Name
Papers
Collaborators
WEICHAO WANG
44
61
Citations 
PageRank 
Referers 
500
33.87
1161
Referees 
References 
1337
777
Search Limit
1001000
Title
Citations
PageRank
Year
Cross-Platform Immersive Visualization and Navigation with Augmented Reality.00.342021
Encryption-free data transmission and hand-over in two-tier body area networks.00.342020
Proof of Network Security Services - Enforcement of Security SLA through Outsourced Network Testing.00.342020
Proof of outsourced encryption: cross verification of security service level agreement.00.342020
Equipment Contention Attack in Cloud Manufacturing Environments and Its Defense00.342019
Middle School Students' Social Media Use.00.342018
Lightweight Detection of On-Body Sensor Impersonator in Body Area Networks00.342016
Lightweight Examination of DLL Environments in Virtual Machines to Detect Malware.00.342016
Optimizing content delivery in ICN networks by the supply chain model10.362016
Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines00.342015
An investigation of collaborations between top Chinese universities: a new quantitative approach10.352014
Rootkit detection on virtual machines through deep information extraction at hypervisor-level50.412013
An Action-Stack Based Selective-Undo Method in Feature Model Customization.00.342013
Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing10.352013
Alternating-directional Doubling Algorithm for M-Matrix Algebraic Riccati Equations.130.742012
Towards the attacker's view of protocol narrations (or, how to compile security protocols)00.342012
Fingerprinting large data sets through memory de-duplication technique in virtual machines10.352011
Non-Normalizable Functions: A New Method To Generate Metamorphic Malware00.342011
Evolutionary computation methods for helicopter loads estimation.00.342011
Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines211.242011
Rethinking about guessing attacks00.342011
Rethinking about Type-Flaw Attacks30.372010
Interactive detection of network anomalies via coordinated multiple views.60.482010
Deciding recognizability under Dolev-Yao intruder model20.362010
Node Localization in Wireless Networks through Physical Layer Network Coding30.402010
Detecting Sybil nodes in wireless networks with physical layer network coding60.502010
A surface topology and motion compensation system for microsurgery guidance and intervention based on common-path optical coherence tomography.40.632009
Secure and efficient access to outsourced data894.032009
Visualisation of wormholes in underwater sensor networks: a distributed approach271.192008
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks50.512008
Interactive wormhole detection and evaluation100.542007
Interactive Wormhole Detection in Large Scale Wireless Networks70.562006
Visualization assisted detection of sybil attacks in wireless networks50.452006
Trust-based privacy preservation for peer-to-peer data sharing210.962006
Defending against wormhole attacks in mobile ad hoc networks391.382006
Wireless networking security: open issues in trust, management, interoperation and measurement140.592006
Construction of Tele-Rehabilitation Platform Using Distributed Common Object Models10.372006
Cooperative co-evolutionary approach applied in reactive power optimization of power system00.342006
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks161.072005
Key distribution and update for secure inter-group multicast communication110.882005
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA)452.002004
Visualization of wormholes in sensor networks1054.902004
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks80.882003
Study of distance vector routing protocols for mobile ad hoc networks301.952003