Shigeng Zhang

According to our database1, Shigeng Zhang authored at least 66 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications.
IEEE Trans. Information Forensics and Security, 2019

Range-Based Localization for Sparse 3-D Sensor Networks.
IEEE Internet of Things Journal, 2019

2018
A Novel Indoor Localization Algorithm for Efficient Mobility Management in Wireless Networks.
Wireless Communications and Mobile Computing, 2018

Energy-Aware Temporal Reachability Graphs for Time-Varying Mobile Opportunistic Networks.
IEEE Trans. Vehicular Technology, 2018

Big program code dissemination scheme for emergency software-define wireless sensor networks.
Peer-to-Peer Networking and Applications, 2018

Characterizing the Capability of Vehicular Fog Computing in Large-scale Urban Environment.
MONET, 2018

An optimal algorithm for small group multicast in wireless sensor networks.
IJAHUC, 2018

Leveraging content similarity among VMI files to allocate virtual machines in cloud.
Future Generation Comp. Syst., 2018

RFID Localization Based on Multiple Feature Fusion.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Key parameters decision for cloud computing: Insights from a multiple game model.
Concurrency and Computation: Practice and Experience, 2017

Exploiting distribution of channel state information for accurate wireless indoor localization.
Computer Communications, 2017

Edge Mesh: A New Paradigm to Enable Distributed Intelligence in Internet of Things.
IEEE Access, 2017

Accurate Indoor Localization with Multiple Feature Fusion.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Weight-Bind-Based Safe Top-k Query Processing Scheme in Two-Tiered Sensor Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A High Throughput Reader Scheduling Algorithm for Large RFID Systems in Smart Environments.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Tag size profiling in multiple reader RFID systems.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Flexible and Time-Efficient Tag Scanning with Handheld Readers.
IEEE Trans. Mob. Comput., 2016

A locality-based range-free localization algorithm for anisotropic wireless sensor networks.
Telecommunication Systems, 2016

Distance outlier detection with a mobile beacon in wireless sensor networks localisation.
IJSN, 2016

Who stole my cheese?: Verifying intactness of anonymous RFID systems.
Ad Hoc Networks, 2016

Let's work together: Fast tag identification by interference elimination for multiple RFID readers.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution.
IEEE Trans. Parallel Distrib. Syst., 2015

Minimizing Movement for Target Coverage and Network Connectivity in Mobile Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

Accurate Range-Free Localization for Anisotropic Wireless Sensor Networks.
TOSN, 2015

Deterministic Detection of Cloning Attacks for Anonymous RFID Systems.
IEEE Trans. Industrial Informatics, 2015

STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems.
IEEE Trans. Computers, 2015

A Component-Based Localization Algorithm for Sparse Sensor Networks Combining Angle and Distance Information.
TIIS, 2015

Energy-efficient active tag searching in large scale RFID systems.
Inf. Sci., 2015

Algorithmic Methods in Wireless Sensor Network 2014.
IJDSN, 2015

Energy Balanced Clustering Data Collection Based on Dominating Set in Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2015

2014
Defending collaborative false data injection attacks in wireless sensor networks.
Inf. Sci., 2014

ECN-Based Congestion Probability Prediction over Hybrid Wired-Wireless Networks.
IJDSN, 2014

An energy-preserving spectrum access strategy in mobile cognitive radio networks.
Trans. Emerging Telecommunications Technologies, 2014

A Cluster-Based False Data Filtering Scheme in Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2014

Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

LOCK: A fast and flexible tag scanning mechanism with handheld readers.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

ArPat: Accurate RFID reader positioning with mere boundary tags.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Intactness verification in anonymous RFID systems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2013
Secure localization and location verification in wireless sensor networks: a survey.
The Journal of Supercomputing, 2013

Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks.
Computer Communications, 2013

A Semantic Medical Multimedia Retrieval Approach Using Ontology Information Hiding.
Comp. Math. Methods in Medicine, 2013

A Deterministic Sensor Placement Scheme for Full Coverage and Connectivity without Boundary Effect inWireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2013

An energy-preserving spectrum access strategy in cognitive radio networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A data gathering algorithm based on energy-balanced connected dominating sets in wireless sensor networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Bacterial Colony Chemotaxis Algorithm with Self-adaptive Mechanism.
Proceedings of the Intelligent Computing Theories and Technology, 2013

Component-Based Localization for Wireless Sensor Networks Combining Angle and Distance Information.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Time Efficient Tag Searching in Multiple Reader RFID Systems.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Range-free selective multilateration for anisotropic wireless sensor networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Complete and fast unknown tag identification in large RFID systems.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Minimizing Movement for Target Coverage in Mobile Sensor Networks.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

An energy-balanced clustering protocol based on dominating set for data gathering in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

Clique partition based relay placement in WiMAX mesh networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Anchor supervised distance estimation in anisotropic wireless sensor networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

An Explicit Congestion Control Protocol Based on Bandwidth Estimation.
Proceedings of the Global Communications Conference, 2011

A Buffer Management Scheme Based on Message Transmission Status in Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2011

2010
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Random-walk based approach to detect clone attacks in wireless sensor networks.
IEEE Journal on Selected Areas in Communications, 2010

On accuracy of region based localization algorithms for wireless sensor networks.
Computer Communications, 2010

2009
Pollution attack: a new attack against localization in wireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

On Accuracy of Region-based Localization Algorithms for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2008
Locating Nodes in Mobile Sensor Networks More Accurately and Faster.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

2007
Secure Hop-Count Based Localization in Wireless Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...