Year |
Citation |
Score |
2020 |
Li W, Chen H, Ku W, Qin X. Turbo-GTS: A Fast Framework of Optimizing Task Throughput for Large-Scale Mobile Crowdsourcing Acm Transactions On Spatial Algorithms and Systems. 6: 1-29. DOI: 10.1145/3363450 |
0.427 |
|
2019 |
Sakai K, Sun M, Ku W, Wu J, Lai TH. Secure Data Communications in Wireless Networks Using Multi-Path Avoidance Routing Ieee Transactions On Wireless Communications. 18: 4753-4767. DOI: 10.1109/Twc.2019.2928801 |
0.396 |
|
2019 |
Sakai K, Sun M, Ku W, Wu J. On Anonymous Routing in Delay Tolerant Networks Ieee Transactions On Mobile Computing. 18: 2926-2940. DOI: 10.1109/Tmc.2018.2886349 |
0.406 |
|
2019 |
Sakai K, Sun M, Ku W, Lu H, Lai TH. Data Verification in Integrated RFID Systems Ieee Systems Journal. 13: 1969-1980. DOI: 10.1109/Jsyst.2018.2865571 |
0.375 |
|
2019 |
Zhang J, Harn P, Ku W, Sun M, Qin X, Lu H, Jiang X. An overlapping Voronoi diagram-based system for multi-criteria optimal location queries Geoinformatica. 23: 105-161. DOI: 10.1007/S10707-018-00338-7 |
0.393 |
|
2017 |
Teng S, Ku W, Chuang K. Toward mining user movement behaviors in indoor environments Sigspatial Special. 9: 19-27. DOI: 10.1145/3151123.3151127 |
0.369 |
|
2017 |
Teng S, Ku W, Chuang K. Toward Mining Stop-by Behaviors in Indoor Space Acm Transactions On Spatial Algorithms and Systems. 3: 7. DOI: 10.1145/3106736 |
0.393 |
|
2017 |
Wang W, Ku W. Dynamic indoor navigation with bayesian filters Sigspatial Special. 8: 9-10. DOI: 10.1145/3100243.3100249 |
0.344 |
|
2017 |
Sakai K, Sun M, Ku W, Wu J, Alanazi FS. Performance and Security Analyses of Onion-Based Anonymous Routing for Delay Tolerant Networks Ieee Transactions On Mobile Computing. 16: 3473-3487. DOI: 10.1109/Tmc.2017.2690634 |
0.389 |
|
2017 |
Chen H, Ku W, Wang H, Tang L, Sun M. Scaling Up Markov Logic Probabilistic Inference for Social Graphs Ieee Transactions On Knowledge and Data Engineering. 29: 433-445. DOI: 10.1109/Tkde.2016.2625251 |
0.499 |
|
2016 |
Zhang J, Jiang X, Ku WS, Qin X. Efficient parallel skyline evaluation using MapReduce Ieee Transactions On Parallel and Distributed Systems. 27: 1996-2009. DOI: 10.1109/Tpds.2015.2472016 |
0.335 |
|
2016 |
Sun M, Sakai K, Ku W, Lai TH, Vasilakos AV. Private and Secure Tag Access for Large-Scale RFID Systems Ieee Transactions On Dependable and Secure Computing. 13: 657-671. DOI: 10.1109/Tdsc.2015.2427833 |
0.388 |
|
2016 |
Sakai K, Sun MT, Ku WS, Lai TH. A novel coding scheme for secure communications in distributed RFID systems Ieee Transactions On Computers. 65: 409-421. DOI: 10.1109/Tc.2015.2423671 |
0.339 |
|
2016 |
Tang L, Chen H, Ku WS, Sun MT. Exploiting location-aware social networks for efficient spatial query processing Geoinformatica. 1-23. DOI: 10.1007/S10707-016-0271-0 |
0.548 |
|
2015 |
Zhang J, Jiang X, Qin X, Ku WS, Alghamdi MI. Frog: A framework for context-based file systems Acm Transactions On Storage. 11. DOI: 10.1145/2720022 |
0.343 |
|
2015 |
Sakai K, Sun MT, Ku WS, Lai TH, Vasilakos AV. A Framework for the Optimal k-Coverage Deployment Patterns of Wireless Sensors Ieee Sensors Journal. 15: 7273-7283. DOI: 10.1109/Jsen.2015.2474711 |
0.323 |
|
2014 |
Jing Y, Hu L, Ku WS, Shahabi C. Authentication of k nearest neighbor query on road networks Ieee Transactions On Knowledge and Data Engineering. 26: 1494-1506. DOI: 10.1109/Tkde.2013.174 |
0.456 |
|
2013 |
Sakai K, Ku WS, Sun MT, Zimmermann R. Privacy preserving continuous multimedia streaming in MANETs Acm Transactions On Multimedia Computing, Communications and Applications. 9. DOI: 10.1145/2501643.2501645 |
0.404 |
|
2013 |
Ku WS, Chen H, Wang H, Sun MT. A bayesian inference-based framework for RFID data cleansing Ieee Transactions On Knowledge and Data Engineering. 25: 2177-2191. DOI: 10.1109/Tkde.2012.116 |
0.505 |
|
2013 |
Hu L, Ku WS, Bakiras S, Shahabi C. Spatial query integrity with voronoi neighbors Ieee Transactions On Knowledge and Data Engineering. 25: 863-876. DOI: 10.1109/Tkde.2011.267 |
0.446 |
|
2013 |
Sakai K, Ku WS, Zimmermann R, Sun MT. Dynamic bit encoding for privacy protection against correlation attacks in RFID backward channel Ieee Transactions On Computers. 62: 112-123. DOI: 10.1109/Tc.2011.248 |
0.34 |
|
2013 |
Ku WS, Chen H, Wang CJ, Liu CM. Geo-store: A framework for supporting semantics-enabled location-based services Ieee Internet Computing. 17: 35-43. DOI: 10.1109/Mic.2012.21 |
0.52 |
|
2013 |
Ku WS, Hu L, Shahabi C, Wang H. A query integrity assurance scheme for accessing outsourced spatial databases Geoinformatica. 17: 97-124. DOI: 10.1007/S10707-012-0156-9 |
0.424 |
|
2012 |
Wang CJ, Ku WS. Anonymous sensory data collection approach for mobile participatory sensing Proceedings - 2012 Ieee 28th International Conference On Data Engineering Workshops, Icdew 2012. 220-227. DOI: 10.1109/ICDEW.2012.78 |
0.325 |
|
2011 |
Ku W, Sakai K, Sun M. The optimal k-covering tag deployment for RFID-based localization Journal of Network and Computer Applications. 34: 914-924. DOI: 10.1016/J.Jnca.2010.04.012 |
0.324 |
|
2010 |
Hsueh Y, Zimmermann R, Ku W. Efficient Location Updates for Continuous Queries over Moving Objects Journal of Computer Science and Technology. 25: 415-430. DOI: 10.1007/S11390-010-9334-0 |
0.422 |
|
2010 |
Chen H, Ku W, Sun M, Zimmermann R. The partial sequenced route query with traveling rules in road networks Geoinformatica. 15: 541-569. DOI: 10.1007/S10707-010-0115-2 |
0.534 |
|
2009 |
Hu H, Chen Y, Ku WS, Su Z, Chen CHJ. Weighted trust evaluation-based malicious node detection for wireless sensor networks International Journal of Information and Computer Security. 3: 132. DOI: 10.1504/Ijics.2009.028810 |
0.346 |
|
2008 |
Ku W, Zimmermann R, Wang H. Location-Based Spatial Query Processing with Data Sharing in Wireless Broadcast Environments Ieee Transactions On Mobile Computing. 7: 778-791. DOI: 10.1109/Tmc.2007.70791 |
0.431 |
|
2008 |
Ku WS, Zimmermann R. Nearest neighbor queries with peer-to-peer data sharing in mobile environments Pervasive and Mobile Computing. 4: 775-788. DOI: 10.1016/J.Pmcj.2008.08.001 |
0.418 |
|
2008 |
Ku W, Chen Y, Zimmermann R. Privacy Protected Spatial Query Processing for Advanced Location Based Services Wireless Personal Communications. 51: 53-65. DOI: 10.1007/S11277-008-9608-9 |
0.451 |
|
2007 |
Chen Y, Hwang K, Ku W. Collaborative Detection of DDoS Attacks over Multiple Network Domains Ieee Transactions On Parallel and Distributed Systems. 18: 1649-1662. DOI: 10.1109/Tpds.2007.1111 |
0.359 |
|
2006 |
Zimmermann R, Ku W, Wang H, Zand A, Bardet J-. A Distributed Geotechnical Information Management and Exchange Architecture Ieee Internet Computing. 10: 26-33. DOI: 10.1109/Mic.2006.92 |
0.324 |
|
2005 |
Wang H, Zimmermann R, Ku W. ASPEN: an adaptive spatial peer-to-peer network International Journal of Geographical Information Science. 230-239. DOI: 10.1145/1097064.1097097 |
0.42 |
|
2005 |
Ku W, Zimmermann R, Wang H, Wan C. Adaptive nearest neighbor queries in travel time networks International Journal of Geographical Information Science. 210-219. DOI: 10.1145/1097064.1097094 |
0.403 |
|
2004 |
Zimmermann R, Ku W, Chu W. Efficient query routing in distributed spatial databases International Journal of Geographical Information Science. 176-183. DOI: 10.1145/1032222.1032249 |
0.422 |
|
Show low-probability matches. |