Yu-Shun Wang

Orcid: 0000-0001-8489-5371

According to our database1, Yu-Shun Wang authored at least 23 papers between 2002 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
A 5.1Gb/s 60.3fJ/bit/mm PVT tolerant NoC transceiver.
Proceedings of the IEEE Asian Solid-State Circuits Conference, 2016

2015
NVGRE: Network Virtualization Using Generic Routing Encapsulation.
RFC, September, 2015

A Cyber-Attack Synergy Model Considering Both Positive and Negative Impacts from Each Attacker.
Int. J. Distributed Sens. Networks, 2015

2013
Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet.
J. Appl. Math., 2013

Maximization of Wireless Mesh Networks Survivability to Assure Service Continuity under Intelligent Attacks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
An At-Speed Test Technique for High-Speed High-order Adder by a 6.4-GHz 64-bit Domino Adder Example.
IEEE Trans. Circuits Syst. I Regul. Pap., 2012

A 2 - 8 GHz multi-phase distributed DLL using phase insertion in 90 nm.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Maximization of Network Survivability under Malicious and Epidemic Attacks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Network recovery strategies for maximization of network survivability.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

A 12 Gb/s chip-to-chip AC coupled transceiver.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

A 1.2V 6.4GHz 181ps 64-bit CD domino adder with DLL measurement technique.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

An at-speed self-testable technique for the high speed domino adder.
Proceedings of the 2011 IEEE Custom Integrated Circuits Conference, 2011

2010
Redundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent Attackers.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Efficient defense strategies to minimize attackers' success probabilities in honeynet.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2008
Problem and Applicability Statement for Better-Than-Nothing Security (BTNS).
RFC, November, 2008

2006
A Dynamic Topology and Routing Management Strategy for Virtual IP Networks.
IEICE Trans. Commun., 2006

2005
A Global X-Bone for Network Experiments.
Proceedings of the 1st International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2005), 2005

2004
Use of IPsec Transport Mode for Dynamic Routing.
RFC, September, 2004

2003
DynaBone: Dynamic Defense Using Multi-layer Internet Overlays.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

TetherNet Anti-NAT - Secure Internet Subnet Rental System.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Application Deployment in Virtual Networks Using the X-Bone.
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002


  Loading...