Helen Tang
Orcid: 0000-0003-3589-3980
According to our database1,
Helen Tang
authored at least 51 papers
between 2006 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community.
IEEE Open J. Commun. Soc., 2020
2019
A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges.
IEEE Commun. Surv. Tutorials, 2019
IEEE Commun. Surv. Tutorials, 2019
Mitigating Routing Misbehavior using Blockchain-Based Distributed Reputation Management System for IoT Networks.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019
2018
A Deep Reinforcement Learning-based Trust Management Scheme for Software-defined Vehicular Networks.
Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2018
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
2017
Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying.
Wirel. Commun. Mob. Comput., 2017
2016
Compensation of imperfect channel reciprocity through MMSE prediction for physical-layer confidentiality enhancement.
Proceedings of the International Conference on Military Communications and Information Systems, 2016
Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the Ad Hoc Networks - 8th International Conference, 2016
Proceedings of the Ad Hoc Networks - 8th International Conference, 2016
2015
Secur. Commun. Networks, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Secure and efficient routing by Leveraging Situational Awareness Messages in tactical edge networks.
Proceedings of the International Conference on Military Communications and Information Systems, 2015
A trust based framework for both spectrum sensing and data transmission in CR-MANETs.
Proceedings of the IEEE International Conference on Communication, 2015
Privacy-preserving distributed cooperative spectrum sensing in multi-channel cognitive radio MANETs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
Wirel. Commun. Mob. Comput., 2014
A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks.
IEEE Trans. Wirel. Commun., 2014
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning.
IEEE Trans. Veh. Technol., 2014
Trust Establishment Based on Bayesian Networks for Threat Mitigation in Mobile Ad Hoc Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks.
EURASIP J. Wirel. Commun. Netw., 2013
Proceedings of the 32th IEEE Military Communications Conference, 2013
2012
Wirel. Networks, 2012
A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions.
Proc. IEEE, 2012
Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks.
IET Commun., 2012
Joint authentication and quality of service provisioning in cooperative communication networks.
Comput. Commun., 2012
A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications.
Proceedings of the 31st IEEE Military Communications Conference, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
2011
Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks.
IEEE Trans. Wirel. Commun., 2011
Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011
Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios
CoRR, 2011
Robust physical layer authentication using inherent properties of channel impulse response.
Proceedings of the MILCOM 2011, 2011
Proceedings of IEEE International Conference on Communications, 2011
A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2011
2010
Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks.
Wirel. Networks, 2010
A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks.
IEEE Trans. Netw. Serv. Manag., 2010
Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios.
IEEE Netw., 2010
Combined Authentication and Quality of Service in Cooperative Communication Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks.
IEEE Trans. Wirel. Commun., 2009
Enhancing interoperability in heterogeneous mobile wireless networks for disaster response.
IEEE Trans. Wirel. Commun., 2009
Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Secur. Commun. Networks, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008
2007
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007
QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical Infrastructures.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
2006
Proceedings of the IEEE 11th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2006