Cliff Wang
According to our database1,
Cliff Wang
authored at least 65 papers
between 1994 and 2023.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2016, "For leadership in trusted computing and communication systems".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IEEE Trans. Wirel. Commun., November, 2023
Remedy or Resource Drain: Modeling and Analysis of Massive Task Offloading Processes in Fog.
IEEE Internet Things J., July, 2023
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
2022
Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection.
IEEE Trans. Mob. Comput., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2020
IEEE Trans. Wirel. Commun., 2020
Modeling and Analysis of Conflicting Information Propagation in a Finite Time Horizon.
IEEE/ACM Trans. Netw., 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
SAS: Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019
2018
Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel Hopping Capability.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
IEEE/ACM Trans. Netw., 2017
When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
On the Root Cause of Dropout-Induced Contraction Process in D2D-Based Mobile Social Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
From Isolation Time to Node Resilience: Impact of Cascades in D2D-Based Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
IEEE Trans. Mob. Comput., 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
2015
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23288-1, 2015
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming.
IEEE Trans. Dependable Secur. Comput., 2015
CoRR, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-13629-5, 2014
Proceedings of the Cyber Defense and Situational Awareness, 2014
Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications.
IEEE Trans. Mob. Comput., 2014
How can botnets cause storms? Understanding the evolution and impact of mobile botnets.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2012
Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks.
IEEE Trans. Mob. Comput., 2012
Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2008
ACM Trans. Inf. Syst. Secur., 2008
Int. J. Sens. Networks, 2008
2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
2006
IEEE J. Sel. Areas Commun., 2006
Proceedings of the IEEE International Conference on Sensor Networks, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
RFC, May, 2005
RFC, March, 2005
IEEE Trans. Dependable Secur. Comput., 2005
Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005
1994
Proceedings of the Seventh Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'94), 1994