Qijun Gu

According to our database1, Qijun Gu authored at least 45 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Consumer UAV-based Air Quality Monitoring System for Smart Cities.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

2018
Developing a Modular Unmanned Aerial Vehicle (UAV) Platform for Air Pollution Profiling.
Sensors, 2018

Assignment and collaborative execution of tasks on transient clouds.
Annales des Télécommunications, 2018

2017
Marcher: A Heterogeneous System Supporting Energy-Aware High Performance Computing and Big Data Analytics.
Big Data Research, 2017

Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

2016
Collaborative task execution with originator data security for weak devices.
IJSNet, 2016

2015
Robust Detection of Rogue Signals in Cooperative Spectrum Sensing.
J. Internet Serv. Inf. Secur., 2015

Exploiting and defending trust models in cooperative spectrum sensing.
EURASIP J. Wireless Comm. and Networking, 2015

Using the Greenup, Powerup, and Speedup metrics to evaluate software energy efficiency.
Proceedings of the Sixth International Green and Sustainable Computing Conference, 2015

2014
Exploiting and Defending Trust Models in Cooperative Spectrum Sensing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Demo: Transient clouds.
Proceedings of the 6th International Conference on Mobile Computing, 2014

Energy and Power Characterization of Parallel Programs Running on Intel Xeon Phi.
Proceedings of the 43rd International Conference on Parallel Processing Workshops, 2014

Program energy efficiency: The impact of language, compiler and implementation choices.
Proceedings of the International Green Computing Conference, 2014

Transient clouds: Assignment and collaborative execution of tasks on mobile devices.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Originator Data Security for Collaborative Task Execution among Weak Devices.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Collaborative Computing On-demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Computation integrity in mobile cloud: Running probabilistically checkable proof on Android.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Secure Routing Protocols.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Packet-Dropping Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Intrusion Detection in Ad Hoc Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Self-Healing Control Flow Protection in Sensor Applications.
IEEE Trans. Dependable Sec. Comput., 2011

Fast mobility control protocols with sink location protection in wireless sensor networks.
IJIPT, 2011

A study of self-propagating mal-packets in sensor networks: Attacks and defenses.
Computers & Security, 2011

Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2011

Can You Help Me Run These Code Segments on Your Mobile Device?
Proceedings of the Global Communications Conference, 2011

2010
PWC: a proactive worm containment solution for enterprise networks.
Security and Communication Networks, 2010

Efficient code diversification for network reprogramming in sensor networks.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

2009
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services.
IEEE Trans. Dependable Sec. Comput., 2009

Self-healing control flow protection in sensor applications.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Sink-Anonymity Mobility Control in Wireless Sensor Networks.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

An Attack-Resilient Channel Assignment MAC Protocol.
Proceedings of the NBiS 2009, 2009

2008
Towards self-propagate mal-packets in sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Privacy Preserving Mobility Control Protocols in Wireless Sensor Networks.
Proceedings of the 9th International Symposium on Parallel Architectures, 2008

2007
Defence against packet injection in ad hoc networks.
IJSN, 2007

Analysis of area-congestion-based DDoS attacks in ad hoc networks.
Ad Hoc Networks, 2007

PWC: A proactive worm containment solution for enterprise networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

Analysis of Software Vulnerability in Sensor Nodes.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Localized Broadcast Authentication in Large Sensor Networks.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

2005
KTR: an Efficient Key Management Scheme For Air Access Control.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Defending against packet injection attacks unreliable ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2002
Designing a Wireless Network.
Scalable Computing: Practice and Experience, 2002


  Loading...