If you made any changes in Pure, your changes will be visible here soon.

Research Output 2001 2019

  • 3871 Citations
  • 34 h-Index
  • 68 Conference contribution
  • 42 Article
  • 1 Chapter
  • 1 Review article
2011
39 Citations (Scopus)

SAT: A security architecture achieving anonymity and traceability in wireless mesh networks

Sun, J., Zhang, C., Zhang, Y. & Fang, Y., 2011, In : IEEE Transactions on Dependable and Secure Computing. 8, 2, p. 295-307 13 p., 5374418.

Research output: Contribution to journalArticle

Wireless mesh networks (WMN)
Authentication

SOI MESFETs for extreme environment buck regulators

Lepkowski, W., Goryll, M., Wilk, S. J., Zhang, Y., Sochacki, J. & Thornton, T., 2011, Proceedings - IEEE International SOI Conference. 6081696

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Radiation
Testing
2010
25 Citations (Scopus)

A Coverage Inference Protocol for Wireless Sensor Networks

Zhang, C., Zhang, Y. & Fang, Y., Jun 2010, In : IEEE Transactions on Mobile Computing. 9, 6, p. 850-864 15 p., 10.

Research output: Contribution to journalArticle

Sensor nodes
Wireless sensor networks
Network protocols
Base stations
Time measurement
196 Citations (Scopus)

An identity-based security system for user privacy in vehicular ad hoc networks

Sun, J., Zhang, C., Zhang, Y. & Fang, Y., 2010, In : IEEE Transactions on Parallel and Distributed Systems. 21, 9, p. 1227-1239 13 p., 5383352.

Research output: Contribution to journalArticle

Vehicular ad hoc networks
Security systems
Authentication
Law enforcement
Cryptography

Editorial special section on wireless network security and privacy

Zhang, Y., Feb 2010, In : IEEE Transactions on Vehicular Technology. 59, 2, p. 518 1 p., 5415852.

Research output: Contribution to journalArticle

Network Security
Network security
Privacy
Wireless Networks
Wireless networks
35 Citations (Scopus)

PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks

Ren, K., Yu, S., Lou, W. & Zhang, Y., Feb 2010, In : IEEE Transactions on Parallel and Distributed Systems. 21, 2, p. 203-215 13 p., 4815227.

Research output: Contribution to journalArticle

Wireless mesh networks (WMN)
Access control
Authentication
Internet
Network protocols
146 Citations (Scopus)

PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems

Shi, J., Zhang, R., Liu, Y. & Zhang, Y., 2010, Proceedings - IEEE INFOCOM. 5462147

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Agglomeration
Servers
8 Citations (Scopus)

Security and privacy in emerging wireless networks

Cao, G., Hubaux, J. P., Kim, Y. & Zhang, Y., Oct 2010, In : IEEE Wireless Communications. 17, 5, p. 10-11 2 p., 5416337.

Research output: Contribution to journalArticle

Delay tolerant networks
Wireless networks
Wireless mesh networks (WMN)
Mobile ad hoc networks
Wireless sensor networks
8 Citations (Scopus)

Traffic inference in anonymous MANETs

Liu, Y., Zhang, R., Shi, J. & Zhang, Y., 2010, SECON 2010 - 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 5508207

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Telecommunication traffic
Routing protocols
Network routing
57 Citations (Scopus)

Verifiable fine-grained top-k queries in tiered sensor networks

Zhang, R., Shi, J., Liu, Y. & Zhang, Y., 2010, Proceedings - IEEE INFOCOM. 5461927

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor nodes
Sensor networks
Telecommunication networks
Denial-of-service attack
33 Citations (Scopus)

Wormhole-resilient secure neighbor discovery in underwater acoustic networks

Zhang, R. & Zhang, Y., 2010, Proceedings - IEEE INFOCOM. 5462093

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Underwater acoustics
Network protocols
Direction of arrival
Wireless networks
Synchronization
2009
1 Citation (Scopus)

An adaptive resource allocation scheme for GPRS/EDGE towards 3G

Zhang, Y. & Gao, Z., 2009, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5303117

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Resource allocation
utilization
resources
traffic
Throughput
61 Citations (Scopus)

Dependable and secure sensor data storage with dynamic integrity assurance

Wang, Q., Ren, K., Lou, W. & Zhang, Y., 2009, Proceedings - IEEE INFOCOM. p. 954-962 9 p. 5062006

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Wireless sensor networks
Sensors
Information management
Redundancy
36 Citations (Scopus)

DP 2AC: Distributed privacy-preserving access control in sensor networks

Zhang, R., Zhang, Y. & Ren, K., 2009, Proceedings - IEEE INFOCOM. p. 1251-1259 9 p. 5062039

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Sensor networks
Sensor nodes
Communication
61 Citations (Scopus)

Localized algorithms for coverage boundary detection in wireless sensor networks

Zhang, C., Zhang, Y. & Fang, Y., Jan 2009, In : Wireless Networks. 15, 1, p. 3-20 18 p.

Research output: Contribution to journalArticle

Wireless sensor networks
Sensor nodes
Base stations
Energy efficiency
Scalability
67 Citations (Scopus)

Multi-user broadcast authentication in wireless sensor networks

Ren, K., Yu, S., Lou, W. & Zhang, Y., 2009, In : IEEE Transactions on Vehicular Technology. 58, 8, p. 4554-4564 11 p.

Research output: Contribution to journalArticle

Broadcast
Authentication
Wireless Sensor Networks
Wireless sensor networks
Message Authentication
4 Citations (Scopus)

On address privacy in mobile Ad Hoc networks

Zhang, Y. & Ren, K., Apr 2009, In : Mobile Networks and Applications. 14, 2, p. 188-197 10 p.

Research output: Contribution to journalArticle

Mobile ad hoc networks
Entropy
39 Citations (Scopus)

Secure multidimensional range queries in sensor networks

Zhang, R., Shi, J. & Zhang, Y., 2009, Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). p. 197-206 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor nodes
Sensor networks
Query processing
Data storage equipment
71 Citations (Scopus)

Secure range queries in tiered sensor networks

Shi, J., Zhang, R. & Zhang, Y., 2009, Proceedings - IEEE INFOCOM. p. 945-953 9 p. 5062005

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query processing
Sensor nodes
Sensor networks
Data storage equipment
15 Citations (Scopus)

Securing resource-constrained wireless ad hoc networks

Fang, Y., Zhu, X. & Zhang, Y., Apr 2009, In : IEEE Wireless Communications. 16, 2, p. 24-29 6 p., 4907556.

Research output: Contribution to journalArticle

Wireless ad hoc networks
Internet
Wireless networks
Heterogeneous networks
Mobile devices
62 Citations (Scopus)

SPREAD: Improving network security by multipath routing in mobile ad hoc networks

Lou, W., Liu, W., Zhang, Y. & Fang, Y., Apr 2009, In : Wireless Networks. 15, 3, p. 279-294 16 p.

Research output: Contribution to journalArticle

Network security
Mobile ad hoc networks
Mathematical models
2008
13 Citations (Scopus)

Efficient user revocation for privacy-aware PKI

Ren, W., Ren, K., Lou, W. & Zhang, Y., 2008, QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. ICST

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Communication
Costs
99 Citations (Scopus)

LEDS: Providing location-aware end-to-end data security in wireless sensor networks

Ren, K., Lou, W. & Zhang, Y., May 2008, In : IEEE Transactions on Mobile Computing. 7, 5, p. 585-598 14 p., 4358997.

Research output: Contribution to journalArticle

Security of data
Wireless sensor networks
Availability
Sensor nodes
Authentication
1 Citation (Scopus)

Opportunistic cooperation with receiver-based ratio combining strategy

Wang, Q., Ren, K., Zhang, Y. & Zhu, B., 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5258 LNCS. p. 361-372 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5258 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Convex optimization
Maximal Ratio Combining
Communication systems
Receiver
Energy
254 Citations (Scopus)

Securing wireless sensor networks: A survey

Zhou, Y., Fang, Y. & Zhang, Y., 2008, In : IEEE Communications Surveys and Tutorials. 10, 3, p. 6-28 23 p., 4625802.

Research output: Contribution to journalArticle

Wireless sensor networks
Hardware
Communication
Sensors
Costs

Towards address privacy in mobile ad hoc networks

Zhang, Y. & Ren, K., 2008, QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. ICST

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Entropy
Monitoring
2 Citations (Scopus)

Towards secure link quality measurement in multihop wireless networks

Zeng, K., Yu, S., Ren, K., Lou, W. & Zhang, Y., 2008, GLOBECOM - IEEE Global Telecommunications Conference. p. 4946-4950 5 p. 4698721

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Throughput
Costs
2007
89 Citations (Scopus)

Access control in wireless sensor networks

Zhou, Y., Zhang, Y. & Fang, Y., Jan 2007, In : Ad Hoc Networks. 5, 1, p. 3-13 11 p.

Research output: Contribution to journalArticle

Access control
Sensor networks
Wireless sensor networks
Network protocols
Authentication
76 Citations (Scopus)

A fine-grained reputation system for reliable service selection in peer-to-peer networks

Zhang, Y. & Fang, Y., Aug 2007, In : IEEE Transactions on Parallel and Distributed Systems. 18, 8, p. 1134-1145 12 p.

Research output: Contribution to journalArticle

Reputation System
Service Selection
Peer to peer networks
Peer-to-peer Networks
Quality of Service
40 Citations (Scopus)

A secure authentication and billing architecture for wireless mesh networks

Zhang, Y. & Fang, Y., Oct 2007, In : Wireless Networks. 13, 5, p. 663-678 16 p.

Research output: Contribution to journalArticle

Wireless mesh networks (WMN)
Authentication
Cryptography
Electronic document identification systems
HIgh speed networks
66 Citations (Scopus)

A secure incentive protocol for mobile ad hoc networks

Zhang, Y., Lou, W., Liu, W. & Fang, Y., Oct 2007, In : Wireless Networks. 13, 5, p. 569-582 14 p.

Research output: Contribution to journalArticle

Mobile ad hoc networks
Throughput
Degradation
Communication

Defending against physical destruction attacks on wireless sensor networks

Zhang, C., Zhang, Y. & Fang, Y., 2007, Proceedings - IEEE Military Communications Conference MILCOM. 4086486

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Base stations
Wireless sensor networks
Network protocols
Time measurement
23 Citations (Scopus)

Multi-rate geographic opportunistic routing in wireless ad hoc networks

Zeng, K., Lou, W. & Zhang, Y., 2007, Proceedings - IEEE Military Communications Conference MILCOM. 4454897

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Throughput
Telecommunication links
Costs
48 Citations (Scopus)

Multi-user broadcast authentication in wireless sensor networks

Ren, K., Lou, W. & Zhang, Y., 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 223-232 10 p. 4292834

Research output: Chapter in Book/Report/Conference proceedingConference contribution

broadcast
Authentication
Wireless sensor networks
energy consumption
Sensor nodes
1 Citation (Scopus)

Securing resource-constrained wireless ad hoc networks

Fang, Y. & Zhang, Y., 2007, 2007 IEEE Sarnoff Symposium, SARNOFF. 4567365

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Internet
Wireless networks
resources
Network security
81 Citations (Scopus)

Stochastic channel selection in cognitive radio networks

Song, Y., Fang, Y. & Zhang, Y., 2007, GLOBECOM - IEEE Global Telecommunications Conference. p. 4878-4882 5 p. 4411835

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cognitive radio
2006
12 Citations (Scopus)

A robust and energy-efficient data dissemination framework for wireless sensor networks

Liu, W., Zhang, Y., Lou, W. & Fang, Y., Aug 2006, In : Wireless Networks. 12, 4, p. 465-479 15 p.

Research output: Contribution to journalArticle

Wireless sensor networks
Supply chain management
Sensor nodes
Telecommunication links
Energy efficiency
107 Citations (Scopus)

ARSA: An attack-resilient security architecture for multihop wireless mesh networks

Zhang, Y. & Fang, Y., Oct 2006, In : IEEE Journal on Selected Areas in Communications. 24, 10, p. 1916-1928 13 p., 1705622.

Research output: Contribution to journalArticle

Wireless mesh networks (WMN)
Authentication
Internet
7 Citations (Scopus)

Consistency of cooperative caching in mobile peer-to-peer systems over MANET

Cao, J., Zhang, Y., Xie, L. & Cao, G., Jun 1 2006, In : International Journal of Parallel, Emergent and Distributed Systems. 21, 3, p. 151-168 18 p.

Research output: Contribution to journalReview article

Mobile ad hoc networks
Scalability
Availability
Communication
51 Citations (Scopus)

Detecting coverage boundary nodes in wireless sensor networks

Zhang, C., Zhang, Y. & Fang, Y., 2006, Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06. p. 868-873 6 p. 1673261

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computational geometry
Sensor nodes
Sensor networks
Energy efficiency
Scalability
14 Citations (Scopus)

Energy conservation through resource-aware movement in heterogeneous mobile ad hoc networks

Liu, W., Zhang, Y., Fang, Y. & Lu, K., Feb 2006, In : Journal of Combinatorial Optimization. 11, 1, p. 7-20 14 p.

Research output: Contribution to journalArticle

Energy Conservation
Mobile ad hoc networks
Mobile Ad Hoc Networks
Energy conservation
Resources
1 Citation (Scopus)

Energy-efficient coverage measurement for wireless sensor networks

Zhang, C., Zhang, Y. & Fang, Y., 2006, GLOBECOM - IEEE Global Telecommunications Conference. 4151117

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Network protocols
Time measurement
Base stations
1 Citation (Scopus)

Key management in wireless sensor networks: Challenges and solutions

Zhou, Y., Zhang, Y. & Fang, Y., Jan 1 2006, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications. CRC Press, p. 445-475 31 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Wireless sensor networks
Military applications
National security
Monitoring
52 Citations (Scopus)

LEDS: Providing location-aware end-to-end data security in wireless sensor networks

Ren, K., Lou, W. & Zhang, Y., 2006, Proceedings - IEEE INFOCOM. 4146956

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Wireless sensor networks
Availability
Sensor nodes
Authentication
1 Citation (Scopus)

Localized coverage boundary detection for wireless sensor networks

Zhang, C., Zhang, Y. & Fang, Y., 2006, ACM International Conference Proceeding Series. Vol. 191. 1185390

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Sensor nodes
Base stations
Energy efficiency
Scalability
230 Citations (Scopus)

Location-based compromise-tolerant security mechanisms for wireless sensor networks

Zhang, Y., Liu, W., Lou, W. & Fang, Y., Feb 2006, In : IEEE Journal on Selected Areas in Communications. 24, 2, p. 247-260 14 p.

Research output: Contribution to journalArticle

Wireless sensor networks
Authentication
Sensor networks
Scalability
Energy conservation
140 Citations (Scopus)

MASK: Anonymous on-demand routing in mobile Ad Hoc networks

Zhang, Y., Liu, W., Lou, W. & Fang, Y., Sep 2006, In : IEEE Transactions on Wireless Communications. 5, 9, p. 2376-2385 10 p., 1687761.

Research output: Contribution to journalArticle

Mobile ad hoc networks
Mobile Ad Hoc Networks
Routing
Attack
Network layers
134 Citations (Scopus)

Secure localization and authentication in ultra-wideband sensor networks

Zhang, Y., Liu, W., Fang, Y. & Wu, D., Apr 2006, In : IEEE Journal on Selected Areas in Communications. 24, 4 I, p. 829-835 7 p.

Research output: Contribution to journalArticle

Ultra-wideband (UWB)
Authentication
Sensor networks
Wireless sensor networks
Communication
149 Citations (Scopus)

Securing mobile ad hoc networks with certificateless public keys

Zhang, Y., Liu, W., Lou, W. & Fang, Y., Oct 2006, In : IEEE Transactions on Dependable and Secure Computing. 3, 4, p. 386-399 14 p.

Research output: Contribution to journalArticle

Mobile ad hoc networks
Cryptography
Network security
2005
39 Citations (Scopus)

AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks

Zhang, Y., Liu, W., Lou, W., Fang, Y. & Kwon, Y., 2005, IEEE International Conference on Communications. Vol. 5. p. 3515-3519 5 p. WN28-1

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Ad hoc networks