Qian Wang
Orcid: 0000-0002-8967-8525Affiliations:
- Wuhan University, School of Cyber Science and Engineering, Hubei, China
- Wuhan University, State Key Laboratory of Software Engineering, School of Computer Science, China
- Illinois Institute of Technology, Department of Electrical and Computer Engineering, Chicago, IL, USA (former)
According to our database1,
Qian Wang
authored at least 271 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Mob. Comput., December, 2024
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns.
IEEE Trans. Mob. Comput., October, 2024
IEEE Trans. Mob. Comput., June, 2024
Multi-Agent Attention Double Actor-Critic Framework for Intelligent Traffic Light Control in Urban Scenarios With Hybrid Traffic.
IEEE Trans. Mob. Comput., January, 2024
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models.
IEEE Trans. Inf. Forensics Secur., 2024
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios.
IEEE Trans. Inf. Forensics Secur., 2024
No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures.
IEEE Trans. Inf. Forensics Secur., 2024
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification.
CoRR, 2024
A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication.
CoRR, 2024
CoRR, 2024
ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving.
CoRR, 2024
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Spectral and Geometric Spaces Representation Regularization for Multi-Modal Sequential Recommendation.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Commun. Mag., December, 2023
IEEE Commun. Mag., December, 2023
ACM Trans. Priv. Secur., November, 2023
Future Gener. Comput. Syst., November, 2023
Sci. China Inf. Sci., November, 2023
IEEE Trans. Circuits Syst. Video Technol., August, 2023
Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions.
IEEE Wirel. Commun., April, 2023
Neural Networks, February, 2023
Towards Privacy-Driven Truthful Incentives for Mobile Crowdsensing Under Untrusted Platform.
IEEE Trans. Mob. Comput., 2023
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
AdvDDoS: Zero-Query Adversarial Attacks Against Commercial Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2023
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
ACM Comput. Surv., 2023
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples.
Proceedings of the ACM Web Conference 2023, 2023
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Netw. Serv. Manag., December, 2022
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams.
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Knowl. Data Eng., 2022
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure.
IEEE Trans. Inf. Forensics Secur., 2022
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation.
IEEE Trans. Dependable Secur. Comput., 2022
Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers.
IEEE Netw., 2022
IACR Cryptol. ePrint Arch., 2022
Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions.
IEEE Commun. Mag., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
IEEE Trans. Parallel Distributed Syst., 2021
IEEE Trans. Parallel Distributed Syst., 2021
IEEE Trans. Parallel Distributed Syst., 2021
IEEE Trans. Mob. Comput., 2021
SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment With Social Networks.
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Knowl. Data Eng., 2021
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection.
IEEE Trans. Dependable Secur. Comput., 2021
Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Proc. IEEE, 2021
Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment.
IEEE J. Sel. Areas Commun., 2021
Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions.
ACM Comput. Surv., 2021
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server.
Proceedings of the Database Systems for Advanced Applications, 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the Federated Learning - Privacy and Incentive, 2020
IEEE Trans. Wirel. Commun., 2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Proc. IEEE, 2020
Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments.
IEEE Netw., 2020
IEEE J. Sel. Areas Commun., 2020
IEEE Commun. Mag., 2020
A scalable ledger-assisted architecture for secure query processing over distributed IoT data.
CCF Trans. Netw., 2020
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
IEEE Wirel. Commun., 2019
Privacy-Preserving Spectrum Auction Design: Challenges, Solutions, and Research Directions.
IEEE Wirel. Commun., 2019
IEEE/ACM Trans. Netw., 2019
ACM Trans. Inf. Syst., 2019
IEEE Trans. Mob. Comput., 2019
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server.
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Image Process., 2019
IEEE Trans. Inf. Forensics Secur., 2019
<i>PROST</i>: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
IEEE Trans. Inf. Forensics Secur., 2019
Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions.
IEEE Netw., 2019
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection.
CoRR, 2019
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019
IEEE Commun. Mag., 2019
IEEE Commun. Mag., 2019
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback.
IEEE Trans. Wirel. Commun., 2018
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Serv. Comput., 2018
IEEE Trans. Parallel Distributed Syst., 2018
IEEE Trans. Mob. Comput., 2018
IEEE Trans. Knowl. Data Eng., 2018
IEEE Trans. Knowl. Data Eng., 2018
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Cybern., 2018
Int. J. Web Serv. Res., 2018
A fast multi-level algorithm for community detection in directed online social networks.
J. Inf. Sci., 2018
Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals.
Comput. Networks, 2018
Sci. China Inf. Sci., 2018
IEEE Access, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Pay On-Demand: Dynamic Incentive and Task Selection for Location-Dependent Mobile Crowdsensing Systems.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Multim., 2017
IEEE Trans. Mob. Comput., 2017
Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications.
IEEE Trans. Inf. Forensics Secur., 2017
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources.
IEEE Trans. Inf. Forensics Secur., 2017
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Netw., 2017
IEEE J. Sel. Areas Commun., 2017
A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications.
J. Parallel Distributed Comput., 2017
Tell me the truth: Practically public authentication for outsourced databases with multi-user modification.
Inf. Sci., 2017
CoRR, 2017
Comput. Networks, 2017
Ad Hoc Networks, 2017
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
Exploiting social influence for context-aware event recommendation in event-based social networks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2016
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs.
IEEE Trans. Veh. Technol., 2016
IEEE Trans. Parallel Distributed Syst., 2016
Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.
IEEE Trans. Image Process., 2016
CoRR, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Messages behind the sound: real-time hidden acoustic signal capture with smartphones.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 2016 IEEE International Conference on Digital Signal Processing, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IEEE Geosci. Remote. Sens. Lett., 2015
Int. J. Sens. Networks, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Wirel. Commun., 2014
ACM Trans. Internet Techn., 2014
Secur. Commun. Networks, 2014
Energy efficient opportunistic cooperative transmission with different ratio combinings: from a new perspective.
Sci. China Inf. Sci., 2014
Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014
2013
IEEE Wirel. Commun., 2013
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations.
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Computers, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
2012
IEEE Trans. Serv. Comput., 2012
IEEE J. Sel. Areas Commun., 2012
Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels.
IEEE J. Sel. Areas Commun., 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
IEEE Wirel. Commun., 2011
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2011
ACM Trans. Sens. Networks, 2011
Mob. Networks Appl., 2011
Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Anti-jamming communication in cognitive radio networks with unknown channel statistics.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009
2008
Proceedings of the Wireless Algorithms, 2008
Proceedings of the 2008 International Conference on Telecommunications, 2008
Proceedings of IEEE International Conference on Communications, 2008
2006
A grouped and proportional-fair subcarrier allocation scheme for multiuser OFDM systems.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
2005
A Low-Complexity Power Allocation Scheme for Distributed Wireless Links in Rayleigh Fading Channels with Capacity Optimization.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005