Wenjing Lou
Orcid: 0000-0002-2421-4623Affiliations:
- Virginia Tech, Falls Church, VA, USA
According to our database1,
Wenjing Lou
authored at least 313 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2023, "For contributions to information and network security".
IEEE Fellow
IEEE Fellow 2015, "For contributions to information and network security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Wirel. Commun., November, 2024
IEEE J. Sel. Areas Commun., November, 2024
IEEE Internet Things J., November, 2024
IEEE Internet Things J., July, 2024
Modeling and Optimization of Channel Allocation for PAL and GAA Users in the CBRS Band.
IEEE Trans. Cogn. Commun. Netw., February, 2024
IEEE J. Sel. Areas Commun., February, 2024
IEEE Trans. Mob. Comput., January, 2024
CoRR, 2024
BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning.
CoRR, 2024
CoRR, 2024
ProFLingo: A Fingerprinting-based Copyright Protection Scheme for Large Language Models.
CoRR, 2024
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Hermes: Boosting the Performance of Machine-Learning-Based Intrusion Detection System through Geometric Feature Learning.
Proceedings of the Twenty-fifth International Symposium on Theory, 2024
Vehigan:Generative Adversarial Networks for Adversarially Robust V2X Misbehavior Detection Systems.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
Pri-Share: Enabling Inter-SAS Privacy Protection via Secure Multi-Party Spectrum Allocation.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2024
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Mob. Comput., December, 2023
IEEE Trans. Cogn. Commun. Netw., August, 2023
IEEE Trans. Mob. Comput., July, 2023
On DoF Conservation in MIMO Interference Cancellation Based on Signal Strength in the Eigenspace.
IEEE Trans. Mob. Comput., May, 2023
Achieving Real-Time Spectrum Sharing in 5G Underlay Coexistence With Channel Uncertainty.
IEEE Trans. Mob. Comput., April, 2023
IEEE Internet Things J., April, 2023
IEEE J. Sel. Areas Commun., March, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy.
IEEE Trans. Dependable Secur. Comput., 2023
CANShield: Deep-Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal Level.
IEEE Internet Things J., 2023
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction.
CoRR, 2023
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Fortifying Your Defenses: Techniques to Thwart Adversarial Attacks and Boost Performance of Machine Learning-Based Intrusion Detection Systems.
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
MINDFL: Mitigating the Impact of Imbalanced and Noisy-labeled Data in Federated Learning with Quality and Fairness-Aware Client Selection.
Proceedings of the IEEE Military Communications Conference, 2023
Proceedings of the IEEE Military Communications Conference, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
IEEE Wirel. Commun., 2022
IEEE Trans. Wirel. Commun., 2022
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Knowl. Data Eng., 2022
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput., 2022
A Dynamic Deep-Learning-Based Virtual Edge Node Placement Scheme for Edge Cloud Systems in Mobile Environment.
IEEE Trans. Cloud Comput., 2022
IEEE J. Sel. Areas Commun., 2022
Hector: A Reinforcement Learning-based Scheduler for Minimizing Casualties of a Military Drone Swarm.
Proceedings of the IEEE Military Communications Conference, 2022
FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning.
Proceedings of the IEEE INFOCOM 2022, 2022
Ao<sup>2</sup>I: Minimizing Age of Outdated Information to Improve Freshness in Data Collection.
Proceedings of the IEEE INFOCOM 2022, 2022
D<sup>2</sup>BF - Data-Driven Beamforming in MU-MIMO with Channel Estimation Uncertainty.
Proceedings of the IEEE INFOCOM 2022, 2022
M<sup>3</sup>: A Sub-Millisecond Scheduler for Multi-Cell MIMO Networks under C-RAN Architecture.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE/ACM Trans. Netw., 2021
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Proceedings of the MobiHoc '21: The Twenty-second International Symposium on Theory, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021
2020
IEEE Trans. Wirel. Commun., 2020
IEEE/ACM Trans. Netw., 2020
IEEE Trans. Netw. Sci. Eng., 2020
IEEE Trans. Cogn. Commun. Netw., 2020
IEEE Netw., 2020
A Deep-Reinforcement-Learning-Based Approach to Dynamic eMBB/URLLC Multiplexing in 5G NR.
IEEE Internet Things J., 2020
IEEE Commun. Surv. Tutorials, 2020
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Turbo-HB: A Novel Design and Implementation to Achieve Ultra-Fast Hybrid Beamforming.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Veh. Technol., 2019
A General Method to Determine Asymptotic Capacity Upper Bounds for Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2019
IEEE Trans. Ind. Informatics, 2019
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT.
IEEE Trans. Inf. Forensics Secur., 2019
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data.
CoRR, 2019
Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution.
CoRR, 2019
Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019
2018
On the integration of SIC and MIMO DoF for interference cancellation in wireless networks.
Wirel. Networks, 2018
IEEE Trans. Veh. Technol., 2018
Cost Minimization for Cooperative Traffic Relaying Between Primary and Secondary Networks.
IEEE Trans. Mob. Comput., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Commun., 2018
A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
A General Model for DoF-based Interference Cancellation in MIMO Networks With Rank-Deficient Channels.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
A Service Strategy Selection in Collaboration Model for the Business Growth of Content Providers.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Proceedings of the Computer Security, 2018
CURT: A Real-Time Scheduling Algorithm for Coexistence of LTE and Wi-Fi in Unlicensed Spectrum.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Serv. Comput., 2017
Beyond Overlay: Reaping Mutual Benefits for Primary and Secondary Networks Through Node-Level Cooperation.
IEEE Trans. Mob. Comput., 2017
Impact of Full Duplex Scheduling on End-to-End Throughput in Multi-Hop Wireless Networks.
IEEE Trans. Mob. Comput., 2017
From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality.
ACM Trans. Intell. Syst. Technol., 2017
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Trans. Commun., 2017
A Distributed Scheduling Algorithm for Underwater Acoustic Networks With Large Propagation Delays.
IEEE Trans. Commun., 2017
IEEE J. Sel. Areas Commun., 2017
A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications.
J. Parallel Distributed Comput., 2017
Tell me the truth: Practically public authentication for outsourced databases with multi-user modification.
Inf. Sci., 2017
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
A Distributed Algorithm to Achieve Transparent Coexistence for a Secondary Multi-Hop MIMO Network.
IEEE Trans. Wirel. Commun., 2016
IEEE Trans. Wirel. Commun., 2016
Cross-Layer Optimization for Multi-Hop Wireless Networks With Successive Interference Cancellation.
IEEE Trans. Wirel. Commun., 2016
Cooperative Interference Mitigation for Heterogeneous Multi-Hop Wireless Networks Coexistence.
IEEE Trans. Wirel. Commun., 2016
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2016
IEEE Trans. Mob. Comput., 2016
IEEE Trans. Mob. Comput., 2016
IEEE Trans. Inf. Forensics Secur., 2016
An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm.
IEEE Trans. Cogn. Commun. Netw., 2016
IEEE Trans. Computers, 2016
IEEE Netw., 2016
Interference alignment for multihop wireless networks: challenges and research directions.
IEEE Netw., 2016
IEEE J. Sel. Areas Commun., 2016
Int. J. Inf. Sec., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Nullification in the air: Interference neutralization in multi-hop wireless networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security.
IEEE Wirel. Commun. Lett., 2015
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Dependable Secur. Comput., 2015
IEEE Trans. Computers, 2015
IEEE J. Sel. Areas Commun., 2015
IEEE J. Sel. Areas Commun., 2015
J. Comput. Secur., 2015
Comput. Networks, 2015
DDoS attack protection in the era of cloud computing and Software-Defined Networking.
Comput. Networks, 2015
Harmonizing SIC and MIMO DoF Interference Cancellation for Efficient Network-Wide Resource Allocation.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Optimal throughput curve for primary and secondary users with node-level cooperation.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2014
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
Future Gener. Comput. Syst., 2014
Shark-IA: An Interference Alignment Algorithm for Multi-hop Underwater Acoustic Networks with Large Propagation Delays.
Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, November 12, 2014
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014
Achieving transparent coexistence in a multi-hop secondary network through distributed computation.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
Proceedings of the Secure Cloud Computing, 2014
2013
IEEE Wirel. Commun., 2013
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks.
IEEE Trans. Wirel. Commun., 2013
Throughput Maximization for Multi-Hop Wireless Networks with Network-Wide Energy Constraint.
IEEE Trans. Wirel. Commun., 2013
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
IEEE Trans. Parallel Distributed Syst., 2013
Secure ad hoc trust initialization and key management in wireless body area networks.
ACM Trans. Sens. Networks, 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Computers, 2013
Beyond interference avoidance: On transparent coexistence for multi-hop secondary CR networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
On traveling path and related problems for a mobile station in a rechargeable sensor network.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Bundling mobile base station and wireless energy transfer: Modeling and optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
SybilShield: An agent-aided social network-based Sybil defense among multiple communities.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
On energy efficiency of geographic opportunistic routing in lossy multihop wireless networks.
Wirel. Networks, 2012
On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication.
IEEE Wirel. Commun. Lett., 2012
IEEE Trans. Wirel. Commun., 2012
IEEE Trans. Serv. Comput., 2012
IEEE Trans. Parallel Distributed Syst., 2012
Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2012
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Cherish every joule: Maximizing throughput with an eye on network-wide energy consumption.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
P<sup>2</sup>: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid.
IEEE Trans. Smart Grid, 2011
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2011
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2011
ACM Trans. Sens. Networks, 2011
CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2011
Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links.
Comput. Networks, 2011
Ad Hoc Networks, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
IEEE Trans. Wirel. Commun., 2010
PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
IEEE Trans. Parallel Distributed Syst., 2010
Comput. Networks, 2010
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply.
Wirel. Networks, 2009
Wirel. Networks, 2009
IEEE Wirel. Commun., 2009
IEEE Trans. Veh. Technol., 2009
IEEE Trans. Veh. Technol., 2009
Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation.
IEEE Trans. Veh. Technol., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Wireless Algorithms, 2009
OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of IEEE International Conference on Communications, 2009
R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009
2008
IEEE Trans. Wirel. Commun., 2008
IEEE Trans. Wirel. Commun., 2008
IEEE Trans. Mob. Comput., 2008
Mob. Networks Appl., 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008
Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008
On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
IEEE Trans. Wirel. Commun., 2007
On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks.
Mob. Networks Appl., 2007
Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability.
Mob. Networks Appl., 2007
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
2006
A robust and energy-efficient data dissemination framework for wireless sensor networks.
Wirel. Networks, 2006
A new approach for random key pre-distribution in large-scale wireless sensor networks.
Wirel. Commun. Mob. Comput., 2006
IEEE Trans. Wirel. Commun., 2006
A novel privacy preserving authentication and access control scheme for pervasive computing environments.
IEEE Trans. Veh. Technol., 2006
H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks.
IEEE Trans. Veh. Technol., 2006
IEEE Trans. Dependable Secur. Comput., 2006
IEEE J. Sel. Areas Commun., 2006
Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
Comput. Networks, 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2005
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005
2004
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
J. Parallel Distributed Comput., 2003
A selection function based distributed algorithm for delay-constraint least-cost unicast routing.
Proceedings of IEEE International Conference on Communications, 2003
Proceedings of the Global Telecommunications Conference, 2003
2002
Predictive Caching Strategy for On-Demand Routing Protocols in Wireless Ad Hoc Networks.
Wirel. Networks, 2002
2001
Int. J. Commun. Syst., 2001