Name
Affiliation
Papers
QIJUN GU
Penn State Univ, Sch Info Sci & Tech, University Pk, PA 16802 USA
38
Collaborators
Citations 
PageRank 
57
143
17.41
Referers 
Referees 
References 
350
874
467
Search Limit
100874
Title
Citations
PageRank
Year
A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications.00.342020
A Consumer UAV-based Air Quality Monitoring System for Smart Cities00.342019
Securing ADS-B with Multi-Point Distance-Bounding for UAV Collision Avoidance00.342019
Assignment and collaborative execution of tasks on transient clouds.00.342018
Developing a Modular Unmanned Aerial Vehicle (UAV) Platform for Air Pollution Profiling.20.382018
Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education.00.342017
Marcher: A Heterogeneous System Supporting Energy-Aware High Performance Computing and Big Data Analytics.00.342017
Collaborative task execution with originator data security for weak devices00.342016
Exploiting and Defending Trust Models in Cooperative Spectrum Sensing.00.342015
Robust Detection of Rogue Signals in Cooperative Spectrum Sensing.00.342015
Using the Greenup, Powerup, and Speedup metrics to evaluate software energy efficiency.70.482015
Program energy efficiency: The impact of language, compiler and implementation choices50.482014
Collaborative Computing On-demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs40.412013
Originator Data Security for Collaborative Task Execution among Weak Devices00.342013
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.00.342012
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks40.402012
Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks60.462011
Self-Healing Control Flow Protection in Sensor Applications20.512011
Can You Help Me Run These Code Segments on Your Mobile Device?80.502011
Fast mobility control protocols with sink location protection in wireless sensor networks00.342011
A study of self-propagating mal-packets in sensor networks: Attacks and defenses70.562011
Efficient code diversification for network reprogramming in sensor networks00.342010
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++40.412010
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services90.572009
Sink-Anonymity Mobility Control in Wireless Sensor Networks40.422009
An Attack-Resilient Channel Assignment MAC Protocol10.352009
Towards self-propagate mal-packets in sensor networks231.552008
Privacy Preserving Mobility Control Protocols in Wireless Sensor Networks20.382008
Analysis of Software Vulnerability in Sensor Nodes10.412007
PWC: A proactive worm containment solution for enterprise networks10.392007
Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks00.342007
Analysis of area-congestion-based DDoS attacks in ad hoc networks60.512007
Defence against packet injection in ad hoc networks90.422007
Modeling Of Pollution In P2p File Sharing Systems40.502006
Localized Broadcast Authentication in Large Sensor Networks130.662006
KTR: an efficient key management scheme for air access control00.342005
Defending against packet injection attacks unreliable ad hoc networks.50.462005
A heuristic ant algorithm for solving QoS multicast routing problem161.122002