Qijun Gu

According to our database1, Qijun Gu authored at least 52 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Precise Mixed-Criticality Scheduling on Varying-Speed Multiprocessors.
IEEE Trans. Computers, 2023

2021
Precise Scheduling of Mixed-Criticality Tasks on Varying-Speed Multiprocessors.
Proceedings of the RTNS'2021: 29th International Conference on Real-Time Networks and Systems, 2021

Reserving Processors by Precise Scheduling of Mixed-Criticality Tasks.
Proceedings of the 27th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2021

A Retina-LGN-V1 Structure-like Spiking Neuron Network for Image Feature Extraction.
Proceedings of the ICVIP 2021: The 5th International Conference on Video and Image Processing, Hayward, CA, USA, December 22, 2021

2020
A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications.
J. Comput. Sci. Technol., 2020

2019
Securing ADS-B with Multi-Point Distance-Bounding for UAV Collision Avoidance.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

A Consumer UAV-based Air Quality Monitoring System for Smart Cities.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

2018
Developing a Modular Unmanned Aerial Vehicle (UAV) Platform for Air Pollution Profiling.
Sensors, 2018

Assignment and collaborative execution of tasks on transient clouds.
Ann. des Télécommunications, 2018

2017
Marcher: A Heterogeneous System Supporting Energy-Aware High Performance Computing and Big Data Analytics.
Big Data Res., 2017

Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

2016
Collaborative task execution with originator data security for weak devices.
Int. J. Sens. Networks, 2016

2015
Robust Detection of Rogue Signals in Cooperative Spectrum Sensing.
J. Internet Serv. Inf. Secur., 2015

Exploiting and defending trust models in cooperative spectrum sensing.
EURASIP J. Wirel. Commun. Netw., 2015

Using the Greenup, Powerup, and Speedup metrics to evaluate software energy efficiency.
Proceedings of the Sixth International Green and Sustainable Computing Conference, 2015

2014
Exploiting and Defending Trust Models in Cooperative Spectrum Sensing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Demo: Transient clouds.
Proceedings of the 6th International Conference on Mobile Computing, 2014

Energy and Power Characterization of Parallel Programs Running on Intel Xeon Phi.
Proceedings of the 43rd International Conference on Parallel Processing Workshops, 2014

Program energy efficiency: The impact of language, compiler and implementation choices.
Proceedings of the International Green Computing Conference, 2014

Transient clouds: Assignment and collaborative execution of tasks on mobile devices.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Originator Data Security for Collaborative Task Execution among Weak Devices.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Collaborative Computing On-demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Computation integrity in mobile cloud: Running probabilistically checkable proof on Android.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Secure Routing Protocols.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Packet-Dropping Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Intrusion Detection in Ad Hoc Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Self-Healing Control Flow Protection in Sensor Applications.
IEEE Trans. Dependable Secur. Comput., 2011

Fast mobility control protocols with sink location protection in wireless sensor networks.
Int. J. Internet Protoc. Technol., 2011

A study of self-propagating mal-packets in sensor networks: Attacks and defenses.
Comput. Secur., 2011

Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2011

Can You Help Me Run These Code Segments on Your Mobile Device?
Proceedings of the Global Communications Conference, 2011

2010
PWC: a proactive worm containment solution for enterprise networks.
Secur. Commun. Networks, 2010

Efficient code diversification for network reprogramming in sensor networks.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

2009
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services.
IEEE Trans. Dependable Secur. Comput., 2009

Self-healing control flow protection in sensor applications.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Sink-Anonymity Mobility Control in Wireless Sensor Networks.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

An Attack-Resilient Channel Assignment MAC Protocol.
Proceedings of the NBiS 2009, 2009

2008
Towards self-propagate mal-packets in sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Privacy Preserving Mobility Control Protocols in Wireless Sensor Networks.
Proceedings of the 9th International Symposium on Parallel Architectures, 2008

2007
Defence against packet injection in ad hoc networks.
Int. J. Secur. Networks, 2007

Analysis of area-congestion-based DDoS attacks in ad hoc networks.
Ad Hoc Networks, 2007

Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

Analysis of Software Vulnerability in Sensor Nodes.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Localized Broadcast Authentication in Large Sensor Networks.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

Modeling of pollution in p2p file sharing systems.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
KTR: an Efficient Key Management Scheme For Air Access Control.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Defending against packet injection attacks unreliable ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2002
Designing a Wireless Network.
Scalable Comput. Pract. Exp., 2002

A heuristic ant algorithm for solving QoS multicast routing problem.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002


  Loading...