Yi Ouyang

Affiliations:
  • University of Texas at Arlington, TX, USA
  • Dartmouth College, NH, USA (former)


According to our database1, Yi Ouyang authored at least 14 papers between 2004 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Dynamic mix zone: location data sanitizing in assisted environments.
Univers. Access Inf. Soc., 2011

2008
Source location privacy against laptop-class attacks in sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Providing location privacy in assisted living environments.
Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, 2008

Mobile device protection from loss and capture.
Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, 2008

2007
PrivaSense: providing privacy protection for sensor networks.
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, 2007

Analysis of range-free anchor-free localization in a wsn under wormhole attack.
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007

Providing Anonymity in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

Preventing Unofficial Information Propagation.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Mobile Anchor-Free Localization for Wireless Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2007

2006
Entrapping Adversaries for Source Protection in Sensor Networks.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Analysis of a low-dimensional linear model under recommendation attacks.
Proceedings of the SIGIR 2006: Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2006

2005
Node clustering based on link delay in P2P networks.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Local data protection for in-network processing in sensor networks.
Proceedings of the International Conference on Pervasive Services 2005, 2005

2004
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model.
Proceedings of the Information Security, 7th International Conference, 2004


  Loading...