Xiaole Bai

According to our database1, Xiaole Bai authored at least 42 papers between 2003 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
A mobile phone-based physical-social location proof system for mobile social network service.
Secur. Commun. Networks, 2016

2015
Characterizations of coverings for upper approximation operators being closure operators.
Inf. Sci., 2015

2014
Incentive-Driven and Privacy-Preserving Message Dissemination in Large-Scale Mobile Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Connected Coverage in Wireless Networks with Directional Antennas.
ACM Trans. Sens. Networks, 2014

E-Shadow: Lubricating Social Interaction Using Mobile Phones.
IEEE Trans. Computers, 2014

2013
A study of rough sets based on 1-neighborhood systems.
Inf. Sci., 2013

2012
Pattern mutation in wireless sensor deployment.
IEEE/ACM Trans. Netw., 2012

Topological characterizations of covering for special covering-based upper approximation operators.
Inf. Sci., 2012

A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks.
IEEE Commun. Surv. Tutorials, 2012

MPSL: A Mobile Phone-Based Physical-Social Location Verification System.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

JSGuard: Shellcode Detection in JavaScript.
Proceedings of the Security and Privacy in Communication Networks, 2012

2011
Providing End-to-End Secure Communications in Wireless Sensor Networks.
IEEE Trans. Netw. Serv. Manag., 2011

Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2011

Axiomatization and conditions for neighborhoods in a covering to form a partition.
Inf. Sci., 2011

Directed Coverage in Wireless Sensor Networks: Concept and Quality.
Ad Hoc Sens. Wirel. Networks, 2011

P<sup>3</sup>-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

2010
Optimal Deployment Patterns for Full Coverage and k -Connectivity (k <= 6) Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2010

Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Mobile phone-based pervasive fall detection.
Pers. Ubiquitous Comput., 2010

Constructing low-connectivity and full-coverage three dimensional sensor networks.
IEEE J. Sel. Areas Commun., 2010

Mobile phone based drunk driving detection.
Proceedings of the 4th International Conference on Pervasive Computing Technologies for Healthcare, 2010

PerFallD: A pervasive fall detection system using mobile phones.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Malicious Shellcode Detection with Virtual Memory Snapshots.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Link-layer protection in 802.11i WLANS with dummy authentication.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Low-connectivity and full-coverage three dimensional wireless sensor networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

DiffUser: Differentiated User Access Control on Smartphone.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Directed Coverage in Wireless Sensor Networks: Concept and Quality.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Adaptive Laplacian eigenfunctions as bases for regression analysis.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2007

Mobility Limited Flip-Based Sensor Networks Deployment.
IEEE Trans. Parallel Distributed Syst., 2007

Deploying Wireless Sensor Networks under Limited Mobility Constraints.
IEEE Trans. Mob. Comput., 2007

2006
A dynamic geographic hash table for data-centric storage in sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Deploying wireless sensors to achieve both coverage and connectivity.
Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2006

Network Decoupling for Secure Communications in Wireless Sensor Networks.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

2005
Sensor networks deployment using flip-based sensors.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

A Novel Multi-path Routing Protocol.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
ICN: Interest-Based Clustering Network.
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

2003
A QoS Based Routing Algorithm for Multi-class Optimization in DiffServ Networks.
Proceedings of the High Speed Networks and Multimedia Communications, 2003


  Loading...