Xiuzhen Cheng

According to our database1, Xiuzhen Cheng authored at least 271 papers between 2000 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to localization and detection in sensor networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming.
IEEE Trans. Wireless Communications, 2019

Anonymization in Online Social Networks Based on Enhanced Equi-Cardinal Clustering.
IEEE Trans. Comput. Social Systems, 2019

Edge Computing Security: State of the Art and Challenges.
Proceedings of the IEEE, 2019

I Can See Your Brain: Investigating Home-Use Electroencephalography System Security.
IEEE Internet of Things Journal, 2019

NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce.
IEEE Internet of Things Journal, 2019

A Novel Secure and Efficient Data Aggregation Scheme for IoT.
IEEE Internet of Things Journal, 2019

Identification of Vulnerable Lines in Smart Grid Systems Based on Affinity Propagation Clustering.
IEEE Internet of Things Journal, 2019

Information, knowledge, and semantics for interacting with Internet-of-Things.
Computer Networks, 2019

Crowdsourcee evaluation based on persuasion game.
Computer Networks, 2019

A model for integrating heterogeneous sensory data in IoT systems.
Computer Networks, 2019

User Identity De-anonymization Based on Attributes.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

A game theoretic analysis on block withholding attacks using the zero-determinant strategy.
Proceedings of the International Symposium on Quality of Service, 2019

Distributed Dominating Set and Connected Dominating Set Construction Under the Dynamic SINR Model.
Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium, 2019

2018
Jamming Strategies for Physical Layer Security.
IEEE Wireless Commun., 2018

N-in-One: A Novel Location-Based Service.
IEEE Trans. Vehicular Technology, 2018

Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services.
IEEE Trans. Vehicular Technology, 2018

SecureGuard: A Certificate Validation System in Public Key Infrastructure.
IEEE Trans. Vehicular Technology, 2018

Stable Local Broadcast in Multihop Wireless Networks Under SINR.
IEEE/ACM Trans. Netw., 2018

A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds.
IEEE Trans. Big Data, 2018

SSDNet: Small-World Super-Dense Device-to-Device Wireless Networks.
IEEE Network, 2018

A survey on key fields of context awareness for mobile devices.
J. Network and Computer Applications, 2018

A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications.
IEEE Access, 2018

An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Sampling Based \delta δ -Approximate Data Aggregation in Sensor Equipped IoT Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

PRIDE: A Private and Decentralized Usage-Based Insurance Using Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Fully Dynamic Broadcasting under SINR.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

De-anonymizing Scale-Free Social Networks by Using Spectrum Partitioning Method.
Proceedings of the 2018 International Conference on Identification, 2018

Efficient Connected Dominating Set Construction with Maximum Lifetime in the Cognitive Radio Networks.
Proceedings of the 2018 International Conference on Identification, 2018

Lightweight Hardware Based Secure Authentication Scheme for Fog Computing.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

2017
A coalition formation game based relay selection scheme for cooperative cognitive radio networks.
Wireless Networks, 2017

Coverage Contribution Area Based k-Coverage for Wireless Sensor Networks.
IEEE Trans. Vehicular Technology, 2017

Shortest Link Scheduling Algorithms in Wireless Networks Under the SINR Model.
IEEE Trans. Vehicular Technology, 2017

Game Theoretic Analysis of Green Spectrum and Infrastructure Leasing on TV Bands.
IEEE Trans. Vehicular Technology, 2017

Enhancing GPS With Lane-Level Navigation to Facilitate Highway Driving.
IEEE Trans. Vehicular Technology, 2017

Utility-Based Cooperative Spectrum Sensing Scheduling in Cognitive Radio Networks.
IEEE Trans. Vehicular Technology, 2017

Fundamental Analysis on Data Dissemination in Mobile Opportunistic Networks With Lévy Mobility.
IEEE Trans. Vehicular Technology, 2017

Localized Algorithms for Yao Graph-Based Spanner Construction in Wireless Networks Under SINR.
IEEE/ACM Trans. Netw., 2017

Distributed Spanner Construction With Physical Interference: Constant Stretch and Linear Sparseness.
IEEE/ACM Trans. Netw., 2017

Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing.
IEEE Trans. Industrial Informatics, 2017

Social Welfare Control in Mobile Crowdsensing Using Zero-Determinant Strategy.
Sensors, 2017

QuickCash: Secure Transfer Payment Systems.
Sensors, 2017

Customized privacy preserving for inherent data and latent data.
Personal and Ubiquitous Computing, 2017

SINR based shortest link scheduling with oblivious power control in wireless networks.
J. Network and Computer Applications, 2017

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes.
IEEE Internet of Things Journal, 2017

Ultraviolet Radiation Measurement via Smart Devices.
IEEE Internet of Things Journal, 2017

IoT Applications on Secure Smart Shopping System.
IEEE Internet of Things Journal, 2017

Guest Editorial Special Issue on Fog Computing in the Internet of Things.
IEEE Internet of Things Journal, 2017

An Android-Based Mechanism for Energy Efficient Localization Depending on Indoor/Outdoor Context.
IEEE Internet of Things Journal, 2017

Fog Computing for the Internet of Things: Security and Privacy Issues.
IEEE Internet Computing, 2017

Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks.
IET Communications, 2017

Perturbation-Based Private Profile Matching in Social Networks.
IEEE Access, 2017

An Attribute-Based Encryption Scheme to Secure Fog Communications.
IEEE Access, 2017

A Secure and Practical Authentication Scheme Using Personal Devices.
IEEE Access, 2017

Theoretical Analysis of Secrecy Transmission Capacity in Wireless Ad Hoc Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A Bitcoin Based Incentive Mechanism for Distributed P2P Applications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Personal Information Inference in Social Networks.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Poster: Perturbation Based Private Profile Matching in Social Networks.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Quantum Game Analysis of Privacy-Leakage for Application Ecosystems.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

Mechanism design games for thwarting malicious behavior in crowdsourcing applications.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

A secure and verifiable outsourcing scheme for matrix inverse computation.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

SA Framework based De-anonymization of Social Networks.
Proceedings of the 2017 International Conference on Identification, 2017

Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

An Attribute & Network Coding-Based Secure Multicast Protocol for Firmware Updates in Smart Grid AMI Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Inference attacks based on neural networks in social networks.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

2016
Big data routing in D2D communications with cognitive radio capability.
IEEE Wireless Commun., 2016

An Efficient Scheme for Tag Information Update in RFID Systems on Roads.
IEEE Trans. Vehicular Technology, 2016

An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets.
IEEE Trans. Cogn. Comm. & Networking, 2016

On Connected Target k-Coverage in Heterogeneous Wireless Sensor Networks.
Sensors, 2016

Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility.
Sensors, 2016

Secure multi-unit sealed first-price auction mechanisms.
Security and Communication Networks, 2016

Cyber security, crime, and forensics of wireless networks and applications.
Security and Communication Networks, 2016

Connected dominating set construction in cognitive radio networks.
Personal and Ubiquitous Computing, 2016

New advances in data, information, and knowledge in the Internet of Things.
Personal and Ubiquitous Computing, 2016

A novel contention-on-demand design for WiFi hotspots.
Personal and Ubiquitous Computing, 2016

Security in wearable communications.
IEEE Network, 2016

Three connected dominating set algorithms for wireless sensor networks.
IJSNet, 2016

Editorial for special issue on Big Data and knowledge extraction for Cyber-Physical Systems 2016.
IJDSN, 2016

An enhanced low overhead and stable clustering scheme for crossroads in VANETs.
EURASIP J. Wireless Comm. and Networking, 2016

Analysis and optimization of delayed channel access for wireless cyber-physical systems.
EURASIP J. Wireless Comm. and Networking, 2016

ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

An Enhanced Structure-Based De-anonymization of Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Solving the crowdsourcing dilemma using the zero-determinant strategy: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Distributed deterministic broadcasting algorithms under the SINR model.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Detecting driver phone calls in a moving vehicle based on voice features.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Differentially Private k-Anonymity: Achieving Query Privacy in Location-Based Services.
Proceedings of the International Conference on Identification, 2016

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes.
Proceedings of the International Conference on Identification, 2016

SINR-Q-CSMA: Carrier Sense Multiple Access Based on Queue Length under SINR.
Proceedings of the International Conference on Identification, 2016

IoT Applications on Secure Smart Shopping.
Proceedings of the International Conference on Identification, 2016

A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization.
Proceedings of the International Conference on Identification, 2016

Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Cooperative Relay Selection in Cognitive Radio Networks.
IEEE Trans. Vehicular Technology, 2015

Cooperative Coverage Extension for Relay-Union Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

A Time Fairness-Based MAC Algorithm for Throughput Maximization in 802.11 Networks.
IEEE Trans. Computers, 2015

Theme issue on advances in the Internet of Things: identification, information, and knowledge.
Personal and Ubiquitous Computing, 2015

Secure friend discovery based on encounter history in mobile social networks.
Personal and Ubiquitous Computing, 2015

A novel verification method for payment card systems.
Personal and Ubiquitous Computing, 2015

Analyzing the potential of mobile opportunistic networks for big data applications.
IEEE Network, 2015

Big Data and Knowledge Extraction for Cyber-Physical Systems.
IJDSN, 2015

Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks.
EURASIP J. Wireless Comm. and Networking, 2015

Online auction-based relay selection for cooperative communication in CR networks.
EURASIP J. Wireless Comm. and Networking, 2015

Achievable transmission capacity of cognitive radio networks with cooperative relaying.
EURASIP J. Wireless Comm. and Networking, 2015

Enabling smartphone-based HD video chats by cooperative transmissions in CRNs.
EURASIP J. Wireless Comm. and Networking, 2015

Security and privacy in localization for underwater sensor networks.
IEEE Communications Magazine, 2015

Simultaneous energy and information cooperation in MIMO cooperative cognitive radio systems.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Cooperative Spectrum and Infrastructure Leasing on TV Bands.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Secure Multi-unit Sealed First-Price Auction Mechanism.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Bidder-Oriented Privacy-Preserving VCG Auction Scheme.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Impact of a Deterministic Delay in the DCA Protocol.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications.
Proceedings of the Security and Privacy in Communication Networks, 2015

Distributed Algorithms for Maximum Clique in Wireless Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Secure Auctions without an Auctioneer via Verifiable Secret Sharing.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015

Controlling the Spreads of Infectious Disease and Scare via Utilizing Location and Social Networking Information.
Proceedings of the 2015 Workshop on Mobile Big Data, 2015

Minimum connected dominating set construction in wireless networks under the beeping model.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

X.509 Check: A Tool to Check the Safety and Security of Digital Certificates.
Proceedings of the International Conference on Identification, 2015

A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Efficient Customized Privacy Preserving Friend Discovery in Mobile Social Networks.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Ads dissemination in Vehicular Ad Hoc Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Low Price to Win: Interactive scheme in cooperative cognitive radio networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Fog Computing Based Ultraviolet Radiation Measurement via Smartphones.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015

2014
Coverage adjustment for load balancing with an AP service availability guarantee in WLANs.
Wireless Networks, 2014

Analyzing Cognitive Network Access Efficiency Under Limited Spectrum Handoff Agility.
IEEE Trans. Vehicular Technology, 2014

Optimal Spectrum Sensing Interval in Cognitive Radio Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Mobility-Assisted Routing in Intermittently Connected Mobile Cognitive Radio Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

AP Association for Proportional Fairness in Multirate WLANs.
IEEE/ACM Trans. Netw., 2014

Opportunistic Sensing in Wireless Sensor Networks: Theory and Application.
IEEE Trans. Computers, 2014

Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks.
Mobile Computing and Communications Review, 2014

Theme issue on identification, information, and knowledge in the Internet of Things.
Personal and Ubiquitous Computing, 2014

Advances on data, information, and knowledge in the internet of things.
Personal and Ubiquitous Computing, 2014

Virtual track: applications and challenges of the RFID system on roads.
IEEE Network, 2014

Cooperative Spectrum Prediction in Multi-PU Multi-SU Cognitive Radio Networks.
MONET, 2014

Editorial for Crowncom 2013 Special Issue.
MONET, 2014

Routing in user-centric networks.
IEEE Communications Magazine, 2014

Emerging WiFi Direct technique in home area networks for Smart Grid: Power consumption and outage performance.
Ad Hoc Networks, 2014

Editorial for the special issue on routing in smart grid communication networks.
Ad Hoc Networks, 2014

Online Auction Based Relay Selection for Cooperative Communications in CR Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

A Transparent Correlation-Based Scheme for Energy Efficient Context Sensing and Fusion under Android Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Towards More Secure Cardholder Verification in Payment Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

QueueSense: Collaborative recognition of queuing on mobile phones.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

An extensible and flexible truthful auction framework for heterogeneous spectrum markets.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Achieving privacy preservation in WiFi fingerprint-based localization.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Secure Friend Discovery Based on Encounter History in Mobile Social Networks.
Proceedings of the International Conference on Identification, 2014

The Tempo-Spatial Information Dissemination Properties of Mobile Opportunistic Networks with Levy Mobility.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

An optimal privacy-preserving mechanism for crowdsourced traffic monitoring.
Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, 2014

Multi-channel selection maximizing throughput for delay-constrained multi-application secondary users in dynamic cognitive radio networks.
Proceedings of the 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2014

2013
Spectrum prediction in cognitive radio networks.
IEEE Wireless Commun., 2013

Improving Macrocell Downlink Throughput in Rayleigh Fading Channel Environment Through Femtocell User Cooperation.
IEEE Trans. Wireless Communications, 2013

Robust Compressive Data Gathering in Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2013

Dynamic Scheduling for Wireless Data Center Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

Time-Bounded Essential Localization for Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2013

Opportunistic Routing in Intermittently Connected Mobile P2P Networks.
IEEE Journal on Selected Areas in Communications, 2013

Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme.
IEEE Journal on Selected Areas in Communications, 2013

Spectrum Assignment and Sharing for Delay Minimization in Multi-Hop Multi-Flow CRNs.
IEEE Journal on Selected Areas in Communications, 2013

Connected dominating set algorithms for wireless sensor networks.
IJSNet, 2013

Compressive sensing in distributed radar sensor networks using pulse compression waveforms.
EURASIP J. Wireless Comm. and Networking, 2013

Social Communications Assisted Epidemic Disease Influence Minimization.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Distributed Algorithm for Connected Dominating Set Construction in Sensor Networks.
Proceedings of the IEEE International Conference on Systems, 2013

Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model.
Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, 2013

Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks.
Proceedings of the 1st ACM workshop on Cognitive radio architectures for broadband, 2013

Channel quality prediction based on Bayesian inference in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Utility-based cooperative spectrum sensing scheduling in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Cooperative multi-hop relaying via network formation games in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Cooperative relay selection in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A multi-unit truthful double auction framework for secondary market.
Proceedings of IEEE International Conference on Communications, 2013

2012
Routing in pocket switched networks.
IEEE Wireless Commun., 2012

Dynamic spectrum access: from cognitive radio to network radio.
IEEE Wireless Commun., 2012

On the Design and Deployment of RFID Assisted Navigation Systems for VANETs.
IEEE Trans. Parallel Distrib. Syst., 2012

Verifiable multi-secret sharing based on LFSR sequences.
Theor. Comput. Sci., 2012

No Silver Bullet: Identifying Security Vulnerabilities in Anonymization Protocols for Hospital Databases.
IJHISI, 2012

HERO - A Home Based Routing in Pocket Switched Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Routing for Information Leakage Reduction in Multi-channel Multi-hop Ad-Hoc Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

EM-MAC: An energy-aware multi-channel MAC protocol for multi-hop wireless networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A statistical approach for target counting in sensor-based surveillance systems.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Maximizing throughput when achieving time fairness in multi-rate wireless LANs.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Achievable transmission capacity of cognitive mesh networks with different media access control.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Delay modeling in mobile cognitive radio networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Sparsity and compressive sensing of sense-through-foliage radar signals.
Proceedings of IEEE International Conference on Communications, 2012

Ampliude based compressive sensing for UWB noise radar signal.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Achievable transmission capacity of cognitive radio networks with cooperative relaying.
Proceedings of the 7th International Conference on Cognitive Radio Oriented Wireless Networks, 2012

2011
Wireless data center networking.
IEEE Wireless Commun., 2011

Achieving Proportional Fairness via AP Power Control in Multi-Rate WLANs.
IEEE Trans. Wireless Communications, 2011

Timer-Based CDS Construction in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2011

Guest Editorial.
JCM, 2011

A Model-Based Approach for Outlier Detection in Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2011

Enhancing Macrocell Downlink Performance through Femtocell User Cooperation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Load Balancing Access Point Association Schemes for IEEE 802.11 Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Sparse target counting and localization in sensor networks based on compressive sensing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Channel allocation in wireless data center networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Multi-hop access pricing in public area WLANs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Partially overlapping channel assignment based on "node orthogonality" for 802.11 wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Wireless link scheduling for data center networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

A Monte Carlo Method for Mobile Target Counting.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Opportunistic Sensing in Wireless Sensor Networks: Theory and Application.
Proceedings of the Global Communications Conference, 2011

2010
Location-centric storage and query in wireless sensor networks.
Wireless Networks, 2010

Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach.
EURASIP J. Wireless Comm. and Networking, 2010

Radar and Sonar Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2010

Introduction to the Special Section on Mobile Ad Hoc and Sensor Networks.
Computer Communications, 2010

Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs.
Proceedings of the Wireless Algorithms, 2010

From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
A novel rate adaptation scheme for 802.11 networks.
IEEE Trans. Wireless Communications, 2009

3D Underwater Sensor Network Localization.
IEEE Trans. Mob. Comput., 2009

A surveillance robot with hopping capabilities for home security.
IEEE Trans. Consumer Electronics, 2009

Location discovery for sensor networks with short range beacons.
IJAHUC, 2009

In Situ Key Establishment in Large-Scale Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2009

Underwater acoustic sensor networks: Target size detection and performance analysis.
Ad Hoc Networks, 2009

Topology Inference in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, 2009

Fault tolerant target tracking in sensor networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

Robust Event Boundary Detection in Sensor Networks - A Mixture Model Based Approach.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

The Complexity of Channel Scheduling in Multi-Radio Multi-Channel Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Time-Synchronization Free Localization in Large Scale Underwater Acoustic Sensor Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

2008
Connected Dominating Set.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

A power controlled interference aware routing protocol for dense multi-hop wireless networks.
Wireless Networks, 2008

Relay sensor placement in wireless sensor networks.
Wireless Networks, 2008

LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2008

Silent Positioning in Underwater Acoustic Sensor Networks.
IEEE Trans. Vehicular Technology, 2008

Fault-Tolerant Topology Control for All-to-One and One-to-All Communication in Wireles Networks.
IEEE Trans. Mob. Comput., 2008

SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks.
IEEE Trans. Mob. Comput., 2008

Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Underwater Localization in Sparse 3D Acoustic Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

A Clustering Approach in Developing Prognostic Systems of Cancer Patients.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

Real-Time Detection of Clone Attacks in Wireless Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

UWB Radar Sensor Networks for Sense-Through-Foliage Target Detection.
Proceedings of IEEE International Conference on Communications, 2008

Underwater Acoustic Sensor Networks: Target Size Detection and Performance Analysis.
Proceedings of IEEE International Conference on Communications, 2008

2007
iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2007

Localized Outlying and Boundary Data Detection in Sensor Networks.
IEEE Trans. Knowl. Data Eng., 2007

Location-centric storage for safety warning based on roadway sensor networks.
J. Parallel Distrib. Comput., 2007

Fault-Tolerant Target Localization in Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2007

Algorithmic Aspects of Wireless Networks.
EURASIP J. Wireless Comm. and Networking, 2007

Localized Flooding Backbone Construction for Location Privacy in Sensor Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

RAP: protecting commodity wi-fi networks from rogue access points.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

Insider Attacker Detection in Wireless Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Passive Listening and Intrusion Management in Commodity Wi-Fi Networks.
Proceedings of the Global Communications Conference, 2007

2006
Virtual backbone construction in multihop ad hoc wireless networks.
Wireless Communications and Mobile Computing, 2006

SeGrid: A Secure Grid Framework for Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2006

A Self-Configured Key Establishment Scheme for Large-Scale Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Location-aware key establishment in wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

On the Performance of In-Situ Key Establishment Schemes for Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
A Performance Evaluation of a Novel Energy-Aware Data-Centric Routing Algorithm in Wireless Sensor Networks.
Wireless Networks, 2005

iTPS: an improved location discovery scheme for sensor networks with long-range beacons.
J. Parallel Distrib. Comput., 2005

Safety warning based on highway sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Fault-tolerant target detection in sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

DIAR: A Dynamic Interference Aware Routing Protocol for IEEE 802.11-Based Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

SeGrid: A Secure Grid Infrastructure for Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Location-centric storage for sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Localized fault-tolerant event boundary detection in sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

TPSS: A Time-Based Positioning Scheme for Sensor Networks with Short Range Beacons.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
TPS: A Time-Based Positioning Scheme for Outdoor Wireless Sensor Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

2003
Strong Minimum Energy Topology in Wireless Sensor Networks: NP-Completeness and Heuristics.
IEEE Trans. Mob. Comput., 2003

A polynomial-time approximation scheme for the minimum-connected dominating set in ad hoc wireless networks.
Networks, 2003

Energy-aware data-centric routing in microsensor networks.
Proceedings of the 6th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2003

Statistical Comparisons of Multiple Classifiers.
Proceedings of the International Conference on Machine Learning; Models, Technologies and Applications. MLMTA'03, June 23, 2003

Latent Structure Models for the Analysis of Gene Expression Data.
Proceedings of the 2nd IEEE Computer Society Bioinformatics Conference, 2003

Gene Selection for Multi-Class Prediction of Microarray Data.
Proceedings of the 2nd IEEE Computer Society Bioinformatics Conference, 2003

2002
Connected Domination in Multihop Ad Hoc Wireless Networks.
Proceedings of the 6th Joint Conference on Information Science, 2002

2001
An asymptotic analysis of some expert fusion methods.
Pattern Recognition Letters, 2001

Polynomial Time Approximation Scheme for Symmetric Rectilinear Steiner Arborescence Problem.
J. Global Optimization, 2001

A Polynomial Time Approximation Scheme for the Problem of Interconnecting Highways.
J. Comb. Optim., 2001

2000
A Simple Implementation of the Stochastic Discrimination for Pattern Recognition.
Proceedings of the Advances in Pattern Recognition, Joint IAPR International Workshops SSPR 2000 and SPR 2000, [8th International Workshop on Structural and Syntactic Pattern Recognition, 3rd International Workshop on Statistical Techniques in Pattern Recognition], Alicante, Spain, August 30, 2000


  Loading...