Yong Guan

According to our database1, Yong Guan authored at least 180 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Safety-Assured Model-Driven Design of the Multifunction Vehicle Bus Controller.
IEEE Trans. Intelligent Transportation Systems, 2018

From Offline Towards Real-Time Verification for Robot Systems.
IEEE Trans. Industrial Informatics, 2018

Naive Bayes Bearing Fault Diagnosis Based on Enhanced Independence of Data.
Sensors, 2018

Bayesian Test for Detecting False Data Injection in Wireless Relay Networks.
IEEE Communications Letters, 2018

Sensor attack detection using history based pairwise inconsistency.
Future Generation Comp. Syst., 2018

Unsupervised Trajectory Segmentation and Promoting of Multi-Modal Surgical Demonstrations.
CoRR, 2018

EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis.
CoRR, 2018

A Fast Unsupervised Approach for Multi-Modality Surgical Trajectory Segmentation.
IEEE Access, 2018

An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

A Dynamic Taint Analysis Tool for Android App Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Domain Adaptation in Steganalysis for the Spatial Domain.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Forensic Analysis of Android Steganography Apps.
Proceedings of the Advances in Digital Forensics XIV, 2018

Design and Test of an In-Vivo Robotic Camera Integrated with Optimized Illumination System for Single-port Laparoscopic Surgery.
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

The Impact of Exposure Settings in Digital Image Forensics.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Formalization of Symplectic Geometry in HOL-Light.
Proceedings of the Formal Methods and Software Engineering, 2018

Active Probing-Based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking Based Domains.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Runtime Verification of Robots Collision Avoidance Case Study.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Enhanced resilient sensor attack detection using fusion interval and measurement history.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018

EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Delegation of Computation with Verification Outsourcing: Curious Verifiers.
IEEE Trans. Parallel Distrib. Syst., 2017

vFlash: Virtualized Flash for Optimizing the I/O Performance in Mobile Devices.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2017

A Block-Level Log-Block Management Scheme for MLC NAND Flash Memory Storage Systems.
IEEE Trans. Computers, 2017

Fault Diagnosis from Raw Sensor Data Using Deep Neural Networks Considering Temporal Coherence.
Sensors, 2017

Virtual duplication and mapping prefetching for emerging storage primitives in NAND flash memory storage systems.
Microprocessors and Microsystems - Embedded Hardware Design, 2017

A workload-aware flash translation layer enhancing performance and lifespan of TLC/SLC dual-mode flash memory in embedded systems.
Microprocessors and Microsystems - Embedded Hardware Design, 2017

An energy-efficient encryption mechanism for NVM-based main memory in mobile systems.
Journal of Systems Architecture - Embedded Systems Design, 2017

A centroidal Voronoi tessellation based intelligent control algorithm for the self-assembly path planning of swarm robots.
Expert Syst. Appl., 2017

Transfer Learning With Neural Networks for Bearing Fault Diagnosis in Changing Working Conditions.
IEEE Access, 2017

Rolling Element Bearing Fault Diagnosis Using Improved Manifold Learning.
IEEE Access, 2017

Robust Principal Component Analysis via Symmetric Alternating Direction for Moving Object Detection.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Formalization and analysis of jacobian matrix in screw theory and its application in kinematic singularity.
Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2017

A fast search algorithm based on image pyramid for robotic grasping.
Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2017

Formal Modeling and Automatic Code Synthesis for Robot System.
Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems, 2017

The impact of discharge inversion effect on learning SRAM power-up statistics.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Image-Content-Aware I/O Optimization for Mobile Virtualization.
ACM Trans. Embedded Comput. Syst., 2016

Identifying High-Cardinality Hosts from Network-Wide Traffic Measurements.
IEEE Trans. Dependable Sec. Comput., 2016

NVMRA: utilizing NVM to improve the random write operations for NAND-flash-based mobile devices.
Softw., Pract. Exper., 2016

A dynamics based two-stage path model for the docking navigation of a self-assembly modular robot (Sambot).
Robotica, 2016

RT-ROS: A real-time ROS architecture on multi-core processors.
Future Generation Comp. Syst., 2016

Energy-aware assignment and scheduling for hybrid main memory in embedded systems.
Computing, 2016

Chinese Word Similarity Computing Based on Combination Strategy.
Proceedings of the Natural Language Understanding and Intelligent Applications, 2016

A Confidence Weighted Real-Time Depth Filter for 3D Reconstruction.
Proceedings of the Intelligent Information Processing VIII, 2016

Voice Pattern Hiding for VoIP Communications.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Formal Modelling and Analysis of TCP for Nodes Communication with ROS.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Smartphone reconnaissance: Operating system identification.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Crytpo-Based Methods and Fingerprints.
Proceedings of the Digital Fingerprinting, 2016

Operating System Fingerprinting.
Proceedings of the Digital Fingerprinting, 2016

Conclusion.
Proceedings of the Digital Fingerprinting, 2016

Introduction.
Proceedings of the Digital Fingerprinting, 2016

2015
On-Demand Block-Level Address Mapping in Large-Scale NAND Flash Storage Systems.
IEEE Trans. Computers, 2015

Wearable Ego-Motion Tracking for Blind Navigation in Indoor Environments.
IEEE Trans. Automation Science and Engineering, 2015

Online Sensor Fault Detection Based on an Improved Strong Tracking Filter.
Sensors, 2015

HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015

Distinct element counting in distributed dynamic data streams.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Graph-Based Investigation of Bitcoin Transactions.
Proceedings of the Advances in Digital Forensics XI, 2015

ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Virtual Machine Image Content Aware I/O Optimization for Mobile Virtualization.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Formal Modeling and Verification of the Safety Critical Fire-Fighting Control System.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Embedded System Design with Reliability-Centric Optimization.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures.
Proceedings of the 10th ACM Symposium on Information, 2015

Unified non-volatile memory and NAND flash memory architecture in smartphones.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

2014
Loop Transforming for Reducing Data Alignment on Multi-Core SIMD Processors.
Signal Processing Systems, 2014

On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2014

Memory-Aware Task Scheduling with Communication Overhead Minimization for Streaming Applications on Bus-Based Multiprocessor System-on-Chips.
IEEE Trans. Parallel Distrib. Syst., 2014

A Non-Intrusive Method for Monitoring the Degradation of MOSFETs.
Sensors, 2014

Formalization of Function Matrix Theory in HOL.
J. Applied Mathematics, 2014

Query dependent multiview features fusion for effective medical image retrieval.
Proceedings of the Proceedings IEEE International Conference on Security, 2014

Virtual-machine metadata optimization for I/O traffic reduction in mobile virtualization.
Proceedings of the IEEE Non-Volatile Memory Systems and Applications Symposium, 2014

Localization of concurrency bugs using shared memory access pairs.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Formalizing the Matrix Inversion Based on the Adjugate Matrix in HOL4.
Proceedings of the Intelligent Information Processing VII, 2014

RGMP-ROS: A real-time ROS architecture of hybrid RTOS and GPOS on multi-core processor.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Timed automata based motion planning for a self-assembly robot system.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Geometry constrained sparse embedding for multi-dimensional transfer function design in direct volume rendering.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

A framework of model checking guided test vector generation for the 6DOF manipulator.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Formal verification of a collision-free algorithm of dual-arm robot in HOL4.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Delegation of Computation with Verification Outsourcing Using GENI Infrastructure.
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014

Verifiable Computation with Reduced Informational Costs and Computational Costs.
Proceedings of the Computer Security - ESORICS 2014, 2014

Identifying global hot items in distributed dynamic data streams.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distrib. Syst., 2013

Lightweight Location Verification Algorithms for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

Formalization of Linear Space Theory in the Higher-Order Logic Proving System.
J. Applied Mathematics, 2013

Component-Based Formal Modeling of PLC Systems.
J. Applied Mathematics, 2013

The Gauge Integral Theory in HOL4.
J. Applied Mathematics, 2013

The Supercapacitor Degradation State Diagnostic System Based on LabVIEW.
iJOE, 2013

FishEYE: A Forensic Tool for the visualization of change-over-time in Windows VSS.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

Delegation of computation with verification outsourcing: curious verifiers.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2013

BLog: block-level log-block management for NAND flash memorystorage systems.
Proceedings of the SIGPLAN/SIGBED Conference on Languages, 2013

Near-optimal approximate membership query over time-decaying windows.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Cardinality change-based early detection of large-scale cyber-attacks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An introduction to the variable neighborhood and the related adaptive determination algorithm.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

A cross-layer routing protocol (CLRP) for cognitive radio network.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Formal Modelling of PLC Systems by BIP Components.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Model Checking for SpaceWire Link Interface Design Using Uppaal.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

A lightweight argument system with efficient verifier.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Identifying high-cardinality hosts from network-wide traffic measurements.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
A Space Reuse Strategy for Flash Translation Layers in SLC NAND Flash Memory Storage Systems.
IEEE Trans. VLSI Syst., 2012

Spectrum decision for efficient routing in cognitive radio network.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Monitoring Traffic Activity Graphs with low-rank matrix approximation.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

A fast sketch for aggregate queries over high-speed network traffic.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Evidence Collection in Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics VIII, 2012

Accountable Anonymity: A Proxy Re-Encryption Based Anonymous Communication System.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Pecan: A circuit-less P2P design for anonymity.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Approximate membership query over time-decaying windows for event stream processing.
Proceedings of the Sixth ACM International Conference on Distributed Event-Based Systems, 2012

Detecting hidden communities in online auction networks.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
Leakage-Aware Modulo Scheduling for Embedded VLIW Processors.
J. Comput. Sci. Technol., 2011

Design of Panoramic Mosaic Camera Based on FPGA Using Optimal Mosaic Algorithm.
JCP, 2011

Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

Kinship verification from facial images under uncontrolled conditions.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Efficient Spectrum Searching and Monitoring in Cognitive Radio Network.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

MNFTL: an efficient flash translation layer for MLC NAND flash memory storage systems.
Proceedings of the 48th Design Automation Conference, 2011

The Wireless Applied Research on Concatenated Code for SpaceWire Communication Network.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
A dynamic en-route filtering scheme for data reporting in wireless sensor networks.
IEEE/ACM Trans. Netw., 2010

Thousands of Voices for HMM-Based Speech Synthesis-Analysis and Application of TTS Systems Built on Various ASR Corpora.
IEEE Trans. Audio, Speech & Language Processing, 2010

Gather/scatter hardware support for accelerating Fast Fourier Transform.
Journal of Systems Architecture - Embedded Systems Design, 2010

Hyperbolic polynomial uniform B-spline curves and surfaces with shape parameter.
Graphical Models, 2010

Monaural speech separation based on MAXVQ and CASA for robust speech recognition.
Computer Speech & Language, 2010

Scattered Points Denoising of TC-Bezier Surface Fitting.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

Speaker adaptation and the evaluation of speaker similarity in the EMIME speech-to-speech translation project.
Proceedings of the Seventh ISCA Tutorial and Research Workshop on Speech Synthesis, 2010

An unified and automatic approach of Mandarin HTS system.
Proceedings of the Seventh ISCA Tutorial and Research Workshop on Speech Synthesis, 2010

RNFTL: a reuse-aware NAND flash translation layer for flash memory.
Proceedings of the ACM SIGPLAN/SIGBED 2010 conference on Languages, 2010

Lightweight Mutual Authentication and Ownership Transfer for RFID Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Secure online banking on untrusted computers.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

The axial position sensing and signal processing in maglev artificial heart pump.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

Personalising Speech-To-Speech Translation in the EMIME Project.
Proceedings of the ACL 2010, 2010

2009
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis.
IEEE Trans. Parallel Distrib. Syst., 2009

A distributed data streaming algorithm for network-wide traffic anomaly detection.
SIGMETRICS Performance Evaluation Review, 2009

A Statistical Indoor Localization Method for Supporting Location-based Access Control.
MONET, 2009

A Novel Architecture for Secure and Scalable Multicast over IP Network.
Proceedings of the Security and Privacy in Communication Networks, 2009

Research and Design of On-board Dynamic Reconfigurable Router.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Thousands of voices for HMM-based speech synthesis.
Proceedings of the INTERSPEECH 2009, 2009

Trigonometric polynomial uniform B-spline surface with shape parameter.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Detecting Fraud in Internet Auction Systems.
Proceedings of the Advances in Digital Forensics V, 2009

Lightweight Secure Search Protocols for Low-cost RFID Systems.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

An Effective Method for Combating Malicious Scripts Clickbots.
Proceedings of the Computer Security, 2009

Application in Market Basket Research Based on FP-Growth Algorithm.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2008

A statistical indoor localization method for supporting location-based access control.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Research and Design of Digital Synthesizer Based on MATLAB.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

A Two-Stage Algorithm for Multi-Speaker Identification System.
Proceedings of the 6th International Symposium on Chinese Spoken Language Processing, 2008

Sale Decision-Making Model of United Operation between Hydropower and Thermal Power Considering Uncertain Factors.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Pre-Processing of X-Ray Medical Image Based on Improved Temporal Recursive Self-Adaptive Filter.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Vehicle Multi-sensor Information Optimization Based on Federal Fusion Valuation.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Hardware Design and Implementation of Intelligent Teaching Aid Based on FDD Theory.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Frequency Estimation over Sliding Windows.
Proceedings of the 24th International Conference on Data Engineering, 2008

Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Embedded Sensor of Forecast Conveyer Belt Breaks.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

A Novel Course System and Engineering Practice Design for Embed System Education.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
PeerCredential: a reputation-based trust framework for Peer-to-Peer applications.
IJICS, 2007

Variance estimation over sliding windows.
Proceedings of the Twenty-Sixth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2007

Wireless and Sensor Networks Security (WSNS) A Retrospection.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Location Verification Algorithms forWireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

On TCP Performance in Flow-Based Mix Networks.
Proceedings of the Third IEEE International Symposium on Dependable, 2007

2006
A testbed for evaluation and analysis of stepping stone attack attribution techniques.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

TOPO: A Topology-aware Single Packet Attack Traceback Scheme.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Detection of stepping stone attack under delay and chaff perturbations.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Collusion Detection Using Multimedia Fingerprints.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

Monaural Speech Separation Based on Computational Auditory Scene Analysis and Objective Quality Assessment of Speech.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2006

2005
Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs.
Computer Communications, 2005

A robust group-based key management scheme for wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A dynamic en-route scheme for filtering false data injection in wireless sensor networks.
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2005

An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

Customizing a Geographical Routing Protocol for Wireless Sensor Networks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

A key pre-distribution scheme using deployment knowledge for wireless sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

A Spatial-Based Multi-Resolution Data Dissemination Scheme for Wireless Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery.
Proceedings of the Advances in Digital Forensics, 2005

2004
A quantitative analysis of anonymous communications.
IEEE Trans. Reliability, 2004

Customizing GPSR for wireless sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

Improving performance of text-independent speaker identification by utilizing contextual principal curves filtering.
Proceedings of the INTERSPEECH 2004, 2004

An efficient data dissemination method in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Dependable Handling of Uncertainty.
Reliable Computing, 2003

A lightweight authentication protocol for access control in IEEE 802.11.
Proceedings of the Global Telecommunications Conference, 2003

2002
An Optimal Strategy for Anonymous Communication Protocols.
ICDCS, 2002

2001
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2001


  Loading...