Year |
Citation |
Score |
2020 |
An Z, Lin Q, Yang L, Lou W, Xie L. Acquiring Bloom Filters Across Commercial RFIDs in Physical Layer Ieee Acm Transactions On Networking. 28: 1804-1817. DOI: 10.1109/Tnet.2020.2992851 |
0.317 |
|
2019 |
Jiao X, Lou W, Guo S, Yang L, Feng X, Wang X, Chen G. Delay Efficient Scheduling Algorithms for Data Aggregation in Multi-Channel Asynchronous Duty-Cycled WSNs Ieee Transactions On Communications. 67: 6179-6192. DOI: 10.1109/Tcomm.2019.2924222 |
0.342 |
|
2019 |
Yao J, Xu J, Luo S, Wang L, Yang C, Wu K, Lou W. Comprehensive Study on MIMO-Related Interference Management in WLANs Ieee Communications Surveys and Tutorials. 21: 2087-2110. DOI: 10.1109/Comst.2019.2894160 |
0.383 |
|
2018 |
Yao J, Xu J, Che YL, Wu K, Lou W. Revisiting of Channel Access Mechanisms in Mobile Wireless Networks through Exploiting Physical Layer Technologies Wireless Communications and Mobile Computing. 2018: 1-16. DOI: 10.1155/2018/5967194 |
0.459 |
|
2018 |
Yao J, Lou W, Wang L, Wu K. On Exploiting Concurrent Transmissions Through Discernible Interference Cancellation Ieee Transactions On Vehicular Technology. 67: 9370-9384. DOI: 10.1109/Tvt.2018.2853716 |
0.478 |
|
2018 |
Chen H, Lou W, Wang Z, Xia F. On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks Ieee Transactions On Emerging Topics in Computing. 6: 553-565. DOI: 10.1109/Tetc.2016.2586192 |
0.574 |
|
2018 |
Xu J, Yao J, Wang L, Wu K, Chen L, Lou W. Revolution of Self-Organizing Network for 5G MmWave Small Cell Management: From Reactive to Proactive Ieee Wireless Communications. 25: 66-73. DOI: 10.1109/Mwc.2018.1700420 |
0.384 |
|
2018 |
Yang L, Lou W. Evolution and Competition, a Game Theoretical Analysis of Heterogeneous Wireless Networks in Unlicensed Spectrum Ieee Access. 6: 14347-14356. DOI: 10.1109/Access.2017.2777829 |
0.341 |
|
2018 |
Yao J, Lou W, Yang C, Wu K. Efficient Interference-Aware Power Control for Wireless Networks Computer Networks. 136: 68-79. DOI: 10.1016/J.Comnet.2018.02.017 |
0.423 |
|
2017 |
Xiong T, Yao J, Zhang J, Lou W. It Can Drain Out Your Energy: An Energy-Saving Mechanism Against Packet Overhearing in High Traffic Wireless LANs Ieee Transactions On Mobile Computing. 16: 1911-1925. DOI: 10.1109/Tmc.2016.2604805 |
0.38 |
|
2017 |
Yang C, Yao J, Lou W, Xie S. On Demand Response Management Performance Optimization for Microgrids Under Imperfect Communication Constraints Ieee Internet of Things Journal. 4: 881-893. DOI: 10.1109/Jiot.2017.2708322 |
0.359 |
|
2016 |
Chen H, Lou W, Wang Z, Wang Q. A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs Ieee Transactions On Vehicular Technology. 65: 6377-6388. DOI: 10.1109/Tvt.2015.2477164 |
0.613 |
|
2016 |
Yao J, Xiong T, Zhang J, Lou W. On Eliminating the Exposed Terminal Problem Using Signature Detection Ieee Transactions On Mobile Computing. 15: 2034-2047. DOI: 10.1109/Tmc.2015.2478459 |
0.515 |
|
2016 |
Yang C, Lou W, Fu Y, Xie S, Yu R. On Throughput Maximization in Multichannel Cognitive Radio Networks Via Generalized Access Strategy Ieee Transactions On Communications. 64: 1384-1398. DOI: 10.1109/Tcomm.2016.2522435 |
0.356 |
|
2016 |
Chen H, Lou W. Contact expectation based routing for delay tolerant networks Ad Hoc Networks. 36: 244-257. DOI: 10.1016/j.adhoc.2015.07.017 |
0.407 |
|
2015 |
Xiong T, Lou W, Zhang J, Tan H. MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation Ieee Transactions On Information Forensics and Security. 10: 1678-1691. DOI: 10.1109/Tifs.2015.2422264 |
0.456 |
|
2015 |
Yao J, Xiong T, Lou W. Beyond the limit: A fast tag identification protocol for RFID systems Pervasive and Mobile Computing. 21: 1-18. DOI: 10.1016/J.Pmcj.2014.10.003 |
0.342 |
|
2015 |
Chen H, Lou W, Wang Z, Wu J, Wang Z, Xia A. Securing DV-Hop localization against wormhole attacks in wireless sensor networks Pervasive and Mobile Computing. 16: 22-35. DOI: 10.1016/J.Pmcj.2014.01.007 |
0.64 |
|
2015 |
Chen H, Lou W. On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks Pervasive and Mobile Computing. 16: 36-50. DOI: 10.1016/J.Pmcj.2014.01.006 |
0.63 |
|
2014 |
Ma J, Lou W, Li X. Contiguous Link Scheduling for Data Aggregation in Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 25: 1691-1701. DOI: 10.1109/Tpds.2013.296 |
0.448 |
|
2014 |
Chen H, Lou W. GAR: Group aware cooperative routing protocol for resource-constraint opportunistic networks Computer Communications. 48: 20-29. DOI: 10.1016/J.Comcom.2014.03.022 |
0.644 |
|
2013 |
Wang Z, Lou W, Wang Z, Ma J, Chen H. A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks International Journal of Distributed Sensor Networks. 9: 494863. DOI: 10.1155/2013/494863 |
0.523 |
|
2013 |
Chen H, Lou W. Making nodes cooperative: A secure incentive mechanism for message forwarding in DTNs Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2013.6614150 |
0.389 |
|
2012 |
Ma J, Lou W. Interference-free wakeup scheduling with consecutive constraints in wireless sensor networks International Journal of Distributed Sensor Networks. 2012. DOI: 10.1155/2012/525909 |
0.428 |
|
2012 |
Jiao X, Lou W, Ma J, Cao J, Wang X, Zhou X. Minimum Latency Broadcast Scheduling in Duty-Cycled Multihop Wireless Networks Ieee Transactions On Parallel and Distributed Systems. 23: 110-117. DOI: 10.1109/Tpds.2011.106 |
0.4 |
|
2012 |
Yang L, Lou W. A contract-ruled economic model for QoS guarantee in mobile peer-to-peer streaming services Ieee International Workshop On Quality of Service, Iwqos. DOI: 10.1109/Tmc.2015.2456920 |
0.32 |
|
2012 |
Chen H, Lou W. Group aware cooperative routing for opportunistic networks under resource constraints Globecom - Ieee Global Telecommunications Conference. 5705-5710. DOI: 10.1109/GLOCOM.2012.6504030 |
0.444 |
|
2011 |
Ma J, Lou W. Interference-aware spatio-temporal link scheduling for long delay underwater sensor networks 2011 8th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon 2011. 431-439. DOI: 10.1109/SAHCN.2011.5984927 |
0.327 |
|
2011 |
Chen H, Lou W. On using contact expectation for routing in delay tolerant networks Proceedings of the International Conference On Parallel Processing. 683-692. DOI: 10.1109/ICPP.2011.39 |
0.402 |
|
2011 |
Zeng K, Lou W, Li M. Multihop Wireless Networks: Opportunistic Routing Multihop Wireless Networks: Opportunistic Routing. 1-285. DOI: 10.1002/9781119973607 |
0.353 |
|
2010 |
Chen H, Lou W, Wang Z. A novel secure localization approach in wireless sensor networks Eurasip Journal On Wireless Communications and Networking. 2010: 981280. DOI: 10.1155/2010/981280 |
0.646 |
|
2010 |
Chen H, Lou W, Sun X, Wang Z. A secure localization approach against wormhole attacks using distance consistency Eurasip Journal On Wireless Communications and Networking. 2010: 627039. DOI: 10.1155/2010/627039 |
0.63 |
|
2010 |
Wu Y, Li X, Liu Y, Lou W. Energy-Efficient Wake-Up Scheduling for Data Collection and Aggregation Ieee Transactions On Parallel and Distributed Systems. 21: 275-287. DOI: 10.1109/Tpds.2009.45 |
0.438 |
|
2010 |
Chen H, Lou W. From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 1-8. DOI: 10.1109/PCCC.2010.5682341 |
0.422 |
|
2010 |
Ma J, Lou W. Compact wakeup scheduling in wireless sensor networks Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2010.5683587 |
0.317 |
|
2009 |
Cai Y, Lou W, Li M, Li X. Energy Efficient Target-Oriented Scheduling in Directional Sensor Networks Ieee Transactions On Computers. 58: 1259-1274. DOI: 10.1109/Tc.2009.40 |
0.401 |
|
2009 |
Lou W, Ren K. Security, privacy, and accountability in wireless access networks - [Accepted from open call] Ieee Wireless Communications. 16: 80-87. DOI: 10.1109/Mwc.2009.5281259 |
0.372 |
|
2008 |
Li M, Lou W. Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links Qshine 2008 - 5th International Icst Conference On Heterogeneous Networking For Quality, Reliability, Security and Robustness. DOI: 10.4108/ICST.QSHINE2008.3827 |
0.404 |
|
2008 |
Ren K, Lou W. A soPhisticated privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks Proceedings - the 28th International Conference On Distributed Computing Systems, Icdcs 2008. 286-294. DOI: 10.1109/ICDCS.2008.18 |
0.33 |
|
2007 |
Lou W, Wu J. Toward broadcast reliability in mobile ad hoc networks with double coverage Ieee Transactions On Mobile Computing. 6: 148-163. DOI: 10.1109/Tmc.2007.31 |
0.455 |
|
2006 |
Lou W, Kwon Y. H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks Ieee Transactions On Vehicular Technology. 55: 1320-1330. DOI: 10.1109/TVT.2006.877707 |
0.437 |
|
2005 |
Lou W. An efficient N-to-1 multipath routing protocol in wireless sensor networks 2nd Ieee International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2005. 2005: 665-672. DOI: 10.1109/MAHSS.2005.1542857 |
0.431 |
|
2004 |
Wu J, Lou W. Extended multipoint relays to determine connected dominating sets in MANETs 2004 First Annual Ieee Communications Society Conference On Sensor and Ad Hoc Communications and Networks, Ieee Secon 2004. 621-630. DOI: 10.1109/Tc.2006.40 |
0.419 |
|
2004 |
Lou W, Wu J. Double-covered broadcast (DCB): A simple reliable broadcast algorithm in MANETs Proceedings - Ieee Infocom. 3: 2084-2095. DOI: 10.1109/INFCOM.2004.1354616 |
0.345 |
|
2004 |
Lou W, Wu J. An enhanced message exchange mechanism in cluster-based mobile ad hoc networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3358: 223-232. |
0.353 |
|
2003 |
Wu J, Lou W. Forward-node-set-based broadcast in clustered mobile ad hoc networks Wireless Communications and Mobile Computing. 3: 155-173. DOI: 10.1002/Wcm.109 |
0.508 |
|
2003 |
Lou W, Wu J. A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks Globecom - Ieee Global Telecommunications Conference. 6: 3536-3541. |
0.369 |
|
2003 |
Lou W, Liu W, Fang Y. SPREAD: Improving network security by multipath routing Proceedings - Ieee Military Communications Conference Milcom. 2: 808-813. |
0.406 |
|
2002 |
Lou W, Wu J. On reducing broadcast redundancy in ad hoc wireless networks Ieee Transactions On Mobile Computing. 1: 111-122. DOI: 10.1109/Tmc.2002.1038347 |
0.458 |
|
2002 |
Lou W, Wu J. Efficient broadcast with forward node set in clustered mobile ad hoc networks Proceedings - International Conference On Computer Communications and Networks, Icccn. 2002: 398-403. DOI: 10.1109/ICCCN.2002.1043098 |
0.342 |
|
2002 |
Lou W, Fang Y. Predictive caching strategy for on-demand routing protocols in wireless ad hoc networks Wireless Networks. 8: 671-679. DOI: 10.1023/A:1020327309720 |
0.305 |
|
2001 |
Lou W, Fang Y. A multipath routing approach for secure data delivery Proceedings - Ieee Military Communications Conference Milcom. 2: 1467-1473. |
0.343 |
|
Show low-probability matches. |