If you made any changes in Pure, your changes will be visible here soon.

Research Output 2001 2019

  • 4071 Citations
  • 34 h-Index
  • 71 Conference contribution
  • 42 Article
  • 1 Chapter
  • 1 Review article
Filter
Article
Article
89 Citations (Scopus)

Access control in wireless sensor networks

Zhou, Y., Zhang, Y. & Fang, Y., Jan 2007, In : Ad Hoc Networks. 5, 1, p. 3-13 11 p.

Research output: Contribution to journalArticle

Access control
Sensor networks
Wireless sensor networks
Network protocols
Authentication
27 Citations (Scopus)

A Coverage Inference Protocol for Wireless Sensor Networks

Zhang, C., Zhang, Y. & Fang, Y., Jun 2010, In : IEEE Transactions on Mobile Computing. 9, 6, p. 850-864 15 p., 10.

Research output: Contribution to journalArticle

Sensor nodes
Wireless sensor networks
Network protocols
Base stations
Time measurement
77 Citations (Scopus)

A fine-grained reputation system for reliable service selection in peer-to-peer networks

Zhang, Y. & Fang, Y., Aug 2007, In : IEEE Transactions on Parallel and Distributed Systems. 18, 8, p. 1134-1145 12 p.

Research output: Contribution to journalArticle

Reputation System
Service Selection
Peer to peer networks
Peer-to-peer Networks
Quality of Service
213 Citations (Scopus)

An identity-based security system for user privacy in vehicular ad hoc networks

Sun, J., Zhang, C., Zhang, Y. & Fang, Y., 2010, In : IEEE Transactions on Parallel and Distributed Systems. 21, 9, p. 1227-1239 13 p., 5383352.

Research output: Contribution to journalArticle

Vehicular ad hoc networks
Security systems
Authentication
Law enforcement
Cryptography
12 Citations (Scopus)

AOS: An anonymous overlay system for mobile ad hoc networks

Zhang, R., Zhang, Y. & Fang, Y., May 2011, In : Wireless Networks. 17, 4, p. 843-859 17 p.

Research output: Contribution to journalArticle

Mobile ad hoc networks
Communication
Communication systems
Network protocols
Chemical analysis
12 Citations (Scopus)

A robust and energy-efficient data dissemination framework for wireless sensor networks

Liu, W., Zhang, Y., Lou, W. & Fang, Y., Aug 2006, In : Wireless Networks. 12, 4, p. 465-479 15 p.

Research output: Contribution to journalArticle

Wireless sensor networks
Supply chain management
Sensor nodes
Telecommunication links
Energy efficiency
108 Citations (Scopus)

ARSA: An attack-resilient security architecture for multihop wireless mesh networks

Zhang, Y. & Fang, Y., Oct 2006, In : IEEE Journal on Selected Areas in Communications. 24, 10, p. 1916-1928 13 p., 1705622.

Research output: Contribution to journalArticle

Wireless mesh networks (WMN)
Authentication
Internet
40 Citations (Scopus)

A secure authentication and billing architecture for wireless mesh networks

Zhang, Y. & Fang, Y., Oct 2007, In : Wireless Networks. 13, 5, p. 663-678 16 p.

Research output: Contribution to journalArticle

Wireless mesh networks (WMN)
Authentication
Cryptography
Electronic document identification systems
HIgh speed networks
70 Citations (Scopus)

A secure incentive protocol for mobile ad hoc networks

Zhang, Y., Lou, W., Liu, W. & Fang, Y., Oct 2007, In : Wireless Networks. 13, 5, p. 569-582 14 p.

Research output: Contribution to journalArticle

Mobile ad hoc networks
Throughput
Degradation
Communication
31 Citations (Scopus)

A spatiotemporal approach for secure range queries in tiered sensor networks

Shi, J., Zhang, R. & Zhang, Y., Jan 2011, In : IEEE Transactions on Wireless Communications. 10, 1, p. 264-273 10 p., 5610974.

Research output: Contribution to journalArticle

Range Query
Query processing
Sensor nodes
Sensor networks
Sensor Networks
2 Citations (Scopus)

Beware of What You Share: Inferring User Locations in Venmo

Yao, X., Chen, Y., Zhang, R., Zhang, Y. & Lin, Y., Jun 5 2018, (Accepted/In press) In : IEEE Internet of Things Journal.

Research output: Contribution to journalArticle

Application programs
26 Citations (Scopus)

Distributed privacy-preserving access control in sensor networks

Zhang, R., Zhang, Y. & Ren, K., 2012, In : IEEE Transactions on Parallel and Distributed Systems. 23, 8, p. 1427-1438 12 p., 6095540.

Research output: Contribution to journalArticle

Access control
Sensor networks
Sensor nodes
Base stations
Communication

Editorial special section on wireless network security and privacy

Zhang, Y., Feb 2010, In : IEEE Transactions on Vehicular Technology. 59, 2, p. 518 1 p., 5415852.

Research output: Contribution to journalArticle

Network Security
Network security
Privacy
Wireless Networks
Wireless networks
14 Citations (Scopus)

Energy conservation through resource-aware movement in heterogeneous mobile ad hoc networks

Liu, W., Zhang, Y., Fang, Y. & Lu, K., Feb 2006, In : Journal of Combinatorial Optimization. 11, 1, p. 7-20 14 p.

Research output: Contribution to journalArticle

Energy Conservation
Mobile ad hoc networks
Mobile Ad Hoc Networks
Energy conservation
Resources
10 Citations (Scopus)

Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks

Zhang, R., Sun, J., Zhang, Y. & Huang, X., Oct 1 2015, In : IEEE Transactions on Wireless Communications. 14, 10, p. 5588-5601 14 p., 7115955.

Research output: Contribution to journalArticle

Jamming
Mobile ad hoc networks
Mobile Ad Hoc Networks
Spread Spectrum
Vertex of a graph
103 Citations (Scopus)

LEDS: Providing location-aware end-to-end data security in wireless sensor networks

Ren, K., Lou, W. & Zhang, Y., May 2008, In : IEEE Transactions on Mobile Computing. 7, 5, p. 585-598 14 p., 4358997.

Research output: Contribution to journalArticle

Security of data
Wireless sensor networks
Availability
Sensor nodes
Authentication
64 Citations (Scopus)

Localized algorithms for coverage boundary detection in wireless sensor networks

Zhang, C., Zhang, Y. & Fang, Y., Jan 2009, In : Wireless Networks. 15, 1, p. 3-20 18 p.

Research output: Contribution to journalArticle

Wireless sensor networks
Sensor nodes
Base stations
Energy efficiency
Scalability
233 Citations (Scopus)

Location-based compromise-tolerant security mechanisms for wireless sensor networks

Zhang, Y., Liu, W., Lou, W. & Fang, Y., Feb 2006, In : IEEE Journal on Selected Areas in Communications. 24, 2, p. 247-260 14 p.

Research output: Contribution to journalArticle

Wireless sensor networks
Authentication
Sensor networks
Scalability
Energy conservation
142 Citations (Scopus)

MASK: Anonymous on-demand routing in mobile Ad Hoc networks

Zhang, Y., Liu, W., Lou, W. & Fang, Y., Sep 2006, In : IEEE Transactions on Wireless Communications. 5, 9, p. 2376-2385 10 p., 1687761.

Research output: Contribution to journalArticle

Mobile ad hoc networks
Mobile Ad Hoc Networks
Routing
Attack
Network layers
70 Citations (Scopus)

Multi-user broadcast authentication in wireless sensor networks

Ren, K., Yu, S., Lou, W. & Zhang, Y., 2009, In : IEEE Transactions on Vehicular Technology. 58, 8, p. 4554-4564 11 p.

Research output: Contribution to journalArticle

Broadcast
Authentication
Wireless Sensor Networks
Wireless sensor networks
Message Authentication
4 Citations (Scopus)

On address privacy in mobile Ad Hoc networks

Zhang, Y. & Ren, K., Apr 2009, In : Mobile Networks and Applications. 14, 2, p. 188-197 10 p.

Research output: Contribution to journalArticle

Mobile ad hoc networks
Entropy
18 Citations (Scopus)

On the price of security in large-scale wireless ad hoc networks

Zhang, C., Song, Y., Fang, Y. & Zhang, Y., Apr 2011, In : IEEE/ACM Transactions on Networking. 19, 2, p. 319-332 14 p., 5710020.

Research output: Contribution to journalArticle

Wireless ad hoc networks
Throughput
Network performance
Degradation
Communication
38 Citations (Scopus)

PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks

Ren, K., Yu, S., Lou, W. & Zhang, Y., Feb 2010, In : IEEE Transactions on Parallel and Distributed Systems. 21, 2, p. 203-215 13 p., 4815227.

Research output: Contribution to journalArticle

Wireless mesh networks (WMN)
Access control
Authentication
Internet
Network protocols
10 Citations (Scopus)

Privacy-Preserving Crowdsourced Spectrum Sensing

Jin, X. & Zhang, Y., Jun 1 2018, In : IEEE/ACM Transactions on Networking. 26, 3, p. 1236-1249 14 p.

Research output: Contribution to journalArticle

Costs
60 Citations (Scopus)

Privacy-preserving profile matching for proximity-based mobile social networking

Zhang, R., Zhang, J., Zhang, Y., Sun, J. & Yan, G., 2013, In : IEEE Journal on Selected Areas in Communications. 31, 9, p. 656-668 13 p., 6544548.

Research output: Contribution to journalArticle

Smartphones
Experiments
8 Citations (Scopus)

Privacy-Preserving Spatiotemporal Matching for Secure Device-To-Device Communications

Sun, J., Zhang, R. & Zhang, Y., Dec 1 2016, In : IEEE Internet of Things Journal. 3, 6, p. 1048-1060 13 p., 7445133.

Research output: Contribution to journalArticle

Smartphones
Communication
Authentication
Acoustic waves
Secure communication
40 Citations (Scopus)

SAT: A security architecture achieving anonymity and traceability in wireless mesh networks

Sun, J., Zhang, C., Zhang, Y. & Fang, Y., 2011, In : IEEE Transactions on Dependable and Secure Computing. 8, 2, p. 295-307 13 p., 5374418.

Research output: Contribution to journalArticle

Wireless mesh networks (WMN)
Authentication
13 Citations (Scopus)

Secure cooperative data storage and query processing in unattended tiered sensor networks

Zhang, R., Shi, J., Zhang, Y. & Sun, J., Feb 2012, In : IEEE Journal on Selected Areas in Communications. 30, 2, p. 433-441 9 p., 6136828.

Research output: Contribution to journalArticle

Unattended sensors
Query processing
Sensor nodes
Sensor networks
Data storage equipment
16 Citations (Scopus)

SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing

Sun, J., Zhang, R., Jin, X. & Zhang, Y., Mar 1 2016, In : IEEE Transactions on Wireless Communications. 15, 3, p. 1716-1728 13 p., 7308083.

Research output: Contribution to journalArticle

Privacy Preserving
Bluetooth
Mobile devices
Object
Costs
137 Citations (Scopus)

Secure localization and authentication in ultra-wideband sensor networks

Zhang, Y., Liu, W., Fang, Y. & Wu, D., Apr 2006, In : IEEE Journal on Selected Areas in Communications. 24, 4 I, p. 829-835 7 p.

Research output: Contribution to journalArticle

Ultra-wideband (UWB)
Authentication
Sensor networks
Wireless sensor networks
Communication
19 Citations (Scopus)

Secure spatial top-k query processing via untrusted location-based service providers

Zhang, R., Sun, J., Zhang, Y. & Zhang, C., Jan 1 2015, In : IEEE Transactions on Dependable and Secure Computing. 12, 1, p. 111-124 14 p., 6803036.

Research output: Contribution to journalArticle

Location based services
Query processing
Mobile devices
Internet
9 Citations (Scopus)

Secure top-k query processing in unattended tiered sensor networks

Zhang, R., Shi, J., Zhang, Y. & Huang, X., Nov 1 2014, In : IEEE Transactions on Vehicular Technology. 63, 9, p. 4681-4693 13 p., 6767141.

Research output: Contribution to journalArticle

Unattended sensors
Query processing
Query Processing
Sensor nodes
Sensor networks
154 Citations (Scopus)

Securing mobile ad hoc networks with certificateless public keys

Zhang, Y., Liu, W., Lou, W. & Fang, Y., Oct 2006, In : IEEE Transactions on Dependable and Secure Computing. 3, 4, p. 386-399 14 p.

Research output: Contribution to journalArticle

Mobile ad hoc networks
Cryptography
Network security
17 Citations (Scopus)

Securing resource-constrained wireless ad hoc networks

Fang, Y., Zhu, X. & Zhang, Y., Apr 2009, In : IEEE Wireless Communications. 16, 2, p. 24-29 6 p., 4907556.

Research output: Contribution to journalArticle

Wireless ad hoc networks
Internet
Wireless networks
Heterogeneous networks
Mobile devices
263 Citations (Scopus)

Securing wireless sensor networks: A survey

Zhou, Y., Fang, Y. & Zhang, Y., 2008, In : IEEE Communications Surveys and Tutorials. 10, 3, p. 6-28 23 p., 4625802.

Research output: Contribution to journalArticle

Wireless sensor networks
Hardware
Communication
Sensors
Costs
10 Citations (Scopus)

Security and privacy in emerging wireless networks

Cao, G., Hubaux, J. P., Kim, Y. & Zhang, Y., Oct 2010, In : IEEE Wireless Communications. 17, 5, p. 10-11 2 p., 5416337.

Research output: Contribution to journalArticle

Delay tolerant networks
Wireless networks
Wireless mesh networks (WMN)
Mobile ad hoc networks
Wireless sensor networks
7 Citations (Scopus)

SpecGuard: Spectrum Misuse Detection in Dynamic Spectrum Access Systems

Jin, X., Sun, J., Zhang, R., Zhang, Y. & Zhang, C., Apr 4 2018, (Accepted/In press) In : IEEE Transactions on Mobile Computing.

Research output: Contribution to journalArticle

Power transmission
Transmitters
Data communication systems
Authentication
MATLAB
65 Citations (Scopus)

SPREAD: Improving network security by multipath routing in mobile ad hoc networks

Lou, W., Liu, W., Zhang, Y. & Fang, Y., Apr 2009, In : Wireless Networks. 15, 3, p. 279-294 16 p.

Research output: Contribution to journalArticle

Network security
Mobile ad hoc networks
Mathematical models
4 Citations (Scopus)

The rise of social botnets: Attacks and countermeasures

Zhang, J., Zhang, R., Zhang, Y. & Yan, G., Nov 1 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 6, p. 1068-1082 15 p., 7790819.

Research output: Contribution to journalArticle

Botnet
Experiments
30 Citations (Scopus)

TIGHT: A geographic routing protocol for cognitive radio mobile Ad Hoc networks

Jin, X., Zhang, R., Sun, J. & Zhang, Y., 2014, In : IEEE Transactions on Wireless Communications. 13, 8, p. 4670-4681 12 p., 6807739.

Research output: Contribution to journalArticle

Cognitive Radio
Cognitive radio
Mobile ad hoc networks
Mobile Ad Hoc Networks
Routing Protocol
19 Citations (Scopus)

TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter

Zhang, J., Zhang, R., Sun, J., Zhang, Y. & Zhang, C., Oct 1 2016, In : IEEE/ACM Transactions on Networking. 24, 5, p. 2834-2846 13 p.

Research output: Contribution to journalArticle

Information dissemination
29 Citations (Scopus)

Verifiable privacy-preserving aggregation in people-centric urban sensing systems

Zhang, R., Shi, J., Zhang, Y. & Zhang, C., 2013, In : IEEE Journal on Selected Areas in Communications. 31, 9, p. 268-278 11 p., 6559974.

Research output: Contribution to journalArticle

Agglomeration
Data privacy
Smartphones
Mobile devices
Authentication