• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20012021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2001

    An immunity-based model for network intrusion detection

    Zhang, Y., Que, X., Wang, W. & Cheng, S., 2001, 2001 International Conferences on Info-Tech and Info-Net: A Key to Better Life, ICII 2001 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 5. p. 24-29 6 p. 983489

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2004

    Anonymous handshakes in mobile ad hoc networks

    Zhang, Y., Liu, W., Lou, W. & Fang, Y., 2004, Proceedings - IEEE Military Communications Conference MILCOM. Vol. 3. p. 1193-1199 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • DELAR: Device/energy/load aware relaying in heterogenous wireless ad hoc networks

    Lia, W., Zhang, Y., Lou, W. & Fang, Y., 2004, Proceedings - IEEE Military Communications Conference MILCOM. Vol. 3. p. 1303-1309 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Managing wireless sensor networks with supply chain strategy

    Liu, W., Zhang, Y., Lou, W. & Fang, Y., 2004, Proceedings - First International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, QShine 2004. Boukerche, A., Cobb, J., Chen, S. & Fang, M. Y. (eds.). p. 59-67 9 p. (Proceedings - First International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, QShine 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Scalable and robust data dissemination in wireless sensor networks

    Liu, W., Zhang, Y., Lou, W., Fang, Y. & Wong, T., 2004, GLOBECOM - IEEE Global Telecommunications Conference. Vol. 5. p. 3177-3181 5 p. WC17-2

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • SIP: A secure incentive protocol against selfishness in mobile ad hoc networks

    Zhang, Y., Lou, W. & Fang, Y., Sep 27 2004, 2004 IEEE Wireless Communications and Networking Conference, WCNC 2004. Institute of Electrical and Electronics Engineers Inc., Vol. 3. p. 1679-1684 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • 2005

    AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks

    Zhang, Y., Liu, W., Lou, W., Fang, Y. & Kwon, Y., 2005, IEEE International Conference on Communications. Vol. 5. p. 3515-3519 5 p. WN28-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    41 Scopus citations
  • Anonymous communications in mobile ad hoc networks

    Zhang, Y., Liu, W. & Lou, W., 2005, Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Makki, K. & Knightly, E. (eds.). p. 1940-1951 12 p. (Proceedings - IEEE INFOCOM; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    200 Scopus citations
  • Conserve energy through multiple-packets transmission in heterogeneous mobile ad hoc networks

    Liu, W., Zhang, Y. & Fang, Y., 2005, MILCOM 2005: Military Communications Conference 2005. Institute of Electrical and Electronics Engineers Inc., p. 1516-1522 7 p. 1605906. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Key establishment in sensor networks based on triangle grid deployment model

    Zhou, Y., Zhang, Y. & Fang, Y., 2005, MILCOM 2005: Military Communications Conference 2005. Institute of Electrical and Electronics Engineers Inc., p. 1450-1455 6 p. 1605881. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • LLK: A link-layer key establishment scheme for wireless sensor networks

    Zhou, Y., Zhang, Y. & Fang, Y., 2005, IEEE Wireless Communications and Networking Conference, WCNC. Vol. 4. p. 1921-1926 6 p. NET30-3

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • Secure localization in wireless sensor networks

    Zhang, Y., Liu, W. & Fang, Y., 2005, MILCOM 2005: Military Communications Conference 2005. Institute of Electrical and Electronics Engineers Inc., p. 3169-3175 7 p. 1606144. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Securing sensor networks with location-based keys

    Zhang, Y., Liu, W., Lou, W. & Fang, Y., 2005, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off. p. 1909-1914 6 p. NET30-1. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    64 Scopus citations
  • 2006

    Defending against physical destruction attacks on wireless sensor networks

    Zhang, C., Zhang, Y. & Fang, Y., Jan 1 2006, Military Communications Conference 2006, MILCOM 2006. Institute of Electrical and Electronics Engineers Inc., 4086486. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Detecting coverage boundary nodes in wireless sensor networks

    Zhang, C., Zhang, Y. & Fang, Y., Dec 1 2006, Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06. p. 868-873 6 p. 1673261. (Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    52 Scopus citations
  • Energy-efficient coverage measurement for wireless sensor networks

    Zhang, C., Zhang, Y. & Fang, Y., Dec 1 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151117. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • LEDS: Providing location-aware end-to-end data security in wireless sensor networks

    Ren, K., Lou, W. & Zhang, Y., 2006, Proceedings - INFOCOM 2006: 25th IEEE International Conference on Computer Communications. 4146956. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • Localized coverage boundary detection for wireless sensor networks

    Zhang, C., Zhang, Y. & Fang, Y., Dec 1 2006, ACM International Conference Proceeding Series - Proceedings of the 3rd International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks. 1185390. (ACM International Conference Proceeding Series; vol. 191).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2007

    Multi-rate geographic opportunistic routing in wireless ad hoc networks

    Zeng, K., Lou, W. & Zhang, Y., Dec 1 2007, Military Communications Conference, MILCOM 2007. 4454897. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • Multi-user broadcast authentication in wireless sensor networks

    Ren, K., Lou, W. & Zhang, Y., 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 223-232 10 p. 4292834. (2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    51 Scopus citations
  • Securing resource-constrained wireless ad hoc networks

    Fang, Y. & Zhang, Y., 2007, 2007 IEEE Sarnoff Symposium, SARNOFF. 4567365. (2007 IEEE Sarnoff Symposium, SARNOFF).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Stochastic channel selection in cognitive radio networks

    Song, Y., Fang, Y. & Zhang, Y., 2007, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings. p. 4878-4882 5 p. 4411835. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    85 Scopus citations
  • 2008

    Efficient user revocation for privacy-aware PKI

    Ren, W., Ren, K., Lou, W. & Zhang, Y., 2008, QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. Cao, J. & Ni, L. (eds.). ICST, (QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Opportunistic cooperation with receiver-based ratio combining strategy

    Wang, Q., Ren, K., Zhang, Y. & Zhu, B., 2008, Wireless Algorithms, Systems, and Applications - Third International Conference, WASA 2008, Proceedings. Springer Verlag, p. 361-372 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5258 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Towards address privacy in mobile ad hoc networks

    Zhang, Y. & Ren, K., 2008, QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. Cao, J. & Ni, L. (eds.). ICST, (QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards secure link quality measurement in multihop wireless networks

    Zeng, K., Yu, S., Ren, K., Lou, W. & Zhang, Y., 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 4946-4950 5 p. 4698721. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2009

    An adaptive resource allocation scheme for GPRS/EDGE towards 3G

    Zhang, Y. & Gao, Z., 2009, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5303117. (Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Dependable and secure sensor data storage with dynamic integrity assurance

    Wang, Q., Ren, K., Lou, W. & Zhang, Y., 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 954-962 9 p. 5062006. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    69 Scopus citations
  • DP 2AC: Distributed privacy-preserving access control in sensor networks

    Zhang, R., Zhang, Y. & Ren, K., Oct 12 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 1251-1259 9 p. 5062039. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • Secure multidimensional range queries in sensor networks

    Zhang, R., Shi, J. & Zhang, Y., Nov 27 2009, MobiHoc'09 - Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 197-206 10 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Scopus citations
  • Secure range queries in tiered sensor networks

    Shi, J., Zhang, R. & Zhang, Y., Oct 12 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 945-953 9 p. 5062005. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    76 Scopus citations
  • 2010

    PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems

    Shi, J., Zhang, R., Liu, Y. & Zhang, Y., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5462147. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    178 Scopus citations
  • Traffic inference in anonymous MANETs

    Liu, Y., Zhang, R., Shi, J. & Zhang, Y., Aug 5 2010, SECON 2010 - 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 5508207. (SECON 2010 - 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Verifiable fine-grained top-k queries in tiered sensor networks

    Zhang, R., Shi, J., Liu, Y. & Zhang, Y., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5461927. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    65 Scopus citations
  • Wormhole-resilient secure neighbor discovery in underwater acoustic networks

    Zhang, R. & Zhang, Y., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5462093. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations
  • 2011

    Fast identification of the missing tags in a large RFID system

    Zhang, R., Liu, Y., Zhang, Y. & Sun, J., 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. IEEE Computer Society, p. 278-286 9 p. 5984908. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    73 Scopus citations
  • JR-SND: Jamming-resilient secure neighbor discovery in mobile Ad Hoc networks

    Zhang, R., Zhang, Y. & Huang, X., Aug 25 2011, Proceedings - 31st International Conference on Distributed Computing Systems, ICDCS 2011. p. 529-538 10 p. 5961707. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks

    Zhang, R. & Zhang, Y., Aug 25 2011, Proceedings - 31st International Conference on Distributed Computing Systems, ICDCS 2011. p. 497-506 10 p. 5961704. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • SOI MESFETs for extreme environment buck regulators

    Lepkowski, W., Goryll, M., Wilk, S. J., Zhang, Y., Sochacki, J. & Thornton, T., 2011, IEEE International SOI Conference, SOI 2011. 6081696. (Proceedings - IEEE International SOI Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Fine-grained private matching for proximity-based mobile social networking

    Zhang, R., Zhang, Y., Sun, J. & Yan, G., Jun 4 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1969-1977 9 p. 6195574. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    112 Scopus citations
  • Secure top-k query processing via untrusted location-based service providers

    Zhang, R., Zhang, Y. & Zhang, C., Jun 4 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1170-1178 9 p. 6195476. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • 2013

    On the impact of social botnets for spam distribution and digital-influence manipulation

    Zhang, J., Zhang, R., Zhang, Y. & Yan, G., Jan 1 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 46-54 9 p. 6682691. (2013 IEEE Conference on Communications and Network Security, CNS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • Privacy-preserving spatiotemporal matching

    Sun, J., Zhang, R. & Zhang, Y., Sep 2 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 800-808 9 p. 6566867. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • Secure crowdsourcing-based cooperative pectrum sensing

    Zhang, R., Zhang, J., Zhang, Y. & Zhang, C., Sep 2 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 2526-2534 9 p. 6567059. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • Social spammer detection in microblogging

    Hu, X., Tang, J., Zhang, Y. & Liu, H., Dec 1 2013, IJCAI 2013 - Proceedings of the 23rd International Joint Conference on Artificial Intelligence. p. 2633-2639 7 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    124 Scopus citations
  • 2014

    SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks

    Sun, J., Chen, X., Zhang, J., Zhang, Y. & Zhang, J., 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 997-1005 9 p. 6848029. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • TouchIn: Sightless two-factor authentication on multi-touch mobile devices

    Sun, J., Zhang, R., Zhang, J. & Zhang, Y., Dec 23 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 436-444 9 p. 6997513. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    38 Scopus citations
  • 2015

    A secure and privacy-preserving payment system for Electric vehicles

    Zhao, T., Zhang, C., Wei, L. & Zhang, Y., Sep 9 2015, IEEE International Conference on Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-September. p. 7280-7285 6 p. 7249489

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • SafeDSA: Safeguard dynamic spectrum access against fake secondary users

    Jin, X., Sun, J., Zhang, R. & Zhang, Y., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 304-315 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • SpecGuard: Spectrum misuse detection in dynamic spectrum access systems

    Jin, X., Sun, J., Zhang, R., Zhang, Y. & Zhang, C., Aug 21 2015, 2015 IEEE Conference on Computer Communications, IEEE INFOCOM 2015. Institute of Electrical and Electronics Engineers Inc., p. 172-180 9 p. 7218380. (Proceedings - IEEE INFOCOM; vol. 26).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations