Jing Deng

Orcid: 0000-0002-2508-1420

Affiliations:
  • University of North Carolina at Greensboro, Department of Computer Science, NC, USA
  • Syracuse University, Department of Electrical Engineering and Computer Science, NY, USA (2002 - 2004)
  • Cornell University, School of Electrical and Computer EngineeringIthaca, NY, USA (PhD 2002)


According to our database1, Jing Deng authored at least 108 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Giant Could Be Tiny: Efficient Inference of Giant Models on Resource-Constrained UAVs.
IEEE Internet Things J., June, 2024

2023
Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network.
Comput. Secur., 2023

perMAC: Perturbation-based MAC for Dense Wireless Networks with Periodic Traffic.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

2022
A Cooperative Caching Scheme for VCCN With Mobility Prediction and Consistent Hashing.
IEEE Trans. Intell. Transp. Syst., 2022

The Story of 1/e: ALOHA-based and Reinforcement-Learning-based Random Access for Delay-Constrained Communications.
CoRR, 2022

2021
Clustering-Learning-Based Long-Term Predictive Localization in 5G-Envisioned Internet of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Estimating Sentiment in Social Media - a Case Study of the Migrant Caravans News on Twitter.
Proceedings of the 15th IEEE International Conference on Semantic Computing, 2021

2020
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks.
IEEE Trans. Dependable Secur. Comput., 2020

A Multi-property Method to Evaluate Trust of Edge Computing Based on Data Driven Capsule Network.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Cooperative Game for Multiple Chargers with Dynamic Network Topology.
Proceedings of the ICPP 2020: 49th International Conference on Parallel Processing, 2020

2019
On the Secret Key Capacity of Sibling Hidden Markov Models.
IEEE Trans. Inf. Forensics Secur., 2019

Geography Still Matters: Examine the Role of Location in Online Markets for Foreign Branded Products.
Decis. Sci., 2019

Maximizing Energy Efficiency of Period-Area Coverage with UAVs for Wireless Rechargeable Sensor Networks.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

LSTM-Based Detection for Timing Attacks in Named Data Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
A Cooperative Caching Scheme Based on Mobility Prediction in Vehicular Content Centric Networks.
IEEE Trans. Veh. Technol., 2018

GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture.
IEEE Trans. Veh. Technol., 2018

Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks.
J. Syst. Softw., 2018

MPF: Prolonging Network Lifetime of Wireless Rechargeable Sensor Networks by Mixing Partial Charge and Full Charge.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

mTS: Temporal-and Spatial-Collaborative Charging for Wireless Rechargeable Sensor Networks with Multiple Vehicles.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks.
Proceedings of the 25th International Conference on Telecommunications, 2018

The Propagation of Counteracting Information in Online Social Networks: A Case Study.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

3DCS: A 3-D Dynamic Collaborative Scheduling Scheme for Wireless Rechargeable Sensor Networks with Heterogeneous Chargers.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

On the Asymptotic Performance of Delay-Constrained Slotted ALOHA.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
P<sup>2</sup>S: A Primary and Passer-By Scheduling Algorithm for On-Demand Charging Architecture in Wireless Rechargeable Sensor Networks.
IEEE Trans. Veh. Technol., 2017

Successive synthesis of latent Gaussian trees.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Asymptotic converse bound for secret key capacity in hidden Markov model.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Origin Location Advantages in Online Markets for Foreign Branded Products.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Secure Routing Based on Social Similarity in Opportunistic Networks.
IEEE Trans. Wirel. Commun., 2016

Overhead Control With Reliable Transmission of Popular Packets in Ad-Hoc Social Networks.
IEEE Trans. Veh. Technol., 2016

Secret Common Randomness From Routing Metadata in Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives.
IEEE Trans. Inf. Forensics Secur., 2016

Enhanced Fingerprinting and Trajectory Prediction for IoT Localization in Smart Buildings.
IEEE Trans Autom. Sci. Eng., 2016

A low-cost node capture attack algorithm for wireless sensor networks.
Int. J. Commun. Syst., 2016

Layered Synthesis of Latent Gaussian Trees.
CoRR, 2016

Using Bi-level Penalized Logistic Classifier to Detect Zombie Accounts in Online Social Networks.
Proceedings of the Fifth International Conference on Network, Communication and Computing, 2016

Synthesis of Gaussian trees with correlation sign ambiguity: An information theoretic approach.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
Online Price Dispersion Revisited: How Do Transaction Prices Differ from Listing Prices?
J. Manag. Inf. Syst., 2015

KERMAN: A Key Establishment Algorithm based on Harvesting Randomness in MANETs.
CoRR, 2015

Classifying Unrooted Gaussian Trees under Privacy Constraints.
CoRR, 2015

Protecting source-location privacy based on multirings in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

A-CACHE: An anchor-based public key caching scheme in large wireless networks.
Comput. Networks, 2015

A Trust Routing for Multimedia Social Networks.
Comput. J., 2015

Evaluation of security robustness against information leakage in Gaussian polytree graphical models.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

ROBE - Knitting a Tight Hub for Shortest Path Discovery in Large Social Graphs.
Proceedings of the ICEIS 2015, 2015

VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

DWDP: A Double Warning Thresholds with Double Preemptive Scheduling Scheme for Wireless Rechargeable Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Efficient Link Cuts in Online Social Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Revisiting optimal power control: Dual effects of SNR and contention.
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014

Fast authentication in multi-hop infrastructure-based mobile communication.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Robust Decoding for Convolutionally Coded Systems Impaired by Memoryless Impulsive Noise.
IEEE Trans. Commun., 2013

Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth the Pain?
IEEE J. Sel. Areas Commun., 2013

Cooperative secret delivery in wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2013

Revisiting Optimal Power Control: its Dual Effect on SNR and Contention.
CoRR, 2013

Graph Calculus: Scalable Shortest Path Analytics for Large Social Graphs through Core Net.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Biometrics-based Data Link Layer Anonymous Authentication in VANETs.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
An Online Relay Selection Scheme in Power Controllable Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Is diversity gain worth the pain: A delay comparison between opportunistic multi-channel MAC and single-channel MAC.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Stealthy pre-attacks against random key pre-distribution security.
Proceedings of IEEE International Conference on Communications, 2012

2011
Guest Editorial.
J. Commun., 2011

Parallel Importation: An Empirical Investigation of Online Unauthorized Distribution Channels for Luxury Fashion Goods.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2011

Efficient decoding over power-line channels.
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011

2010
Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks.
Comput. Commun., 2010

Detection of Fabricated CTS Packet Attacks in Wireless LANs.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

Fault Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

A Distributed Public Key Caching Scheme in Large Wireless Networks.
Proceedings of the Global Communications Conference, 2010

2009
Can multiple subchannels improve the delay performance of RTS/CTS-based MAC schemes?
IEEE Trans. Wirel. Commun., 2009

Multihop/Direct Forwarding (MDF) for static wireless sensor networks.
ACM Trans. Sens. Networks, 2009

Energy Efficient DNA-Based Scheduling Scheme for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

Fairness Index Based on Variational Distance.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Broadcast Scheduling in Interference Environment.
IEEE Trans. Mob. Comput., 2008

Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission.
IEEE Trans. Dependable Secur. Comput., 2008

On search sets of expanding ring search in wireless networks.
Ad Hoc Networks, 2008

Key Establishment in Multi-core Parallel Systems.
Proceedings of the MSN 2008, 2008

Jamming ACK Attack to Wireless Networks and a Mitigation Approach.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Failure Rate Minimization with Multiple Function Unit Scheduling for Heterogeneous WSNs.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Selection of a Forwarding Area for Contention-Based Geographic Forwarding in Wireless Multi-Hop Networks.
IEEE Trans. Veh. Technol., 2007

An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs.
IEEE Trans. Mob. Comput., 2007

Optimal Transmission Range for Wireless Ad Hoc Networks Based on Energy Efficiency.
IEEE Trans. Commun., 2007

A fault tolerant and energy efficient routing protocol for urban sensor networks.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

2006
Analyzing multi-channel medium access control schemes with ALOHA reservation.
IEEE Trans. Wirel. Commun., 2006

Analyzing split channel medium access control schemes.
IEEE Trans. Wirel. Commun., 2006

A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge.
IEEE Trans. Dependable Secur. Comput., 2006

Medium Access Control protocols for ad hoc wireless networks: A survey.
Ad Hoc Networks, 2006

Methods for restoring MAC layer fairness in IEEE 802.11 networks with physical layer capture.
Proceedings of the 2nd International Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality, 2006

The Head-of-Line Blocking Problem on Exposed Terminals in MANETs.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
A pairwise key predistribution scheme for wireless sensor networks.
ACM Trans. Inf. Syst. Secur., 2005

Scheduling Sleeping Nodes in High Density Cluster-based Sensor Networks.
Mob. Networks Appl., 2005

Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks.
Comput. Commun., 2005

A state-free data delivery protocol for multihop wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

TWOACK: preventing selfishness in mobile ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

On the forwarding area of contention-based geographic forwarding for ad hoc and sensor networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005

ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Using MDS Codes for the Key Establishment of Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

GB: distributed reachability-tunable broadcast algorithms for wireless sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

2004
Optimum transmission range for wireless ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Tuning the carrier sensing range of IEEE 802.11 MAC.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
On optimizing the backoff interval for random access schemes.
IEEE Trans. Commun., 2003

A witness-based approach for data fusion assurance in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2003

A pairwise key pre-distribution scheme for wireless sensor networks.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Analyzing Split Channel Medium Access Control Schemas with ALOHA Reservation.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, 2003

2002
Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks.
IEEE Trans. Commun., 2002

Elective participation in ad hoc networks based on energy consumption.
Proceedings of the Global Telecommunications Conference, 2002

1999
Dual busy tone multiple access (DBTMA)-performance results.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999


  Loading...