Yang Xiao

Orcid: 0000-0001-8549-6794

Affiliations:
  • University of Alabama, Department of Computer Science, Tuscaloosa, AL, USA
  • The University of Memphis, Department of Computer Science, TN, USA (former)


According to our database1, Yang Xiao authored at least 468 papers between 2000 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Designing accountable IoT systems to overcome IoT storage limitation.
Comput. Secur., 2025

2024
A dynamic online nomogram for predicting renal outcomes of idiopathic membranous nephropathy.
BMC Medical Informatics Decis. Mak., December, 2024

Intelligent Building Energy Management Considering Uncertainties and Variation of Day-Ahead and Real-Time Electricity Prices.
IEEE Internet Things J., December, 2024

Flexible Label-Induced Manifold Broad Learning System for Multiclass Recognition.
IEEE Trans. Neural Networks Learn. Syst., November, 2024

Accountability in Internet of Things Networks.
IEEE Internet Things J., November, 2024

Adaptive fixed-time PID-based control of uncertain nonlinear systems and its application to unmanned surface vehicles.
Int. J. Syst. Sci., October, 2024

Multi-Agent Reinforcement Learning for Dynamic Topology Optimization of Mesh Wireless Networks.
IEEE Trans. Wirel. Commun., September, 2024

Dynamic Positioning Control for Unmanned Marine Vehicles With Thruster Faults and Time Delay: A Lyapunov Matrix-Based Method.
IEEE Trans. Syst. Man Cybern. Syst., July, 2024

Fixed-Time Dynamic Surface-Based Adaptive Composite Control for Nonlinear Systems and Its Application to the RLC Circuit.
IEEE Trans. Circuits Syst. II Express Briefs, June, 2024

Distributed Energy Management Method With EEOI Limitation for the Ship-Integrated Energy System.
IEEE Syst. J., June, 2024

Fundamentals, Algorithms, and Technologies of Occupancy Detection for Smart Buildings Using IoT Sensors.
Sensors, April, 2024

Car-Following Behavior Based on LiDAR Trajectory Data at Urban Intersections.
IEEE Syst. J., March, 2024

A Novel Adaptive Control Design for a Class of Nonstrict-Feedback Discrete-Time Systems via Reinforcement Learning.
IEEE Trans. Syst. Man Cybern. Syst., February, 2024

Event-Triggered Distributed Secondary Control With Model-Free Predictive Compensation in AC/DC Networked Microgrids Under DoS Attacks.
IEEE Trans. Cybern., January, 2024

Defense for Displacement Attacks on Distributed Formation Control Systems.
IEEE Trans. Netw. Sci. Eng., 2024

Distributed Optimal Energy Management for We-Energy Considering Operation Security.
IEEE Trans. Netw. Sci. Eng., 2024

Canonical Variate Analysis for Detecting False Data Injection Attacks in Alternating Current State Estimation.
IEEE Trans. Netw. Sci. Eng., 2024

PhishingRTDS: A real-time detection system for phishing attacks using a Deep Learning model.
Comput. Secur., 2024

Complemented subspace-based weighted collaborative representation model for imbalanced learning.
Appl. Soft Comput., 2024

Discriminative elastic-net broad learning systems for visual classification.
Appl. Soft Comput., 2024

Corrections to "A Survey on DNA-Based Cryptography and Steganography".
IEEE Access, 2024

A CVAE-Based Anomaly Detection Algorithm for Cyber Physical Attacks for Water Distribution Systems.
IEEE Access, 2024

Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model.
Proceedings of the 2024 ACM Southeast Conference, 2024

2023
Online optimal control for dynamic positioning of vessels via time-based adaptive dynamic programming.
J. Ambient Intell. Humaniz. Comput., December, 2023

Guest Editorial Digital Twins for Mobile Networks - Part II.
IEEE J. Sel. Areas Commun., November, 2023

Guest Editorial Digital Twins for Mobile Networks - Part I.
IEEE J. Sel. Areas Commun., October, 2023

A Jamming Aware Artificial Potential Field Method to Counter GPS Jamming for Unmanned Surface Ship Path Planning.
IEEE Syst. J., September, 2023

Grouping visual enhancements for Picviz logging visualisation.
Int. J. Sens. Networks, 2023

A Survey on DNA-Based Cryptography and Steganography.
IEEE Access, 2023

A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks.
IEEE Access, 2023

Conti Ransomware Development Evaluation.
Proceedings of the 2023 ACM Southeast Conference, 2023

2022
Broad Learning System Approximation-Based Adaptive Optimal Control for Unknown Discrete-Time Nonlinear Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Guest Editorial Introduction to the Special Section on AI-Powered Internet of Everything (IoE) Services in Next-Generation Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2022

Distributed Virtual Inertia Implementation of Multiple Electric Springs Based on Model Predictive Control in DC Microgrids.
IEEE Trans. Ind. Electron., 2022

Guest Editorial Special Issue on Green Communication and Networking for Connected and Autonomous Vehicles.
IEEE Trans. Green Commun. Netw., 2022

Hotlist and stale content update mitigation in local databases for DNS flooding attacks.
Telecommun. Syst., 2022

Attacks on Formation Control for Multiagent Systems.
IEEE Trans. Cybern., 2022

AdaGT: An Adaptive Group Testing Method for Improving Efficiency and Sensitivity of Large-Scale Screening Against COVID-19.
IEEE Trans Autom. Sci. Eng., 2022

Detection Methods in Smart Meters for Electricity Thefts: A Survey.
Proc. IEEE, 2022

Special issue on ambient intelligence, IoT, and Smart City.
J. Ambient Intell. Humaniz. Comput., 2022

A Control-Chart-Based Detector for Small-Amount Electricity Theft (SET) Attack in Smart Grids.
IEEE Internet Things J., 2022

An Iterative Optimization and Learning-Based IoT System for Energy Management of Connected Buildings.
IEEE Internet Things J., 2022

NN adaptive optimal tracking control for a class of uncertain nonstrict feedback nonlinear systems.
Neurocomputing, 2022

Guest Editorial: Autonomous Networks: Opportunities, Challenges, and Applications.
IEEE Commun. Stand. Mag., 2022

An Analysis of Conti Ransomware Leaked Source Codes.
IEEE Access, 2022

2021
Guest Editorial: Empowering Sustainable Energy Infrastructures via AI-Assisted Wireless Communications.
IEEE Wirel. Commun., 2021

Detecting False Data Injection Attacks Using Canonical Variate Analysis in Power Grid.
IEEE Trans. Netw. Sci. Eng., 2021

A Schedulable Energy Scheduling Algorithm With Fair Delay for Smart Grid Distributions.
IEEE Syst. J., 2021

Editorial: deep learning for 5G IoT systems.
Int. J. Mach. Learn. Cybern., 2021

A Survey of Autonomous Underwater Vehicle Formation: Performance, Formation Control, and Communication Capability.
IEEE Commun. Surv. Tutorials, 2021

A Deviation-Based Detection Method Against False Data Injection Attacks in Smart Grid.
IEEE Access, 2021

A Survey of Cyber-Physical Attacks and Detection Methods in Smart Water Distribution Systems.
IEEE Access, 2021

A Review of Intenet of things on sea.
Proceedings of the 2021 International Conference on Security, 2021

Forecasting of Vessel Traffic Flow Using BPNN Based on Genetic Algorithm Optimization.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Utilizing Csiszar Divergences to Analyze Deployments of Binary Sensors with Modulators.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

2020
GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids.
IEEE Trans. Netw. Sci. Eng., 2020

SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2020

Edge computing enabled non-technical loss fraud detection for big data security analytic in Smart Grid.
J. Ambient Intell. Humaniz. Comput., 2020

Load Distributed and Benign-Bot Mitigation Methods for IoT DNS Flood Attacks.
IEEE Internet Things J., 2020

Adaptive NN event-triggered control for path following of underactuated vessels with finite-time convergence.
Neurocomputing, 2020

Fog computing-based privacy preserving data aggregation protocols.
Trans. Emerg. Telecommun. Technol., 2020

A Survey of Technologies for Unmanned Merchant Ships.
IEEE Access, 2020

2019
Special issue on big data for IoT cloud computing convergence.
Web Intell., 2019

Artificial Neural Networks for Volt/VAR Control of DER Inverters at the Grid Edge.
IEEE Trans. Smart Grid, 2019

ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2019

Adaptive leader-following formation control with collision avoidance for a class of second-order nonlinear multi-agent systems.
Neurocomputing, 2019

True Coalition Formation of Bio-inspired Mobile Sensors or Robots on Intrusion Detection - Part 1: Theoretical Modeling.
Ad Hoc Sens. Wirel. Networks, 2019

True Coalition Formation of Bio-inspired Mobile Sensors or Robots on Intrusion Detection -Part 2: Evaluation and Simulations.
Ad Hoc Sens. Wirel. Networks, 2019

A Decision Tree Based Road Recognition Approach Using Roadside Fixed 3D LiDAR Sensors.
IEEE Access, 2019

Prototyping Flow-Net Logging for Accountability Management in Linux Operating Systems.
IEEE Access, 2019

AR<sub>P</sub>ILC: An Approach for Short-Term Prediction of Freeway Entrance Flow.
IEEE Access, 2019

DNS Flood Attack Mitigation Utilizing Hot-Lists and Stale Content Updates.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A Review of Research on Port Throughput Forecasting.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

Encoding Space to Count Multi-Targets with Multiplexed Binary Infrared Sensors.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

Grouping based on Comparison of data and Grouping Consecutive Data for Logging Visualization.
Proceedings of the 2nd International Conference on Computer Science and Software Engineering, 2019

Mitigation Process for DNS Flood Attacks.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Deploying Throwboxes to Enhance Fault-Tolerance Performance in Delay Tolerant Networks.
Wirel. Pers. Commun., 2018

A Deferrable Energy Scheduling Algorithm in Smart Grid Distribution.
Mob. Networks Appl., 2018

Trade-off of security and performance of lightweight block ciphers in Industrial Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2018

Improving performance of transactional memory through machine learning.
Concurr. Comput. Pract. Exp., 2018

Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid.
Comput. Secur., 2018

FNF: Flow-net based fingerprinting and its applications.
Comput. Secur., 2018

2017
Bio-inspired Patrolling Scheme Design in Wireless and Mobile Sensor and Robot Networks.
Wirel. Pers. Commun., 2017

P-Accountability: A Quantitative Study of Accountability in Networked Systems.
Wirel. Pers. Commun., 2017

Performance Analysis of the Industrial Wireless Networks Standard: WIA-PA.
Mob. Networks Appl., 2017

Provably secure CL-KEM-based password-authenticated key exchange protocol.
Int. J. Sens. Networks, 2017

Extensible time synchronisation protocol for wireless sensor networks.
Int. J. Sens. Networks, 2017

Malicious device inspection home area network in smart grids.
Int. J. Sens. Networks, 2017

Studying the capture of stochastic events using radar and a mobile robot.
Int. J. Sens. Networks, 2017

A survey of intrusion detection systems in smart grid.
Int. J. Sens. Networks, 2017

Accountable administration in operating systems.
Int. J. Inf. Comput. Secur., 2017

A survey of distributed denial-of-service attack, prevention, and mitigation techniques.
Int. J. Distributed Sens. Networks, 2017

Utilisation and energy consumption of fair-access in sensor networks with selected grid topologies.
Int. J. Ad Hoc Ubiquitous Comput., 2017

NFD: Non-technical loss fraud detection in Smart Grid.
Comput. Secur., 2017

A novel detector to detect colluded non-technical loss frauds in smart grid.
Comput. Networks, 2017

Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid.
Comput. J., 2017

An Adaptive Vehicle Detection Algorithm Based on Magnetic Sensors in Intelligent Transportation Systems.
Ad Hoc Sens. Wirel. Networks, 2017

Time Synchronization for Wireless Sensor Networks with a Mobile Node.
Ad Hoc Sens. Wirel. Networks, 2017

Enhancements of Temporal Accountability in Medical Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017

FNF: flow-net based fingerprinting.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

An Intrusion Detection Scheme in TCP/IP Networks Based on Flow-Net and Fingerprint.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

2016
IP<sup>2</sup>DM: integrated privacy-preserving data management architecture for smart grid V2G networks.
Wirel. Commun. Mob. Comput., 2016

Assessing the Feasibility of Passive and BAP RFID Communications on Construction Site Scenarios.
IEEE Syst. J., 2016

Computer operating system logging and security issues: a survey.
Secur. Commun. Networks, 2016

A survey of accountability in computer networks and distributed systems.
Secur. Commun. Networks, 2016

Home area network accountability with varying consumption devices in smart grid.
Secur. Commun. Networks, 2016

Design a fast Non-Technical Loss fraud detector for smart grid.
Secur. Commun. Networks, 2016

Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model.
Inf. Sci., 2016

Security Issues in ProtoGENI.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2016

Water quality monitoring using STORM 3 Data Loggers and a wireless sensor network.
Int. J. Sens. Networks, 2016

Privacy preservation for V2G networks in smart grid: A survey.
Comput. Commun., 2016

Non-intrusive Traffic Data Collection with Wireless Sensor Networks for Intelligent Transportation Systems.
Ad Hoc Sens. Wirel. Networks, 2016

CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

CO<sub>2</sub>: Design Fault-Tolerant Relay Node Deployment Strategy for Throwbox-Based DTNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Big Data Security Analytic for Smart Grid with Fog Nodes.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Improving Performance of Transactional Applications through Adaptive Transactional Memory.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Non-Technical Loss Fraud in Advanced Metering Infrastructure in Smart Grid.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Combating TNTL: Non-Technical Loss Fraud Targeting Time-Based Pricing in Smart Grid.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2015

Monitoring power transmission lines using a wireless sensor network.
Wirel. Commun. Mob. Comput., 2015

Bio-inspired Group Modeling and Analysis for Intruder Detection in Mobile Sensor/Robotic Networks.
IEEE Trans. Cybern., 2015

Auditing overhead, auditing adaptation, and benchmark evaluation in Linux.
Secur. Commun. Networks, 2015

Smart Grid Attacks and Countermeasures.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015

ProtoGENI experiments.
Int. J. Secur. Networks, 2015

Network forensics analysis using Wireshark.
Int. J. Secur. Networks, 2015

Security tests and attack experimentations of ProtoGENI.
Int. J. Secur. Networks, 2015

Robust Localization Algorithm Based on the RSSI Ranging Scope.
Int. J. Distributed Sens. Networks, 2015

Polling in the frequency domain: a new MAC protocol for industrial wireless network for factory automation.
Int. J. Ad Hoc Ubiquitous Comput., 2015

A multi-resolution accountable logging and its applications.
Comput. Networks, 2015

Linux auditing: Overhead and adaptation.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Accountable logging in operating systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

BCGI: A fast approach to detect malicious meters in neighborhood area smart grid.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

IP<sup>2</sup>DM for V2G networks in Smart Grid.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Automatic Optimization of Software Transactional Memory Through Linear Regression and Decision Tree.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Accountability and Q-Accountable Logging in Wireless Networks.
Wirel. Pers. Commun., 2014

Deterministic deployment based on information coverage in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014

The effects of wireless communication failures on group behavior of mobile sensors.
Wirel. Commun. Mob. Comput., 2014

Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password Theft.
IEEE Syst. J., 2014

Achieving Accountability in Smart Grid.
IEEE Syst. J., 2014

GlobalView: building global view with log files in a distributed/networked system for accountability.
Secur. Commun. Networks, 2014

Virtual flow-net for accountability and forensics of computer and network systems.
Secur. Commun. Networks, 2014

SCADA communication and security issues.
Secur. Commun. Networks, 2014

A survey of biological collaboration models.
J. Ambient Intell. Humaniz. Comput., 2014

Range-based localisation algorithms integrated with the probability of ranging error in wireless sensor networks.
Int. J. Sens. Networks, 2014

Asynchronous multi-channel neighbour discovery for energy optimisation in wireless sensor networks.
Int. J. Sens. Networks, 2014

Collision-free multichannel superframe scheduling for IEEE 802.15.4 cluster-tree networks.
Int. J. Sens. Networks, 2014

Ubiquitous Context-Awareness and Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Achieving Accountable MapReduce in cloud computing.
Future Gener. Comput. Syst., 2014

High performance mobile opportunistic systems.
Trans. Emerg. Telecommun. Technol., 2014

A Survey of Cross-Layer Designs in Wireless Networks.
IEEE Commun. Surv. Tutorials, 2014

NFD: A practical scheme to detect non-technical loss fraud in smart grid.
Proceedings of the IEEE International Conference on Communications, 2014

A multi-resolution flow-net methodology for accountable logging and its application in TCP/IP networks.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Random time source protocol in wireless sensor networks and synchronization in industrial environments.
Wirel. Commun. Mob. Comput., 2013

Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids.
IEEE Trans. Smart Grid, 2013

A critical line based boundary surveillance strategy in wireless sensor networks.
Telecommun. Syst., 2013

Stochastic event capturing with a single mobile robot in rectangular perimeters.
Telecommun. Syst., 2013

Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks.
IEEE Syst. J., 2013

FTDA: outlier detection-based fault-tolerant data aggregation for wireless sensor networks.
Secur. Commun. Networks, 2013

Nonintrusive tracing in the Internet.
Secur. Commun. Networks, 2013

Cipher feedback mode under go-back-N and selective-reject protocols in error channels.
Secur. Commun. Networks, 2013

Disturbance attenuation for nonlinear switched descriptor systems based on neural network.
Neural Comput. Appl., 2013

Mobile sensor intrusion detection under any shape of curve.
Math. Comput. Model., 2013

Energy-aware utility optimisation for joint multi-path routing and MAC layer retransmission control in TDMA-based wireless sensor networks.
Int. J. Sens. Networks, 2013

A review of GENI authentication and access control mechanisms.
Int. J. Secur. Networks, 2013

Security and Privacy in Cloud Computing.
IEEE Commun. Surv. Tutorials, 2013

Game Theory for Network Security.
IEEE Commun. Surv. Tutorials, 2013

An update-based step-wise optimal cache replacement for wireless data access.
Comput. Networks, 2013

Non-repudiation in neighborhood area networks for smart grid.
IEEE Commun. Mag., 2013

2012
Tight Performance Bounds of Multihop Fair Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks.
IEEE Trans. Mob. Comput., 2012

Optimal Pipeline Paging Load Balancing for Hierarchical Cellular Networks.
IEEE Trans. Mob. Comput., 2012

A survey of cyber crimes.
Secur. Commun. Networks, 2012

A survey of security visualization for computer network logs.
Secur. Commun. Networks, 2012

Accountability using flow-net: design, implementation, and performance evaluation.
Secur. Commun. Networks, 2012

Error analysis of range-based localisation algorithms in wireless sensor networks.
Int. J. Sens. Networks, 2012

The effect of leaders on the consistency of group behaviour.
Int. J. Sens. Networks, 2012

PeerReview re-evaluation for accountability in distributed systems or networks.
Int. J. Secur. Networks, 2012

Internet of things' authentication and access control.
Int. J. Secur. Networks, 2012

A survey of communication/networking in Smart Grids.
Future Gener. Comput. Syst., 2012

Cyber Security and Privacy Issues in Smart Grids.
IEEE Commun. Surv. Tutorials, 2012

Studying the stochastic capturing of moving intruders by mobile sensors.
Comput. Math. Appl., 2012

Authentication and Access Control in the Internet of Things.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

A Class of Non-statistical Traffic Anomaly Detection in Complex Network Systems.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags.
Wirel. Commun. Mob. Comput., 2011

Wireless monitoring and control.
Wirel. Commun. Mob. Comput., 2011

A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID.
Wirel. Commun. Mob. Comput., 2011

Survey and experiments of WIA-PA specification of industrial wireless network.
Wirel. Commun. Mob. Comput., 2011

Architecture and protocol design for a pervasive robot swarm communication networks.
Wirel. Commun. Mob. Comput., 2011

Primate-Inspired Communication Methods for Mobile and Static Sensors and RFID Tags.
ACM Trans. Auton. Adapt. Syst., 2011

A Cross-Layer Approach for Prioritized Frame Transmissions of MPEG-4 Over the IEEE 802.11 and IEEE 802.11e Wireless Local Area Networks.
IEEE Syst. J., 2011

Temporal Accountability and Anonymity in Medical Sensor Networks.
Mob. Networks Appl., 2011

Wireless telemedicine and m-health: technologies, applications and research issues.
Int. J. Sens. Networks, 2011

Error compensation algorithm in wireless sensor networks synchronisation.
Int. J. Sens. Networks, 2011

Hidden information in Microsoft Word.
Int. J. Secur. Networks, 2011

Advances in multimedia communications.
Int. J. Commun. Syst., 2011

Integrity protecting hierarchical concealed data aggregation for wireless sensor networks.
Comput. Networks, 2011

Home M2M networks: Architectures, standards, and QoS improvement.
IEEE Commun. Mag., 2011

Performance analysis of ALOHA and <i>p</i>-persistent ALOHA for multi-hop underwater acoustic sensor networks.
Clust. Comput., 2011

Accountable Administration and Implementation in Operating Systems.
Proceedings of the Global Communications Conference, 2011

Building Accountable Smart Grids in Neighborhood Area Networks.
Proceedings of the Global Communications Conference, 2011

Polynomial Regression Based Secure Data Aggregation for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

Accountability in smart grids.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Weaving a proper net to catch large objects in wireless sensor networks.
IEEE Trans. Wirel. Commun., 2010

Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs.
IEEE Trans. Wirel. Commun., 2010

Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches.
IEEE Trans. Veh. Technol., 2010

Studying Bio-Inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory.
IEEE Trans. Syst. Man Cybern. Part B, 2010

Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks.
IEEE Trans. Ind. Electron., 2010

Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed.
IEEE Trans. Ind. Electron., 2010

Special issue on "security for multimedia and ubiquitous applications".
Telecommun. Syst., 2010

Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks.
IEEE Trans. Computers, 2010

Performance Analysis of Contention Based Bandwidth Request Mechanisms in WiMAX Networks.
IEEE Syst. J., 2010

MRL-CC: a novel cooperative communication protocol for QoS provisioning in wireless sensor networks.
Int. J. Sens. Networks, 2010

Dynamic bandwidth partition schemes for integrated voice, video, and data traffic in the IEEE 802.11e distributed wireless LANs.
Int. J. Commun. Syst., 2010

A Survey of Payment Card Industry Data Security Standard.
IEEE Commun. Surv. Tutorials, 2010

Scheduling on-demand data broadcast in mixed-type request environments.
Comput. Networks, 2010

IEEE 802.11 user fingerprinting and its applications for intrusion detection.
Comput. Math. Appl., 2010

Cross Layer Optimization for Energy-Constrained Wireless Sensor Networks: Joint Rate Control and Routing.
Comput. J., 2010

Power Management Scheduling for Low Rate Wireless Sensor Networks.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010

PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Sensor Distribution on Coverage in Sensor Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

Studying Non-intrusive Tracing in the Internet.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

A Quantitative Study of Accountability in Wireless Multi-hop Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

A Reliable Energy Efficient Algorithm for Target Coverage in Wireless Sensor Networks.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Signature Maximization in Designing Wireless Binary Pyroelectric Sensors.
Proceedings of the Global Communications Conference, 2010

An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks.
Proceedings of the Global Communications Conference, 2010

2009
Two-level protection and guarantee for multimedia traffic in IEEE 802.11e distributed WLANs.
Wirel. Networks, 2009

E<sup>2</sup>SRT: enhanced event-to-sink reliable transport for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2009

Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare.
Wirel. Commun. Mob. Comput., 2009

On hierarchical pipeline paging in multi-tier overlaid hierarchical cellular networks.
IEEE Trans. Wirel. Commun., 2009

Stream-based cipher feedback mode in wireless error channel.
IEEE Trans. Wirel. Commun., 2009

Optimization between AES security and performance for IEEE 802.15.3 WPAN.
IEEE Trans. Wirel. Commun., 2009

Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks.
IEEE Trans. Wirel. Commun., 2009

Energy Management Analysis and Enhancement in IEEE 802.16e WirelessMAN.
IEEE Trans. Veh. Technol., 2009

Error Analysis and Kernel Density Approach of Scheduling Sleeping Nodes in Cluster-Based Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2009

<i>eMAC</i> - A Medium-Access Control Protocol for the Next-Generation Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2009

Modeling Nonsaturated Contention-Based IEEE 802.11 Multihop Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2009

Hybrid Geographic Routing for Flexible Energy - Delay Tradeoff.
IEEE Trans. Veh. Technol., 2009

Aggregation with fragment retransmission for very high-speed WLANs.
IEEE/ACM Trans. Netw., 2009

Multiple Human Tracking and Identification With Wireless Distributed Pyroelectric Sensor Systems.
IEEE Syst. J., 2009

Building a wireless capturing tool for WiFi.
Secur. Commun. Networks, 2009

NTRU-based sensor network security: a low-power hardware implementation perspective.
Secur. Commun. Networks, 2009

A survey of anonymity in wireless communication systems.
Secur. Commun. Networks, 2009

Flow-net methodology for accountability in wireless networks.
IEEE Netw., 2009

Delay-Constrained Optimal Data Aggregation in Hierarchical Wireless Sensor Networks.
Mob. Networks Appl., 2009

ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Recent Advances in IEEE 802.11 WLANs: Protocols, Solutions and Future Directions".
Mob. Networks Appl., 2009

Congestion-aware, loss-resilient bio-monitoring sensor networking for mobile health applications.
IEEE J. Sel. Areas Commun., 2009

Primate social systems, scent-marking and their applications in mobile and static sensor networks.
Int. J. Sens. Networks, 2009

Bio-inspired visual attention in agile sensing for target detection.
Int. J. Sens. Networks, 2009

IPSA: a novel architecture design for integrating IP and sensor networks.
Int. J. Sens. Networks, 2009

Attacks and countermeasures in multi-hop Cognitive Radio Networks.
Int. J. Secur. Networks, 2009

Wireless Network Security.
EURASIP J. Wirel. Commun. Netw., 2009

Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures.
EURASIP J. Wirel. Commun. Netw., 2009

Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks.
Comput. Networks, 2009

Secure data aggregation in wireless sensor networks: A comprehensive overview.
Comput. Networks, 2009

Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications.
Ad Hoc Networks, 2009

Performance analysis of random access multi-hop ad hoc networks: An analytical approach.
Proceedings of the 2nd IFIP Wireless Days, 2009

Energy Consumption of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies.
Proceedings of the Wireless Algorithms, 2009

A novel cooperative communication protocol for QoS provisioning in wireless sensor networks.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

Unreachability problem in mobile ad hoc networks: A medium access control perspective.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Performance Limits of Fair-Access in Underwater Sensor Networks.
Proceedings of the ICPP 2009, 2009

Performance Analysis of p-Persistent Aloha for Multi-hop Underwater Acoustic Sensor Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2009

Error Analysis of Scheduling Sleeping Nodes in Wireless Sensor Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2009

Primate-Inspired Scent Marking for Mobile and Static Sensors and RFID Tags.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

An Optimal Sensor Network for Intrusion Detection.
Proceedings of IEEE International Conference on Communications, 2009

Fragmentation and AES Encryption Overhead in Very High-Speed Wireless LANs.
Proceedings of IEEE International Conference on Communications, 2009

A Linear Time Synchronization Algorithm for Underwater Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

Density-Varying High-End Sensor Placement in Heterogeneous Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

Modeling IEEE 802.11 DCF Using Parallel Space-Time Markov Chain: Multi-Hop Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Experiments on an Election Algorithm for Decision Element Failures in 4D Future Internet Architecture.
Proceedings of the Communication and Networking, 2009

Modeling collaborative robots for detecting intrusions.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

Bio-inspired true coalition formation on intrusion detection by mobile robots.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
Analysis of energy consumption for multiple object identification system with active RFID tags.
Wirel. Commun. Mob. Comput., 2008

Target tracking based on a distributed particle filter in underwater sensor networks.
Wirel. Commun. Mob. Comput., 2008

Vertical and horizontal synchronization services with outlier detection in underwater acoustic networks.
Wirel. Commun. Mob. Comput., 2008

Low-cost wireless sensor networks for remote cardiac patients monitoring applications.
Wirel. Commun. Mob. Comput., 2008

Increasing network lifetime by balancing node energy consumption in heterogeneous sensor networks.
Wirel. Commun. Mob. Comput., 2008

Variable bit rate VOiP in IEEE 802.11e wireless LANs.
IEEE Wirel. Commun., 2008

Queueing analysis for OFDM subcarrier allocation in broadband wireless multiservice networks.
IEEE Trans. Wirel. Commun., 2008

An Enhanced Fast Handover with Low Latency for Mobile IPv6.
IEEE Trans. Wirel. Commun., 2008

Modeling IEEE 802.11 DCF Using Parallel Space-Time Markov Chain.
IEEE Trans. Veh. Technol., 2008

Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks.
IEEE Trans. Veh. Technol., 2008

Retrieving knowledge from auditing log-files for computer and network forensics and accountability.
Secur. Commun. Networks, 2008

An energy-aware and intelligent cluster-based event detection scheme in wireless sensor networks.
Int. J. Sens. Networks, 2008

Spectrum sensing in cognitive radio sensor networks: towards ultra low overhead, distributed channel findings.
Int. J. Sens. Networks, 2008

Wireless Telemedicine and Applications.
EURASIP J. Wirel. Commun. Netw., 2008

Temperature-Aware Routing for Telemedicine Applications in Embedded Biomedical Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2008

Continuous Drug Infusion for Diabetes Therapy: A Closed-Loop Control System Design.
EURASIP J. Wirel. Commun. Netw., 2008

Security co-existence of wireless sensor networks and RFID for pervasive computing.
Comput. Commun., 2008

Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing.
Comput. Commun., 2008

Scalability study of cache access mechanisms in multiple-cell wireless networks.
Comput. Networks, 2008

Accountability for wireless LANs, ad hoc networks, and wireless mesh networks.
IEEE Commun. Mag., 2008

Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining.
Ad Hoc Networks, 2008

Receiver blocking problem in mobile ad hoc networks: Challenges & solutions.
Proceedings of the 1st IFIP Wireless Days, 2008

Dynamic Bandwidth Partition with Finer-Tune (DP-FT) Scheme for Multimedia IEEE 802.11e WLANs.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A Cross-Layer Approach for Frame Transmissions of MPEG-4 over the IEEE 802.11e Wireless Local Area Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Correlation-Based Security in Time Synchronization of Sensor Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A New Approach on Analysis of IEEE 802.11 DCF in Non-Saturated Wireless Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

A simple algorithm for fault-tolerant topology control in wireless sensor network.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

IEEE 802.11 Distributed Coordination Function service time and queuing delay analysis using Parallel Space - Time Markov Chain.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the MSN 2008, 2008

On-Demand Anonymous Routing with Distance Vector Protecting Traffic Privacy in Wireless Multi-hop Networks.
Proceedings of the MSN 2008, 2008

Active Protection in Wireless Networking.
Proceedings of the MSN 2008, 2008

Adaptive Frame Concatenation Mechanisms for QoS in Multi-Rate Wireless Ad Hoc Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Dynamic Budget Partition Scheme for Integrated Voice/Video/Data Traffic in the IEEE 802.11e WLANs.
Proceedings of IEEE International Conference on Communications, 2008

Secret Little Functions and Codebook for Protecting Users from Password Theft.
Proceedings of IEEE International Conference on Communications, 2008

A Distributed Algorithm for Finding Global Icebergs with Linked Counting Bloom Filters.
Proceedings of IEEE International Conference on Communications, 2008

Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability.
Proceedings of IEEE International Conference on Communications, 2008

Worm Propagation Dynamics in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

QOAR: Adaptive QoS Scheme in Multi-Rate Wireless LANs.
Proceedings of IEEE International Conference on Communications, 2008

A Virtual Password Scheme to Protect Passwords.
Proceedings of IEEE International Conference on Communications, 2008

Finite Load Analysis of IEEE 802.11 Distributed Coordination Function.
Proceedings of IEEE International Conference on Communications, 2008

Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Control Systems Designed for Wireless Sensor and Actuator Networks.
Proceedings of IEEE International Conference on Communications, 2008

Optimal Rate Routing in Wireless Sensor Networks with Guaranteed Lifetime.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Weaving a Proper Net to Catch Large Objects.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Lightweight Block Cipher Based on a Multiple Recursive Generator.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Distributed Collaborative Control Using Wireless Sensor and Actuator Networks.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Distributed Multi-channel Cognitive MAC Protocol for IEEE 802.11s Wireless Mesh Networks.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

2007
Radio frequency identification: technologies, applications, and research issues.
Wirel. Commun. Mob. Comput., 2007

Intrusion detection techniques in mobile ad hoc and wireless sensor networks.
IEEE Wirel. Commun., 2007

Radio resource management and protocol engineering for IEEE 802.16 [Guest Editorial].
IEEE Wirel. Commun., 2007

IEEE 802.20: mobile broadband wireless access.
IEEE Wirel. Commun., 2007

Non-Blocking Pipeline Paging with Known Location Probabilities for Wireless Systems.
IEEE Trans. Wirel. Commun., 2007

Optimal Utilization and Effects of Inaccurate Estimation in Mobile Database Failure Restoration.
IEEE Trans. Wirel. Commun., 2007

Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks.
IEEE Trans. Wirel. Commun., 2007

Pulse Waveform Dependent BER Analysis of a DS-CDMA UWB Radio Under Multiple Access and Multipath Interferences.
IEEE Trans. Wirel. Commun., 2007

Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems.
IEEE Trans. Veh. Technol., 2007

Detection of Fraudulent Usage in Wireless Networks.
IEEE Trans. Veh. Technol., 2007

Bandwidth Sharing Schemes for Multimedia Traffic in the IEEE 802.11e Contention-Based WLANs.
IEEE Trans. Mob. Comput., 2007

On-Bound Selection Cache Replacement Policy for Wireless Data Access.
IEEE Trans. Computers, 2007

Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks.
Int. J. Wirel. Mob. Comput., 2007

A prototype underwater acoustic sensor network platform with topology-aware MAC scheme.
Int. J. Sens. Networks, 2007

Integration of mobility and intrusion detection for wireless <i>ad hoc</i> networks.
Int. J. Commun. Syst., 2007

A survey of key management schemes in wireless sensor networks.
Comput. Commun., 2007

Wireless Broadband Access: WiMAX and Beyond - Investigation of Bandwidth Request Mechanisms under Point-to-Multipoint Mode of WiMAX Networks.
IEEE Commun. Mag., 2007

Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet.
IEEE Commun. Mag., 2007

Secure data aggregation without persistent cryptographic operations in wireless sensor networks.
Ad Hoc Networks, 2007

An effective key management scheme for heterogeneous sensor networks.
Ad Hoc Networks, 2007

WTCP: Improved Performance of TCP for High Speed Wired/Wireless Internet.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Telemedicine Usage and Potentials.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Simulating MPEG-4 over the IEEE 802.11 WLANs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Real-Time Virtual Videophone for Low-bandwidth Wireless Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Modeling Detection Metrics in Randomized Scheduling Algorithm in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

An Analytical Model of the ODPLAU Scheme for Telecommunication Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Coarse-Grained Scheduling for Gateway Nodes in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Asymptotic Coverage and Detection in Randomized Scheduling Algorithm in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Paging Schemes Performance for Wireless Systems.
Proceedings of the Global Communications Conference, 2007

LTRT: Least Total-Route Temperature Routing for Embedded Biomedical Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Effect of Channel Errors on Time Synchronization in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

A Cost Model for Scheduling On-Demand Data Broadcast in Mixed-Type Request Environments.
Proceedings of the Global Communications Conference, 2007

Performance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies.
Proceedings of the Global Communications Conference, 2007

A Secure Time Synchronization Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2007

A Pseudo-Random Function Based Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Invalidation Report Scalability of Cache Access Mechanisms in Future Multiple-Cell Wireless Internet.
Proceedings of the Global Communications Conference, 2007

Towards a Secure, RFID / Sensor Based Telecardiology System.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

Wireless Telemedicine and M-Heath.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Efficient MAC strategies for the IEEE 802.11n wireless LANs.
Wirel. Commun. Mob. Comput., 2006

Investigation of the block ACK scheme in wireless ad hoc networks.
Wirel. Commun. Mob. Comput., 2006

Secure cell relay routing protocol for sensor networks.
Wirel. Commun. Mob. Comput., 2006

QoS guarantee and provisioning at the contention-based wireless MAC layer in the IEEE 802.11e wireless LANs.
IEEE Wirel. Commun., 2006

The OCC-CDMA/OS for 4G wireless.
IEEE Veh. Technol. Mag., 2006

Optimal paging load balance with total delay constraint in macrocell-microcell hierarchical cellular networks.
IEEE Trans. Wirel. Commun., 2006

Optimal periodic location area update for mobile telecommunications networks.
IEEE Trans. Wirel. Commun., 2006

Enhancing security using mobility-based anomaly detection in cellular mobile networks.
IEEE Trans. Veh. Technol., 2006

Voice capacity analysis of WLAN with unbalanced traffic.
IEEE Trans. Veh. Technol., 2006

On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE 802.11 Distributed Wireless LANs.
IEEE Trans. Parallel Distributed Syst., 2006

Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2006

Performance Evaluation of Pipeline Paging under Paging Delay Constraint for Wireless Systems.
IEEE Trans. Mob. Comput., 2006

Optimal Callback with Two-Level Adaptation for Wireless Data Access.
IEEE Trans. Mob. Comput., 2006

Update-Based Cache Access and Replacement in Wireless Data Access.
IEEE Trans. Mob. Comput., 2006

A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks.
Mob. Networks Appl., 2006

Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems.
IEEE J. Sel. Areas Commun., 2006

Generalized pairwise complementary codes with set-wise uniform interference-free windows.
IEEE J. Sel. Areas Commun., 2006

Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs.
Int. J. Wirel. Mob. Comput., 2006

Energy efficient Chessboard Clustering and routing in heterogeneous sensor networks.
Int. J. Wirel. Mob. Comput., 2006

A connection-level call admission control using genetic algorithm for multi-class multimedia services in wireless networks.
Int. J. Mob. Commun., 2006

VoIP over WLAN: voice capacity, admission control, QoS, and MAC.
Int. J. Commun. Syst., 2006

Using Talking Heads for Real-Time Virtual Videophone in Wireless Networks.
IEEE Multim., 2006

Wireless Network Security.
EURASIP J. Wirel. Commun. Netw., 2006

MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2006

Energy-efficient scheduling and MAC for sensor networks, WPANs, WLANs, and WMANs.
Comput. Commun., 2006

A lightweight secure protocol for wireless sensor networks.
Comput. Commun., 2006

An energy diffserv and application-aware MAC scheduling for VBR streaming video in the IEEE 802.15.3 high-rate wireless personal area networks.
Comput. Commun., 2006

Security and privacy in RFID and applications in telemedicine.
IEEE Commun. Mag., 2006

Cache access and replacement for future wireless Internet.
IEEE Commun. Mag., 2006

A New MAC Scheme for Very High-Speed WLANs.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Pipeline Probability Paging for Wireless Systems.
Proceedings of IEEE International Conference on Communications, 2006

Periodic Location Area Update Schemes for UMTS 3G Mobile Networks: Optimality and Comparison.
Proceedings of IEEE International Conference on Communications, 2006

A LCG-based Secure Protocol for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

Asymptotical keep-best Cache Replacement Policy for Wireless Data Access.
Proceedings of IEEE International Conference on Communications, 2006

Channel Allocation Algorithms for Three-tier Wireless Local Loops.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Performance Analysis of Advanced Encryption Standard (AES).
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Hierarchical Pipeline Paging in Hierarchical Wireless Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Maximizing Network Lifetime under QoS Constraints in Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

On Evaluating and Optimizing Pipeline Probability Paging under QoS constraints in Wireless Systems.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Configurable Acknowledgment Delay (CAD) Mechanism for Asymmetric Space-Internet Links.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Enhancing Security using Calling Activity for Wireless Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Lightweight Secure Solution for RFID.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Enhancing Security using Mobility Profile for Cellular Mobile Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Security Issues in the IEEE 802.15.3 WPANs.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

An Efficient Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Secure Routing Protocol for Heterogeneous Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Step-wise Optimal Cache Replacement for Wireless Data Access In Next Generation Wireless Internet.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Adaptive ACK schemes of the IEEE 802.15.3 MAC for the ultra-wideband system.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Performance analysis of an energy saving mechanism in the IEEE 802.16e wireless MAN.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Contention-based QoS MAC mechanisms for VBR VoIP in IEEE 802.11e wireless LANs.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Special Issue: Mobility, Paging, and Quality of Service Management for Future Wireless Networks.
Wirel. Commun. Mob. Comput., 2005

Architecture, mobility management, and quality of service for integrated 3G and WLAN networks.
Wirel. Commun. Mob. Comput., 2005

Proportional degradation services in wireless/mobile adaptive multimedia networks.
Wirel. Commun. Mob. Comput., 2005

Saturation throughput analysis of error-prone 802.11 wireless networks.
Wirel. Commun. Mob. Comput., 2005

IEEE 802.11n: enhancements for higher throughput in wireless LANs.
IEEE Wirel. Commun., 2005

Which transmission mechanism is best for space Internet: window-based, rate-based, or a hybrid of the two?
IEEE Wirel. Commun., 2005

IEEE 802.11 performance enhancement via concatenation and piggyback mechanisms.
IEEE Trans. Wirel. Commun., 2005

Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs.
IEEE Trans. Wirel. Commun., 2005

Differentiation, QoS Guarantee, and Optimization for Real-Time Traffic over One-Hop Ad Hoc Networks.
IEEE Trans. Parallel Distributed Syst., 2005

Lightweight Deployment-Aware Scheduling for Wireless Sensor Networks.
Mob. Networks Appl., 2005

Performance study of multiple route dynamic source routing protocols for mobile ad hoc networks.
J. Parallel Distributed Comput., 2005

Energy saving mechanism in the IEEE 802.16e wireless MAN.
IEEE Commun. Lett., 2005

Pipeline paging for wireless systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Voice Capacity Analysis of WLAN with Unbalanced Traffic.
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2005), 2005

Reservation and Grouping Stations for the IEEE 802.11 DCF.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Security services and enhancements in the IEEE 802.15.4 wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Paging load balance in hierarchical cellular networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Optimal stream-based cipher feedback mode in error channel.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Analytically modeling pipeline paging for wireless systems.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

An adaptive callback cache access for wireless Internet.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Vulnerabilities and security enhancements for the IEEE 802.11 WLANs.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Performance analysis of server-based poll-each-read in wireless Internet.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Energy saving mechanisms in sensor networks.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

Performance analysis of the ieee 802.11e block ACK scheme in a noisy channel.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

Update-based cache replacement policies in wireless data access.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

2004
IEEE 802.11e: QoS provisioning at the MAC layer.
IEEE Wirel. Commun., 2004

On optimizing energy consumption for mobile handsets.
IEEE Trans. Veh. Technol., 2004

Local data control and admission control for QoS support in wireless ad hoc networks.
IEEE Trans. Veh. Technol., 2004

Hierarchical implicit deregistration with forced registrations in 3G wireless networks.
IEEE Trans. Veh. Technol., 2004

Design and Analysis of Location Management for 3G Cellular Networks.
IEEE Trans. Parallel Distributed Syst., 2004

Voice and Video Transmissions with Global Data Parameter Control for the IEEE 802.11e Enhance Distributed Channel Access.
IEEE Trans. Parallel Distributed Syst., 2004

A simulation study of overflow replacement policies for location management in mobile networks.
Int. J. Mob. Commun., 2004

Backoff strategies for demand re-registration in PCS database failure recover.
Comput. Commun., 2004

Evaluation of distributed admission control for the IEEE 802.11e EDCA.
IEEE Commun. Mag., 2004

Protection and Guarantee for Voice and Video Traffic in IEEE 802.11e Wireless LANs.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

A Dynamic HLR Location Management Scheme for PCS Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

An Analysis for Differentiated Services in IEEE 802.11 and IEEE 802.11e Wireless LANs.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
Hierarchical mobility database overflow control.
Wirel. Commun. Mob. Comput., 2003

Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

A parallel shuffled paging strategy under delay bounds in wireless systems.
IEEE Commun. Lett., 2003

A dynamic anchor-cell assisted paging with an optimal timer for PCS networks.
IEEE Commun. Lett., 2003

A simple and effective priority scheme for IEEE 802.11.
IEEE Commun. Lett., 2003

Optimal fractional movement-based scheme for PCS location management.
IEEE Commun. Lett., 2003

Optimal location management for two-tier PCS networks.
Comput. Commun., 2003

Enhanced DCF of IEEE 802.11e to support QoS.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Location Update for PCS Networks with a Fractional Movement Threshold.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

A New Overflow Replacement Policy for Efficient Location Management in Mobile Networks.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

Implicit deregistration in 3G cellular networks.
Proceedings of IEEE International Conference on Communications, 2003

Movement-based location management for 3G cellular networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Throughput and delay limits of IEEE 802.11.
IEEE Commun. Lett., 2002

Bandwidth degradation QoS provisioning for adaptive multimedia in wireless/mobile networks.
Comput. Commun., 2002

2001
QoS for Adaptive Multimedia in Wireless/Mobile Networks.
Proceedings of the 9th International Workshop on Modeling, 2001

An Optimal Power Saving Scheme for Mobile Handsets.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

Improving degradation and fairness for mobile adaptive multimedia wireless networks.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

2000
An Optimal Distributed Call Admission Control for Adaptive Multimedia in Wireless/Mobile Networks.
Proceedings of the MASCOTS 2000, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 29 August, 2000

Quality of service provisioning framework for multimedia traffic in wireless/mobile networks.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000


  Loading...