• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20012021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2009

    DP 2AC: Distributed privacy-preserving access control in sensor networks

    Zhang, R., Zhang, Y. & Ren, K., Oct 12 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 1251-1259 9 p. 5062039. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • Secure multidimensional range queries in sensor networks

    Zhang, R., Shi, J. & Zhang, Y., Nov 27 2009, MobiHoc'09 - Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 197-206 10 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Scopus citations
  • Secure range queries in tiered sensor networks

    Shi, J., Zhang, R. & Zhang, Y., 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 945-953 9 p. 5062005. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    77 Scopus citations
  • 2008

    Efficient user revocation for privacy-aware PKI

    Ren, W., Ren, K., Lou, W. & Zhang, Y., 2008, QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. Cao, J. & Ni, L. (eds.). ICST, (QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Opportunistic cooperation with receiver-based ratio combining strategy

    Wang, Q., Ren, K., Zhang, Y. & Zhu, B., 2008, Wireless Algorithms, Systems, and Applications - Third International Conference, WASA 2008, Proceedings. Springer Verlag, p. 361-372 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5258 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Towards address privacy in mobile ad hoc networks

    Zhang, Y. & Ren, K., 2008, QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. Cao, J. & Ni, L. (eds.). ICST, (QShine 2008 - 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards secure link quality measurement in multihop wireless networks

    Zeng, K., Yu, S., Ren, K., Lou, W. & Zhang, Y., 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 4946-4950 5 p. 4698721. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2007

    Multi-rate geographic opportunistic routing in wireless ad hoc networks

    Zeng, K., Lou, W. & Zhang, Y., 2007, Military Communications Conference, MILCOM 2007. 4454897. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Multi-user broadcast authentication in wireless sensor networks

    Ren, K., Lou, W. & Zhang, Y., 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 223-232 10 p. 4292834. (2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    51 Scopus citations
  • Securing resource-constrained wireless ad hoc networks

    Fang, Y. & Zhang, Y., 2007, 2007 IEEE Sarnoff Symposium, SARNOFF. 4567365. (2007 IEEE Sarnoff Symposium, SARNOFF).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Stochastic channel selection in cognitive radio networks

    Song, Y., Fang, Y. & Zhang, Y., 2007, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings. p. 4878-4882 5 p. 4411835. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    86 Scopus citations
  • 2006

    Defending against physical destruction attacks on wireless sensor networks

    Zhang, C., Zhang, Y. & Fang, Y., Jan 1 2006, Military Communications Conference 2006, MILCOM 2006. Institute of Electrical and Electronics Engineers Inc., 4086486. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Detecting coverage boundary nodes in wireless sensor networks

    Zhang, C., Zhang, Y. & Fang, Y., Dec 1 2006, Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06. p. 868-873 6 p. 1673261. (Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    52 Scopus citations
  • Energy-efficient coverage measurement for wireless sensor networks

    Zhang, C., Zhang, Y. & Fang, Y., Dec 1 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151117. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • LEDS: Providing location-aware end-to-end data security in wireless sensor networks

    Ren, K., Lou, W. & Zhang, Y., 2006, Proceedings - INFOCOM 2006: 25th IEEE International Conference on Computer Communications. 4146956. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • Localized coverage boundary detection for wireless sensor networks

    Zhang, C., Zhang, Y. & Fang, Y., Dec 1 2006, ACM International Conference Proceeding Series - Proceedings of the 3rd International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks. 1185390. (ACM International Conference Proceeding Series; vol. 191).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2005

    AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks

    Zhang, Y., Liu, W., Lou, W., Fang, Y. & Kwon, Y., 2005, IEEE International Conference on Communications. Vol. 5. p. 3515-3519 5 p. WN28-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Scopus citations
  • Anonymous communications in mobile ad hoc networks

    Zhang, Y., Liu, W. & Lou, W., 2005, Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Makki, K. & Knightly, E. (eds.). p. 1940-1951 12 p. (Proceedings - IEEE INFOCOM; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    205 Scopus citations
  • Conserve energy through multiple-packets transmission in heterogeneous mobile ad hoc networks

    Liu, W., Zhang, Y. & Fang, Y., 2005, MILCOM 2005: Military Communications Conference 2005. Institute of Electrical and Electronics Engineers Inc., p. 1516-1522 7 p. 1605906. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Key establishment in sensor networks based on triangle grid deployment model

    Zhou, Y., Zhang, Y. & Fang, Y., 2005, MILCOM 2005: Military Communications Conference 2005. Institute of Electrical and Electronics Engineers Inc., p. 1450-1455 6 p. 1605881. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • LLK: A link-layer key establishment scheme for wireless sensor networks

    Zhou, Y., Zhang, Y. & Fang, Y., 2005, IEEE Wireless Communications and Networking Conference, WCNC. Vol. 4. p. 1921-1926 6 p. NET30-3

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • Secure localization in wireless sensor networks

    Zhang, Y., Liu, W. & Fang, Y., 2005, MILCOM 2005: Military Communications Conference 2005. Institute of Electrical and Electronics Engineers Inc., p. 3169-3175 7 p. 1606144. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • Securing sensor networks with location-based keys

    Zhang, Y., Liu, W., Lou, W. & Fang, Y., 2005, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off. p. 1909-1914 6 p. NET30-1. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    70 Scopus citations
  • 2004

    Anonymous handshakes in mobile ad hoc networks

    Zhang, Y., Liu, W., Lou, W. & Fang, Y., 2004, Proceedings - IEEE Military Communications Conference MILCOM. Vol. 3. p. 1193-1199 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • DELAR: Device/energy/load aware relaying in heterogenous wireless ad hoc networks

    Lia, W., Zhang, Y., Lou, W. & Fang, Y., 2004, Proceedings - IEEE Military Communications Conference MILCOM. Vol. 3. p. 1303-1309 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Managing wireless sensor networks with supply chain strategy

    Liu, W., Zhang, Y., Lou, W. & Fang, Y., 2004, Proceedings - First International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, QShine 2004. Boukerche, A., Cobb, J., Chen, S. & Fang, M. Y. (eds.). p. 59-67 9 p. (Proceedings - First International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, QShine 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Scalable and robust data dissemination in wireless sensor networks

    Liu, W., Zhang, Y., Lou, W., Fang, Y. & Wong, T., 2004, GLOBECOM - IEEE Global Telecommunications Conference. Vol. 5. p. 3177-3181 5 p. WC17-2

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • SIP: A secure incentive protocol against selfishness in mobile ad hoc networks

    Zhang, Y., Lou, W. & Fang, Y., Sep 27 2004, 2004 IEEE Wireless Communications and Networking Conference, WCNC 2004. Institute of Electrical and Electronics Engineers Inc., Vol. 3. p. 1679-1684 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • 2001

    An immunity-based model for network intrusion detection

    Zhang, Y., Que, X., Wang, W. & Cheng, S., 2001, 2001 International Conferences on Info-Tech and Info-Net: A Key to Better Life, ICII 2001 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 5. p. 24-29 6 p. 983489

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations