The Impact of COVID-19 on Communication Network Outages | 0 | 0.34 | 2022 |
Software Defined Ambit of Data Integrity for the Internet of Things | 0 | 0.34 | 2021 |
Packet Header Obfuscation Using MIMO | 0 | 0.34 | 2020 |
On Automated Trust Computation in IoT with Multiple Attributes and Subjective Logic | 1 | 0.35 | 2020 |
Improving Liquidity in Secondary Spectrum Markets: Virtualizing Spectrum for Fungibility | 0 | 0.34 | 2019 |
Recovery and Optimization of Post-Disaster Cellular Networks | 0 | 0.34 | 2019 |
Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning. | 0 | 0.34 | 2018 |
A Framework for MIMO-based Packet Header Obfuscation. | 0 | 0.34 | 2018 |
Diversity for Detecting Routing Attacks in Multihop Networks | 0 | 0.34 | 2018 |
Reversible Data Perturbation Techniques for Multi-level Privacy-Preserving Data Publication. | 1 | 0.35 | 2018 |
Group Differential Privacy-Preserving Disclosure Of Multi-Level Association Graphs | 1 | 0.36 | 2017 |
Mining Historical Data towards Interference Management in Wireless SDNs. | 0 | 0.34 | 2017 |
Data Credence in IoT: Vision and Challenges. | 0 | 0.34 | 2017 |
Time-Dependent Performance Analysis of IEEE 802.11p Vehicular Networks. | 3 | 0.39 | 2016 |
On Configuring Radio Resources in Virtualized Fractional Frequency Reuse Cellular Networks | 0 | 0.34 | 2016 |
Socio-spatial affiliation networks | 5 | 0.39 | 2016 |
A Collaborative Spectrum-Sharing Framework for LTE Virtualization. | 2 | 0.44 | 2015 |
Localization Challenges for the Emergence of the Smart World. | 12 | 0.81 | 2015 |
Resource Allocation for Heterogeneous Traffic in LTE Virtual Networks | 1 | 0.35 | 2015 |
Time-Varying Performance Analysis of Multihop Wireless Networks With CBR Traffic | 1 | 0.36 | 2014 |
Country-level spatial dynamics of user activity: a case study in location-based social networks | 3 | 0.38 | 2014 |
Trustworthy Operations in Cellular Networks: The Case of PF Scheduler | 1 | 0.36 | 2014 |
Decoupling trust and wireless channel induced effects on collaborative sensing attacks | 6 | 0.45 | 2014 |
On radio resource sharing in multi-antenna virtualized wireless networks | 2 | 0.41 | 2013 |
Wireless network virtualization | 10 | 0.67 | 2013 |
Information reuse in dynamic spectrum access | 0 | 0.34 | 2013 |
Cognitive radio networks: realistic or not? | 3 | 0.38 | 2013 |
Joint reactive jammer detection and localization in an enterprise WiFi network | 4 | 0.40 | 2013 |
On secure connectivity with adjusting power to cope with jamming in sensor networks | 0 | 0.34 | 2013 |
ACM HotMobile 2013 poster: detecting fake check-ins in location-based social networks through honeypot venues | 1 | 0.35 | 2013 |
An efficient hybrid model and dynamic performance analysis for multihop wireless networks | 3 | 0.38 | 2013 |
Secure connectivity through key predistribution with directional antennas to cope with jamming in sensor networks | 0 | 0.34 | 2013 |
Analysis of WLAN's received signal strength indication for indoor location fingerprinting | 68 | 2.75 | 2012 |
Towards reliable spatial information in LBSNs | 7 | 0.61 | 2012 |
Cell sleeping for energy efficiency in cellular networks: Is it viable? | 4 | 0.58 | 2012 |
Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies | 13 | 0.62 | 2012 |
Gaming the Game: Honeypot Venues Against Cheaters in Location-based Social Networks | 3 | 0.50 | 2012 |
A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks | 4 | 0.49 | 2012 |
Location affiliation networks: bonding social and spatial information | 13 | 0.65 | 2012 |
Location-Based Social Network Users Through a Lense: Examining Temporal User Patterns. | 1 | 0.39 | 2012 |
Physical Distance vs. Signal Distance: An Analysis towards Better Location Fingerprinting | 5 | 0.55 | 2011 |
Modeling and simulation of wireless link quality (ETT) through principal component analysis of trace data | 0 | 0.34 | 2011 |
Source - destination obfuscation in wireless ad hocnetworks. | 9 | 0.64 | 2011 |
Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks | 3 | 0.43 | 2011 |
Detecting Route Attraction Attacks in Wireless Networks | 2 | 0.36 | 2011 |
MAC Layer Throughput Estimation in Impulse-Radio UWB Networks | 0 | 0.34 | 2011 |
A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks | 6 | 0.62 | 2011 |
On security and reliability using cooperative transmissions in sensor networks | 4 | 0.43 | 2010 |
Sub-area localization: a simple calibration free approach | 4 | 0.44 | 2010 |
A time dependent performance model for multihop wireless networks with CBR traffic | 6 | 0.49 | 2010 |