Qun Li

According to our database1, Qun Li authored at least 227 papers between 1997 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2018, "For contributions to ad-hoc network routing and sensor networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Optimal arrangement of the pulmonary interventional surgeries considering timely distribution of medical consumables.
J. Comb. Optim., 2019

Ultrasound Proximity Networking on Smart Mobile Devices for IoT Applications.
IEEE Internet of Things Journal, 2019

Energy-Saving Computation Offloading by Joint Data Compression and Resource Allocation for Mobile-Edge Computing.
IEEE Communications Letters, 2019

Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks.
IEEE Access, 2019

2018
Deep Temporal Multimodal Fusion for Medical Procedure Monitoring Using Wearable Sensors.
IEEE Trans. Multimedia, 2018

CamK: Camera-Based Keystroke Detection and Localization for Small Mobile Devices.
IEEE Trans. Mob. Comput., 2018

Resource Allocation for Cognitive Radio With Primary User Secrecy Outage Constraint.
IEEE Systems Journal, 2018

Graphical passwords for older computer users.
IJSN, 2018

Recurrent neural system with minimum complexity: A deep learning perspective.
Neurocomputing, 2018

Secure Communications for Primary Users in Cognitive Radio Networks with Collusive Eavesdroppers.
IEICE Transactions, 2018

Proactive Eavesdropping through a Third-Party Jammer.
IEICE Transactions, 2018

Legitimate Surveillance with a Wireless Powered Monitor in Rayleigh Fading Channels.
IEICE Transactions, 2018

Household Electrical Load Scheduling Algorithms with Renewable Energy.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Network Traffic Anomaly Detection Based on Wavelet Analysis.
Proceedings of the 16th IEEE International Conference on Software Engineering Research, 2018

MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Traffic Offloading Through Third-Party Cognitive Small Cells with Dual-Connectivity.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

Antenna Selection and Resource Allocation in Wireless Powered Communication Networks with Self-Energy Recycling.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

eSGD: Communication Efficient Distributed Deep Learning on the Edge.
Proceedings of the USENIX Workshop on Hot Topics in Edge Computing, 2018

EdgeCons: Achieving Efficient Consensus in Edge Computing Networks.
Proceedings of the USENIX Workshop on Hot Topics in Edge Computing, 2018

Learning from Differentially Private Neural Activations with Edge Computing.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

FastPay: A Secure Fast Payment Method for Edge-IoT Platforms using Blockchain.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

Energy Efficient Joint Channel and Power allocation for Energy Harvesting Cognitive Radio Networks.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Cooperative Resource Allocation in Cognitive Wireless Powered Communication Networks with Minimum Rate Requirements.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Resource Allocation for Mobile Data Offloading Through Third-Party Cognitive Small Cells.
Proceedings of the Communications and Networking, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Cooperative Resource Allocation in Cognitive Radio Networks With Wireless Powered Primary Users.
IEEE Wireless Commun. Letters, 2017

Joint Power Control and Time Allocation for Wireless Powered Underlay Cognitive Radio Networks.
IEEE Wireless Commun. Letters, 2017

Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios.
IEEE Trans. Mob. Comput., 2017

Automatic localization of optic disk based on texture orientation voting.
Signal, Image and Video Processing, 2017

Deep belief echo-state network and its application to time series prediction.
Knowl.-Based Syst., 2017

Securing SDN Infrastructure of IoT-Fog Networks From MitM Attacks.
IEEE Internet of Things Journal, 2017

Challenges and Software Architecture for Fog Computing.
IEEE Internet Computing, 2017

Resource allocation in underlay cognitive radio networks with full-duplex cognitive base station.
Int. J. Communication Systems, 2017

Power allocation for two-user cognitive multiple access channels under primary user outage constraint.
Int. J. Communication Systems, 2017

Tactics Exploration Framework based on Genetic Programming.
Int. J. Comput. Intell. Syst., 2017

Improving physical-layer security for primary users in cognitive radio networks.
IET Communications, 2017

Joint User and Power Allocation in Underlay Cognitive Radio Networks with Multiple Primary Users' Security Constraints.
IEICE Transactions, 2017

An Efficient Resource Allocation Algorithm for Underlay Cognitive Radio Multichannel Multicast Networks.
IEICE Transactions, 2017

Offloading data traffic via cognitive small cells with wireless powered user equipments.
EURASIP J. Wireless Comm. and Networking, 2017

Price-based time and energy allocation in cognitive radio multiple access networks with energy harvesting.
SCIENCE CHINA Information Sciences, 2017

Enabling accurate and efficient modeling-based CPU power estimation for smartphones.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Neural Oscillations as a Bridge Between GABAergic System and Emotional Behaviors.
Proceedings of the Advances in Neural Networks - ISNN 2017 - 14th International Symposium, 2017

Image representation based on multi-features.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

Tensorial compressive sensing of jointly sparse matrices with applications to color imaging.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

WearLock: Unlocking Your Phone via Acoustics Using Smartwatch.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

LAVEA: Latency-Aware Video Analytics on Edge Computing Platform.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Power allocation for cognitive radio with hybrid energy supplies.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

Graphical passwords for older computer users.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

LAVEA: latency-aware video analytics on edge computing platform.
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, San Jose / Silicon Valley, 2017

Efficient service handoff across edge servers via docker container migration.
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, San Jose / Silicon Valley, 2017

Mining and analysis of public information for insight into personal fitness tracker reliability, operations and user performance.
Proceedings of the Workshop on Smart Internet of Things, SmartIoT@SEC 2017, 2017

An Algorithm for Parallel Reconstruction of Jointly Sparse Tensors with Applications to Hyperspectral Imaging.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Binary Histogram of Oriented Gradients Based Dynamometer Card Recognition.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Reduced Graphene Oxide/Au Nanocomposite for NO2 Sensing at Low Operating Temperature.
Sensors, 2016

A Crowd-Sourcing Indoor Localization Algorithm via Optical Camera on a Smartphone Assisted by Wi-Fi Fingerprint RSSI.
Sensors, 2016

Scalable Indoor Localization via Mobile Crowdsourcing and Gaussian Process.
Sensors, 2016

Indoor-Outdoor Detection Using a Smart Phone Sensor.
Sensors, 2016

Hybrid tenso-vectorial compressive sensing for hyperspectral imaging.
J. Electronic Imaging, 2016

Price-based Resource Allocation for Virtualized Cognitive Radio Networks.
TIIS, 2016

Sum Outage Capacity Maximization in Cognitive Radio Networks with Channel Distribution Information.
IEICE Transactions, 2016

Energy Efficient Power Allocation for Delay-QoS Constrained Cognitive Radio Networks.
IEICE Transactions, 2016

Resource allocation for outage probability minimisation in cognitive radio multicast networks.
Trans. Emerging Telecommunications Technologies, 2016

Optimization of multiuser multichannel cognitive radio networks with wireless information and power transfer.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Scene-independent feature- and classifier-based vehicle headlight and shadow removal in video sequences.
Proceedings of the 2016 IEEE Winter Applications of Computer Vision Workshops, 2016

Model-less and model-based computationally efficient motion estimation for video compression in transportation applications.
Proceedings of the 2016 IEEE Winter Applications of Computer Vision Workshops, 2016

DroidCollector: A High Performance Framework for High Quality Android Traffic Collection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

CamK: A camera-based keyboard for small mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

GlassGesture: Exploring head gesture interface of smart glasses.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

GlassGesture: Exploring head gesture interface of smart glasses.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

AMIL: Localizing neighboring mobile devices through a simple gesture.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

AMIL: Localizing neighboring mobile devices through a simple gesture.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Statistical analysis of sea clutter acquired by quad-pol coherent X-band radar.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

MobiPlay: a remote execution based record-and-replay tool for mobile applications.
Proceedings of the 38th International Conference on Software Engineering, 2016

A study on the discriminability of facs from spontaneous facial expressions.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Joint user pairing and resource allocation in full-duplex underlay cognitive radio networks.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

Resource allocation in wireless virtualized networks with energy harvesting.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

Joint power and time allocation for wireless powered cognitive radio multiple access networks with or without SIC.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

Towards User Re-Authentication on Mobile Devices via On-Screen Keyboard.
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016

Poster Abstract: EdgeStore: Integrating Edge Computing into Cloud-Based Storage Systems.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016

2015
VProof: Lightweight Privacy-Preserving Vehicle Location Proofs.
IEEE Trans. Vehicular Technology, 2015

Efficient Protocols for Collecting Histograms in Large-Scale RFID Systems.
IEEE Trans. Parallel Distrib. Syst., 2015

Exploring the Gap between Ideal and Reality: An Experimental Study on Continuous Scanning with Mobile Reader in RFID Systems.
IEEE Trans. Mob. Comput., 2015

Supervised Segmentation of Remote Sensing Image Using Reference Descriptor.
IEEE Geosci. Remote Sensing Lett., 2015

Construction of semantic bootstrapping models for relation extraction.
Knowl.-Based Syst., 2015

Minimum BER Power Allocation for OFDM-based Cognitive Radio Networks.
TIIS, 2015

Service Outage Constrained Outage Probability Minimizing Joint Channel, Power and Rate Allocation for Cognitive Radio Multicast Networks.
IEICE Transactions, 2015

Power Allocation for Two-Way OFDM-Based Spectrum Sharing Cognitive Radio Networks.
IEICE Transactions, 2015

Power Allocation for Ergodic Capacity and Outage Probability Tradeoff in Cognitive Radio Networks.
IEICE Transactions, 2015

Effective capacity region and power allocation for two-way spectrum sharing cognitive radio networks.
SCIENCE CHINA Information Sciences, 2015

Energy efficient joint scheduling and resource allocation for downlink cognitive radio networks.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Power allocation for two-user cognitive multiple access channels under primary user outage constraint.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Energy efficient resource allocation for multiple primary and secondary users in cognitive radio networks with limited primary users' cooperation.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Energy efficient joint chunk and power allocation for chunk-based multi-carrier cognitive radio networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Security and Privacy Issues of Fog Computing: A Survey.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Survey of Fog Computing: Concepts, Applications and Issues.
Proceedings of the 2015 Workshop on Mobile Big Data, 2015

Static Occlusion Detection and Handling in Transportation Videos.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

SMOC: A secure mobile cloud computing platform.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Optimal power allocation for cognitive radio networks with primary user secrecy rate loss constraint.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Hybrid vectorial and tensorial Compressive Sensing for hyperspectral imaging.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffic.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Physical media covert channels on smart mobile devices.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Fog Computing: Platform and Applications.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015

On-the-fly hand detection training with application in egocentric action recognition.
Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015

2014
VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet.
IEEE Trans. Vehicular Technology, 2014

Channel-Hopping-Based Communication Rendezvous in Cognitive Radio Networks.
IEEE/ACM Trans. Netw., 2014

Design, Realization, and Evaluation of DozyAP for Power-Efficient Wi-Fi Tethering.
IEEE/ACM Trans. Netw., 2014

Exploiting ZigBee in Reducing WiFi Power Consumption for Mobile Devices.
IEEE Trans. Mob. Comput., 2014

Compressive Sensing of Sparse Tensors.
IEEE Trans. Image Processing, 2014

Multilinear Discriminant Analysis for Higher-Order Tensor Data Classification.
IEEE Trans. Pattern Anal. Mach. Intell., 2014

Online vector scheduling and generalized load balancing.
J. Parallel Distrib. Comput., 2014

On the Outage Capacity of Fading Cognitive Multicast Channel.
IEICE Transactions, 2014

Joint Power and Rate Allocation in Cognitive Radio Multicast Networks for Outage Probability Minimization.
IEICE Transactions, 2014

Discriminative Reference-Based Scene Image Categorization.
IEICE Transactions, 2014

Two algorithms for compressed sensing of sparse tensors.
CoRR, 2014

Resource allocation for chunk-based multi-carrier cognitive radio networks.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

Resource allocation in delay-QoS constrained multiuser cognitive radio networks.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

Joint user association and resource allocation for cognitive radio networks.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

Quantified Coalition Logic for BDI-Agents: Completeness and Complexity.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

Efficiently collecting histograms over RFID tags.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

LBSNSim: Analyzing and modeling location-based social networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Preserving secondary users' privacy in cognitive radio networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Near-pri: Private, proximity based location sharing.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Ontological, Epistemological, and Teleological Perspectives on Service-Oriented Simulation Frameworks.
Proceedings of the Ontology, Epistemology, and Teleology for Modeling and Simulation, 2013

Defending Against Cooperative Attacks in Cooperative Spectrum Sensing.
IEEE Trans. Wireless Communications, 2013

SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput.
IEEE Trans. Parallel Distrib. Syst., 2013

SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

Defending against Unidentifiable Attacks in Electric Power Grids.
IEEE Trans. Parallel Distrib. Syst., 2013

Reference-Based Scheme Combined With K-SVD for Scene Image Categorization.
IEEE Signal Process. Lett., 2013

Robust HOSVD-Based Higher-Order Data Indexing and Retrieval.
IEEE Signal Process. Lett., 2013

A multi-paradigm decision modeling framework for combat system effectiveness measurement based on domain-specific modeling.
Journal of Zhejiang University - Science C, 2013

Selected Papers from "The 6th China Conference of Wireless Sensor Networks".
IJDSN, 2013

Generalized Tensor Compressive Sensing
CoRR, 2013

V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Optimizing background email sync on smartphones.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Continuous scanning with mobile reader in RFID systems: an experimental study.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

Extracting secret key from wireless link dynamics in vehicular environments.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

APT: Accurate outdoor pedestrian tracking with smartphones.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

HoWiES: A holistic approach to ZigBee assisted WiFi energy savings in mobile devices.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Fast Mencius: Mencius with low commit latency.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Human settlement suitability assessment considering climate and DEM.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

Generalized tensor compressive sensing.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, 2013

Representative reference-set and betweenness centrality for scene image categorization.
Proceedings of the IEEE International Conference on Image Processing, 2013

Ordered histogram of shapemes: An ordered bag-of-features based shape descriptor for efficient shape matching.
Proceedings of the IEEE International Conference on Image Processing, 2013

CacheKeeper: a system-wide web caching service for smartphones.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

2012
Efficient median estimation for large-scale sensor RFID systems.
IJSNet, 2012

Online Vector Scheduling and Generalized Load Balancing
CoRR, 2012

Achieving distributed user access control in sensor networks.
Ad Hoc Networks, 2012

Location Proof via Passive RFID Tags.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

DozyAP: power-efficient Wi-Fi tethering.
Proceedings of the 10th International Conference on Mobile Systems, 2012

SybilDefender: Defend against sybil attacks in large social networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

MobiShare: Flexible privacy-preserving location sharing in mobile online social networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Codebook optimization using word activation forces for scene categorization.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Unidentifiable Attacks in Electric Power Systems.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

2011
Public-key based access control in sensornet.
Wireless Networks, 2011

Association Control for Vehicular WiFi Access: Pursuing Efficiency and Fairness.
IEEE Trans. Parallel Distrib. Syst., 2011

A Timing-Based Scheme for Rogue AP Detection.
IEEE Trans. Parallel Distrib. Syst., 2011

Verifiable Privacy-Preserving Sensor Network Storage for Range Query.
IEEE Trans. Mob. Comput., 2011

Service-oriented simulation framework: An overview and unifying methodology.
Simulation, 2011

Robust HOSVD-based multi-camera motion trajectory indexing and retrieval.
Proceedings of the Visual Information Processing and Communication II, 2011

ETCH: Efficient Channel Hopping for communication rendezvous in dynamic spectrum access networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

IMDGuard: Securing implantable medical devices with the external wearable guardian.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Defending against vehicular rogue APs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A general framework for robust HOSVD-based indexing and retrieval with high-order tensor data.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
Achieving robust message authentication in sensor networks: a public-key based approach.
Wireless Networks, 2010

Efficient techniques for monitoring missing RFID tags.
IEEE Trans. Wireless Communications, 2010

Snoogle: A Search Engine for Pervasive Environments.
IEEE Trans. Parallel Distrib. Syst., 2010

Optimize Storage Placement in Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Microsearch: A search engine for embedded devices used in pervasive computing.
ACM Trans. Embedded Comput. Syst., 2010

High Speed Data Routing in Vehicular Sensor Networks.
JCM, 2010

Service-Oriented Simulation Framework: An Overview and Unifying Methodology
CoRR, 2010

Designing a Practical Access Point Association Protocol.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Efficient Tag Identification in Mobile RFID Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Efficient Continuous Scanning in RFID Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Counting RFID Tags Efficiently and Anonymously.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Research on Text Clustering Algorithms.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

A 3D SoC design for H.264 application with on-chip DRAM stacking.
Proceedings of the IEEE International Conference on 3D System Integration, 2010

2009
IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks.
IEEE Trans. Information Technology in Biomedicine, 2009

A transformation model from DEVS to SMP2 based on MDA.
Simulation Modelling Practice and Theory, 2009

High level architecture evolved modular federation object model
CoRR, 2009

Service-oriented high level architecture
CoRR, 2009

Privacy-aware routing in sensor networks.
Computer Networks, 2009

Experimental Study on Mobile RFID Performance.
Proceedings of the Wireless Algorithms, 2009

Experimental Study on Secure Data Collection in Vehicular Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

Communication in Naturally Mobile Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

A Measurement Based Rogue AP Detection Scheme.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Achieving Efficiency and Fairness for Association Control in Vehicular Networks.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

Research on the Backup Mechanism of Oracle Database.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

Optimistic Parallel Discrete Event Simulation Based on Multi-core Platform and its Performance Analysis.
Proceedings of the 2009 International Conference on Complex, 2009

Detection of Ventricular Fibrillation by Support Vector Machine Algorithm.
Proceedings of the 2009 International Asia Conference on Informatics in Control, 2009

2008
Secure and Serverless RFID Authentication and Search Protocols.
IEEE Trans. Wireless Communications, 2008

Body sensor network security: an identity-based cryptography approach.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Microsearch: When Search Engines Meet Small Devices.
Proceedings of the Pervasive Computing, 2008

Finding popular categories for RFID tags.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Snoogle: A Search Engine for the Physical World.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

How to Monitor for Missing RFID tags.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2007

Cooperative Relay Service in a Wireless LAN.
IEEE Journal on Selected Areas in Communications, 2007

Severless Search and Authentication Protocols for RFID.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

Outlier detection in sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

2006
Global Clock Synchronization in Sensor Networks.
IEEE Trans. Computers, 2006

Elliptic curve cryptography-based access control in sensor networks.
IJSN, 2006

Data storage placement in sensor networks.
Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2006

Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

A Robust and Secure RFID-Based Pedigree System (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Distributed User Access Control in Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2006

2005
Navigation protocols in sensor networks.
TOSN, 2005

A study on object tracking quality under probabilistic coverage in sensor networks.
Mobile Computing and Communications Review, 2005

Extend SRML schema based on DEVS: an executable DEVS language.
Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, 2005

Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks.
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005

Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications.
Proceedings of the Distributed Computing in Sensor Systems, 2005

2004
Global Clock Synchronization in Sensor Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

2003
Three power-aware routing algorithms for sensor networks.
Wireless Communications and Mobile Computing, 2003

MobiCom poster: reactive behavior in self-reconfiguring sensor networks.
Mobile Computing and Communications Review, 2003

Communication in disconnected ad hoc networks using message relay.
J. Parallel Distrib. Comput., 2003

Distributed algorithms for guiding navigation across a sensor network.
Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking, 2003

Distributed Energy-conserving Routing Protocols.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
Message relay in disconnected ad-hoc networks.
Proceedings of the International Mobility and Wireless Access Workshop, 2002

An analysis of the causes of increased error rates in children²s speech recognition.
Proceedings of the 7th International Conference on Spoken Language Processing, ICSLP2002, 2002

2001
Online power-aware routing in wireless Ad-hoc networks.
Proceedings of the MOBICOM 2001, 2001

Why is automatic recognition of children's speech difficult?
Proceedings of the EUROSPEECH 2001 Scandinavia, 2001

2000
Sending messages to mobile users in disconnected ad-hoc wireless networks.
Proceedings of the MOBICOM 2000, 2000

1997
BFXM: A Parallel File System Model Based on the Mechanism of Distributed Shared Memory.
Operating Systems Review, 1997

Group Consistency Model Which Separates the Intra-Group Consistency Maintenance from the Inter-group Consistency Maintenance in Large Scale DSM Systems.
Operating Systems Review, 1997


  Loading...