Year |
Citation |
Score |
2018 |
Lin C, Wei S, Deng J, Obaidat MS, Song H, Wang L, Wu G. GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture Ieee Transactions On Vehicular Technology. 67: 12124-12136. DOI: 10.1109/Tvt.2018.2872890 |
0.311 |
|
2018 |
Yao L, Chen A, Deng J, Wang J, Wu G. A Cooperative Caching Scheme Based on Mobility Prediction in Vehicular Content Centric Networks Ieee Transactions On Vehicular Technology. 67: 5435-5444. DOI: 10.1109/Tvt.2017.2784562 |
0.368 |
|
2018 |
Lin C, Wang K, Chu Z, Wang K, Deng J, Obaidat MS, Wu G. Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks Journal of Systems and Software. 146: 42-58. DOI: 10.1016/J.Jss.2018.09.002 |
0.326 |
|
2017 |
Lin C, Han D, Deng J, Wu G. P$^2$S: A Primary and Passer-By Scheduling Algorithm for On-Demand Charging Architecture in Wireless Rechargeable Sensor Networks Ieee Transactions On Vehicular Technology. 66: 8047-8058. DOI: 10.1109/Tvt.2017.2683493 |
0.311 |
|
2016 |
Yao L, Man Y, Huang Z, Deng J, Wang X. Secure Routing Based on Social Similarity in Opportunistic Networks Ieee Transactions On Wireless Communications. 15: 594-605. DOI: 10.1109/Twc.2015.2476466 |
0.326 |
|
2016 |
Xia F, Liaqat HB, Deng J, Wan J, Das SK. Overhead control with reliable transmission of popular packets in ad-hoc social networks Ieee Transactions On Vehicular Technology. 65: 7647-7661. DOI: 10.1109/Tvt.2015.2484418 |
0.343 |
|
2016 |
Khalili-Shoja MR, Amariucai GT, Wei S, Deng J. Secret Common Randomness From Routing Metadata in Ad Hoc Networks Ieee Transactions On Information Forensics and Security. 11: 1674-1684. DOI: 10.1109/Tifs.2016.2550424 |
0.314 |
|
2016 |
Lin C, Wu G, Qiu T, Deng J. A low-cost node capture attack algorithm for wireless sensor networks International Journal of Communication Systems. 29: 1251-1268. DOI: 10.1002/Dac.3097 |
0.321 |
|
2015 |
Yao L, Deng J, Wang J, Wu G. A-CACHE: An anchor-based public key caching scheme in large wireless networks Computer Networks. 87: 78-88. DOI: 10.1016/J.Comnet.2015.06.001 |
0.351 |
|
2015 |
Yao L, Kang L, Deng F, Deng J, Wu G. Protecting source-location privacy based on multirings in wireless sensor networks Concurrency and Computation: Practice and Experience. 27: 3863-3876. DOI: 10.1002/Cpe.3075 |
0.364 |
|
2013 |
Liu Y, Liu M, Deng J. Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth the Pain? Ieee Journal On Selected Areas in Communications. 31: 2301-2311. DOI: 10.1109/Jsac.2013.131122 |
0.313 |
|
2012 |
Deng J, Huang SC-, Han YS. An Online Relay Selection Scheme in Power Controllable Wireless Sensor Networks International Journal of Distributed Sensor Networks. 8: 213598. DOI: 10.1155/2012/213598 |
0.38 |
|
2010 |
Pai H, Deng J, Han YS. Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks Computer Communications. 33: 1524-1530. DOI: 10.1016/J.Comcom.2010.04.021 |
0.37 |
|
2009 |
Deng J, Han YS, Kulkarni SR. Can multiple subchannels improve the delay performance of RTS/CTS-based MAC schemes? Ieee Transactions On Wireless Communications. 8: 1591-1596. DOI: 10.1109/Twc.2009.060932 |
0.366 |
|
2008 |
Deng J, Han YS. Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission Ieee Transactions On Dependable and Secure Computing. 5: 177-190. DOI: 10.1109/Tdsc.2007.70233 |
0.357 |
|
2007 |
Chen D, Deng J, Varshney PK. Selection of a Forwarding Area for Contention-Based Geographic Forwarding in Wireless Multi-Hop Networks Ieee Transactions On Vehicular Technology. 56: 3111-3122. DOI: 10.1109/Tvt.2007.900371 |
0.334 |
|
2007 |
Liu K, Deng J, Varshney PK, Balakrishnan K. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs Ieee Transactions On Mobile Computing. 6: 536-550. DOI: 10.1109/Tmc.2007.1036 |
0.381 |
|
2007 |
Deng J, Han YS, Chen P, Varshney PK. Optimal Transmission Range for Wireless Ad Hoc Networks Based on Energy Efficiency Ieee Transactions On Communications. 55: 1772-1782. DOI: 10.1109/Tcomm.2007.904395 |
0.317 |
|
2006 |
Deng J, Han R, Mishra S. Limiting DoS attacks during multihop data delivery in wireless sensor networks International Journal of Security and Networks. 1: 167-178. DOI: 10.1504/Ijsn.2006.011776 |
0.346 |
|
2006 |
Han YS, Deng J, Haas ZJ. Analyzing multi-channel medium access control schemes with ALOHA reservation Ieee Transactions On Wireless Communications. 5: 2143-2152. DOI: 10.1109/Twc.2006.1687730 |
0.557 |
|
2006 |
Deng J, Han YS, Haas ZJ. Analyzing split channel medium access control schemes Ieee Transactions On Wireless Communications. 5: 967-971. DOI: 10.1109/Twc.2006.1633347 |
0.574 |
|
2006 |
Du W, Deng J, Han YS, Varshney PK. A key predistribution scheme for sensor networks using deployment knowledge Ieee Transactions On Dependable and Secure Computing. 3: 62-77. DOI: 10.1109/Tdsc.2006.2 |
0.378 |
|
2006 |
Deng J, Han R, Mishra S. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks Pervasive and Mobile Computing. 2: 159-186. DOI: 10.1016/J.Pmcj.2005.12.003 |
0.357 |
|
2006 |
Deng J, Han R, Mishra S. INSENS: Intrusion-tolerant routing for wireless sensor networks Computer Communications. 29: 216-230. DOI: 10.1016/J.Comcom.2005.05.018 |
0.361 |
|
2005 |
Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A. A pairwise key predistribution scheme for wireless sensor networks Acm Transactions On Information and System Security (Tissec). 8: 228-258. DOI: 10.1145/1065545.1065548 |
0.38 |
|
2005 |
Deng J, Han YS, Heinzelman WB, Varshney PK. Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks Computer Communications. 28: 1631-1642. DOI: 10.1016/J.Comcom.2005.02.019 |
0.342 |
|
2005 |
Deng J, Han YS, Heinzelman WB, Varshney PK. Scheduling sleeping nodes in high density cluster-based sensor networks Mobile Networks and Applications. 10: 825-835. DOI: 10.1007/S11036-005-4441-9 |
0.34 |
|
2003 |
Haas ZJ, Deng J. On optimizing the backoff interval for random access schemes Ieee Transactions On Communications. 51: 2081-2090. DOI: 10.1109/Tcomm.2003.820754 |
0.577 |
|
2002 |
Haas ZJ, Deng J. Dual busy tone multiple access (DBTMA) - A multiple access control scheme for ad hoc networks Ieee Transactions On Communications. 50: 975-985. DOI: 10.1109/Tcomm.2002.1010617 |
0.58 |
|
Show low-probability matches. |