Sammy Chan

According to our database1, Sammy Chan authored at least 152 papers between 1992 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Group Password Strength Meter Based on Attention Mechanism.
IEEE Netw., 2020

Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras.
IEEE Netw., 2020

Simulation Design for Security Testing of Integrated Electronic Systems.
IEEE Netw., 2020

Fake Review Detection Based on PU Learning and Behavior Density.
IEEE Netw., 2020

A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems.
IEEE Netw., 2020

Smart Contract Vulnerability Analysis and Security Audit.
IEEE Netw., 2020

CTRA: A complex terrain region-avoidance charging algorithm in Smart World.
J. Netw. Comput. Appl., 2020

TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities.
Future Gener. Comput. Syst., 2020

Deterministic Algorithms for Solving Boolean Polynomial Equations Based on Channel Coding Theory.
IEEE Access, 2020

2019
A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2019

An Uneven Cluster-Based Mobile Charging Algorithm for Wireless Rechargeable Sensor Networks.
IEEE Syst. J., 2019

PMS: Intelligent Pollution Monitoring System Based on the Industrial Internet of Things for a Healthier City.
IEEE Netw., 2019

Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare Systems.
IEEE Netw., 2019

How to Govern the Non-Cooperative Amateur Drones?
IEEE Netw., 2019

A Coverage-Aware Hierarchical Charging Algorithm in Wireless Rechargeable Sensor Networks.
IEEE Netw., 2019

Performance Modeling of Representative Load Sharing Schemes for Clustered Servers in Multiaccess Edge Computing.
IEEE Internet Things J., 2019

A Maximum Cache Value Policy in Hybrid Memory-Based Edge Computing for Mobile Devices.
IEEE Internet Things J., 2019

Wireless Sensor Network Deployment Optimization Based on Two Flower Pollination Algorithms.
IEEE Access, 2019

2018
KCLP: A k-Means Cluster-Based Location Privacy Protection Scheme in WSNs for IoT.
IEEE Wirel. Commun., 2018

Dynamic cloud resource management for efficient media applications in mobile computing environments.
Pers. Ubiquitous Comput., 2018

Security Analysis of a Space-Based Wireless Network.
IEEE Netw., 2018

Privacy-friendly and efficient secure communication framework for V2G networks.
IET Commun., 2018

A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things.
Future Gener. Comput. Syst., 2018

An SNR-Assured Anti-Jamming Routing Protocol for Reliable Communication in Industrial Wireless Sensor Networks.
IEEE Commun. Mag., 2018

Privacy in the Internet of Things for Smart Healthcare.
IEEE Commun. Mag., 2018

Flight Security and Safety of Drones in Airborne Fog Computing Systems.
IEEE Commun. Mag., 2018

Imminent Communication Security for Smart Communities.
IEEE Commun. Mag., 2018

Security in the Internet of Things Supported by Mobile Edge Computing.
IEEE Commun. Mag., 2018

CASLP: A Confused Arc-Based Source Location Privacy Protection Scheme in WSNs for IoT.
IEEE Commun. Mag., 2018

A Hierarchical Jammed-Area Mapping Service for Ubiquitous Communication in Smart Communities.
IEEE Commun. Mag., 2018

Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities: Part 3.
IEEE Commun. Mag., 2018

Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities: Part 2.
IEEE Commun. Mag., 2018

2017
Channel Hopping Protocols for Dynamic Spectrum Management in 5G Technology.
IEEE Wirel. Commun., 2017

Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring.
IEEE Wirel. Commun., 2017

Communication Security of Unmanned Aerial Vehicles.
IEEE Wirel. Commun., 2017

A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks.
IEEE Trans. Ind. Informatics, 2017

Win-Win Security Approaches for Smart Grid Communications Networks.
IEEE Netw., 2017

Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation.
IEEE Internet Things J., 2017

On blocking time in multi-class optical burst switching nodes.
Int. J. Commun. Syst., 2017

A Trust Cloud Model for Underwater Wireless Sensor Networks.
IEEE Commun. Mag., 2017

Drone-Assisted Public Safety Networks: The Security Aspect.
IEEE Commun. Mag., 2017

HySense: A Hybrid Mobile CrowdSensing Framework for Sensing Opportunities Compensation under Dynamic Coverage Constraint.
IEEE Commun. Mag., 2017

Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities.
IEEE Commun. Mag., 2017

A MAC Protocol for Full Duplex Cellular Networks.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2016
Throughput Improvement of 802.11 Networks Via Randomization of Transmission Power Levels.
IEEE Trans. Veh. Technol., 2016

An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks.
IEEE Trans. Veh. Technol., 2016

The Application of DOA Estimation Approach in Patient Tracking Systems with High Patient Density.
IEEE Trans. Ind. Informatics, 2016

PD Source Diagnosis and Localization in Industrial High-Voltage Insulation System via Multimodal Joint Sparse Representation.
IEEE Trans. Ind. Electron., 2016

Security and privacy in Internet of things: methods, architectures, and solutions.
Secur. Commun. Networks, 2016

Securing software defined wireless networks.
IEEE Commun. Mag., 2016

Recent advances in green industrial networking [Guest Editorial].
IEEE Commun. Mag., 2016

PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor Networks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Mobile application security: malware threats and defenses.
IEEE Wirel. Commun., 2015

User privacy and data trustworthiness in mobile crowd sensing.
IEEE Wirel. Commun., 2015

Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2015

Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Handover authentication for mobile networks: security and efficiency aspects.
IEEE Netw., 2015

Traffic matrix estimation: Advanced-Tomogravity method based on a precise gravity model.
Int. J. Commun. Syst., 2015

Privacy and incentive mechanisms in people-centric sensing networks.
IEEE Commun. Mag., 2015

Security and privacy in emerging networks: Part II [Guest Editorial].
IEEE Commun. Mag., 2015

Security and privacy in emerging networks: Part 1 [Guest Editorial].
IEEE Commun. Mag., 2015

Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
Performance analysis and optimization of best-effort service in IEEE 802.16 networks.
Wirel. Commun. Mob. Comput., 2014

Small data dissemination for wireless sensor networks: The security aspect.
IEEE Wirel. Commun., 2014

Multi-Path Routing and Forwarding in Non-Cooperative Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks.
IEEE J. Biomed. Health Informatics, 2014

A Novel and Lightweight System to Secure Wireless Medical Sensor Networks.
IEEE J. Biomed. Health Informatics, 2014

An enhanced public key infrastructure to secure smart grid wireless communication networks.
IEEE Netw., 2014

A comparative simulation study of TCP/AQM systems for evaluating the potential of neuron-based AQM schemes.
J. Netw. Comput. Appl., 2014

An efficient reputation-based system for wireless ad hoc networks.
Int. J. Auton. Adapt. Commun. Syst., 2014

How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway?
IEEE Intell. Syst., 2014

Performance Analysis of Contention Based Services with Bulk Transmission in IEEE 802.16 OFDMA Networks.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

2013
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013

Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks.
IEEE J. Biomed. Health Informatics, 2013

Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2013

Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks.
IEEE Trans. Computers, 2013

Decentralized Power Control for Random Access with Successive Interference Cancellation.
IEEE J. Sel. Areas Commun., 2013

A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.
Int. J. Commun. Syst., 2013

Strong roaming authentication technique for wireless and mobile networks.
Int. J. Commun. Syst., 2013

Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects.
IEEE Commun. Mag., 2013

2012
Performance Modeling of Broadcast Polling in IEEE 802.16 Networks with Finite-Buffered Subscriber Stations.
IEEE Trans. Wirel. Commun., 2012

DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2012

Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions.
IEEE Trans. Wirel. Commun., 2012

A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2012

ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2012

SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2012

Secure and efficient dynamic program update in wireless sensor networks.
Secur. Commun. Networks, 2012

Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks.
IEEE Commun. Lett., 2012

IAPI: An intelligent adaptive PI active queue management scheme.
Comput. Commun., 2012

Secure service provision in smart grid communications.
IEEE Commun. Mag., 2012

Decentralized power control for random access with iterative multi-user detection.
Proceedings of the 7th International Symposium on Turbo Codes and Iterative Information Processing, 2012

2011
A Simple and Robust Vertical Handoff Algorithm for Heterogeneous Wireless Mobile Networks.
Wirel. Pers. Commun., 2011

Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2011

Distributed Access Control with Privacy Support in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2011

Privacy-Preserving Universal Authentication Protocol for Wireless Communications.
IEEE Trans. Wirel. Commun., 2011

Lightweight and provably secure user authentication with anonymity for the global mobility network.
Int. J. Commun. Syst., 2011

Performance effects of two-way FAST TCP.
Comput. Networks, 2011

Optimal throughput for 802.11 DCF with multiple packet reception.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Performance modelling of broadcast polling protocol in unsaturated IEEE 802.16 networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Distributed privacy-preserving access control in a single-owner multi-user sensor network.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

High-Throughput Routing with Superposition Coding and Successive Interference Cancellation.
Proceedings of IEEE International Conference on Communications, 2011

FORBID: Cope with Byzantine Behaviors in Wireless Multi-Path Routing and Forwarding.
Proceedings of the Global Communications Conference, 2011

2010
Performance Analysis of Best-Effort Service in Saturated IEEE 802.16 Networks.
IEEE Trans. Veh. Technol., 2010

A priority-based processor sharing model for TDM passive optical networks.
IEEE J. Sel. Areas Commun., 2010

Bandwidth allocation in wireless ad hoc networks: Challenges and prospects.
IEEE Commun. Mag., 2010

An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2010

A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

2009
Error-aware and energy-efficient routing approach in MANETs.
Int. J. Commun. Syst., 2009

Auction in multi-path multi-hop routing.
IEEE Commun. Lett., 2009

Generalized Second Price Auction in Multi-Path Routing with Selfish Nodes.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Performance Analysis of Resource Selection Schemes for a Large Scale Video-on-Demand System.
IEEE Trans. Multim., 2008

Evolutionary Optimization of File Assignment for a Large-Scale Video-on-Demand System.
IEEE Trans. Knowl. Data Eng., 2008

Combination Load Balancing for Video-on-Demand Systems.
IEEE Trans. Circuits Syst. Video Technol., 2008

Performance Evaluation for Saturated 802.16 Networks with Binary Backoff Mechanism.
Proceedings of the NTMS 2008, 2008

Delay Model for Saturated IEEE 802.16 Networks.
Proceedings of the NTMS 2008, 2008

Loss performance evaluation in heterogeneous hierarchical networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Priority-Based fair Scheduling for Multimedia WiMAX Uplink Traffic.
Proceedings of IEEE International Conference on Communications, 2008

2007
Improving Wireless TCP Throughput by a Novel TCM-Based Hybrid ARQ.
IEEE Trans. Wirel. Commun., 2007

Performance of Hybrid ARQ Using Trellis-Coded Modulation Over Rayleigh Fading Channel.
IEEE Trans. Veh. Technol., 2007

Instability effects of two-way traffic in a TCP/AQM system.
Comput. Commun., 2007

An Error-aware and Energy Efficient Routing Protocol in MANETs.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

RLAR: Robust Link Availability Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

A QoS Architecture for IDMA-Based Multi-Service Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2007

2006
A data link control protocol for broadband wireless networks with adaptive coding rate.
Int. J. Commun. Syst., 2006

Price-based max-min fair rate allocation in wireless multi-hop networks.
IEEE Commun. Lett., 2006

Adaptive Deterministic Packet Marking.
IEEE Commun. Lett., 2006

Max-min Fair Rate Allocation in Multi-hop Wireless Ad Hoc Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

2005
A hybrid ARQ scheme based on CT-TCM codes.
IEEE Commun. Lett., 2005

Buffer sizing for nonhomogeneous TCP sources.
IEEE Commun. Lett., 2005

A novel method for modeling and analysis of distributed video on demand systems.
Proceedings of IEEE International Conference on Communications, 2005

2004
Optimal video placement scheme for batching VOD services.
IEEE Trans. Broadcast., 2004

An enhanced handoff control scheme for multimedia traffic in cellular networks.
IEEE Commun. Lett., 2004

Effect of Large Buffers on TCP Queueing Behavior.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Performance benchmarks for an interactive video-on-demand system.
Proceedings of IEEE International Conference on Communications, 2004

Designing a stable and effective PD-control AQM.
Proceedings of the 8th International Conference on Control, 2004

2003
PD-RED: to improve the performance of RED.
IEEE Commun. Lett., 2003

On the efficient use of video-on-demand storage facility.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

PD-controller: a new active queue management scheme.
Proceedings of the Global Telecommunications Conference, 2003

2002
A congestion control framework for available bit rate service in ATM networks.
Int. J. Commun. Syst., 2002

Fault tolerance in Clos-Knockout multicast ATM switch.
Int. J. Commun. Syst., 2002

Is max-min fairness achievable in the presence of insubordinate users?
IEEE Commun. Lett., 2002

Call Admission Control for 3G CDMA Networks with Differentiated QoS.
Proceedings of the NETWORKING 2002, 2002

2001
Optimal file placement in VOD system using genetic algorithm.
IEEE Trans. Ind. Electron., 2001

2000
An efficient handoff management scheme for mobile wireless ATM networks.
IEEE Trans. Veh. Technol., 2000

A refined model for performance analysis of output-buffered Banyan networks.
Telecommun. Syst., 2000

A New Max-Min Fairness Definition to Neutralize Malicious Users.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

1998
Design of wide-sense nonblocking multicast ATM switches.
IEEE Commun. Lett., 1998

1997
Fair packet discarding for controlling ABR traffic in ATM networks.
IEEE Trans. Commun., 1997

Max-Log-MAP Filtering Algorithm for Decoding Product F24 Code.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

1993
Fairness in ATM Networks.
Comput. Networks ISDN Syst., 1993

1992
Fairness in Broadband ISDN.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992


  Loading...