Year |
Citation |
Score |
2019 |
Chen Y, Li D, Hua Y, He W. Effective and Efficient Content Redundancy Detection of Web Videos Ieee Transactions On Big Data. 1-1. DOI: 10.1109/Tbdata.2019.2913674 |
0.302 |
|
2018 |
Shameli-Sendi A, Louafi H, He W, Cheriet M. Dynamic Optimal Countermeasure Selection for Intrusion Response System Ieee Transactions On Dependable and Secure Computing. 15: 755-770. DOI: 10.1109/Tdsc.2016.2615622 |
0.348 |
|
2017 |
Ma Q, Zhang S, Zhu T, Liu K, Zhang L, He W, Liu Y. PLP: Protecting Location Privacy Against Correlation Analyze Attack in Crowdsensing Ieee Transactions On Mobile Computing. 16: 2588-2598. DOI: 10.1109/Tmc.2016.2624732 |
0.345 |
|
2016 |
He W, Sarvestani SS, Yen I, Zhang J. Guest Editorial: Special Issue on Cyber-Physical Systems and Services Ieee Transactions On Services Computing. 9: 172-173. DOI: 10.1109/Tsc.2016.2547518 |
0.338 |
|
2016 |
Gong W, Liu H, Miao X, Liu K, He W, Zhang L, Liu Y. Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2016.2521333 |
0.315 |
|
2016 |
Wang P, He W, Liu X. Efficiently Estimating Statistics of Points of Interests on Maps Ieee Transactions On Knowledge and Data Engineering. 28: 425-438. DOI: 10.1109/Tkde.2015.2480397 |
0.314 |
|
2016 |
Tong C, He W, Niu J, Xie Z. A novel information cascade model in online social networks Physica a: Statistical Mechanics and Its Applications. 444: 297-310. DOI: 10.1016/J.Physa.2015.10.026 |
0.335 |
|
2015 |
Zhu H, Liu KH, He W, Ota K. Quality of experience and quality of protection provisions in emerging mobile networks [Guest Editorial] Ieee Wireless Communications. 22: 8-9. DOI: 10.1109/Mwc.2015.7224721 |
0.385 |
|
2014 |
Zhang F, He W, Chen Y, Li Z, Wang X, Chen S, Liu X. Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing Ieee Transactions On Wireless Communications. 13: 86-98. DOI: 10.1109/Twc.2013.121013.121473 |
0.374 |
|
2014 |
Hua Y, Liu X, He W, Feng D. Design and Implementation of Holistic Scheduling and Efficient Storage for FlexRay Ieee Transactions On Parallel and Distributed Systems. 25: 2529-2539. DOI: 10.1109/Tpds.2013.205 |
0.391 |
|
2014 |
Wang P, He W, Zhao J. A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare Ieee Internet Computing. 18: 10-15. DOI: 10.1109/Mic.2013.128 |
0.318 |
|
2014 |
Lin X, He W. WiLoVe: A WiFi-coverage based Location Verification System in LBS☆ Procedia Computer Science. 34: 484-491. DOI: 10.1016/J.Procs.2014.07.041 |
0.345 |
|
2013 |
Groat MM, Edwards B, Horey J, He W, Forrest S. Application and analysis of multidimensional negative surveys in participatory sensing applications Pervasive and Mobile Computing. 9: 372-391. DOI: 10.1016/J.Pmcj.2012.12.004 |
0.325 |
|
2011 |
He W, Liu X, Viet H, Nahrstedt K, Abdelzaher T. PDA: Privacy-preserving data aggregation for information collection Acm Transactions On Sensor Networks. 8. DOI: 10.1145/1993042.1993048 |
0.527 |
|
2009 |
He W, Huang Y, Sathyam R, Nahrstedt K, Lee WC. SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks Ieee Transactions On Information Forensics and Security. 4: 140-150. DOI: 10.1109/Tifs.2008.2009601 |
0.557 |
|
2008 |
Xu Z, Liu X, Zhang G, He W. McCLS: Certificateless Signature Scheme for Emergency Mobile Wireless Cyber-Physical Systems International Journal of Computers Communications & Control. 3: 395-411. DOI: 10.15837/Ijccc.2008.4.2407 |
0.418 |
|
2008 |
He W, Nahrstedt K, Liu X. End-to-end delay control of multimedia applications over multihop wireless links Acm Transactions On Multimedia Computing, Communications and Applications. 5. DOI: 10.1145/1413862.1413869 |
0.53 |
|
2008 |
He W, Huang Y, Nahrstedt K, Lee WC. Alert propagation in mobile ad hoc networks Acm Sigmobile Mobile Computing and Communications Review. 12: 23. DOI: 10.1145/1374512.1374519 |
0.524 |
|
2008 |
He W, Nahrstedt K. MobileAds Acm Sigbed Review. 5: 1-2. DOI: 10.1145/1366283.1366300 |
0.502 |
|
2007 |
He W, Huang Y, Nahrstedt K, Lee WC. A scalable public key management scheme in wireless ad hoc networks Acm Sigmobile Mobile Computing and Communications Review. 11: 69-70. DOI: 10.1145/1282221.1282240 |
0.569 |
|
2006 |
Liu X, Wang Q, He W, Caccamo M, Sha L. Optimal real-time sampling rate assignment for wireless sensor networks Acm Transactions On Sensor Networks. 2: 263-295. DOI: 10.1145/1149283.1149288 |
0.349 |
|
2002 |
Médard M, Barry RA, Finn SG, He W, Lumetta SS. Generalized loop-back recovery in optical mesh networks Ieee/Acm Transactions On Networking. 10: 153-164. DOI: 10.1109/90.986592 |
0.337 |
|
Show low-probability matches. |