Zhengyi Le

According to our database1, Zhengyi Le authored at least 28 papers between 2004 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Two-Way Graphic Password for Mobile User Authentication.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2012
On-demand security service.
Proceedings of the 5th International Conference on PErvasive Technologies Related to Assistive Environments, 2012

2011
Dynamic mix zone: location data sanitizing in assisted environments.
Univers. Access Inf. Soc., 2011

Digital cities of the future: Extending @home assistive technologies for the elderly and the disabled.
Telematics Informatics, 2011

EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments.
Secur. Commun. Networks, 2011

2010
Abnormal human behavioral pattern detection in assisted living environments.
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010

Acoustical implicit communication in human-robot interaction.
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010

Modeling reliability for wireless sensor node coverage in assistive testbeds.
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010

2009
An event driven framework for assistive CPS environments.
SIGBED Rev., 2009

Human behavioral detection and data cleaning in assisted living environment using wireless sensor networks.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

Decision making in assistive environments using multimodal observations.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

PEON: privacy-enhanced opportunistic networks with applications in assistive environments.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

Strong mobile device protection from loss and capture.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

SAL: a simulation and analysis tool for assistive living applications.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

Event-based experiments in an assistive environment using wireless sensor networks and voice recognition.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

Dynamic Information Fusion and Evidence Equilibrium.
Proceedings of the 2009 International Conference on Artificial Intelligence, 2009

2008
Source location privacy against laptop-class attacks in sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Providing location privacy in assisted living environments.
Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, 2008

Towards an evaluation framework for assistive environments.
Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, 2008

Mobile device protection from loss and capture.
Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, 2008

2007
PrivaSense: providing privacy protection for sensor networks.
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, 2007

Analysis of range-free anchor-free localization in a wsn under wormhole attack.
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007

Providing Anonymity in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

Preventing Unofficial Information Propagation.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Mobile Anchor-Free Localization for Wireless Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2007

2006
Entrapping Adversaries for Source Protection in Sensor Networks.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

2005
Local data protection for in-network processing in sensor networks.
Proceedings of the International Conference on Pervasive Services 2005, 2005

2004
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model.
Proceedings of the Information Security, 7th International Conference, 2004


  Loading...