Name
Affiliation
Papers
WENSHENG ZHANG
Iowa State Univ, Ames, IA 50011 USA
65
Collaborators
Citations 
PageRank 
59
1415
80.30
Referers 
Referees 
References 
2742
1464
971
Search Limit
1001000
Title
Citations
PageRank
Year
Towards Practical Privacy-Preserving Solution for Outsourced Neural Network Inference00.342022
Edge-based Situ-aware Reinforcement Learning for Traffic Congestion Mitigation00.342022
Optimizing Fund Allocation for Game-Based Verifiable Computation Outsourcing00.342021
Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart Contracts10.422020
A New Game Theoretic Scheme for Verifiable Cloud Computing00.342018
A Grid-Based On-Road Localization System in VANET with Linear Error Propagation110.562014
Access Points Planning in Urban Area for Data Dissemination to Drivers60.452014
2D k-barrier duty-cycle scheduling for intruder detection in Wireless Sensor Networks.120.512014
Joint charging and rate allocation for utility maximization in sustainable sensor networks30.422014
Detect smart intruders in sensor networks by creating network dynamics70.492014
DOVE: Data Dissemination to a Desired Number of Receivers in VANET140.582014
I2C: A holistic approach to prolong the sensor network lifetime.00.342013
Joint Aggregation And Mac Design To Prolong Sensor Network Lifetime10.362013
ZigBee-Assisted Power Saving for More Efficient and Sustainable Ad Hoc Networks30.392013
ZigBee-assisted Power Saving Management for mobile devices50.462012
Lb-Mac: A Lifetime-Balanced Mac Protocol For Sensor Networks10.362012
LBA: Lifetime balanced data aggregation in low duty cycle sensor networks180.902012
DOVE: Data dissemination to a fixed number of receivers in VANET.50.412012
J-RoC: A Joint Routing and Charging scheme to prolong sensor network lifetime773.112011
GOT: Grid-Based On-Road Localization through Inter-Vehicle Collaboration130.692011
Charging scheduling with minimal waiting in a network of electric vehicles and charging stations644.142011
Reconciling privacy preservation and intrusion detection in sensory data aggregation80.522011
Heterogeneity-Aware Design for Automatic Detection of Problematic Road Conditions40.472011
A light-weight solution to preservation of access pattern privacy in un-trusted clouds90.492011
A Distributed Scheme for Securing Middle-Tier Multicast in Hierarchical Sensor Networks.20.372011
ZigBee-Assisted WiFi Transmission for Multi-interface Mobile Devices.60.512011
Delay-bounded MAC with minimal idle listening for sensor networks150.612011
Study of joint routing and wireless charging strategies in sensor networks151.552010
Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks30.442010
A three-tier framework for intruder information sharing in sensor networks00.342010
Sensor-Aided Navigation in GPS-Denied Environments.00.342010
An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments271.202010
Prolonging Sensor Network Lifetime Through Wireless Charging1124.642010
Coverage properties of clustered wireless sensor networks70.562010
How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing673.902010
Editorial for special issue on privacy and security in wireless sensorand ad hoc networks00.342009
pDCS: Security and Privacy Support for Data-Centric Sensor Networks511.982009
Network Planning for Heterogeneous Wireless Sensor Networks in Environmental Survivability20.372009
On-Demand Node Reclamation and Replacement for Guaranteed Area Coverage in Long-Lived Sensor Networks110.992009
A Power-Efficient Scheme for Securing Multicast in Hierarchical Sensor Networks30.392009
Predistribution and local collaboration-based group rekeying for wireless sensor networks110.612009
EagleVision: A pervasive mobile device protection system00.342009
Catching Packet Droppers and Modifiers in Wireless Sensor Networks50.582009
Node Reclamation and Replacement for Long-Lived Sensor Networks432.032009
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks80.652008
GP^2S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data (concise contribution)261.182008
A heterogeneity-aware framework for group key management in wireless mesh networks.40.522008
Intelligent p-Cycle Protection for Multicast Sessions in WDM Networks40.562008
Slede: a domain-specific verification framework for sensor network security protocol implementations170.862008
Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks50.422008
  • 1
  • 2