Mingyan Liu

Orcid: 0000-0003-3295-9200

Affiliations:
  • University of Michigan, Ann Arbor, USA


According to our database1, Mingyan Liu authored at least 234 papers between 1999 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2014, "For contributions to modeling of wireless ad-hoc and sensor networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Incentivizing Secure Software Development: The Role of Liability (Waiver) and Audit.
CoRR, 2024

Performative Federated Learning: A Solution to Model-Dependent and Heterogeneous Distribution Shifts.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Differentially Private Real-Time Release of Sequential Data.
ACM Trans. Priv. Secur., 2023

Deterrence, Backup, or Insurance: Game-Theoretic Modeling of Ransomware.
Games, 2023

Federated Learning with Reduced Information Leakage and Computation.
CoRR, 2023

Fair Classifiers that Abstain without Harm.
CoRR, 2023

Professional Basketball Player Behavior Synthesis via Planning with Diffusion.
CoRR, 2023

Performative Federated Learning: A Solution to Model-Dependent and Heterogeneous Distribution Shifts.
CoRR, 2023

Long-Term Fairness with Unknown Dynamics.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

An LLM-based Framework for Fingerprinting Internet-connected Devices.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

DensePure: Understanding Diffusion Models for Adversarial Robustness.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Cooperation and Competition: A Sequential Game Model of Flocking.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

Collaboration as a Mechanism for More Robust Strategic Classification.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

2022
DensePure: Understanding Diffusion Models towards Adversarial Robustness.
CoRR, 2022

Incentive Mechanisms for Strategic Classification and Regression Problems.
Proceedings of the EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11, 2022

Fairness Interventions as (Dis)Incentives for Strategic Manipulation.
Proceedings of the International Conference on Machine Learning, 2022

Multi-stage Floor Plan Recognition and 3D Reconstruction.
Proceedings of the ICCAI '22: 8th International Conference on Computing and Artificial Intelligence, Tianjin, China, March 18, 2022


ReLiable: Offline Reinforcement Learning for Tactical Strategies in Professional Basketball Games.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Characterizing Attacks on Deep Reinforcement Learning.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

2021
Embracing Risk: Cyber Insurance as an Incentive Mechanism for Cybersecurity
Synthesis Lectures on Learning, Networks, and Algorithms, Morgan & Claypool Publishers, ISBN: 978-3-031-02381-1, 2021

Privacy Risk is a Function of Information Type: Learnings for the Surveillance Capitalism Age.
IEEE Trans. Netw. Serv. Manag., 2021

Will Catastrophic Cyber-Risk Aggregation Thrive in the IoT Age? A Cautionary Economics Tale for (Re-)Insurers and Likes.
ACM Trans. Manag. Inf. Syst., 2021

Resource Pooling for Shared Fate: Incentivizing Effort in Interdependent Security Games Through Cross-Investments.
IEEE Trans. Control. Netw. Syst., 2021

Corrections to Aggregate Cyber-Risk Management in the IoT Age: Cautionary Statistics for (Re)Insurers and Likes.
IEEE Internet Things J., 2021

Aggregate Cyber-Risk Management in the IoT Age Cautionary Statistics for (Re)Insurers and Likes.
IEEE Internet Things J., 2021

Managing Industrial Control Systems Security Risks for Cyber Insurance (Dagstuhl Seminar 21451).
Dagstuhl Reports, 2021

Corrections to "Preference-Based Privacy Markets".
IEEE Access, 2021

Designing Contracts for Trading Private and Heterogeneous Data Using a Biased Differentially Private Algorithm.
IEEE Access, 2021

Do People Favor Personal Data Markets in a Surveillance Society?
Proceedings of the Winter Simulation Conference, 2021

Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Can Shape Structure Features Improve Model Robustness under Diverse Adversarial Settings?
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Network Games with Strategic Machine Learning.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Structural Stability of a Family of Group Formation Games.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Multi-planner Intervention in Network Games with Community Structures.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Multi-Scale Games: Representing and Solving Games on Networks with Group Structure.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Recycled ADMM: Improving the Privacy and Accuracy of Distributed Algorithms.
IEEE Trans. Inf. Forensics Secur., 2020

Using Private and Public Assessments in Security Information Sharing Agreements.
IEEE Trans. Inf. Forensics Secur., 2020

Data Trading with a Monopoly Social Network: Outcomes are Mostly Privacy Welfare Damaging.
CoRR, 2020

Fairness in Learning-Based Sequential Decision Algorithms: A Survey.
CoRR, 2020

Distributed learning of average belief over networks using sequential observations.
Autom., 2020

Preference-Based Privacy Markets.
IEEE Access, 2020

Sustainable Catastrophic Cyber-Risk Management in IoT Societies.
Proceedings of the Winter Simulation Conference, 2020

How do fair decisions fare in long-term qualification?
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Games on Networks with Community Structure: Existence, Uniqueness and Stability of Equilibria.
Proceedings of the 2020 American Control Conference, 2020

2019
A Reputation-Based Contract for Repeated Crowdsensing With Costly Verification.
IEEE Trans. Signal Process., 2019

Contention-Detectable Mechanism for Receiver-Initiated MAC.
ACM Trans. Embed. Comput. Syst., 2019

Adaptive Bayesian group testing: Algorithms and performance.
Signal Process., 2019

Embracing and controlling risk dependency in cyber-insurance policy underwriting.
J. Cybersecur., 2019

Characterizing Attacks on Deep Reinforcement Learning.
CoRR, 2019

Adversarial Objects Against LiDAR-Based Autonomous Driving Systems.
CoRR, 2019

Long term impact of fair machine learning in sequential decision making: representation disparity and group retention.
CoRR, 2019

Predictive Cruise Control with Private Vehicle-to-Vehicle Communication for Improving Fuel Consumption and Emissions.
IEEE Commun. Mag., 2019

Group Retention when Using Machine Learning in Sequential Decision Making: the Interplay between User Dynamics and Fairness.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Incentivizing effort in interdependent security games using resource pooling.
Proceedings of the 14th Workshop on the Economics of Networks, Systems and Computation, 2019

Contract design for purchasing private data using a biased differentially private algorithm.
Proceedings of the 14th Workshop on the Economics of Networks, Systems and Computation, 2019

AdvIT: Adversarial Frames Identifier Based on Temporal Consistency in Videos.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Effective Premium Discrimination for Designing Cyber Insurance Policies with Rare Losses.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

MeshAdv: Adversarial Meshes for Visual Recognition.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Provision of Public Goods on Networks: On Existence, Uniqueness, and Centralities.
IEEE Trans. Netw. Sci. Eng., 2018

Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence.
IEEE Trans. Inf. Forensics Secur., 2018

Realistic Adversarial Examples in 3D Meshes.
CoRR, 2018

From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild.
Proceedings of the 27th USENIX Security Symposium, 2018

Characterizing the Internet Host Population Using Deep Learning: A Universal and Lightweight Numerical Embedding.
Proceedings of the Internet Measurement Conference 2018, 2018

Generating Adversarial Examples with Adversarial Networks.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Improving the Privacy and Accuracy of ADMM-Based Distributed Algorithms.
Proceedings of the 35th International Conference on Machine Learning, 2018

Spatially Transformed Adversarial Examples.
Proceedings of the 6th International Conference on Learning Representations, 2018

Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation.
Proceedings of the Computer Vision - ECCV 2018, 2018

Recycled ADMM: Improve Privacy and Accuracy with Less Computation in Distributed Algorithms.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

Local Weak Convergence Based Analysis of a New Graph Model.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

2017
Mitigating Large Errors in WiFi-Based Indoor Localization for Smartphones.
IEEE Trans. Veh. Technol., 2017

An Online Learning Approach to Improving the Quality of Crowd-Sourcing.
IEEE/ACM Trans. Netw., 2017

Designing cyber insurance policies in the presence of security interdependence.
Proceedings of the 12th workshop on the Economics of Networks, Systems and Computation, 2017

Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

Crowd Learning: Improving Online Decision Making Using Crowdsourced Data.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Designing Cyber Insurance Policies: Mitigating Moral Hazard Through Security Pre-Screening.
Proceedings of the Game Theory for Networks - 7th International EAI Conference, 2017

Distributed belief averaging using sequential observations.
Proceedings of the 2017 American Control Conference, 2017

On the uniqueness and stability of equilibria of network games.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

Embracing risk dependency in designing cyber-insurance contracts.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Sniffer Channel Assignment With Imperfect Monitoring for Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2016

Hitchhike: A Preamble-Based Control Plane for SNR-Sensitive Wireless Networks.
IEEE Trans. Wirel. Commun., 2016

Learning in Hide-and-Seek.
IEEE/ACM Trans. Netw., 2016

Perceptions and Truth: A Mechanism Design Approach to Crowd-Sourcing Reputation.
IEEE/ACM Trans. Netw., 2016

Opting Out of Incentive Mechanisms: A Study of Security as a Non-Excludable Public Good.
IEEE Trans. Inf. Forensics Secur., 2016

Risky business: Fine-grained data breach prediction using business profiles.
J. Cybersecur., 2016

On the Role of Public and Private Assessments in Security Information Sharing Agreements.
CoRR, 2016

Impact of Community Structure on Cascades.
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016

Exit equilibrium: Towards understanding voluntary participation in security games.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Inter-Temporal Incentives in Security Information Sharing Agreements.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

Finding One's Best Crowd: Online Learning By Exploiting Source Similarity.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Data-Driven Channel Modeling Using Spectrum Measurement.
IEEE Trans. Mob. Comput., 2015

To Stay or To Switch: Multiuser Multi-Channel Dynamic Access.
IEEE Trans. Mob. Comput., 2015

Online Learning Methods for Networking.
Found. Trends Netw., 2015

A Tale of Two Mechanisms: Incentivizing Investments in Security Games.
CoRR, 2015

Efficient Sensor Fault Detection Using Group Testing.
CoRR, 2015

Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents.
Proceedings of the 24th USENIX Security Symposium, 2015

Case study on the reliability of unattended outdoor wireless sensor systems.
Proceedings of the Annual IEEE Systems Conference, 2015

CD-MAC: A contention detectable MAC for low duty-cycled wireless sensor networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

An Online Approach to Dynamic Channel Access and Transmission Scheduling.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

PhaseU: Real-time LOS identification with WiFi.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Static power of mobile devices: Self-updating radio maps for wireless indoor localization.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A regulated oligopoly multi-market model for trading smart data.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Optimal relay selection with non-negligible probing time.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Detecting hidden cliques from noisy observations.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

Provision of non-excludable public goods on networks: From equilibrium to centrality measures.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Emerging Technologies, Sensor Web.
Proceedings of the Encyclopedia of Remote Sensing, 2014

In-situ Soil Moisture Sensing: Measurement Scheduling and Estimation Using Sparse Sampling.
ACM Trans. Sens. Networks, 2014

Profit Incentive in Trading Nonexclusive Access on a Secondary Spectrum Market Through Contract Design.
IEEE/ACM Trans. Netw., 2014

Sufficient Conditions on the Optimality of Myopic Sensing in Opportunistic Channel Access: A Unifying Framework.
IEEE Trans. Inf. Theory, 2014

Jamming defense against a resource-replenishing adversary in multi-channel wireless systems.
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014

Revisiting optimal power control: Dual effects of SNR and contention.
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014

Adaptive demand response: Online learning of restless and controlled bandits.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

On the Mismanagement and Maliciousness of Networks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Secondary User Data Capturing for Cognitive Radio Network Forensics under Capturing Uncertainty.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Closing the price of anarchy gap in the interdependent security game.
Proceedings of the 2014 Information Theory and Applications Workshop, 2014

Hitchhike: Riding control on preambles.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Can Less Be More? A Game-Theoretic Analysis of Filtering vs. Investment.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Detecting hidden propagation structure and its application to analyzing phishing.
Proceedings of the International Conference on Data Science and Advanced Analytics, 2014

Budget balance or voluntary participation? Incentivizing investments in interdependent security games.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Throughput Optimal Switching in Multichannel WLANs.
IEEE Trans. Mob. Comput., 2013

Ripple-2: a non-collaborative, asynchronous, and open architecture for highly-scalable and low duty-cycle WSNs.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2013

Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth the Pain?
IEEE J. Sel. Areas Commun., 2013

Optimal Stochastic Routing in Low Duty-Cycled Wireless Sensor Networks.
Internet Math., 2013

An Adaptive Energy-Management Framework for Sensor Nodes with Constrained Energy Scavenging Profiles.
Int. J. Distributed Sens. Networks, 2013

Online Learning in a Contract Selection Problem
CoRR, 2013

DorFin: WiFi Fingerprint-based Localization Revisited.
CoRR, 2013

Revisiting Optimal Power Control: its Dual Effect on SNR and Contention.
CoRR, 2013

Incentives, Quality, and Risks: A Look Into the NSF Proposal Review Pilot.
CoRR, 2013

Characterization of Blacklists and Tainted Network Traffic.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

When simplicity meets optimality: Efficient transmission power control with stochastic energy harvesting.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Profit incentive in a secondary spectrum market: A contract design approach.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

To stay or to switch: Multiuser dynamic channel access.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Symmetric Nash equilibrium in a secondary spectrum market.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

WSN-SA: Design foundations for situational awareness systems based on sensor networks.
Proceedings of the 2013 IEEE Global Humanitarian Technology Conference, 2013

Efficient Sensor Fault Detection Using Combinatorial Group Testing.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Distributive Model-Based Sensor Fault Diagnosis in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Joint control of transmission power and channel switching against adaptive jamming.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

Group learning and opinion diffusion in a broadcast network.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

2012
Price of Anarchy for Congestion Games in Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2012

In-situ soil moisture sensing: Optimal sensor placement and field estimation.
ACM Trans. Sens. Networks, 2012

Atomic Congestion Games on Graphs and Their Applications in Networking.
IEEE/ACM Trans. Netw., 2012

Networked Computing in Wireless Sensor Networks for Structural Health Monitoring.
IEEE/ACM Trans. Netw., 2012

Mining Spectrum Usage Data: A Large-Scale Spectrum Measurement Study.
IEEE Trans. Mob. Comput., 2012

Channel Estimation for Opportunistic Spectrum Access: Uniform and Random Sensing.
IEEE Trans. Mob. Comput., 2012

CapEst: A Measurement-Based Approach to Estimating Link Capacity in Wireless Networks.
IEEE Trans. Mob. Comput., 2012

Online Learning of Rested and Restless Bandits.
IEEE Trans. Inf. Theory, 2012

Power-Management Techniques for Wireless Sensor Networks and Similar Low-Power Communication Devices Based on Nonrechargeable Batteries.
J. Comput. Networks Commun., 2012

Online Learning in Decentralized Multiuser Resource Sharing Problems
CoRR, 2012

Online learning for combinatorial network optimization with restless Markovian rewards.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Online learning in decentralized multi-user spectrum access with synchronized explorations.
Proceedings of the 31st IEEE Military Communications Conference, 2012

In-situ soil moisture sensing: measurement scheduling and estimation using compressive sensing.
Proceedings of the 11th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2012), 2012

Pair-wise reference-free fault detection in wireless sensor networks.
Proceedings of the 11th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2012), 2012

Approximately optimal adaptive learning in opportunistic spectrum access.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Is diversity gain worth the pain: A delay comparison between opportunistic multi-channel MAC and single-channel MAC.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Optimal Contract Design for an Efficient Secondary Spectrum Market.
Proceedings of the Game Theory for Networks, 2012

Establishing Network Reputation via Mechanism Design.
Proceedings of the Game Theory for Networks, 2012

Dynamic pricing of power in Smart-Grid networks.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

2011
Energy-Efficient Transmission Scheduling With Strict Underflow Constraints.
IEEE Trans. Inf. Theory, 2011

A stochastic differential equation model for spectrum utilization.
Proceedings of the 9th International Symposium on Modeling and Optimization in Mobile, 2011

Throughput optimal switching in multi-channel WLANs.
Proceedings of the 9th International Symposium on Modeling and Optimization in Mobile, 2011

Price of anarchy of congestion games with player-specific constants.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011

Latency-optimizing file splitting for transmission over a large multi-hop network.
Proceedings of the Information Theory and Applications Workshop, 2011

Online learning in opportunistic spectrum access: A restless bandit approach.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

ZigBee Wireless Sensor Network Using Physics-Based Optimally Sampling for Soil Moisture Measurement.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

On the Combinatorial Multi-Armed Bandit Problem with Markovian Rewards.
Proceedings of the Global Communications Conference, 2011

Performance and Convergence of Multi-user Online Learning.
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011

Adaptive learning of uncontrolled restless bandits with logarithmic regret.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
A Wireless Soil Moisture Smart Sensor Web Using Physics-Based Optimal Control: Concept and Initial Demonstrations.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2010

Measurement Scheduling for Soil Moisture Sensing: From Physical Models to Optimal Control.
Proc. IEEE, 2010

Special issue on sensor network applications.
Proc. IEEE, 2010

Spectrum Sharing as Spatial Congestion Games
CoRR, 2010

Channel Estimation for Opportunistic Spectrum Access: Uniform and Random Sensing
CoRR, 2010

Channel estimation for opportunistic spectrum sensing: Uniform and random sensing.
Proceedings of the Information Theory and Applications Workshop, 2010

Online algorithms for the multi-armed bandit problem with Markovian rewards.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010

2009
Server allocation with delayed state observation: Sufficient conditions for the optimality of an index policy.
IEEE Trans. Wirel. Commun., 2009

Optimal channel probing and transmission scheduling for opportunistic spectrum access.
IEEE/ACM Trans. Netw., 2009

Optimality of myopic sensing in multichannel opportunistic access.
IEEE Trans. Inf. Theory, 2009

Energy-Efficient Transmission Scheduling with Strict Underflow Constraints
CoRR, 2009

Hitting time analysis for a class of random packet forwarding schemes in ad hoc networks.
Ad Hoc Networks, 2009

Revenue generation for truthful spectrum auction in dynamic spectrum access.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

Price of Anarchy for Cognitive MAC Games.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Congestion games with resource reuse and applications in spectrum sharing.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

Dynamic clock calibration via temperature measurement.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

Multi-channel opportunistic access: A case of restless bandits with multiple plays.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
Constrained Sequential Resource Allocation and Guessing Games.
IEEE Trans. Inf. Theory, 2008

Optimal Competitive Algorithms for Opportunistic Spectrum Access.
IEEE J. Sel. Areas Commun., 2008

Optimality of Myopic Sensing in Multi-Channel Opportunistic Access
CoRR, 2008

Energy-efficient transmission scheduling for wireless media streaming with strict underflow constraints.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

Competitive Analysis of Opportunistic Spectrum Access Strategies.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

A Soil Moisture Smart Sensor Web using Data Assimilation and Optimal Control: Formulation and First Laboratory Demonstration.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Optimality of Myopic Sensing in Multi-Channel Opportunistic Access.
Proceedings of IEEE International Conference on Communications, 2008

Spectum sharing as congestion games.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
Controlled flooding search in a large network.
IEEE/ACM Trans. Netw., 2007

Multirate multicast service provisioning II: a tâtonnement process for rate allocation.
Math. Methods Oper. Res., 2007

Multirate multicast service provisioning I: an algorithm for optimal price splitting along multicast trees.
Math. Methods Oper. Res., 2007

Throughput Scaling in Random Wireless Networks: A Non-Hierarchical Multipath Routing Strategy
CoRR, 2007

On Throughput Scaling of Wireless Networks: Effect of Node Density and Propagation Model
CoRR, 2007

Surface street traffic estimation.
Proceedings of the 5th International Conference on Mobile Systems, 2007

2006
Randomly Duty-cycled Wireless Sensor Networks: Dynamics of Coverage.
IEEE Trans. Wirel. Commun., 2006

A General Framework to Construct Stationary Mobility Models for the Simulation of Mobile Networks.
IEEE Trans. Mob. Comput., 2006

Optimal Bandwidth Allocation in a Delay Channel.
IEEE J. Sel. Areas Commun., 2006

Self-monitoring of wireless sensor networks.
Comput. Commun., 2006

Building realistic mobility models from coarse-grained traces.
Proceedings of the 4th International Conference on Mobile Systems, 2006

The Effect of Node Density and Propagation Model on Throughput Scaling of Wireless Networks.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Controlled Flooding Search with Delay Constraints.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
An Efficient and Robust Computational Framework for Studying Lifetime and Information Capacity in Sensor Networks.
Mob. Networks Appl., 2005

Editorial.
EURASIP J. Wirel. Commun. Netw., 2005

Optimal Controlled Flooding Search in a Large Wireless Network.
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005

Partial Clustering: Maintaining Connectivity in a Low Duty-Cycled Dense Wireless Sensor Network.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Dynamic Bandwidth Allocation for Low Power Devices With Random Connectivity.
Proceedings of the 44th IEEE IEEE Conference on Decision and Control and 8th European Control Conference Control, 2005

2004
Fixed point approximation for multirate multihop loss networks with state-dependent routing.
IEEE/ACM Trans. Netw., 2004

Modeling TCP performance with proxies.
Comput. Commun., 2004

Revisiting the TTL-based controlled flooding search: optimality and randomization.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

Network coverage using low duty-cycled sensors: random & coordinated sleep algorithms.
Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004

On the optimality of an index policy for bandwidth allocation with delayed state observation and differentiated services.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Properties of optimal resource sharing in a delay channel.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004

2003
Evaluation of performance enhancing proxies in internet over satellite.
Int. J. Commun. Syst., 2003

Data-gathering wireless sensor networks: organization and capacity.
Comput. Networks, 2003

Sound mobility models.
Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking, 2003

On the Many-to-One Transport Capacity of a Dense Wireless Sensor Network and the Compressibility of Its Data.
Proceedings of the Information Processing in Sensor Networks, 2003

Random Waypoint Considered Harmful.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

Analysis of TCP transient behavior and its effect on file transfer latency.
Proceedings of IEEE International Conference on Communications, 2003

An approach to rate allocation in multicast.
Proceedings of the 42nd IEEE Conference on Decision and Control, 2003

2002
AMRoute: Ad Hoc Multicast Routing Protocol.
Mob. Networks Appl., 2002

A distributed monitoring mechanism for wireless sensor networks.
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002

Modelling TCP Performance Proxies.
Proceedings of the International Conference on Internet Computing, 2002

Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2002

2001
Modeling and Analysis of TCP Enhancement over Heterogeneous Links.
Proceedings of the Networking, 2001

2000
Network Performance Modeling, Design and Dimensioning Technologies.
PhD thesis, 2000

Performance analysis using a hierarchical loss network model.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1999
Caching and Multicasting in DBS Systems.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999


  Loading...