Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Ic Teixeira
Daniel P. Kennedy
Dan Graur
Barbara Aquilani
Tan-Tan Zhang
Guangquan Cheng
Maximilian Dürr
Jhonathan Pinzon
Liangliang Shang
Chen Ma
Home
/
Author
/
QIJUN GU
Author Info
Open Visualization
Name
Affiliation
Papers
QIJUN GU
Penn State Univ, Sch Info Sci & Tech, University Pk, PA 16802 USA
38
Collaborators
Citations
PageRank
57
143
17.41
Referers
Referees
References
350
874
467
Search Limit
100
874
Publications (38 rows)
Collaborators (57 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications.
0
0.34
2020
A Consumer UAV-based Air Quality Monitoring System for Smart Cities
0
0.34
2019
Securing ADS-B with Multi-Point Distance-Bounding for UAV Collision Avoidance
0
0.34
2019
Assignment and collaborative execution of tasks on transient clouds.
0
0.34
2018
Developing a Modular Unmanned Aerial Vehicle (UAV) Platform for Air Pollution Profiling.
2
0.38
2018
Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education.
0
0.34
2017
Marcher: A Heterogeneous System Supporting Energy-Aware High Performance Computing and Big Data Analytics.
0
0.34
2017
Collaborative task execution with originator data security for weak devices
0
0.34
2016
Exploiting and Defending Trust Models in Cooperative Spectrum Sensing.
0
0.34
2015
Robust Detection of Rogue Signals in Cooperative Spectrum Sensing.
0
0.34
2015
Using the Greenup, Powerup, and Speedup metrics to evaluate software energy efficiency.
7
0.48
2015
Program energy efficiency: The impact of language, compiler and implementation choices
5
0.48
2014
Collaborative Computing On-demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs
4
0.41
2013
Originator Data Security for Collaborative Task Execution among Weak Devices
0
0.34
2013
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
0
0.34
2012
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks
4
0.40
2012
Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks
6
0.46
2011
Self-Healing Control Flow Protection in Sensor Applications
2
0.51
2011
Can You Help Me Run These Code Segments on Your Mobile Device?
8
0.50
2011
Fast mobility control protocols with sink location protection in wireless sensor networks
0
0.34
2011
A study of self-propagating mal-packets in sensor networks: Attacks and defenses
7
0.56
2011
Efficient code diversification for network reprogramming in sensor networks
0
0.34
2010
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++
4
0.41
2010
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
9
0.57
2009
Sink-Anonymity Mobility Control in Wireless Sensor Networks
4
0.42
2009
An Attack-Resilient Channel Assignment MAC Protocol
1
0.35
2009
Towards self-propagate mal-packets in sensor networks
23
1.55
2008
Privacy Preserving Mobility Control Protocols in Wireless Sensor Networks
2
0.38
2008
Analysis of Software Vulnerability in Sensor Nodes
1
0.41
2007
PWC: A proactive worm containment solution for enterprise networks
1
0.39
2007
Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks
0
0.34
2007
Analysis of area-congestion-based DDoS attacks in ad hoc networks
6
0.51
2007
Defence against packet injection in ad hoc networks
9
0.42
2007
Modeling Of Pollution In P2p File Sharing Systems
4
0.50
2006
Localized Broadcast Authentication in Large Sensor Networks
13
0.66
2006
KTR: an efficient key management scheme for air access control
0
0.34
2005
Defending against packet injection attacks unreliable ad hoc networks.
5
0.46
2005
A heuristic ant algorithm for solving QoS multicast routing problem
16
1.12
2002
1