Towards Practical Privacy-Preserving Solution for Outsourced Neural Network Inference | 0 | 0.34 | 2022 |
Edge-based Situ-aware Reinforcement Learning for Traffic Congestion Mitigation | 0 | 0.34 | 2022 |
Optimizing Fund Allocation for Game-Based Verifiable Computation Outsourcing | 0 | 0.34 | 2021 |
Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart Contracts | 1 | 0.42 | 2020 |
A New Game Theoretic Scheme for Verifiable Cloud Computing | 0 | 0.34 | 2018 |
A Grid-Based On-Road Localization System in VANET with Linear Error Propagation | 11 | 0.56 | 2014 |
Access Points Planning in Urban Area for Data Dissemination to Drivers | 6 | 0.45 | 2014 |
2D k-barrier duty-cycle scheduling for intruder detection in Wireless Sensor Networks. | 12 | 0.51 | 2014 |
Joint charging and rate allocation for utility maximization in sustainable sensor networks | 3 | 0.42 | 2014 |
Detect smart intruders in sensor networks by creating network dynamics | 7 | 0.49 | 2014 |
DOVE: Data Dissemination to a Desired Number of Receivers in VANET | 14 | 0.58 | 2014 |
I2C: A holistic approach to prolong the sensor network lifetime. | 0 | 0.34 | 2013 |
Joint Aggregation And Mac Design To Prolong Sensor Network Lifetime | 1 | 0.36 | 2013 |
ZigBee-Assisted Power Saving for More Efficient and Sustainable Ad Hoc Networks | 3 | 0.39 | 2013 |
ZigBee-assisted Power Saving Management for mobile devices | 5 | 0.46 | 2012 |
Lb-Mac: A Lifetime-Balanced Mac Protocol For Sensor Networks | 1 | 0.36 | 2012 |
LBA: Lifetime balanced data aggregation in low duty cycle sensor networks | 18 | 0.90 | 2012 |
DOVE: Data dissemination to a fixed number of receivers in VANET. | 5 | 0.41 | 2012 |
J-RoC: A Joint Routing and Charging scheme to prolong sensor network lifetime | 77 | 3.11 | 2011 |
GOT: Grid-Based On-Road Localization through Inter-Vehicle Collaboration | 13 | 0.69 | 2011 |
Charging scheduling with minimal waiting in a network of electric vehicles and charging stations | 64 | 4.14 | 2011 |
Reconciling privacy preservation and intrusion detection in sensory data aggregation | 8 | 0.52 | 2011 |
Heterogeneity-Aware Design for Automatic Detection of Problematic Road Conditions | 4 | 0.47 | 2011 |
A light-weight solution to preservation of access pattern privacy in un-trusted clouds | 9 | 0.49 | 2011 |
A Distributed Scheme for Securing Middle-Tier Multicast in Hierarchical Sensor Networks. | 2 | 0.37 | 2011 |
ZigBee-Assisted WiFi Transmission for Multi-interface Mobile Devices. | 6 | 0.51 | 2011 |
Delay-bounded MAC with minimal idle listening for sensor networks | 15 | 0.61 | 2011 |
Study of joint routing and wireless charging strategies in sensor networks | 15 | 1.55 | 2010 |
Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks | 3 | 0.44 | 2010 |
A three-tier framework for intruder information sharing in sensor networks | 0 | 0.34 | 2010 |
Sensor-Aided Navigation in GPS-Denied Environments. | 0 | 0.34 | 2010 |
An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments | 27 | 1.20 | 2010 |
Prolonging Sensor Network Lifetime Through Wireless Charging | 112 | 4.64 | 2010 |
Coverage properties of clustered wireless sensor networks | 7 | 0.56 | 2010 |
How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing | 67 | 3.90 | 2010 |
Editorial for special issue on privacy and security in wireless sensorand ad hoc networks | 0 | 0.34 | 2009 |
pDCS: Security and Privacy Support for Data-Centric Sensor Networks | 51 | 1.98 | 2009 |
Network Planning for Heterogeneous Wireless Sensor Networks in Environmental Survivability | 2 | 0.37 | 2009 |
On-Demand Node Reclamation and Replacement for Guaranteed Area Coverage in Long-Lived Sensor Networks | 11 | 0.99 | 2009 |
A Power-Efficient Scheme for Securing Multicast in Hierarchical Sensor Networks | 3 | 0.39 | 2009 |
Predistribution and local collaboration-based group rekeying for wireless sensor networks | 11 | 0.61 | 2009 |
EagleVision: A pervasive mobile device protection system | 0 | 0.34 | 2009 |
Catching Packet Droppers and Modifiers in Wireless Sensor Networks | 5 | 0.58 | 2009 |
Node Reclamation and Replacement for Long-Lived Sensor Networks | 43 | 2.03 | 2009 |
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks | 8 | 0.65 | 2008 |
GP^2S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data (concise contribution) | 26 | 1.18 | 2008 |
A heterogeneity-aware framework for group key management in wireless mesh networks. | 4 | 0.52 | 2008 |
Intelligent p-Cycle Protection for Multicast Sessions in WDM Networks | 4 | 0.56 | 2008 |
Slede: a domain-specific verification framework for sensor network security protocol implementations | 17 | 0.86 | 2008 |
Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks | 5 | 0.42 | 2008 |