Weichao Wang, Ph.D. - Publications

Affiliations: 
2005 Purdue University, West Lafayette, IN, United States 
Area:
Computer Science

11 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Wang W, Qin T, Wang Y. Encryption-free data transmission and hand-over in two-tier body area networks. Computer Methods and Programs in Biomedicine. 192: 105411. PMID 32172080 DOI: 10.1016/J.Cmpb.2020.105411  0.374
2018 Wang W, Shi X, Qin T. Encryption-free Authentication and Integrity Protection in Body Area Networks through Physical Unclonable Functions Smart Health. 12: 66-81. DOI: 10.1016/J.Smhl.2018.01.001  0.351
2013 Xie X, Wang W. Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding Procedia Computer Science. 21: 430-435. DOI: 10.1016/J.Procs.2013.09.057  0.371
2011 Lu A, Wang W, Dnyate A, Hu X. Sybil attack detection through global topology pattern visualization Information Visualization. 10: 32-46. DOI: 10.1057/Ivs.2010.1  0.363
2011 Mao X, Zhou C, He Y, Yang Z, Tang S, Wang W. Guest editorial: Special issue on wireless sensor networks, cyber-physical systems, and internet of things Tsinghua Science and Technology. 16: 559-560. DOI: 10.1016/S1007-0214(11)70074-8  0.363
2011 Li Z, Pu D, Wang W, Wyglinski A. Forced collision: Detecting wormhole attacks with physical layer network coding Tsinghua Science and Technology. 16: 505-519. DOI: 10.1016/S1007-0214(11)70069-4  0.389
2008 Wang W, Kong J, Bhargava B, Gerla M. Visualisation of wormholes in underwater sensor networks: a distributed approach International Journal of Security and Networks. 3: 10. DOI: 10.1504/Ijsn.2008.016198  0.577
2007 Wang W, Lu A. Interactive wormhole detection and evaluation Information Visualization. 6: 3-17. DOI: 10.1057/Palgrave.Ivs.9500144  0.43
2006 Evans JB, Wang W, Ewy BJ. Wireless networking security: open issues in trust, management, interoperation and measurement International Journal of Security and Networks. 1: 84-94. DOI: 10.1504/Ijsn.2006.010825  0.4
2006 Wang W, Bhargava BK, Lu Y, Wu X. Defending against wormhole attacks in mobile ad hoc networks Wireless Communications and Mobile Computing. 6: 483-503. DOI: 10.1002/Wcm.292  0.575
2004 Bhargava B, Wu X, Lu Y, Wang W. Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA) Mobile Networks and Applications. 9: 393-408. DOI: 10.1023/B:Mone.0000031606.04846.Fa  0.579
Show low-probability matches.