Xiuzhen Cheng

Orcid: 0000-0001-5912-4647

Affiliations:
  • Shandong University, School of Computer Science and Technology, Qingdao, China
  • George Washington University, Washington, D.C., USA (former)


According to our database1, Xiuzhen Cheng authored at least 465 papers between 2000 and 2025.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to localization and detection in sensor networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Distributed Age-of-Information Scheduling With NOMA via Deep Reinforcement Learning.
IEEE Trans. Mob. Comput., January, 2025

Ambient Light Reflection-Based Eavesdropping Enhanced With cGAN.
IEEE Trans. Mob. Comput., January, 2025

Romeo: Fault Detection of Rotating Machinery via Fine-Grained mmWave Velocity Signature.
IEEE Trans. Mob. Comput., January, 2025

t-READi: Transformer-Powered Robust and Efficient Multimodal Inference for Autonomous Driving.
IEEE Trans. Mob. Comput., January, 2025

2024
Private Over-the-Air Federated Learning at Band-Limited Edge.
IEEE Trans. Mob. Comput., December, 2024

Seeing the Invisible: Recovering Surveillance Video With COTS mmWave Radar.
IEEE Trans. Mob. Comput., December, 2024

Computation Offloading and Quantization Schemes for Federated Satellite-Ground Graph Networks.
IEEE Trans. Wirel. Commun., October, 2024

Jump Out of Resonance: A Practical NFC Tag Fingerprinting Scheme.
IEEE Trans. Mob. Comput., September, 2024

Exploring Blockchain Technology through a Modular Lens: A Survey.
ACM Comput. Surv., September, 2024

Efficient Betweenness Centrality Computation over Large Heterogeneous Information Networks.
Proc. VLDB Endow., July, 2024

Reordering and Compression for Hypergraph Processing.
IEEE Trans. Computers, June, 2024

TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things.
IEEE Trans. Mob. Comput., May, 2024

A Fault-Tolerant Communication Algorithm for Age-of-Information Optimization in DITENs.
IEEE Trans. Commun., May, 2024

BFT-DSN: A Byzantine Fault-Tolerant Decentralized Storage Network.
IEEE Trans. Computers, May, 2024

Value of Information: A Comprehensive Metric for Client Selection in Federated Edge Learning.
IEEE Trans. Computers, April, 2024

MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors.
IEEE Trans. Computers, April, 2024

Distributed Learning for Large-Scale Models at Edge With Privacy Protection.
IEEE Trans. Computers, April, 2024

FedRFQ: Prototype-Based Federated Learning With Reduced Redundancy, Minimal Failure, and Enhanced Quality.
IEEE Trans. Computers, April, 2024

An Adaptive and Modular Blockchain Enabled Architecture for a Decentralized Metaverse.
IEEE J. Sel. Areas Commun., April, 2024

Sampling hypergraphs via joint unbiased random walk.
World Wide Web (WWW), March, 2024

Meta Computing.
IEEE Netw., March, 2024

Digital Twin-Assisted Federated Learning Service Provisioning Over Mobile Edge Networks.
IEEE Trans. Computers, February, 2024

Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN.
IEEE Trans. Mob. Comput., January, 2024

Communication Efficient and Provable Federated Unlearning.
Proc. VLDB Endow., January, 2024

CWDC: Optimal Approaches to Connect Weak Devices in Distributed Clouding.
IEEE Netw., January, 2024

PDSR: A Privacy-Preserving Diversified Service Recommendation Method on Distributed Data.
IEEE Trans. Serv. Comput., 2024

Proof of User Similarity: The Spatial Measurer of Blockchain.
IEEE Trans. Serv. Comput., 2024

Game-Theoretic Incentive Mechanism for Collaborative Quality Control in Blockchain-Enhanced Carbon Emissions Verification.
IEEE Trans. Netw. Sci. Eng., 2024

AD-MPC: Fully Asynchronous Dynamic MPC with Guaranteed Output Delivery.
IACR Cryptol. ePrint Arch., 2024

FileDES: A Secure, Scalable and Succinct Decentralized Encrypted Storage Network.
IACR Cryptol. ePrint Arch., 2024

Sleepy Consensus in the Known Participation Model.
IACR Cryptol. ePrint Arch., 2024

Anonymity on Byzantine-Resilient Decentralized Computing.
IACR Cryptol. ePrint Arch., 2024

SoK: Decentralized Storage Network.
IACR Cryptol. ePrint Arch., 2024

zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing.
IACR Cryptol. ePrint Arch., 2024

Attention Is All You Need for LLM-based Code Vulnerability Localization.
CoRR, 2024

A Practical Trigger-Free Backdoor Attack on Neural Networks.
CoRR, 2024

A Treatment of EIP-1559: Enhancing Transaction Fee Mechanism through Nth-Price Auction.
CoRR, 2024

Federating to Grow Transformers with Constrained Resources without Model Sharing.
CoRR, 2024

A Resource-Adaptive Approach for Federated Learning under Resource-Constrained Environments.
CoRR, 2024

DataSafe: Copyright Protection with PUF Watermarking and Blockchain Tracking.
CoRR, 2024

Cooperative Backdoor Attack in Decentralized Reinforcement Learning with Theoretical Guarantee.
CoRR, 2024

On Protecting the Data Privacy of Large Language Models (LLMs): A Survey.
CoRR, 2024

Poisson-Gamma Dynamical Systems with Non-Stationary Transition Dynamics.
CoRR, 2024

LaserAdv: Laser Adversarial Attacks on Speech Recognition Systems.
Proceedings of the 33rd USENIX Security Symposium, 2024

Federating from History in Streaming Federated Learning.
Proceedings of the Twenty-fifth International Symposium on Theory, 2024

RF-Parrot: Wireless Eavesdropping on Wired Audio.
Proceedings of the IEEE INFOCOM 2024, 2024

Correlation-Aware and Personalized Privacy-Preserving Data Collection.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

2023
Online Learning for Failure-Aware Edge Backup of Service Function Chains With the Minimum Latency.
IEEE/ACM Trans. Netw., December, 2023

Collaborative Learning in General Graphs With Limited Memorization: Complexity, Learnability, and Reliability.
IEEE/ACM Trans. Netw., December, 2023

Vehicloak: A Blockchain-Enabled Privacy-Preserving Payment Scheme for Location-Based Vehicular Services.
IEEE Trans. Mob. Comput., November, 2023

FileDAG: A Multi-Version Decentralized Storage Network Built on DAG-Based Blockchain.
IEEE Trans. Computers, November, 2023

Cross-Channel: Scalable Off-Chain Channels Supporting Fair and Atomic Cross-Chain Operations.
IEEE Trans. Computers, November, 2023

An Uncertainty- and Collusion-Proof Voting Consensus Mechanism in Blockchain.
IEEE/ACM Trans. Netw., October, 2023

DP2-Pub: Differentially Private High-Dimensional Data Publication With Invariant Post Randomization.
IEEE Trans. Knowl. Data Eng., October, 2023

Model Poisoning Attack on Neural Network Without Reference Data.
IEEE Trans. Computers, October, 2023

Core maintenance for hypergraph streams.
World Wide Web (WWW), September, 2023

Maximal Clique Search in Weighted Graphs.
IEEE Trans. Knowl. Data Eng., September, 2023

Byzantine-Resilient Federated Learning at Edge.
IEEE Trans. Computers, September, 2023

BLOWN: A Blockchain Protocol for Single-Hop Wireless Networks Under Adversarial SINR.
IEEE Trans. Mob. Comput., August, 2023

Efficient Fault-Tolerant Consensus for Collaborative Services in Edge Computing.
IEEE Trans. Computers, August, 2023

Federated Learning Hyperparameter Tuning From a System Perspective.
IEEE Internet Things J., August, 2023

Energy-Aware, Device-to-Device Assisted Federated Learning in Edge Computing.
IEEE Trans. Parallel Distributed Syst., July, 2023

A Fast Consensus for Permissioned Wireless Blockchains.
IEEE Internet Things J., July, 2023

Blockchain and Federated Edge Learning for Privacy-Preserving Mobile Crowdsensing.
IEEE Internet Things J., July, 2023

FedHAR: Semi-Supervised Online Learning for Personalized Federated Human Activity Recognition.
IEEE Trans. Mob. Comput., June, 2023

Toward maintenance of hypercores in large-scale dynamic hypergraphs.
VLDB J., May, 2023

Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning.
IEEE Trans. Mob. Comput., May, 2023

Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel.
Dataset, May, 2023

Robust decentralized stochastic gradient descent over unstable networks.
Comput. Commun., April, 2023

Jamming-Resilient Message Dissemination in Wireless Networks.
IEEE Trans. Mob. Comput., March, 2023

Exploring Truss Maintenance in Fully Dynamic Graphs: A Mixed Structure-Based Approach.
IEEE Trans. Computers, March, 2023

Malware-on-the-Brain: Illuminating Malware Byte Codes With Images for Malware Classification.
IEEE Trans. Computers, February, 2023

SPDL: A Blockchain-Enabled Secure and Privacy-Preserving Decentralized Learning System.
IEEE Trans. Computers, February, 2023

Applications of Differential Privacy in Social Network Analysis: A Survey.
IEEE Trans. Knowl. Data Eng., 2023

CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems.
IEEE Trans. Dependable Secur. Comput., 2023

I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association.
IEEE Trans. Dependable Secur. Comput., 2023

Black Swan in Blockchain: Micro Analysis of Natural Forking.
IEEE Trans. Dependable Secur. Comput., 2023

Robust communication-efficient decentralized learning with heterogeneity.
J. Syst. Archit., 2023

SoK: Privacy-Preserving Smart Contract.
IACR Cryptol. ePrint Arch., 2023

Latency-First Smart Contract: Overclock the Blockchain for a while.
IACR Cryptol. ePrint Arch., 2023

Spatial Crowdsourcing Task Allocation Scheme for Massive Data with Spatial Heterogeneity.
CoRR, 2023

Modeling Sequential Recommendation as Missing Information Imputation.
CoRR, 2023

Ginver: Generative Model Inversion Attacks Against Collaborative Inference.
Proceedings of the ACM Web Conference 2023, 2023

A Self-Correcting Sequential Recommender.
Proceedings of the ACM Web Conference 2023, 2023

Low-Latency Perception Sharing Services for Connected Autonomous Vehicles.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

mmEcho: A mmWave-based Acoustic Eavesdropping Method.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Communication Resources Limited Decentralized Learning with Privacy Guarantee through Over-the-Air Computation.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Theoretical Convergence Guaranteed Resource-Adaptive Federated Learning with Mixed Heterogeneity.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel.
Proceedings of the IEEE INFOCOM 2023, 2023

Finer-Grained Engagement in Hypergraphs.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

HiPo: Detecting Fake News via Historical and Multi-Modal Analyses of Social Media Posts.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Principal component analysis based data collection for sustainable internet of things enabled Cyber-Physical Systems.
Microprocess. Microsystems, February, 2022

Fault-Tolerant Consensus with NOMA in Mobile Networks.
IEEE Wirel. Commun., 2022

Covert communications with friendly jamming in Internet of vehicles.
Veh. Commun., 2022

Intermittent jamming for eavesdropping defense in WAVE based vehicular networks.
Veh. Commun., 2022

Harnessing Context for Budget-Limited Crowdsensing With Massive Uncertain Workers.
IEEE/ACM Trans. Netw., 2022

A Misreport- and Collusion-Proof Crowdsourcing Mechanism Without Quality Verification.
IEEE Trans. Mob. Comput., 2022

Low-Power and Low-Delay WLAN Using Wake-Up Receivers.
IEEE Trans. Mob. Comput., 2022

Decentralized Wireless Federated Learning With Differential Privacy.
IEEE Trans. Ind. Informatics, 2022

Fast Core Maintenance in Dynamic Graphs.
IEEE Trans. Comput. Soc. Syst., 2022

Structure-Attribute-Based Social Network Deanonymization With Spectral Graph Partitioning.
IEEE Trans. Comput. Soc. Syst., 2022

CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA.
IEEE Trans. Computers, 2022

Extending On-Chain Trust to Off-Chain - Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE).
IEEE Trans. Computers, 2022

Generous or Selfish? Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks.
J. Comput. Sci. Technol., 2022

Core-GAE: Toward Generation of IoT Networks.
IEEE Internet Things J., 2022

Learning Graph Structures With Transformer for Multivariate Time-Series Anomaly Detection in IoT.
IEEE Internet Things J., 2022

A survey of structural representation learning for social networks.
Neurocomputing, 2022

Federated Learning Hyper-Parameter Tuning from a System Perspective.
CoRR, 2022

A Trustless Architecture of Blockchain-enabled Metaverse.
CoRR, 2022

Collaborative Learning in General Graphs with Limited Memorization: Learnability, Complexity and Reliability.
CoRR, 2022

SPDL: Blockchain-secured and Privacy-preserving Decentralized Learning.
CoRR, 2022

Reinforcement learning based adversarial malware example generation against black-box detectors.
Comput. Secur., 2022

Accurate Contact-Free Material Recognition with Millimeter Wave and Machine Learning.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Jamming-Resilient Over-the-Air Computation for Federated Learning in Edge Intelligence.
Proceedings of the IEEE Smartworld, 2022

AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Energy-Constrained D2D Assisted Federated Learning in Edge Computing.
Proceedings of the International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems on International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2022

PPAR: A Privacy-Preserving Adaptive Ranking Algorithm for Multi-Armed-Bandit Crowdsourcing.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

zk-PCN: A Privacy-Preserving Payment Channel Network Using zk-SNARKs.
Proceedings of the IEEE International Performance, 2022

MILLIEAR: Millimeter-wave Acoustic Eavesdropping with Unconstrained Vocabulary.
Proceedings of the IEEE INFOCOM 2022, 2022

Private Stochastic Convex Optimization and Sparse Learning with Heavy-tailed Data Revisited.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Curb: Trusted and Scalable Software-Defined Network Control Plane for Edge Computing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

ASM2TV: An Adaptive Semi-supervised Multi-Task Multi-View Learning Framework for Human Activity Recognition.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Implementing the Abstract MAC Layer via Inductive Coloring Under the Rayleigh-Fading Model.
IEEE Trans. Wirel. Commun., 2021

wChain: A Fast Fault-Tolerant Blockchain Protocol for Multihop Wireless Networks.
IEEE Trans. Wirel. Commun., 2021

Decentralized Parallel SGD With Privacy Preservation in Vehicular Networks.
IEEE Trans. Veh. Technol., 2021

Proof of Federated Learning: A Novel Energy-Recycling Consensus Algorithm.
IEEE Trans. Parallel Distributed Syst., 2021

Distributed Byzantine-Resilient Multiple-Message Dissemination in Wireless Networks.
IEEE/ACM Trans. Netw., 2021

An Exact Implementation of the Abstract MAC Layer via Carrier Sensing in Dynamic Networks.
IEEE/ACM Trans. Netw., 2021

Distributed Broadcasting in Dynamic Networks.
IEEE/ACM Trans. Netw., 2021

Efficient Link Scheduling Solutions for the Internet of Things Under Rayleigh Fading.
IEEE/ACM Trans. Netw., 2021

Achieving Privacy Preservation and Billing via Delayed Information Release.
IEEE/ACM Trans. Netw., 2021

Distributed Social Learning With Imperfect Information.
IEEE Trans. Netw. Sci. Eng., 2021

Implementing The Abstract MAC Layer in Dynamic Networks.
IEEE Trans. Mob. Comput., 2021

Cost-Efficient Mobile Crowdsensing With Spatial-Temporal Awareness.
IEEE Trans. Mob. Comput., 2021

Privacy-Aware Data Trading.
IEEE Trans. Inf. Forensics Secur., 2021

Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021

Truthful Auction Analysis and Design in Multiunit Heterogenous Spectrum Markets With Reserve Prices.
IEEE Trans. Cogn. Commun. Netw., 2021

Utility analysis on privacy-preservation algorithms for online social networks: an empirical study.
Pers. Ubiquitous Comput., 2021

Near-Online Tracking With Co-Occurrence Constraints in Blockchain-Based Edge Computing.
IEEE Internet Things J., 2021

Scalable Decentralized Privacy-Preserving Usage-Based Insurance for Vehicles.
IEEE Internet Things J., 2021

Privacy-Preserving Collaborative Learning for Multiarmed Bandits in IoT.
IEEE Internet Things J., 2021

Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning.
CoRR, 2021

When Blockchain Meets Smart Grids: A Comprehensive Survey.
CoRR, 2021

Extending On-chain Trust to Off-chain - A Trustworthy Vaccine Shipping Example.
CoRR, 2021

Micro Analysis of Natural Forking in Blockchain Based on Large Deviation Theory.
CoRR, 2021

BLOWN: A Blockchain Protocol for Single-Hop Wireless Networks under Adversarial SINR.
CoRR, 2021

Distributed Core Decomposition in Probabilistic Graphs.
Asia Pac. J. Oper. Res., 2021

AERM: An Attribute-Aware Economic Robust Spectrum Auction Mechanism.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Malice-Aware Transaction Forwarding in Payment Channel Networks.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Hypercore Maintenance in Dynamic Hypergraphs.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

Proactive Deployment of Chain-based VNF Backup at the Edge using Online Bandit Learning.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

DCAP: Deep Cross Attentional Product Network for User Response Prediction.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Privacy-Enhancing Preferential LBS Query for Mobile Social Network Users.
Wirel. Commun. Mob. Comput., 2020

Enabling Technologies for Spectrum and Energy Efficient NOMA-MmWave-MaMIMO Systems.
IEEE Wirel. Commun., 2020

Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks: A Survey.
IEEE Wirel. Commun., 2020

Spectrum Prediction for Supporting IoT Applications over 5G.
IEEE Wirel. Commun., 2020

Efficient Link Scheduling in Wireless Networks Under Rayleigh-Fading and Multiuser Interference.
IEEE Trans. Wirel. Commun., 2020

Quantum Game Analysis on Extrinsic Incentive Mechanisms for P2P Services.
IEEE Trans. Parallel Distributed Syst., 2020

Faster Parallel Core Maintenance Algorithms in Dynamic Graphs.
IEEE Trans. Parallel Distributed Syst., 2020

Quantum Analysis on Task Allocation and Quality Control for Crowdsourcing With Homogeneous Workers.
IEEE Trans. Netw. Sci. Eng., 2020

Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks.
IEEE Trans. Netw. Sci. Eng., 2020

Guest Editorial Introduction to the Special Section on Network Science for High-Confidence Cyber-Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2020

Quality Control in Crowdsourcing Using Sequential Zero-Determinant Strategies.
IEEE Trans. Knowl. Data Eng., 2020

Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies.
IEEE Trans. Inf. Forensics Secur., 2020

Batch Processing for Truss Maintenance in Large Dynamic Graphs.
IEEE Trans. Comput. Soc. Syst., 2020

Guest Editorial: Special Issue on High-Confidence City IoT for Collaborative Smart City Services.
IEEE Internet Things J., 2020

Modeling and Analysis Botnet Propagation in Social Internet of Things.
IEEE Internet Things J., 2020

Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory.
IEEE Internet Things J., 2020

Mining Hard Samples Globally and Efficiently for Person Reidentification.
IEEE Internet Things J., 2020

Data Aggregation in Wireless Sensor Networks: From the Perspective of Security.
IEEE Internet Things J., 2020

FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks.
IEEE Internet Things J., 2020

Cap the Gap: Solving the Egoistic Dilemma under the Transaction Fee-Incentive Bitcoin.
CoRR, 2020

Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things.
CoRR, 2020

MalFox: Camouflaged Adversarial Malware Example Generation Based on C-GANs Against Black-Box Detectors.
CoRR, 2020

Differential Privacy and Its Applications in Social Network Analysis: A Survey.
CoRR, 2020

Privacy-aware Data Trading.
CoRR, 2020

Egoistic Incentives Based on Zero-Determinant Alliances for Large-Scale Systems.
CoRR, 2020

Fast skyline community search in multi-valued networks.
Big Data Min. Anal., 2020

Meta Matrix Factorization for Federated Rating Predictions.
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020

Distributed Algorithm for Truss Maintenance in Dynamic Graphs.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2020

Multi-Task Time Series Forecasting With Shared Attention.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

2019
Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming.
IEEE Trans. Wirel. Commun., 2019

An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019

Blockchain for Large-Scale Internet of Things Data Storage and Protection.
IEEE Trans. Serv. Comput., 2019

Anonymization in Online Social Networks Based on Enhanced Equi-Cardinal Clustering.
IEEE Trans. Comput. Soc. Syst., 2019

Edge Computing Security: State of the Art and Challenges.
Proc. IEEE, 2019

I Can See Your Brain: Investigating Home-Use Electroencephalography System Security.
IEEE Internet Things J., 2019

NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce.
IEEE Internet Things J., 2019

A Novel Secure and Efficient Data Aggregation Scheme for IoT.
IEEE Internet Things J., 2019

VisioMap: Lightweight 3-D Scene Reconstruction Toward Natural Indoor Localization.
IEEE Internet Things J., 2019

Identification of Vulnerable Lines in Smart Grid Systems Based on Affinity Propagation Clustering.
IEEE Internet Things J., 2019

Hopping-Proof and Fee-Free Pooled Mining in Blockchain.
CoRR, 2019

From Personalization to Privatization: Meta Matrix Factorization for Private Rating Predictions.
CoRR, 2019

Localized and distributed link scheduling algorithms in IoT under rayleigh fading.
Comput. Networks, 2019

Information, knowledge, and semantics for interacting with Internet-of-Things.
Comput. Networks, 2019

Crowdsourcee evaluation based on persuasion game.
Comput. Networks, 2019

A model for integrating heterogeneous sensory data in IoT systems.
Comput. Networks, 2019

User Identity De-anonymization Based on Attributes.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

A game theoretic analysis on block withholding attacks using the zero-determinant strategy.
Proceedings of the International Symposium on Quality of Service, 2019

Distributed Dominating Set and Connected Dominating Set Construction Under the Dynamic SINR Model.
Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium, 2019

Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Fast Fault-Tolerant Sampling via Random Walk in Dynamic Networks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Analysis of Antagonistic Dynamics for Rumor Propagation.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Attribute-Enhanced De-anonymization of Online Social Networks.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

Distributed Core Decomposition in Probabilistic Graphs.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

2018
Jamming Strategies for Physical Layer Security.
IEEE Wirel. Commun., 2018

N-in-One: A Novel Location-Based Service.
IEEE Trans. Veh. Technol., 2018

Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services.
IEEE Trans. Veh. Technol., 2018

SecureGuard: A Certificate Validation System in Public Key Infrastructure.
IEEE Trans. Veh. Technol., 2018

Stable Local Broadcast in Multihop Wireless Networks Under SINR.
IEEE/ACM Trans. Netw., 2018

A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds.
IEEE Trans. Big Data, 2018

SSDNet: Small-World Super-Dense Device-to-Device Wireless Networks.
IEEE Netw., 2018

Relay selection based on social relationship prediction and information leakage reduction for mobile social networks.
Math. Found. Comput., 2018

CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids.
Math. Found. Comput., 2018

A survey on key fields of context awareness for mobile devices.
J. Netw. Comput. Appl., 2018

A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications.
IEEE Access, 2018

An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Sampling Based \delta δ -Approximate Data Aggregation in Sensor Equipped IoT Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

PRIDE: A Private and Decentralized Usage-Based Insurance Using Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Fully Dynamic Broadcasting under SINR.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

De-anonymizing Scale-Free Social Networks by Using Spectrum Partitioning Method.
Proceedings of the 2018 International Conference on Identification, 2018

Efficient Connected Dominating Set Construction with Maximum Lifetime in the Cognitive Radio Networks.
Proceedings of the 2018 International Conference on Identification, 2018

Lightweight Hardware Based Secure Authentication Scheme for Fog Computing.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

2017
A coalition formation game based relay selection scheme for cooperative cognitive radio networks.
Wirel. Networks, 2017

Coverage Contribution Area Based k-Coverage for Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2017

Shortest Link Scheduling Algorithms in Wireless Networks Under the SINR Model.
IEEE Trans. Veh. Technol., 2017

Game Theoretic Analysis of Green Spectrum and Infrastructure Leasing on TV Bands.
IEEE Trans. Veh. Technol., 2017

Enhancing GPS With Lane-Level Navigation to Facilitate Highway Driving.
IEEE Trans. Veh. Technol., 2017

Utility-Based Cooperative Spectrum Sensing Scheduling in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2017

Fundamental Analysis on Data Dissemination in Mobile Opportunistic Networks With Lévy Mobility.
IEEE Trans. Veh. Technol., 2017

Localized Algorithms for Yao Graph-Based Spanner Construction in Wireless Networks Under SINR.
IEEE/ACM Trans. Netw., 2017

Distributed Spanner Construction With Physical Interference: Constant Stretch and Linear Sparseness.
IEEE/ACM Trans. Netw., 2017

Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing.
IEEE Trans. Ind. Informatics, 2017

Social Welfare Control in Mobile Crowdsensing Using Zero-Determinant Strategy.
Sensors, 2017

QuickCash: Secure Transfer Payment Systems.
Sensors, 2017

Customized privacy preserving for inherent data and latent data.
Pers. Ubiquitous Comput., 2017

SINR based shortest link scheduling with oblivious power control in wireless networks.
J. Netw. Comput. Appl., 2017

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes.
IEEE Internet Things J., 2017

Ultraviolet Radiation Measurement via Smart Devices.
IEEE Internet Things J., 2017

IoT Applications on Secure Smart Shopping System.
IEEE Internet Things J., 2017

Guest Editorial Special Issue on Fog Computing in the Internet of Things.
IEEE Internet Things J., 2017

An Android-Based Mechanism for Energy Efficient Localization Depending on Indoor/Outdoor Context.
IEEE Internet Things J., 2017

Fog Computing for the Internet of Things: Security and Privacy Issues.
IEEE Internet Comput., 2017

Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks.
IET Commun., 2017

Perturbation-Based Private Profile Matching in Social Networks.
IEEE Access, 2017

An Attribute-Based Encryption Scheme to Secure Fog Communications.
IEEE Access, 2017

A Secure and Practical Authentication Scheme Using Personal Devices.
IEEE Access, 2017

Theoretical Analysis of Secrecy Transmission Capacity in Wireless Ad Hoc Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A Bitcoin Based Incentive Mechanism for Distributed P2P Applications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Personal Information Inference in Social Networks.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Poster: Perturbation Based Private Profile Matching in Social Networks.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Quantum Game Analysis of Privacy-Leakage for Application Ecosystems.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

Mechanism design games for thwarting malicious behavior in crowdsourcing applications.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

A secure and verifiable outsourcing scheme for matrix inverse computation.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

SA Framework based De-anonymization of Social Networks.
Proceedings of the 2017 International Conference on Identification, 2017

Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

An Attribute & Network Coding-Based Secure Multicast Protocol for Firmware Updates in Smart Grid AMI Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Inference attacks based on neural networks in social networks.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

2016
Connected Dominating Set.
Encyclopedia of Algorithms, 2016

Big data routing in D2D communications with cognitive radio capability.
IEEE Wirel. Commun., 2016

An Efficient Scheme for Tag Information Update in RFID Systems on Roads.
IEEE Trans. Veh. Technol., 2016

An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets.
IEEE Trans. Cogn. Commun. Netw., 2016

On Connected Target <i>k</i>-Coverage in Heterogeneous Wireless Sensor Networks.
Sensors, 2016

Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility.
Sensors, 2016

Secure multi-unit sealed first-price auction mechanisms.
Secur. Commun. Networks, 2016

Cyber security, crime, and forensics of wireless networks and applications.
Secur. Commun. Networks, 2016

Connected dominating set construction in cognitive radio networks.
Pers. Ubiquitous Comput., 2016

New advances in data, information, and knowledge in the Internet of Things.
Pers. Ubiquitous Comput., 2016

A novel contention-on-demand design for WiFi hotspots.
Pers. Ubiquitous Comput., 2016

Security in wearable communications.
IEEE Netw., 2016

Three connected dominating set algorithms for wireless sensor networks.
Int. J. Sens. Networks, 2016

Editorial for special issue on Big Data and knowledge extraction for Cyber-Physical Systems 2016.
Int. J. Distributed Sens. Networks, 2016

An enhanced low overhead and stable clustering scheme for crossroads in VANETs.
EURASIP J. Wirel. Commun. Netw., 2016

Analysis and optimization of delayed channel access for wireless cyber-physical systems.
EURASIP J. Wirel. Commun. Netw., 2016

Cooperative spectrum sharing of multiple primary users and multiple secondary users.
Digit. Commun. Networks, 2016

ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

An Enhanced Structure-Based De-anonymization of Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Solving the crowdsourcing dilemma using the zero-determinant strategy: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Distributed deterministic broadcasting algorithms under the SINR model.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Detecting driver phone calls in a moving vehicle based on voice features.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Differentially Private k-Anonymity: Achieving Query Privacy in Location-Based Services.
Proceedings of the International Conference on Identification, 2016

SINR-Q-CSMA: Carrier Sense Multiple Access Based on Queue Length under SINR.
Proceedings of the International Conference on Identification, 2016

IoT Applications on Secure Smart Shopping.
Proceedings of the International Conference on Identification, 2016

A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization.
Proceedings of the International Conference on Identification, 2016

Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Cooperative Relay Selection in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2015

Cooperative Coverage Extension for Relay-Union Networks.
IEEE Trans. Parallel Distributed Syst., 2015

A Time Fairness-Based MAC Algorithm for Throughput Maximization in 802.11 Networks.
IEEE Trans. Computers, 2015

Theme issue on advances in the Internet of Things: identification, information, and knowledge.
Pers. Ubiquitous Comput., 2015

Secure friend discovery based on encounter history in mobile social networks.
Pers. Ubiquitous Comput., 2015

A novel verification method for payment card systems.
Pers. Ubiquitous Comput., 2015

Analyzing the potential of mobile opportunistic networks for big data applications.
IEEE Netw., 2015

Big Data and Knowledge Extraction for Cyber-Physical Systems.
Int. J. Distributed Sens. Networks, 2015

Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks.
EURASIP J. Wirel. Commun. Netw., 2015

Online auction-based relay selection for cooperative communication in CR networks.
EURASIP J. Wirel. Commun. Netw., 2015

Achievable transmission capacity of cognitive radio networks with cooperative relaying.
EURASIP J. Wirel. Commun. Netw., 2015

Enabling smartphone-based HD video chats by cooperative transmissions in CRNs.
EURASIP J. Wirel. Commun. Netw., 2015

Security and privacy in localization for underwater sensor networks.
IEEE Commun. Mag., 2015

Simultaneous energy and information cooperation in MIMO cooperative cognitive radio systems.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Cooperative Spectrum and Infrastructure Leasing on TV Bands.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Secure Multi-unit Sealed First-Price Auction Mechanism.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Bidder-Oriented Privacy-Preserving VCG Auction Scheme.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Impact of a Deterministic Delay in the DCA Protocol.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications.
Proceedings of the Security and Privacy in Communication Networks, 2015

Distributed Algorithms for Maximum Clique in Wireless Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Secure Auctions without an Auctioneer via Verifiable Secret Sharing.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015

Controlling the Spreads of Infectious Disease and Scare via Utilizing Location and Social Networking Information.
Proceedings of the 2015 Workshop on Mobile Big Data, 2015

Minimum connected dominating set construction in wireless networks under the beeping model.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

X.509 Check: A Tool to Check the Safety and Security of Digital Certificates.
Proceedings of the International Conference on Identification, 2015

A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Efficient Customized Privacy Preserving Friend Discovery in Mobile Social Networks.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Ads dissemination in Vehicular Ad Hoc Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Low Price to Win: Interactive scheme in cooperative cognitive radio networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Fog Computing Based Ultraviolet Radiation Measurement via Smartphones.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015

2014
Coverage adjustment for load balancing with an AP service availability guarantee in WLANs.
Wirel. Networks, 2014

Analyzing Cognitive Network Access Efficiency Under Limited Spectrum Handoff Agility.
IEEE Trans. Veh. Technol., 2014

Optimal Spectrum Sensing Interval in Cognitive Radio Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Mobility-Assisted Routing in Intermittently Connected Mobile Cognitive Radio Networks.
IEEE Trans. Parallel Distributed Syst., 2014

AP Association for Proportional Fairness in Multirate WLANs.
IEEE/ACM Trans. Netw., 2014

Opportunistic Sensing in Wireless Sensor Networks: Theory and Application.
IEEE Trans. Computers, 2014

Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2014

Theme issue on identification, information, and knowledge in the Internet of Things.
Pers. Ubiquitous Comput., 2014

Advances on data, information, and knowledge in the internet of things.
Pers. Ubiquitous Comput., 2014

Virtual track: applications and challenges of the RFID system on roads.
IEEE Netw., 2014

Cooperative Spectrum Prediction in Multi-PU Multi-SU Cognitive Radio Networks.
Mob. Networks Appl., 2014

Editorial for Crowncom 2013 Special Issue.
Mob. Networks Appl., 2014

Routing in user-centric networks.
IEEE Commun. Mag., 2014

Emerging WiFi Direct technique in home area networks for Smart Grid: Power consumption and outage performance.
Ad Hoc Networks, 2014

Editorial for the special issue on routing in smart grid communication networks.
Ad Hoc Networks, 2014

Online Auction Based Relay Selection for Cooperative Communications in CR Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

A Transparent Correlation-Based Scheme for Energy Efficient Context Sensing and Fusion under Android Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Towards More Secure Cardholder Verification in Payment Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

QueueSense: Collaborative recognition of queuing on mobile phones.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

An extensible and flexible truthful auction framework for heterogeneous spectrum markets.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Achieving privacy preservation in WiFi fingerprint-based localization.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

The Tempo-Spatial Information Dissemination Properties of Mobile Opportunistic Networks with Levy Mobility.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

An optimal privacy-preserving mechanism for crowdsourced traffic monitoring.
Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, 2014

Multi-channel selection maximizing throughput for delay-constrained multi-application secondary users in dynamic cognitive radio networks.
Proceedings of the 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2014

2013
Spectrum prediction in cognitive radio networks.
IEEE Wirel. Commun., 2013

Improving Macrocell Downlink Throughput in Rayleigh Fading Channel Environment Through Femtocell User Cooperation.
IEEE Trans. Wirel. Commun., 2013

Robust Compressive Data Gathering in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013

Dynamic Scheduling for Wireless Data Center Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Time-Bounded Essential Localization for Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2013

Opportunistic Routing in Intermittently Connected Mobile P2P Networks.
IEEE J. Sel. Areas Commun., 2013

Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme.
IEEE J. Sel. Areas Commun., 2013

Spectrum Assignment and Sharing for Delay Minimization in Multi-Hop Multi-Flow CRNs.
IEEE J. Sel. Areas Commun., 2013

Connected dominating set algorithms for wireless sensor networks.
Int. J. Sens. Networks, 2013

Compressive sensing in distributed radar sensor networks using pulse compression waveforms.
EURASIP J. Wirel. Commun. Netw., 2013

Social Communications Assisted Epidemic Disease Influence Minimization.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Distributed Algorithm for Connected Dominating Set Construction in Sensor Networks.
Proceedings of the IEEE International Conference on Systems, 2013

Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model.
Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, 2013

Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks.
Proceedings of the 1st ACM workshop on Cognitive radio architectures for broadband, 2013

Channel quality prediction based on Bayesian inference in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Utility-based cooperative spectrum sensing scheduling in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Cooperative multi-hop relaying via network formation games in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Cooperative relay selection in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A multi-unit truthful double auction framework for secondary market.
Proceedings of IEEE International Conference on Communications, 2013

2012
Routing in pocket switched networks.
IEEE Wirel. Commun., 2012

Dynamic spectrum access: from cognitive radio to network radio.
IEEE Wirel. Commun., 2012

On the Design and Deployment of RFID Assisted Navigation Systems for VANETs.
IEEE Trans. Parallel Distributed Syst., 2012

Verifiable multi-secret sharing based on LFSR sequences.
Theor. Comput. Sci., 2012

No Silver Bullet: Identifying Security Vulnerabilities in Anonymization Protocols for Hospital Databases.
Int. J. Heal. Inf. Syst. Informatics, 2012

HERO - A Home Based Routing in Pocket Switched Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Routing for Information Leakage Reduction in Multi-channel Multi-hop Ad-Hoc Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

A community based vaccination strategy over mobile phone records.
Proceedings of the Second ACM Workshop on Mobile Systems, 2012

EM-MAC: An energy-aware multi-channel MAC protocol for multi-hop wireless networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A statistical approach for target counting in sensor-based surveillance systems.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Maximizing throughput when achieving time fairness in multi-rate wireless LANs.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Achievable transmission capacity of cognitive mesh networks with different media access control.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Delay modeling in mobile cognitive radio networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Sparsity and compressive sensing of sense-through-foliage radar signals.
Proceedings of IEEE International Conference on Communications, 2012

Ampliude based compressive sensing for UWB noise radar signal.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Achievable transmission capacity of cognitive radio networks with cooperative relaying.
Proceedings of the 7th International Conference on Cognitive Radio Oriented Wireless Networks, 2012

2011
Wireless data center networking.
IEEE Wirel. Commun., 2011

Achieving Proportional Fairness via AP Power Control in Multi-Rate WLANs.
IEEE Trans. Wirel. Commun., 2011

Timer-Based CDS Construction in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2011

Guest Editorial.
J. Commun., 2011

A Model-Based Approach for Outlier Detection in Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

Enhancing Macrocell Downlink Performance through Femtocell User Cooperation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Load Balancing Access Point Association Schemes for IEEE 802.11 Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Sparse target counting and localization in sensor networks based on compressive sensing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Channel allocation in wireless data center networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Multi-hop access pricing in public area WLANs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Partially overlapping channel assignment based on "node orthogonality" for 802.11 wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Wireless link scheduling for data center networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

A Monte Carlo Method for Mobile Target Counting.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Opportunistic Sensing in Wireless Sensor Networks: Theory and Application.
Proceedings of the Global Communications Conference, 2011

2010
Location-centric storage and query in wireless sensor networks.
Wirel. Networks, 2010

Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach.
EURASIP J. Wirel. Commun. Netw., 2010

Radar and Sonar Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010

Introduction to the Special Section on Mobile Ad Hoc and Sensor Networks.
Comput. Commun., 2010

Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs.
Proceedings of the Wireless Algorithms, 2010

From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
A novel rate adaptation scheme for 802.11 networks.
IEEE Trans. Wirel. Commun., 2009

3D Underwater Sensor Network Localization.
IEEE Trans. Mob. Comput., 2009

A surveillance robot with hopping capabilities for home security.
IEEE Trans. Consumer Electron., 2009

Location discovery for sensor networks with short range beacons.
Int. J. Ad Hoc Ubiquitous Comput., 2009

In Situ Key Establishment in Large-Scale Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2009

Underwater acoustic sensor networks: Target size detection and performance analysis.
Ad Hoc Networks, 2009

Topology Inference in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, 2009

Fault tolerant target tracking in sensor networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

Robust Event Boundary Detection in Sensor Networks - A Mixture Model Based Approach.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

The Complexity of Channel Scheduling in Multi-Radio Multi-Channel Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Time-Synchronization Free Localization in Large Scale Underwater Acoustic Sensor Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

2008
Connected Dominating Set.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

A power controlled interference aware routing protocol for dense multi-hop wireless networks.
Wirel. Networks, 2008

Relay sensor placement in wireless sensor networks.
Wirel. Networks, 2008

LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2008

Silent Positioning in Underwater Acoustic Sensor Networks.
IEEE Trans. Veh. Technol., 2008

Fault-Tolerant Topology Control for All-to-One and One-to-All Communication in Wireles Networks.
IEEE Trans. Mob. Comput., 2008

SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks.
IEEE Trans. Mob. Comput., 2008

Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Underwater Localization in Sparse 3D Acoustic Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

A Clustering Approach in Developing Prognostic Systems of Cancer Patients.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

Real-Time Detection of Clone Attacks in Wireless Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

UWB Radar Sensor Networks for Sense-Through-Foliage Target Detection.
Proceedings of IEEE International Conference on Communications, 2008

2007
iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2007

Localized Outlying and Boundary Data Detection in Sensor Networks.
IEEE Trans. Knowl. Data Eng., 2007

Location-centric storage for safety warning based on roadway sensor networks.
J. Parallel Distributed Comput., 2007

Fault-Tolerant Target Localization in Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2007

Algorithmic Aspects of Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2007

Localized Flooding Backbone Construction for Location Privacy in Sensor Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

RAP: protecting commodity wi-fi networks from rogue access points.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

Insider Attacker Detection in Wireless Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Passive Listening and Intrusion Management in Commodity Wi-Fi Networks.
Proceedings of the Global Communications Conference, 2007

2006
Virtual backbone construction in multihop <i>ad hoc</i> wireless networks.
Wirel. Commun. Mob. Comput., 2006

SeGrid: A Secure Grid Framework for Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2006

A Self-Configured Key Establishment Scheme for Large-Scale Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Location-aware key establishment in wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

On the Performance of In-Situ Key Establishment Schemes for Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
A Performance Evaluation of a Novel Energy-Aware Data-Centric Routing Algorithm in Wireless Sensor Networks.
Wirel. Networks, 2005

iTPS: an improved location discovery scheme for sensor networks with long-range beacons.
J. Parallel Distributed Comput., 2005

Safety warning based on highway sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Fault-tolerant target detection in sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

DIAR: A Dynamic Interference Aware Routing Protocol for IEEE 802.11-Based Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

SeGrid: A Secure Grid Infrastructure for Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Location-centric storage for sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Localized fault-tolerant event boundary detection in sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

TPSS: A Time-Based Positioning Scheme for Sensor Networks with Short Range Beacons.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
TPS: A Time-Based Positioning Scheme for Outdoor Wireless Sensor Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

2003
Strong Minimum Energy Topology in Wireless Sensor Networks: NP-Completeness and Heuristics.
IEEE Trans. Mob. Comput., 2003

A polynomial-time approximation scheme for the minimum-connected dominating set in ad hoc wireless networks.
Networks, 2003

Energy-aware data-centric routing in microsensor networks.
Proceedings of the 6th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2003

Statistical Comparisons of Multiple Classifiers.
Proceedings of the International Conference on Machine Learning; Models, Technologies and Applications. MLMTA'03, June 23, 2003

Latent Structure Models for the Analysis of Gene Expression Data.
Proceedings of the 2nd IEEE Computer Society Bioinformatics Conference, 2003

Gene Selection for Multi-Class Prediction of Microarray Data.
Proceedings of the 2nd IEEE Computer Society Bioinformatics Conference, 2003

2002
Connected Domination in Multihop Ad Hoc Wireless Networks.
Proceedings of the 6th Joint Conference on Information Science, 2002

2001
An asymptotic analysis of some expert fusion methods.
Pattern Recognit. Lett., 2001

Polynomial Time Approximation Scheme for Symmetric Rectilinear Steiner Arborescence Problem.
J. Glob. Optim., 2001

A Polynomial Time Approximation Scheme for the Problem of Interconnecting Highways.
J. Comb. Optim., 2001

2000
A Simple Implementation of the Stochastic Discrimination for Pattern Recognition.
Proceedings of the Advances in Pattern Recognition, Joint IAPR International Workshops SSPR 2000 and SPR 2000, [8th International Workshop on Structural and Syntactic Pattern Recognition, 3rd International Workshop on Statistical Techniques in Pattern Recognition], Alicante, Spain, August 30, 2000


  Loading...