Wei Yu

Orcid: 0000-0003-4522-7340

Affiliations:
  • Towson University, Department of Computer & Information Sciences
  • Texas A&M University, College Station, Department of Computer Science


According to our database1, Wei Yu authored at least 290 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hybrid Transformers With Attention-Guided Spatial Embeddings for Makeup Transfer and Removal.
IEEE Trans. Circuits Syst. Video Technol., April, 2024

Blockchain-Empowered Federated Learning Through Model and Feature Calibration.
IEEE Internet Things J., February, 2024

Incentive Design for Heterogeneous Client Selection: A Robust Federated Learning Approach.
IEEE Internet Things J., February, 2024

Assessing deep learning performance in power demand forecasting for smart grid.
Int. J. Sens. Networks, 2024

Survey on Multi-Task Learning in Smart Transportation.
IEEE Access, 2024

Deep Reinforcement Learning for Channel State Information Prediction in Internet of Vehicles.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Using Deep Reinforcement Learning to Automate Network Configurations for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., December, 2023

Deep Neural Networks for Spatial-Temporal Cyber-Physical Systems: A Survey.
Future Internet, June, 2023

Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology.
Future Internet, May, 2023

Resource-Aware Knowledge Distillation for Federated Learning.
IEEE Trans. Emerg. Top. Comput., 2023

Open Radio Access Networks for Smart IoT Systems: State of Art and Future Directions.
Future Internet, 2023

Towards an Adversarial Machine Learning Framework in Cyber-Physical Systems.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Named Data Networking (NDN) for Data Collection of Digital Twins-based IoT Systems.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Performance of GAN-Based Denoising and Restoration Techniques for Adversarial Face Images.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Digital Twins of Smart Campus: Performance Evaluation Using Machine Learning Analysis.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Attack Evaluations of Deep Learning Empowered WiFi Sensing in IoT Systems.
Proceedings of the IEEE INFOCOM 2023, 2023

Towards Secure Communications in Heterogeneous Internet of Things.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Towards Trajectory Prediction-Based UAV Deployment in Smart Transportation Systems.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Optimal sampling for Moving Object Trajectory Tracking in Smart Transportation Systems: A Transformer-based Approach.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Context-Aware Multi-Criteria Handover at the Software Defined Network Edge for Service Differentiation in Next Generation Wireless Networks.
IEEE Trans. Serv. Comput., 2022

Locally Private High-Dimensional Crowdsourced Data Release Based on Copula Functions.
IEEE Trans. Serv. Comput., 2022

Time-Frequency Analysis of Scalp EEG With Hilbert-Huang Transform and Deep Learning.
IEEE J. Biomed. Health Informatics, 2022

Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids.
IEEE Trans. Dependable Secur. Comput., 2022

Where Am I Parking: Incentive Online Parking-Space Sharing Mechanism With Privacy Protection.
IEEE Trans Autom. Sci. Eng., 2022

WSCC: A Weight-Similarity-Based Client Clustering Approach for Non-IID Federated Learning.
IEEE Internet Things J., 2022

Toward Generative Adversarial Networks for the Industrial Internet of Things.
IEEE Internet Things J., 2022

Toward Deep Q-Network-Based Resource Allocation in Industrial Internet of Things.
IEEE Internet Things J., 2022

Secure IoT Search Engine: Survey, Challenges Issues, Case Study, and Future Research Direction.
IEEE Internet Things J., 2022

Digital Twin - Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions.
Future Internet, 2022

A Fairness-Aware Peer-to-Peer Decentralized Learning Framework with Heterogeneous Devices.
Future Internet, 2022

Towards Internet of Things (IoT) Forensics Analysis on Intelligent Robot Vacuum Systems.
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering Research, 2022

Transformations as Denoising: A Robust Approach to Weaken Adversarial Facial Images.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022

Performance Assessment of Deep Neural Network on Activity Recognition in WiFi Sensing.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Taxonomy of Security and Defense Mechanisms in Digital Twins-based Cyber-Physical Systems.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

Deep CAPTCHA Recognition Using Encapsulated Preprocessing and Heterogeneous Datasets.
Proceedings of the IEEE INFOCOM 2022, 2022

Integrated Simulation Platform for Internet of Vehicles.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Zero Knowledge Clustering Based Adversarial Mitigation in Heterogeneous Federated Learning.
IEEE Trans. Netw. Sci. Eng., 2021

Survey on Improving Data Utility in Differentially Private Sequential Data Publishing.
IEEE Trans. Big Data, 2021

Towards Dynamic Verifiable Pattern Matching.
IEEE Trans. Big Data, 2021

Guest Editorial: Special Issue on AI-Enabled Internet of Dependable and Controllable Things.
IEEE Internet Things J., 2021

Priority-Aware Reinforcement-Learning-Based Integrated Design of Networking and Control for Industrial Internet of Things.
IEEE Internet Things J., 2021

DPCrowd: Privacy-Preserving and Communication-Efficient Decentralized Statistical Estimation for Real-Time Crowdsourced Data.
IEEE Internet Things J., 2021

Toward Deep Transfer Learning in Industrial Internet of Things.
IEEE Internet Things J., 2021

Toward Computing Resource Reservation Scheduling in Industrial Internet of Things.
IEEE Internet Things J., 2021

Towards asynchronous federated learning for heterogeneous edge-powered internet of things.
Digit. Commun. Networks, 2021

Towards asynchronous federated learning based threat detection: A DC-Adam approach.
Comput. Secur., 2021

On deep reinforcement learning security for Industrial Internet of Things.
Comput. Commun., 2021

Towards Efficient and Intelligent Internet of Things Search Engine.
IEEE Access, 2021

Towards An Adaptive Time-Triggered Protocol in Wireless Networks.
Proceedings of the 2021 IEEE SmartWorld, 2021

Towards Online Continuous Reinforcement Learning on Industrial Internet of Things.
Proceedings of the 2021 IEEE SmartWorld, 2021

FALIoTSE: Towards Federated Adversarial Learning for IoT Search Engine Resiliency.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Towards Scalability of the IoT Search Engine.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
An Edge Computing Based Public Vehicle System for Smart Transportation.
IEEE Trans. Veh. Technol., 2020

Routing in Large-scale Dynamic Networks: A Bloom Filter-based Dual-layer Scheme.
ACM Trans. Internet Techn., 2020

Modeling and Performance Assessment of Dynamic Rate Adaptation for M2M Communications.
IEEE Trans. Netw. Sci. Eng., 2020

Privacy-Preserving Auction for Big Data Trading Using Homomorphic Encryption.
IEEE Trans. Netw. Sci. Eng., 2020

Towards Differential Privacy-Based Online Double Auction for Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2020

Reinforcement Learning-Based Control and Networking Co-Design for Industrial Internet of Things.
IEEE J. Sel. Areas Commun., 2020

Toward Edge-Based Deep Learning in Industrial Internet of Things.
IEEE Internet Things J., 2020

LoPrO: Location Privacy-preserving Online auction scheme for electric vehicles joint bidding and charging.
Future Gener. Comput. Syst., 2020

On Performance Improvement of Centroid Topology Optimization Schemes in LTE Networks.
EAI Endorsed Trans. Wirel. Spectr., 2020

Towards to Inter-domain Network Operations for Dynamic Networks with Software Defined Networking (SDN).
EAI Endorsed Trans. Wirel. Spectr., 2020

DPCrowd: Privacy-preserving and Communication-efficient Decentralized Statistical Estimation for Real-time Crowd-sourced Data.
CoRR, 2020

Internet of Things Data Collection Using Unmanned Aerial Vehicles in Infrastructure Free Environments.
IEEE Access, 2020

Data Integrity Attacks against Traffic Modeling and Forecasting in M2M Communications.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

On Data Integrity Attacks against Industrial Internet of Things.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Search Engine for Heterogeneous Internet of Things Systems and Optimization.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
An Online Continuous Progressive Second Price Auction for Electric Vehicle Charging.
IEEE Internet Things J., 2019

On Location Privacy-Preserving Online Double Auction for Electric Vehicles in Microgrids.
IEEE Internet Things J., 2019

Energy-Efficient Analytics for Geographically Distributed Big Data.
IEEE Internet Comput., 2019

Towards Deep Learning-Based Approach for Detecting Android Malware.
Int. J. Softw. Innov., 2019

Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities.
IEEE Access, 2019

Search Engine for the Internet of Things: Lessons From Web Search, Vision, and Opportunities.
IEEE Access, 2019

Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly.
IEEE Access, 2019

Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Reinforcement Learning for Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Modeling and Forecasting of Timescale Network Traffic Dynamics in M2M Communications.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Real-Time Data Transport Scheduling for Edge/Cloud-Based Internet of Things.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Towards Multimodal Learning for Android Malware Detection.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Performance Assessment of Smart Meter Traffic over LTE Network Using SDR Testbed.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Towards Online Deep Learning-Based Energy Forecasting.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

Towards Deep Learning-Based Detection Scheme with Raw ECG Signal for Wearable Telehealth Systems.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

I Know What You Enter on Gear VR.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Performance Assessment of LTE/LTE-A Based Wireless Networks for Internet-of-Things.
Proceedings of the 18th IEEE/ACIS International Conference on Computer and Information Science, 2019

2018
From Act to Utterance: A Research on Linguistic Act Convergence.
Wirel. Pers. Commun., 2018

Editorial on Wireless Networking Technologies for Smart Cities.
Wirel. Commun. Mob. Comput., 2018

Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense.
IEEE Trans. Veh. Technol., 2018

SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding.
IEEE Trans. Syst. Man Cybern. Syst., 2018

User Differentiated Verifiable File Search on the Cloud.
IEEE Trans. Serv. Comput., 2018

Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.
Sensors, 2018

Buffer Data-Driven Adaptation of Mobile Video Streaming Over Heterogeneous Wireless Networks.
IEEE Internet Things J., 2018

On reliable data delivery in stochastic energy harvesting wireless sensor networks.
Int. J. Sens. Networks, 2018

A cloud/edge computing streaming system for network traffic monitoring and threat detection.
Int. J. Secur. Networks, 2018

Survey of Public Safety Communications: User-Side and Network-Side Solutions and Future Directions.
IEEE Access, 2018

A Survey on the Edge Computing for the Internet of Things.
IEEE Access, 2018

A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective.
IEEE Access, 2018

A Survey on Big Data Market: Pricing, Trading and Protection.
IEEE Access, 2018

A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends.
IEEE Access, 2018

On Association Study of Scalp EEG Data Channels Under Different Circumstances.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

A 3D Topology Optimization Scheme for M2M Communications.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering, 2018

An SDN-Based Approach to Support Dynamic Operations of Multi-Domain Heterogeneous MANETs.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering, 2018

Tuning Deep Learning Performance for Android Malware Detection.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering, 2018

Towards Incentive Mechanism for Taxi Services Allocation with Privacy Guarantee.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Performance Evaluation of Energy Efficiency with Sleep Mode in Ultra Dense Networks.
Proceedings of the 2018 International Conference on Computing, 2018

Reliable Transport for Mobile Ad Hoc Networks with Constrained Application Protocol (CoAP) over Negative-Acknowledgment Oriented Reliable Multicast (NORM).
Proceedings of the 2018 International Conference on Computing, 2018

Towards UAV Assisted Multi-Path Data Streaming in Mobile Ad-Hoc Networks.
Proceedings of the 2018 International Conference on Computing, 2018

A Framework to Enable Multiple Coexisting Internet of Things Applications.
Proceedings of the 2018 International Conference on Computing, 2018

Towards 3D Deployment of UAV Base Stations in Uneven Terrain.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Survey of Blockchain: Techniques, Applications, and Challenges.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Dynamic Rate Adaptation Scheme for M2M Communications.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Framework for Detecting and Countering Android UI Attacks via Inspection of IPC Traffic.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Context-Aware Multi-Criteria Handover with Fuzzy Inference in Software Defined 5G HetNets.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

The Peeping Eye in the Sky.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing.
Wirel. Commun. Mob. Comput., 2017

A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems.
IEEE Trans. Veh. Technol., 2017

On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical Systems.
IEEE Trans. Parallel Distributed Syst., 2017

On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2017

Canoe: An Autonomous Infrastructure-Free Indoor Navigation System.
Sensors, 2017

Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems.
IEEE Internet Things J., 2017

Toward a Gaussian-Mixture Model-Based Detection Scheme Against Data Integrity Attacks in the Smart Grid.
IEEE Internet Things J., 2017

Toward Data Integrity Attacks Against Optimal Power Flow in Smart Grid.
IEEE Internet Things J., 2017

Toward Integrating Distributed Energy Resources and Storage Devices in Smart Grid.
IEEE Internet Things J., 2017

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications.
IEEE Internet Things J., 2017

Toward Emulation-Based Performance Assessment of Constrained Application Protocol in Dynamic Networks.
IEEE Internet Things J., 2017

Sto2Auc: A Stochastic Optimal Bidding Strategy for Microgrids.
IEEE Internet Things J., 2017

A Cross-Domain Optimization Scheme for MANET Communications in Heterogeneous Networks.
EAI Endorsed Trans. Wirel. Spectr., 2017

On Minimizing Energy Cost in Internet-Scale Systems With Dynamic Data.
IEEE Access, 2017

On Optimal Relay Nodes Position and Selection for Multi-Path Data Streaming.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A User Incentive-Based Scheme Against Dishonest Reporting in Privacy-Preserving Mobile Crowdsensing Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

An Integrated Simulation Study on Reliable and Effective Distributed Energy Resources in Smart Grid.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

Software Defined Radio Testbed Setup and Experimentation.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Towards truthful auction for big data trading.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

A Bloom Filter-Based Dual-Layer Routing Scheme in Large-Scale Mobile Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

3D vision attack against authentication.
Proceedings of the IEEE International Conference on Communications, 2017

Copula-Based Multi-Dimensional Crowdsourced Data Synthesis and Release with Local Privacy.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Cheating-resilient incentive scheme for mobile crowdsensing systems.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

On data integrity attacks against optimal power flow in power grid systems.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

On data integrity attacks against route guidance in transportation-based cyber-physical systems.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Towards double auction for assisting electric vehicles demand response in smart grid.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Smart city: The state of the art, datasets, and evaluation platforms.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
On Binary Decomposition Based Privacy-Preserving Aggregation Schemes in Real-Time Monitoring Systems.
IEEE Trans. Parallel Distributed Syst., 2016

Towards Multistep Electricity Prices in Smart Grid Electricity Markets.
IEEE Trans. Parallel Distributed Syst., 2016

Password Extraction via Reconstructed Wireless Mouse Trajectory.
IEEE Trans. Dependable Secur. Comput., 2016

Towards Stochastic Optimization-Based Electric Vehicle Penetration in a Novel Archipelago Microgrid.
Sensors, 2016

On false data injection attacks against Kalman filtering in power system dynamic state estimation.
Secur. Commun. Networks, 2016

A threat monitoring system in enterprise networks with smart mobiles.
Int. J. Secur. Networks, 2016

On energy-balanced backpressure routing mechanisms for stochastic energy harvesting wireless sensor networks.
Int. J. Distributed Sens. Networks, 2016

Disjoint multi mobile agent itinerary planning for big data analytics.
EURASIP J. Wirel. Commun. Netw., 2016

Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks.
EAI Endorsed Trans. Wirel. Spectr., 2016

A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures.
Big Data Res., 2016

A Game-Theoretic Model on Coalitional Attacks in Smart Grid.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

On optimal electric vehicles penetration in a novel Archipelago microgrids.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

A novel microgrid based resilient Demand Response scheme in smart grid.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

Machine learning-based mobile threat monitoring and detection.
Proceedings of the 14th IEEE International Conference on Software Engineering Research, 2016

A streaming-based network monitoring and threat detection system.
Proceedings of the 14th IEEE International Conference on Software Engineering Research, 2016

A Clustering-Based Device-to-Device Communication to Support Diverse Applications.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

Assessing Performance of Constrained Application Protocol (CoAP) in MANET Using Emulation.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate students.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Data integrity attacks against the distributed real-time pricing in the smart grid.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

Towards energy efficiency in ultra dense networks.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

Secure fingertip mouse for mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A Gaussian-Mixture Model Based Detection Scheme against Data Integrity Attacks in the Smart Grid.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Ultra-Dense Networks: Survey of State of the Art and Future Directions.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Towards optimal PMU placement against data integrity attacks in smart grid.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

2015
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation.
IEEE Trans. Parallel Distributed Syst., 2015

TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor.
IEEE Trans. Inf. Forensics Secur., 2015

A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems.
IEEE Trans. Computers, 2015

Towards a Low-Cost Remote Memory Attestation for the Smart Grid.
Sensors, 2015

An integrated detection system against false data injection attacks in the Smart Grid.
Secur. Commun. Networks, 2015

A cloud computing based system for cyber security management.
Int. J. Parallel Emergent Distributed Syst., 2015

Processing geo-dispersed big data in an advanced mapreduce framework.
IEEE Netw., 2015

SPAIS: A novel Self-checking Pollution Attackers Identification Scheme in network coding-based wireless mesh networks.
Comput. Networks, 2015

De-anonymizing and countermeasures in anonymous communication networks.
IEEE Commun. Mag., 2015

Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

On Computing Multi-Agent Itinerary Planning in Distributed Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

ScanMe mobile: a local and cloud hybrid service for analyzing APKs.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

Blind Recognition of Text Input on Mobile Devices via Natural Language Processing.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015

On stochastic optimal bidding strategy for microgrids.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Defending against Energy Dispatching Data integrity attacks in smart grid.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Optimizing the location deployment of dynamic mobile base stations.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

On simulation studies of jamming threats against LTE networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

On Effectiveness of Smart Grid Applications Using Co-Simulation.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

INCOR: Inter-flow Network Coding based Opportunistic Routing in wireless mesh networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

On false data injection attacks against the dynamic microgrid partition in the smart grid.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Effective task scheduling in proximate mobile device based communication systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards experimental evaluation of intelligent Transportation System safety and traffic efficiency.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards Efficient and Secured Real-Time Pricing in the Smart Grid.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Towards Neural Network Based Malware Detection on Android Mobile Devices.
Proceedings of the Cybersecurity Systems for Human Cognition Augmentation, 2014

On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures.
IEEE Trans. Parallel Distributed Syst., 2014

Toward efficient estimation of available bandwidth for IEEE 802.11-based wireless networks.
J. Netw. Comput. Appl., 2014

Network coding versus traditional routing in adversarial wireless networks.
Ad Hoc Networks, 2014

On statistical modeling and forecasting of energy usage in smart grid.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

On cascading failures and countermeasures based on energy storage in the smart grid.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

TorWard: Discovery of malicious traffic over Tor.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

An effective online scheme for detecting Android malware.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

On simulation studies of cyber attacks against LTE networks.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Towards verifiable file search on the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

A novel self-checking pollution attackers identification scheme in wireless network coding.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
A Loose-Virtual-Clustering-Based Routing for Power Heterogeneous MANETs.
IEEE Trans. Veh. Technol., 2013

Novel Packet Size-Based Covert Channel Attacks against Anonymizer.
IEEE Trans. Computers, 2013

Blind detection of spread spectrum flow watermarks.
Secur. Commun. Networks, 2013

On effective data aggregation techniques in host-based intrusion detection in MANET.
Int. J. Secur. Networks, 2013

On effective sampling techniques in host-based intrusion detection in tactical MANET.
Int. J. Secur. Networks, 2013

On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback.
Int. J. Networked Distributed Comput., 2013

Protocol-level attacks against Tor.
Comput. Networks, 2013

A threat monitoring system for smart mobiles in enterprise networks.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

On simulation study of mesh-based protocols for smart grid communication networks.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

How Privacy Leaks From Bluetooth Mouse?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

On Scaling Perturbation Based Privacy-Preserving Schemes in Smart Metering Systems.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

On effective localization attacks against Internet Threat monitors.
Proceedings of IEEE International Conference on Communications, 2013

On effectiveness of integrating intermittent resources and electricity vehicles in the smart grid.
Proceedings of IEEE International Conference on Communications, 2013

On behavior-based detection of malware on Android platform.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

On false data injection attack against Multistep Electricity Price in electricity market in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A cloud computing based architecture for cyber security situation awareness.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Coarse symbol timing for OFDM systems by ranking preamble cross-correlations.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013

Towards energy-efficient cooperative routing algorithms in wireless networks.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
A New Cell-Counting-Based Attack Against Tor.
IEEE/ACM Trans. Netw., 2012

The Digital Marauder's Map: A WiFi Forensic Positioning Tool.
IEEE Trans. Mob. Comput., 2012

HLLS: A History information based Light Location Service for MANETs.
Comput. Networks, 2012

A context-aware scheme for privacy-preserving location-based services.
Comput. Networks, 2012

On effective sampling techniques for host-based intrusion detection in MANET.
Proceedings of the 31st IEEE Military Communications Conference, 2012

A novel network delay based side-channel attack: Modeling and defense.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Extensive analysis and large-scale empirical evaluation of tor bridge discovery.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

On False Data Injection Attacks against Distributed Energy Routing in Smart Grid.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

Towards effective defense against pollution attacks on network coding.
Proceedings of IEEE International Conference on Communications, 2012

A novel architecture against false data injection attacks in smart grid.
Proceedings of IEEE International Conference on Communications, 2012

Novel Anti-forensics Approaches for Smart Phones.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

How privacy leaks from bluetooth mouse?
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
A Cross-Layer Approach Handling Link Asymmetry for Wireless Mesh Access Networks.
IEEE Trans. Veh. Technol., 2011

Modeling and Detection of Camouflaging Worm.
IEEE Trans. Dependable Secur. Comput., 2011

On detecting active worms with varying scan rate.
Comput. Commun., 2011

Are We Relying Too Much on Forensics Tools?
Proceedings of the Software Engineering Research, 2011

A distributed network-sensor based intrusion detection framework in enterprise networks.
Proceedings of the MILCOM 2011, 2011

A novel packet size based covert channel attack against anonymizer.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Proceedings of IEEE International Conference on Communications, 2011

On an Efficient Estimation of Available Bandwidth for IEEE 802.11-Based Wireless Networks.
Proceedings of the Global Communications Conference, 2011

On a Hierarchical False Data Injection Attack on Power System State Estimation.
Proceedings of the Global Communications Conference, 2011

Towards Effective En-Route Filtering against Injected False Data in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

2010
Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks.
IEEE Trans. Syst. Man Cybern. Part B, 2010

Self-Disciplinary Worms and Countermeasures: Modeling and Analysis.
IEEE Trans. Parallel Distributed Syst., 2010

Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures.
IEEE Trans. Computers, 2010

Generic network forensic data acquisition from household and small business wireless routers.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

An Interference Avoidance Multipath Routing protocol based on greedy forwarding in MANETs.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Cyber Crime Scene Investigations (C²SI) through Cloud Computing.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

3DLoc: Three Dimensional Wireless Localization Toolkit.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

HLLS: A History Information Based Light Location Service for MANETs.
Proceedings of IEEE International Conference on Communications, 2010

gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity.
Proceedings of the Decision and Game Theory for Security, 2010

2009
An Invisible Localization Attack to Internet Threat Monitors.
IEEE Trans. Parallel Distributed Syst., 2009

TCP Performance in Flow-Based Mix Networks: Modeling and Analysis.
IEEE Trans. Parallel Distributed Syst., 2009

Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services.
Proceedings of the Wireless Algorithms, 2009

CAP: A Context-Aware Privacy Protection System for Location-Based Services.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

The Digital Marauder's Map: A New Threat to Location Privacy.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

A new cell counter based attack against tor.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Energy-efficient target detection in sensor networks using line proxies.
Int. J. Commun. Syst., 2008

Peer-to-peer system-based active worm attacks: Modeling, analysis and defense.
Comput. Commun., 2008

On performance bottleneck of anonymous communication networks.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

A New Replay Attack Against Anonymous Communication Networks.
Proceedings of IEEE International Conference on Communications, 2008

A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks.
Proceedings of IEEE International Conference on Communications, 2008

On localization attacks to Internet Threat Monitors: An information-theoretic framework.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
DSSS-Based Flow Marking Technique for Invisible Traceback.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Detecting worms via mining dynamic program execution.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

On TCP Performance in Flow-Based Mix Networks.
Proceedings of the Third IEEE International Symposium on Dependable, 2007

2006
Distributed policy processing in active-service based infrastructures.
Int. J. Commun. Syst., 2006

Effective query aggregation for data services in sensor networks.
Comput. Commun., 2006

Policy-driven physical attacks in sensor networks: modeling and measurement.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

A dynamic geographic hash table for data-centric storage in sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Self-adaptive Worms and Countermeasures.
Proceedings of the Stabilization, 2006

Effective Detection of Active Worms with Varying Scan Rate.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

On Recognizing Virtual Honeypots and Countermeasures.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

On Detecting Camouflaging Worm.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks.
Future Gener. Comput. Syst., 2005

Search-based physical attacks in sensor networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Peer-to-peer system-based active worm attacks: modeling and analysis.
Proceedings of IEEE International Conference on Communications, 2005

On defending peer-to-peer system-based active worm attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

An adaptive zone-based storage architecture for wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Scalable network resource management for large scale Virtual Private Networks.
Simul. Model. Pract. Theory, 2004

Query aggregation for providing efficient data services in sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

P2P-based Infrastructure for Efficient Communication Service in Large Scale IP Networks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

Providing efficient virtual cooperation services for large scale networks.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Analyzing the Performance of Internet Worm Attack Approaches.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

Analyze the Worm-Based Attack in Large Scale P2P.
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004

2003
Peer-to-peer approach for global deployment of voice over IP service.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks.
Proceedings of the IEEE Systems, 2003


  Loading...