Special Issue on Connected Vehicles in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2018

Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles.
Symmetry, 2018

Unsupervised steganalysis over social networks based on multi-reference sub-image sets.
Multim. Tools Appl., 2018

SpinMag: A New Fingerprinting Method for Robot Indoor Localization with Geomagnetic Field.
Ad Hoc Sens. Wirel. Networks, 2018

Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition.
IEEE Access, 2018

A New Dependence Model for Heterogeneous Markov Modulated Poisson Processes.
Proceedings of the 17th International IFIP TC6 Networking Conference, 2018

On the Optimal Monitor Placement for Inferring Additive Metrics of Interested Paths.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

When more may not be better: Toward cost-efficient CDN selection.
Proceedings of the IEEE INFOCOM 2018, 2018

SecTap: Secure Back of Device Input System for Mobile Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Speeding Up Multi-CDN Content Delivery via Traffic Demand Reshaping.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Resource Capacity Analysis in Network Slicing with Ensured End-to-End Performance Bound.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Copula Analysis of Temporal Dependence Structure in Markov Modulated Poisson Process and Its Applications.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2017

Guest Editorial Introduction to the Special Issue on Internet of Things and Sensors Technologies for Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2017

NIPD: Non-Intrusive Power Disaggregation in Legacy Datacenters.
IEEE Trans. Computers, 2017

Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System.
IEEE Internet Things J., 2017

FIDC: A framework for improving data credibility in mobile crowdsensing.
Comput. Networks, 2017

Cyber-physical systems and context-aware sensing and computing.
Comput. Networks, 2017

Copula-based parameter estimation for Markov-modulated Poisson Process.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Rethinking CDN design with distributee time-varying traffic demands.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Demo abstract: An integrated tool of applying stochastic network calculus for network performance analysis.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Virtual Machine Power Accounting with Shapley Value.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
A Machine Learning Approach to Meter Placement for Power Quality Estimation in Smart Grid.
IEEE Trans. Smart Grid, 2016

A Distributed and Scalable Approach to Semi-Intrusive Load Monitoring.
IEEE Trans. Parallel Distributed Syst., 2016

Online Resource Scheduling Under Concave Pricing for Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2016

Conflict-Aware Weighted Bipartite B-Matching and Its Application to E-Commerce.
IEEE Trans. Knowl. Data Eng., 2016

Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles.
IEEE Trans. Inf. Forensics Secur., 2016

A Data-Centric Approach to Quality Estimation of Role Mining Results.
IEEE Trans. Inf. Forensics Secur., 2016

A simple and robust approach to energy disaggregation in the presence of outliers.
Sustain. Comput. Informatics Syst., 2016

Taking a free ride for routing topology inference in peer-to-peer networks.
Peer-to-Peer Netw. Appl., 2016

Robust K-means algorithm with automatically splitting and merging clusters and its applications for surveillance data.
Multim. Tools Appl., 2016

A new approach to mitigating security risks of phone clone co-location over mobile clouds.
J. Netw. Comput. Appl., 2016

MinNet: toward more intelligent smart home energy management systems with fewer sensors.
Int. J. Sens. Networks, 2016

Large-scale virtual machines provisioning in clouds: challenges and approaches.
Frontiers Comput. Sci., 2016

Consolidating flows with implicit deadlines for energy-proportional data center networks.
Proceedings of the 2016 IFIP Networking Conference, 2016

Copula Analysis of Latent Dependency Structure for Collaborative Auto-Scaling of Cloud Services.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

A framework for occupancy-aided energy disaggregation.
Proceedings of the Seventh International Conference on Future Energy Systems, Waterloo, ON, Canada, June 21 - 24, 2016, 2016

Computer Vision-Based Detection of Violent Individual Actions Witnessed by Crowds.
Proceedings of the 13th Conference on Computer and Robot Vision, 2016

Constrained Light Deployment for Reducing Energy Consumption in Buildings.
Proceedings of the Combinatorial Optimization and Applications, 2016

From Recommendation to Profile Inference (Rec2PI): A Value-added Service to Wi-Fi Data Mining.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Group-Aware Weighted Bipartite B-Matching.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2015
A Comprehensive Analysis of Detection of Online Paid Posters.
Proceedings of the Recommendation and Search in Social Networks, 2015

TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor.
IEEE Trans. Inf. Forensics Secur., 2015

The Best Answers? Think Twice: Identifying Commercial Campagins in the CQA Forums.
J. Comput. Sci. Technol., 2015

Robust local outlier detection with statistical parameter for big data.
Comput. Syst. Sci. Eng., 2015

The meter tells you are at home! Non-intrusive occupancy detection via load curve data.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Zero-Cost, Fine-Grained Power Monitoring of Datacenters Using Non-Intrusive Power Disaggregation.
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015

Copula analysis for statistical network calculus.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Fire Detection in Videos of Violent Crowds Acquired with Handheld Devices.
Proceedings of the 12th Conference on Computer and Robot Vision, 2015

Mobile Telecom Cloud brokerage with orchestrated multi-tier resource pooling.
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015

2014
From Landscape to Portrait: A New Approach for Outlier Detection in Load Curve Data.
IEEE Trans. Smart Grid, 2014

VMThunder: Fast Provisioning of Large-Scale Virtual Machine Clusters.
IEEE Trans. Parallel Distributed Syst., 2014

Plug and Play! A Simple, Universal Model for Energy Disaggregation.
CoRR, 2014

Buyer to Seller Recommendation under Constraints.
CoRR, 2014

A Survey on Network Tomography With Network Coding.
IEEE Commun. Surv. Tutorials, 2014

DLSM: Decoupled Live Storage Migration with Distributed Device Mapper Storage.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

A simple model-driven approach to energy disaggregation.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Comparing the staples in latent factor models for recommender systems.
Proceedings of the Symposium on Applied Computing, 2014

SWAP: Security aware provisioning and migration of phone clones over mobile clouds.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

RAFlow: Read Ahead Accelerated I/O Flow through Multiple Virtual Layers.
Proceedings of the 9th IEEE International Conference on Networking, 2014

Location Matters: Optimal Data Placement in Mobile Telecom Cloud.
Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, 2014

Traffic Anomaly Detection in the presence of P2P traffic.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Online resource scheduling under concave pricing for cloud computing.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

TorWard: Discovery of malicious traffic over Tor.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Smart Saver: A Consumer-Oriented Web Service for Energy Disaggregation.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

An Appliance-Driven Approach to Detection of Corrupted Load Curve Data.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks.
IEEE Syst. J., 2013

Is My Electricity Bill Accurate? A Model-Driven Approach to Corrupted Load Data Identification.
CoRR, 2013

From Landscape to Portrait: A New Approach for Load Curve Data Analysis and Cleansing.
CoRR, 2013

DCE: A Novel Delay Correlation Measurement for Tomography with Passive Realization.
CoRR, 2013

Intelligent meter placement for power quality estimation in smart grid.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

A Maximum-Entropy based fast estimation of power quality for smart microgrid.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Protocol-level hidden server discovery.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A Prototype Wireless Sensor Network for Precision Agriculture.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Battling the internet water army: detection of hidden paid posters.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

The best answers? think twice: online detection of commercial campaigns in the CQA forums.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Network Optimization for Lightweight Stochastic Scheduling in Underwater Sensor Networks.
IEEE Trans. Wirel. Commun., 2012

Transmission rate enhancement via adaptive relaying in wireless networks.
Int. J. Parallel Emergent Distributed Syst., 2012

A smart meter based approach to power reliability index for enterprise-level power grid.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem.
Proceedings of the Security and Privacy in Communication Networks, 2012

A stochastic calculus for network systems with renewable energy sources.
Proceedings of the 2012 Proceedings IEEE INFOCOM Workshops, 2012

Intelligent Illumination Model-Based Lighting Control.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
CAPF: coded anycast packet forwarding for wireless mesh networks.
Wirel. Networks, 2011

Performance of Acyclic Stochastic Networks with Network Coding.
IEEE Trans. Parallel Distributed Syst., 2011

Using Potential to Guide Mobile Nodes in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

Stochastic Scheduling for Underwater Sensor Networks.
Proceedings of the NETWORKING 2011, 2011

Statistical behavior of embeddedness and communities of overlapping cliques in online social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Transmission Rate Enhancement of Cooperative Communications in Wireless Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

2010
Weaving a proper net to catch large objects in wireless sensor networks.
IEEE Trans. Wirel. Commun., 2010

Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks.
IEEE Trans. Computers, 2010

On the Model Transform in Stochastic Network Calculus
CoRR, 2010

On the model transform in stochastic network calculus.
Proceedings of the 18th International Workshop on Quality of Service, 2010

Performance Modeling and Analysis of Multi-Path Routing in Integrated Fiber-Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Algorithms for Answering Geo-Range Query.
Proceedings of the Global Communications Conference, 2010

2009
Continuous K-Means Monitoring with Low Reporting Cost in Sensor Networks.
IEEE Trans. Knowl. Data Eng., 2009

Delay-Constrained Optimal Data Aggregation in Hierarchical Wireless Sensor Networks.
Mob. Networks Appl., 2009

Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks.
Comput. Networks, 2009

FOCUS: A Cost-Effective Approach for Large-Scale Crop Monitoring with Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

A calculus for information-driven networks.
Proceedings of the 17th International Workshop on Quality of Service, 2009

Run to Potential: Sweep Coverage in Wireless Sensor Networks.
Proceedings of the ICPP 2009, 2009

An Optimal Sensor Network for Intrusion Detection.
Proceedings of IEEE International Conference on Communications, 2009

2008
An Enhanced Fast Handover with Low Latency for Mobile IPv6.
IEEE Trans. Wirel. Commun., 2008

Minimum energy cooperative path routing in all-wireless networks: NP-completeness and heuristic algorithms.
J. Commun. Networks, 2008

Performance Modeling and Evaluation for Information-Driven Networks
CoRR, 2008

Scalable Ubiquitous Data Access in Clustered Sensor Networks.
Proceedings of the Scientific and Statistical Database Management, 2008

Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the MSN 2008, 2008

Fast and quality-guaranteed data streaming in resource-constrained sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

A Distributed Algorithm for Finding Global Icebergs with Linked Counting Bloom Filters.
Proceedings of IEEE International Conference on Communications, 2008

Weaving a Proper Net to Catch Large Objects.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

An Aggregative Approach for Scalable Detection of DoS Attacks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A new approach to counting broadcast trees.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2007
Radio frequency identification: technologies, applications, and research issues.
Wirel. Commun. Mob. Comput., 2007

An Energy-Efficient Data Collection Framework for Wireless Sensor Networks by Exploiting Spatiotemporal Correlation.
IEEE Trans. Parallel Distributed Syst., 2007

Robust Range-Free Localization in Wireless Sensor Networks.
Mob. Networks Appl., 2007

Range-free sensor localisation with ring overlapping based on comparison of received signal strength indicator.
Int. J. Sens. Networks, 2007

Integration of mobility and intrusion detection for wireless <i>ad hoc</i> networks.
Int. J. Commun. Syst., 2007

Cross-Layer Path Configuration for Energy-Efficient Communication over Wireless Ad Hoc Networks.
Adv. Multim., 2007

Secure data aggregation without persistent cryptographic operations in wireless sensor networks.
Ad Hoc Networks, 2007

Modeling Detection Metrics in Randomized Scheduling Algorithm in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Coarse-Grained Scheduling for Gateway Nodes in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

On the robustness of range-free localization in wireless sensor networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

2006
Performance Study of Proactive Flow Handoff for Mobile Ad Hoc Networks.
Wirel. Networks, 2006

Enhancing security using mobility-based anomaly detection in cellular mobile networks.
IEEE Trans. Veh. Technol., 2006

On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE 802.11 Distributed Wireless LANs.
IEEE Trans. Parallel Distributed Syst., 2006

Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2006

A lightweight secure protocol for wireless sensor networks.
Comput. Commun., 2006

Zone-Based Intrusion Detection for Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2006

Minimum Energy Cooperative Path Routing in Wireless Networks: An Integer Programming Formulation.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Radio propagation patterns in wireless sensor networks: new experimental results.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Minimum-energy route configuration for wireless ad hoc networks.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Energy-efficient cooperative routing in multi-hop wireless ad hoc networks.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

A LCG-based Secure Protocol for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

Maximizing Network Lifetime under QoS Constraints in Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Lightweight Deployment-Aware Scheduling for Wireless Sensor Networks.
Mob. Networks Appl., 2005

A dynamic clustering and scheduling approach to energy saving in data collection from wireless sensor networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005

Reservation and Grouping Stations for the IEEE 802.11 DCF.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Randomized Coverage-Preserving Scheduling Schemes for Wireless Sensor Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Very low cost sensor localization for hostile environments.
Proceedings of IEEE International Conference on Communications, 2005

Energy efficient information collection with the ARIMA model in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
On optimizing energy consumption for mobile handsets.
IEEE Trans. Veh. Technol., 2004

Mobility-based anomaly detection in cellular mobile networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

Sensor localization with Ring Overlapping based on Comparison of Received Signal Strength Indicator.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

Towards adaptive intrusion detection in mobile ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Utilizing the Uncertainty of Intrusion Detection to Strengthen Security for Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004

2003
Analysis on the redundancy of wireless sensor networks.
Proceedings of the Second ACM International Conference on Wireless Sensor Networks and Applications, 2003

Alert aggregation in mobile ad hoc networks.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

Location Update for PCS Networks with a Fractional Movement Threshold.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

Routing anomaly detection in mobile ad hoc networks.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

2002
Multipath routing for mobile ad hoc networks.
J. Commun. Networks, 2002

Reliable, Distributed and Energy-Efficient Broadcasting in Multi-Hop Mobile Ad Hoc Networks.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

2001
Performance Study of a Multipath Routing Method for Wireless Mobile Ad Hoc Network.
Proceedings of the 9th International Workshop on Modeling, 2001

Profile-Based Protocols in Wireless Mobile Ad Hoc Networks.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

Load-sensitive routing for mobile ad hoc networks.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

2000
Location trace aided routing in mobile ad hoc networks.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000


  Loading...