Year |
Citation |
Score |
2020 |
Li J, Siddula M, Cheng X, Cheng W, Tian Z, Li Y. Approximate data aggregation in sensor equipped IoT networks Tsinghua Science and Technology. 25: 44-55. DOI: 10.26599/Tst.2019.9010023 |
0.606 |
|
2020 |
Siddula M, Li Y, Cheng X, Tian Z, Cai Z. Privacy-Enhancing Preferential LBS Query for Mobile Social Network Users Wireless Communications and Mobile Computing. 2020: 1-13. DOI: 10.1155/2020/8892321 |
0.575 |
|
2020 |
Yu J, Yu K, Yu D, Lv W, Cheng X, Chen H, Cheng W. Efficient Link Scheduling in Wireless Networks Under Rayleigh-Fading and Multiuser Interference Ieee Transactions On Wireless Communications. 19: 5621-5634. DOI: 10.1109/Twc.2020.2994998 |
0.385 |
|
2020 |
Mei B, Xiao Y, Li R, Li H, Cheng X, Sun Y. Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks Ieee Transactions On Network Science and Engineering. 7: 869-879. DOI: 10.1109/Tnse.2018.2797930 |
0.409 |
|
2020 |
Yu D, Zou Y, Yu J, Zhang Y, Li F, Cheng X, Dressler F, Lau FCM. Implementing Abstract MAC Layer in Dynamic Networks Ieee Transactions On Mobile Computing. 1-1. DOI: 10.1109/Tmc.2020.2971599 |
0.315 |
|
2020 |
Hu Q, Wang S, Ma P, Cheng X, Lv W, Bie R. Quality Control in Crowdsourcing Using Sequential Zero-Determinant Strategies Ieee Transactions On Knowledge and Data Engineering. 32: 998-1009. DOI: 10.1109/Tkde.2019.2896926 |
0.311 |
|
2020 |
Hu Q, Wang S, Cheng X, Ma L, Bie R. Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies Ieee Transactions On Information Forensics and Security. 15: 1778-1789. DOI: 10.1109/Tifs.2019.2949440 |
0.345 |
|
2020 |
Li F, Yu D, Yang H, Yu J, Karl H, Cheng X. Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks: A Survey Ieee Wireless Communications. 27: 24-30. DOI: 10.1109/Mwc.001.1900280 |
0.414 |
|
2020 |
Liu X, Yu J, Li F, Lv W, Wang Y, Cheng X. Data Aggregation in Wireless Sensor Networks: From the Perspective of Security Ieee Internet of Things Journal. 7: 6495-6513. DOI: 10.1109/Jiot.2019.2957396 |
0.437 |
|
2020 |
Wang S, Shi H, Hu Q, Lin B, Cheng X. Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory Ieee Internet of Things Journal. 7: 661-668. DOI: 10.1109/Jiot.2019.2943151 |
0.326 |
|
2019 |
Huo Y, Fan X, Ma L, Cheng X, Tian Z, Chen D. Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming Ieee Transactions On Wireless Communications. 18: 3265-3280. DOI: 10.1109/Twc.2019.2912611 |
0.418 |
|
2019 |
Xia H, Zhang S, Li Y, Pan Z, Peng X, Cheng X. An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks Ieee Transactions On Vehicular Technology. 68: 7108-7120. DOI: 10.1109/Tvt.2019.2919681 |
0.402 |
|
2019 |
Li R, Song T, Mei B, Li H, Cheng X, Sun L. Blockchain for Large-Scale Internet of Things Data Storage and Protection Ieee Transactions On Services Computing. 12: 762-771. DOI: 10.1109/Tsc.2018.2853167 |
0.352 |
|
2019 |
Siddula M, Li Y, Cheng X, Tian Z, Cai Z. Anonymization in Online Social Networks Based on Enhanced Equi-Cardinal Clustering Ieee Transactions On Computational Social Systems. 6: 809-820. DOI: 10.1109/Tcss.2019.2928324 |
0.586 |
|
2019 |
Xiao Y, Jia Y, Cheng X, Yu J, Liang Z, Tian Z. I Can See Your Brain: Investigating Home-Use Electroencephalography System Security Ieee Internet of Things Journal. 6: 6681-6691. DOI: 10.1109/Jiot.2019.2910115 |
0.336 |
|
2019 |
Liu C, Xiao Y, Javangula V, Hu Q, Wang S, Cheng X. NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce Ieee Internet of Things Journal. 6: 4680-4693. DOI: 10.1109/Jiot.2018.2877634 |
0.358 |
|
2019 |
Liu M, Yu J, Yu D, Cheng X. Efficient Connected Dominating Set Construction with Maximum Lifetime in the Cognitive Radio Networks Procedia Computer Science. 147: 446-452. DOI: 10.1016/J.Procs.2019.01.263 |
0.378 |
|
2019 |
Sun Q, Yu J, Jiang H, Chen Y, Cheng X. De-anonymizing Scale-Free Social Networks by Using Spectrum Partitioning Method Procedia Computer Science. 147: 441-445. DOI: 10.1016/J.Procs.2019.01.262 |
0.403 |
|
2019 |
Yu K, Wang Y, Yu J, Yu D, Cheng X, Shan Z. Localized and distributed link scheduling algorithms in IoT under rayleigh fading Computer Networks. 151: 232-244. DOI: 10.1016/J.Comnet.2019.01.017 |
0.378 |
|
2019 |
Cheng S, Li Y, Tian Z, Cheng W, Cheng X. A model for integrating heterogeneous sensory data in IoT systems Computer Networks. 150: 1-14. DOI: 10.1016/J.Comnet.2018.11.032 |
0.507 |
|
2019 |
Zhang C, Jiang H, Cheng X, Zhao F, Cai Z, Tian Z. Utility analysis on privacy-preservation algorithms for online social networks: an empirical study Personal and Ubiquitous Computing. 1-17. DOI: 10.1007/S00779-019-01287-0 |
0.392 |
|
2018 |
Hu Q, Wang S, Hu C, Huang J, Li W, Cheng X. Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services Ieee Transactions On Vehicular Technology. 67: 7698-7711. DOI: 10.1109/Tvt.2018.2838041 |
0.353 |
|
2018 |
Alrawais A, Alhothaily A, Cheng X, Hu C, Yu J. SecureGuard: A Certificate Validation System in Public Key Infrastructure Ieee Transactions On Vehicular Technology. 67: 5399-5408. DOI: 10.1109/Tvt.2018.2805700 |
0.386 |
|
2018 |
Wang S, Meng X, Yu J, Bie R, Sun Y, Cheng X. $N$ -in-One: A Novel Location-Based Service Ieee Transactions On Vehicular Technology. 67: 5274-5286. DOI: 10.1109/Tvt.2017.2737017 |
0.326 |
|
2018 |
Yu D, Zou Y, Yu J, Cheng X, Hua Q, Jin H, Lau FCM. Stable Local Broadcast in Multihop Wireless Networks Under SINR Ieee Acm Transactions On Networking. 26: 1278-1291. DOI: 10.1109/Tnet.2018.2829712 |
0.41 |
|
2018 |
Hu C, Li W, Cheng X, Yu J, Wang S, Bie R. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds Ieee Transactions On Big Data. 4: 341-355. DOI: 10.1109/Tbdata.2016.2621106 |
0.354 |
|
2018 |
Cheng W, Yu J, Zhao F, Cheng X. SSDNet: Small-World Super-Dense Device-to-Device Wireless Networks Ieee Network. 32: 186-192. DOI: 10.1109/Mnet.2017.1700086 |
0.342 |
|
2018 |
He Y, Li H, Cheng X, Liu Y, Yang C, Sun L. A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications Ieee Access. 6: 27324-27335. DOI: 10.1109/Access.2018.2821705 |
0.339 |
|
2018 |
Jiang H, Yu J, Hu C, Zhang C, Cheng X. SA Framework based De-anonymization of Social Networks Procedia Computer Science. 129: 358-363. DOI: 10.1016/J.Procs.2018.03.089 |
0.38 |
|
2018 |
Capurso N, Mei B, Song T, Cheng X, Yu J. A survey on key fields of context awareness for mobile devices Journal of Network and Computer Applications. 118: 44-60. DOI: 10.1016/J.Jnca.2018.05.006 |
0.307 |
|
2017 |
Alhothaily A, Alrawais A, Song T, Lin B, Cheng X. QuickCash: Secure Transfer Payment Systems. Sensors (Basel, Switzerland). 17. PMID 28608846 DOI: 10.3390/S17061376 |
0.321 |
|
2017 |
Hu Q, Wang S, Bie R, Cheng X. Social Welfare Control in Mobile Crowdsensing Using Zero-Determinant Strategy. Sensors (Basel, Switzerland). 17. PMID 28467370 DOI: 10.3390/S17051012 |
0.326 |
|
2017 |
Yu J, Wan S, Cheng X, Yu D. Coverage Contribution Area Based $k$ -Coverage for Wireless Sensor Networks Ieee Transactions On Vehicular Technology. 66: 8510-8523. DOI: 10.1109/Tvt.2017.2681692 |
0.418 |
|
2017 |
Song T, Capurso N, Cheng X, Yu J, Chen B, Zhao W. Enhancing GPS With Lane-Level Navigation to Facilitate Highway Driving Ieee Transactions On Vehicular Technology. 66: 4579-4591. DOI: 10.1109/Tvt.2017.2661316 |
0.303 |
|
2017 |
Xing X, Chen B, Liu H, Cheng X, Zhou W, Chen D. Game Theoretic Analysis of Green Spectrum and Infrastructure Leasing on TV Bands Ieee Transactions On Vehicular Technology. 66: 6511-6522. DOI: 10.1109/Tvt.2016.2636331 |
0.39 |
|
2017 |
Wang S, Wang X, Cheng X, Huang J, Bie R, Zhao F. Fundamental Analysis on Data Dissemination in Mobile Opportunistic Networks With Lévy Mobility Ieee Transactions On Vehicular Technology. 66: 4173-4187. DOI: 10.1109/Tvt.2016.2597969 |
0.371 |
|
2017 |
Yu J, Huang B, Cheng X, Atiquzzaman M. Shortest Link Scheduling Algorithms in Wireless Networks Under the SINR Model Ieee Transactions On Vehicular Technology. 66: 2643-2657. DOI: 10.1109/Tvt.2016.2580379 |
0.349 |
|
2017 |
Li H, Xing X, Zhu J, Cheng X, Li K, Bie R, Jing T. Utility-Based Cooperative Spectrum Sensing Scheduling in Cognitive Radio Networks Ieee Transactions On Vehicular Technology. 66: 645-655. DOI: 10.1109/Tvt.2016.2532886 |
0.391 |
|
2017 |
Zhang X, Yu J, Li W, Cheng X, Yu D, Zhao F. Localized Algorithms for Yao Graph-Based Spanner Construction in Wireless Networks Under SINR Ieee Acm Transactions On Networking. 25: 2459-2472. DOI: 10.1109/Tnet.2017.2688484 |
0.396 |
|
2017 |
Yu D, Ning L, Zou Y, Yu J, Cheng X, Lau FCM. Distributed Spanner Construction With Physical Interference: Constant Stretch and Linear Sparseness Ieee Acm Transactions On Networking. 25: 2138-2151. DOI: 10.1109/Tnet.2017.2684831 |
0.385 |
|
2017 |
Alrawais A, Alhothaily A, Hu C, Cheng X. Fog Computing for the Internet of Things: Security and Privacy Issues Ieee Internet Computing. 21: 34-42. DOI: 10.1109/Mic.2017.37 |
0.333 |
|
2017 |
Chang RN, Cheng X, Cheng W, Lee W, Li Y, Yu J. Guest Editorial Special Issue on Fog Computing in the Internet of Things Ieee Internet of Things Journal. 4: 1113-1116. DOI: 10.1109/Jiot.2017.2750438 |
0.533 |
|
2017 |
Song T, Li R, Mei B, Yu J, Xing X, Cheng X. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes Ieee Internet of Things Journal. 4: 1844-1852. DOI: 10.1109/Jiot.2017.2707489 |
0.351 |
|
2017 |
Li R, Song T, Capurso N, Yu J, Couture J, Cheng X. IoT Applications on Secure Smart Shopping System Ieee Internet of Things Journal. 4: 1945-1954. DOI: 10.1109/Jiot.2017.2706698 |
0.343 |
|
2017 |
Capurso N, Song T, Cheng W, Yu J, Cheng X. An Android-Based Mechanism for Energy Efficient Localization Depending on Indoor/Outdoor Context Ieee Internet of Things Journal. 4: 299-307. DOI: 10.1109/Jiot.2016.2553100 |
0.321 |
|
2017 |
Li R, Li H, Cheng X, Zhou X, Li K, Wang S, Bie R. Perturbation-Based Private Profile Matching in Social Networks Ieee Access. 5: 19720-19732. DOI: 10.1109/Access.2017.2748958 |
0.44 |
|
2017 |
Alhothaily A, Hu C, Alrawais A, Song T, Cheng X, Chen D. A Secure and Practical Authentication Scheme Using Personal Devices Ieee Access. 5: 11677-11687. DOI: 10.1109/Access.2017.2717862 |
0.359 |
|
2017 |
Alrawais A, Alhothaily A, Hu C, Xing X, Cheng X. An Attribute-Based Encryption Scheme to Secure Fog Communications Ieee Access. 5: 9131-9138. DOI: 10.1109/Access.2017.2705076 |
0.366 |
|
2017 |
Gao Q, Huo Y, Ma L, Xing X, Cheng X, Jing T, Liu H. Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks Iet Communications. 11: 1264-1274. DOI: 10.1049/Iet-Com.2016.1168 |
0.377 |
|
2017 |
Huang B, Yu J, Cheng X, Chen H, Liu H. SINR based shortest link scheduling with oblivious power control in wireless networks Journal of Network and Computer Applications. 77: 64-72. DOI: 10.1016/J.Jnca.2016.10.012 |
0.429 |
|
2016 |
Huang J, Cheng X, Bi J, Chen B. Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility. Sensors (Basel, Switzerland). 16. PMID 26797609 DOI: 10.3390/S16010094 |
0.412 |
|
2016 |
Yu J, Chen Y, Ma L, Huang B, Cheng X. On Connected Target k-Coverage in Heterogeneous Wireless Sensor Networks. Sensors (Basel, Switzerland). 16. PMID 26784201 DOI: 10.3390/S16010104 |
0.383 |
|
2016 |
Feng L, Yu J, Cheng X, Wang S. Analysis and optimization of delayed channel access for wireless cyber-physical systems Eurasip Journal On Wireless Communications and Networking. 2016: 1-13. DOI: 10.1186/S13638-016-0557-9 |
0.386 |
|
2016 |
Jing T, Wei X, Cheng W, Guan M, Ma L, Huo Y, Cheng X. An Efficient Scheme for Tag Information Update in RFID Systems on Roads Ieee Transactions On Vehicular Technology. 65: 2435-2444. DOI: 10.1109/Tvt.2015.2424685 |
0.308 |
|
2016 |
Li W, Yu J, Cheng X, Bie R, Zhao F. An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets Ieee Transactions On Cognitive Communications and Networking. 2: 427-441. DOI: 10.1109/Tccn.2016.2620973 |
0.324 |
|
2016 |
Huang J, Wang S, Cheng X, Bi J. Big data routing in D2D communications with cognitive radio capability Ieee Wireless Communications. 23: 45-51. DOI: 10.1109/Mwc.2016.7553025 |
0.386 |
|
2016 |
Wang S, Bie R, Zhao F, Zhang N, Cheng X, Choi H. Security in wearable communications Ieee Network. 30: 61-67. DOI: 10.1109/Mnet.2016.7579028 |
0.305 |
|
2016 |
Liu H, Hua S, Zhuo X, Chen D, Cheng X. Cooperative spectrum sharing of multiple primary users and multiple secondary users Digital Communications and Networks. 2: 191-195. DOI: 10.1016/J.Dcan.2016.10.005 |
0.368 |
|
2016 |
Huo Y, Liu L, Ma L, Zhou W, Cheng X, Jing T, Jiang X. A coalition formation game based relay selection scheme for cooperative cognitive radio networks Wireless Networks. 1-12. DOI: 10.1007/S11276-016-1298-8 |
0.432 |
|
2016 |
Cheng X, Kutylowski M, Xu K, Zhu H. Cyber security, crime, and forensics of wireless networks and applications Security and Communication Networks. 9: 3763-3764. DOI: 10.1002/Sec.1646 |
0.403 |
|
2016 |
Li W, Larson M, Hu C, Li R, Cheng X, Bie R. Secure multi-unit sealed first-price auction mechanisms Security and Communication Networks. 9: 3833-3843. DOI: 10.1002/Sec.1522 |
0.329 |
|
2015 |
Jing T, Li W, Chen X, Cheng X, Xing X, Huo Y, Chen T, Choi HA, Znati T. Achievable transmission capacity of cognitive radio networks with cooperative relaying Eurasip Journal On Wireless Communications and Networking. 2015. DOI: 10.1186/S13638-015-0311-8 |
0.4 |
|
2015 |
Jing T, Cui X, Cheng W, Zhu S, Huo Y, Cheng X. Enabling smartphone-based HD video chats by cooperative transmissions in CRNs Eurasip Journal On Wireless Communications and Networking. 2015. DOI: 10.1186/S13638-015-0290-9 |
0.353 |
|
2015 |
Le Y, Cheng X, Chen D, Zhang N, Znati T, Al-Rodhaan MA, Al-Dhelaan A. Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks Eurasip Journal On Wireless Communications and Networking. 2015. DOI: 10.1186/S13638-015-0289-2 |
0.42 |
|
2015 |
Jing T, Zhang F, Cheng W, Huo Y, Cheng X. Online auction-based relay selection for cooperative communication in CR networks Eurasip Journal On Wireless Communications and Networking. 2015: 1-12. DOI: 10.1186/S13638-015-0258-9 |
0.381 |
|
2015 |
Jing T, Zhu S, Li H, Xing X, Cheng X, Huo Y, Bie R, Znati T. Cooperative relay selection in cognitive radio networks Ieee Transactions On Vehicular Technology. 64: 1872-1881. DOI: 10.1109/Tvt.2014.2338297 |
0.387 |
|
2015 |
Cui Y, Ma X, Cheng X, Li M, Liu J, Ma T, Guo Y, Chen B. Cooperative Coverage Extension for Relay-Union Networks Ieee Transactions On Parallel and Distributed Systems. 26: 371-381. DOI: 10.1109/Tpds.2014.2308201 |
0.432 |
|
2015 |
Le Y, Ma L, Cheng W, Cheng X, Chen B. A Time Fairness-Based MAC Algorithm for Throughput Maximization in 802.11 Networks Ieee Transactions On Computers. 64: 19-31. DOI: 10.1109/Tc.2013.186 |
0.411 |
|
2015 |
Wang S, Wang X, Huang J, Bie R, Cheng X. Analyzing the potential of mobile opportunistic networks for big data applications Ieee Network. 29: 57-63. DOI: 10.1109/Mnet.2015.7293306 |
0.389 |
|
2015 |
Li H, He Y, Cheng X, Zhu H, Sun L. Security and privacy in localization for underwater sensor networks Ieee Communications Magazine. 53: 56-62. DOI: 10.1109/Mcom.2015.7321972 |
0.418 |
|
2015 |
Cheng X, Kutyłowski M, Xu K, Zhu H. Special issue on cyber security, crime, and forensics of wireless networks and applications Security and Communication Networks. 8: 3300-3300. DOI: 10.1002/Sec.1370 |
0.403 |
|
2014 |
Lu Z, Zhu Y, Li W, Wu W, Cheng X. Influence-based community partition for social networks Computational Social Networks. 1. DOI: 10.1186/S40649-014-0001-4 |
0.369 |
|
2014 |
Li W, Wang S, Cheng X, Bie R. Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks Mobile Computing and Communications Review. 18: 3-13. DOI: 10.1145/2581555.2581557 |
0.322 |
|
2014 |
NoroozOliaee M, Hamdaoui B, Cheng X, Znati T, Guizani M. Analyzing cognitive network access efficiency under limited spectrum handoff agility Ieee Transactions On Vehicular Technology. 63: 1402-1407. DOI: 10.1109/Tvt.2013.2283856 |
0.31 |
|
2014 |
Li H, Cheng X, Li K, Hu C, Zhang N, Xue W. Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks Ieee Transactions On Parallel and Distributed Systems. 25: 2190-2200. DOI: 10.1109/Tpds.2013.73 |
0.368 |
|
2014 |
Huang J, Wang S, Cheng X, Liu M, Li Z, Chen B. Mobility-assisted routing in intermittently connected mobile cognitive radio networks Ieee Transactions On Parallel and Distributed Systems. 25: 2956-2968. DOI: 10.1109/Tpds.2013.291 |
0.416 |
|
2014 |
Xing X, Jing T, Li H, Huo Y, Cheng X, Znati T. Optimal spectrum sensing interval in cognitive radio networks Ieee Transactions On Parallel and Distributed Systems. 25: 2408-2417. DOI: 10.1109/Tpds.2013.155 |
0.423 |
|
2014 |
Li W, Wang S, Cui Y, Cheng X, Xin R, Al-Rodhaan MA, Al-Dhelaan A. AP Association for Proportional Fairness in Multirate WLANs Ieee Acm Transactions On Networking. 22: 191-202. DOI: 10.1109/Tnet.2013.2245145 |
0.379 |
|
2014 |
Liang Q, Cheng X, Huang SC, Chen D. Opportunistic Sensing in Wireless Sensor Networks: Theory and Application Ieee Transactions On Computers. 63: 2002-2010. DOI: 10.1109/Tc.2013.85 |
0.428 |
|
2014 |
Xing X, Jing T, Zhou W, Cheng X, Huo Y, Liu H. Routing in user-centric networks Ieee Communications Magazine. 52: 44-51. DOI: 10.1109/Mcom.2014.6894451 |
0.413 |
|
2014 |
Wang S, Huang J, Cheng X, Chen B. Coverage adjustment for load balancing with an AP service availability guarantee in WLANs Wireless Networks. 20: 475-491. DOI: 10.1007/S11276-013-0615-8 |
0.316 |
|
2014 |
Cheng X, Cabric D. Editorial for Crowncom 2013 Special Issue Mobile Networks and Applications. 19: 449-450. DOI: 10.1007/S11036-014-0530-Y |
0.361 |
|
2014 |
Xing X, Jing T, Cheng W, Huo Y, Cheng X, Znati T. Cooperative spectrum prediction in multi-PU multi-SU cognitive radio networks Mobile Networks and Applications. 19: 502-511. DOI: 10.1007/S11036-014-0507-X |
0.338 |
|
2013 |
Al-Nabhan N, Al-Rodhaan M, Al-Dhelaan A, Cheng X. Connected dominating set algorithms for wireless sensor networks International Journal of Sensor Networks. 13: 121-134. DOI: 10.1504/Ijsnet.2013.053719 |
0.436 |
|
2013 |
Xu L, Liang Q, Cheng X, Chen D. Compressive sensing in distributed radar sensor networks using pulse compression waveforms Eurasip Journal On Wireless Communications and Networking. 2013: 36. DOI: 10.1186/1687-1499-2013-36 |
0.325 |
|
2013 |
Zaid AM, Hamdaoui B, Cheng X, Znati T, Guizani M. Improving macrocell downlink throughput in rayleigh fading channel environment through femtocell user cooperation Ieee Transactions On Wireless Communications. 12: 6488-6499. DOI: 10.1109/Twc.2013.100713.130845 |
0.319 |
|
2013 |
Tang Y, Zhang B, Jing T, Wu D, Cheng X. Robust Compressive Data Gathering in Wireless Sensor Networks Ieee Transactions On Wireless Communications. 12: 2754-2761. DOI: 10.1109/Twc.2013.040413.120796 |
0.393 |
|
2013 |
Cui Y, Wang H, Cheng X, Li D, Yla-Jaaski A. Dynamic Scheduling for Wireless Data Center Networks Ieee Transactions On Parallel and Distributed Systems. 24: 2365-2374. DOI: 10.1109/Tpds.2013.5 |
0.433 |
|
2013 |
Cheng W, Zhang N, Cheng X, Song M, Chen D. Time-bounded essential localization for wireless sensor networks Ieee/Acm Transactions On Networking. 21: 400-412. DOI: 10.1109/Tnet.2012.2200107 |
0.415 |
|
2013 |
Xing X, Jing T, Cheng W, Huo Y, Cheng X. Spectrum prediction in cognitive radio networks Ieee Wireless Communications. 20: 90-96. DOI: 10.1109/Mwc.2013.6507399 |
0.325 |
|
2013 |
Wang S, Liu M, Cheng X, Li Z, Huang J, Chen B. Opportunistic Routing in Intermittently Connected Mobile P2P Networks Ieee Journal On Selected Areas in Communications. 31: 369-378. DOI: 10.1109/Jsac.2013.Sup.0513033 |
0.426 |
|
2013 |
Hu C, Zhang N, Li H, Cheng X, Liao X. Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme Ieee Journal On Selected Areas in Communications. 31: 37-46. DOI: 10.1109/Jsac.2013.Sup.0513004 |
0.352 |
|
2013 |
Li W, Cheng X, Jing T, Cui Y, Xing K, Wang W. Spectrum Assignment and Sharing for Delay Minimization in Multi-Hop Multi-Flow CRNs Ieee Journal On Selected Areas in Communications. 31: 2483-2493. DOI: 10.1109/Jsac.2013.131103 |
0.36 |
|
2012 |
Cheng W, Cheng X, Song M, Chen B, Zhao WW. On the design and deployment of RFID assisted navigation systems for VANETs Ieee Transactions On Parallel and Distributed Systems. 23: 1267-1274. DOI: 10.1109/Tpds.2011.259 |
0.31 |
|
2012 |
Wang S, Liu M, Cheng X, Song M. Routing in pocket switched networks Ieee Wireless Communications. 19: 67-73. DOI: 10.1109/Mwc.2012.6155878 |
0.407 |
|
2012 |
Song M, Xin C, Zhao Y, Cheng X. Dynamic spectrum access: from cognitive radio to network radio Ieee Wireless Communications. 19: 23-29. DOI: 10.1109/Mwc.2012.6155873 |
0.345 |
|
2012 |
Hu C, Liao X, Cheng X. Verifiable multi-secret sharing based on LFSR sequences Theoretical Computer Science. 445: 52-62. DOI: 10.1016/J.Tcs.2012.05.006 |
0.319 |
|
2011 |
Li W, Cui Y, Cheng X, Al-Rodhaan MA, Al-Dhelaan A. Achieving Proportional Fairness via AP Power Control in Multi-Rate WLANs Ieee Transactions On Wireless Communications. 10: 3784-3792. DOI: 10.1109/Twc.2011.091411.101899 |
0.356 |
|
2011 |
Cui Y, Wang H, Cheng X, Chen B. Wireless data center networking Ieee Wireless Communications. 18: 46-53. DOI: 10.1109/Mwc.2011.6108333 |
0.459 |
|
2010 |
Ren Q, Cheng X. Latency-optimized and energy-efficient MAC protocol for underwater acoustic sensor networks: a cross-layer approach Eurasip Journal On Wireless Communications and Networking. 2010: 1-8. DOI: 10.1155/2010/323151 |
0.406 |
|
2010 |
Liang Q, Cheng X, Samn SW. NEW: Network-Enabled Electronic Warfare for Target Recognition Ieee Transactions On Aerospace and Electronic Systems. 46: 558-568. DOI: 10.1109/Taes.2010.5461641 |
0.382 |
|
2010 |
Blough D, Cao J, Cheng X, Ekici E, Jia X, Santi P. Introduction to the Special Section on Mobile Ad Hoc and Sensor Networks Computer Communications. 33: 1369. DOI: 10.1016/J.Comcom.2010.05.005 |
0.355 |
|
2009 |
Rong Y, Teymorian AY, Ma L, Cheng X, Choi H. A novel rate adaptation scheme for 802.11 networks Ieee Transactions On Wireless Communications. 8: 862-870. DOI: 10.1109/Twc.2009.071196 |
0.363 |
|
2009 |
Teymorian AY, Cheng W, Ma L, Cheng X, Lu X, Lu Z. 3D Underwater Sensor Network Localization Ieee Transactions On Mobile Computing. 8: 1610-1621. DOI: 10.1109/Tmc.2009.80 |
0.378 |
|
2009 |
Xing K, Cheng X, Li J, Song M. Location-centric storage and query in wireless sensor networks Wireless Networks. 16: 955-967. DOI: 10.1007/S11276-009-0181-2 |
0.452 |
|
2008 |
Liu F, Cheng X. LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks Ieee Transactions On Wireless Communications. 7: 224-232. DOI: 10.1109/Twc.2008.060455 |
0.446 |
|
2008 |
Cheng X, Shu H, Liang Q, Du DH. Silent Positioning in Underwater Acoustic Sensor Networks Ieee Transactions On Vehicular Technology. 57: 1756-1766. DOI: 10.1109/Tvt.2007.912142 |
0.361 |
|
2008 |
Liu F, Cheng X, Ma L, Xing K. SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks Ieee Transactions On Mobile Computing. 7: 858-868. DOI: 10.1109/Tmc.2007.70775 |
0.414 |
|
2008 |
Wang F, Thai MT, Li Y, Cheng X, Du DZ. Fault-tolerant topology control for all-to-one and one-to-all communication in wireless networks Ieee Transactions On Mobile Computing. 7: 322-331. DOI: 10.1109/Tmc.2007.70743 |
0.71 |
|
2008 |
Ma L, Zhang Q, Cheng X. A power controlled interference aware routing protocol for dense multi-hop wireless networks Wireless Networks. 14: 247-257. DOI: 10.1007/S11276-006-9233-Z |
0.443 |
|
2007 |
Ding M, Liu F, Thaeler A, Chen D, Cheng X. Fault-tolerant target localization in sensor networks Eurasip Journal On Wireless Communications and Networking. 2007: 19-19. DOI: 10.1155/2007/96742 |
0.36 |
|
2007 |
Cheng X, Li W, Znati T. Editorial: Algorithmic aspects of wireless networks Eurasip Journal On Wireless Communications and Networking. 2007. DOI: 10.1155/2007/52861 |
0.398 |
|
2007 |
Ma L, Cheng X, Liu F, An F, Rivera J. iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 18: 1174-1184. DOI: 10.1109/Tpds.2007.1063 |
0.436 |
|
2007 |
Wu W, Cheng X, Ding M, Xing K, Liu F, Deng P. Localized Outlying and Boundary Data Detection in Sensor Networks Ieee Transactions On Knowledge and Data Engineering. 19: 1145-1157. DOI: 10.1109/Tkde.2007.1062 |
0.385 |
|
2007 |
Xing K, Cheng X, Liu F, Rotenstreich S. Location-centric storage for safety warning based on roadway sensor networks Journal of Parallel and Distributed Computing. 67: 336-345. DOI: 10.1016/J.Jpdc.2006.10.003 |
0.381 |
|
2007 |
Cheng X, Du D, Wang L, Xu B. Relay sensor placement in wireless sensor networks Wireless Networks. 14: 347-355. DOI: 10.1007/S11276-006-0724-8 |
0.575 |
|
2006 |
Cheng X, Liu F, An F. SeGrid: A secure grid framework for sensor networks Eurasip Journal On Wireless Communications and Networking. 2006. DOI: 10.1155/Wcn/2006/90652 |
0.401 |
|
2006 |
Cheng X, Ding M, Du DH, Jia X. Virtual backbone construction in multihop ad hoc wireless networks Wireless Communications and Mobile Computing. 6: 183-190. DOI: 10.1002/Wcm.378 |
0.411 |
|
2005 |
Thaeler A, Ding M, Cheng X. iTPS: an improved location discovery scheme for sensor networks with long-range beacons Journal of Parallel and Distributed Computing. 65: 98-106. DOI: 10.1016/J.Jpdc.2004.09.002 |
0.38 |
|
2003 |
Cheng X, Narahari B, Simha R, Cheng MX, Liu D. Strong minimum energy topology in wireless sensor networks: NP-Completeness and heuristics Ieee Transactions On Mobile Computing. 2: 248-256. DOI: 10.1109/Tmc.2003.1233530 |
0.667 |
|
2003 |
Cheng X, Huang X, Li D, Wu W, Du D. A polynomial-time approximation scheme for the minimum-connected dominating set in ad hoc wireless networks Networks. 42: 202-208. DOI: 10.1002/Net.10097 |
0.528 |
|
2001 |
Fu HL, Shiue CL, Cheng X, Du DZ, Kim JM. Quadratic Integer Programming with Application to the Chaotic Mappings of Complete Multipartite Graphs Journal of Optimization Theory and Applications. 110: 545-556. DOI: 10.1023/A:1017584227417 |
0.45 |
|
2001 |
Cheng X, Kim J, Lu B. A polynomial time approximation scheme for the problem of interconnecting Highways Journal of Combinatorial Optimization. 5: 327-343. DOI: 10.1023/A:1011497227406 |
0.531 |
|
Show low-probability matches. |