Year |
Citation |
Score |
2019 |
Novak E, Tang Z, Li Q. Ultrasound Proximity Networking on Smart Mobile Devices for IoT Applications Ieee Internet of Things Journal. 6: 399-409. DOI: 10.1109/Jiot.2018.2848099 |
0.318 |
|
2017 |
Li C, Qin Z, Novak E, Li Q. Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks Ieee Internet of Things Journal. 4: 1156-1164. DOI: 10.1109/Jiot.2017.2685596 |
0.304 |
|
2013 |
Qin Z, Li Q, Hsieh G. Defending against cooperative attacks in cooperative spectrum sensing Ieee Transactions On Wireless Communications. 12: 2680-2687. DOI: 10.1109/Twc.2013.041913.120516 |
0.318 |
|
2012 |
Mustafa HEH, Zhu X, Li Q, Chen G. Efficient median estimation for large-scale sensor RFID systems International Journal of Sensor Networks. 12: 171-183. DOI: 10.1504/Ijsnet.2012.050455 |
0.307 |
|
2011 |
Xie L, Li Q, Mao W, Wu J, Chen D. Association Control for Vehicular WiFi Access: Pursuing Efficiency and Fairness Ieee Transactions On Parallel and Distributed Systems. 22: 1323-1331. DOI: 10.1109/Tpds.2011.17 |
0.305 |
|
2011 |
Sheng B, Li Q. Verifiable Privacy-Preserving Sensor Network Storage for Range Query Ieee Transactions On Mobile Computing. 10: 1312-1326. DOI: 10.1109/Tmc.2010.236 |
0.339 |
|
2011 |
Wang H, Sheng B, Tan CC, Li Q. Public-key based access control in sensornet Wireless Networks. 17: 1217-1234. DOI: 10.1007/S11276-011-0343-X |
0.34 |
|
2010 |
Gao H, Utecht S, Patrick G, Hsieh G, Xu F, Wang H, Li Q. High speed data routing in vehicular sensor networks Journal of Communications. 5: 181-188. DOI: 10.4304/Jcm.5.3.181-188 |
0.335 |
|
2010 |
Wang H, Tan CC, Li Q. Snoogle: A search engine for pervasive environments Ieee Transactions On Parallel and Distributed Systems. 21: 1188-1202. DOI: 10.1109/Tpds.2009.145 |
0.303 |
|
2010 |
Sheng B, Li Q, Mao W. Optimize Storage Placement in Sensor Networks Ieee Transactions On Mobile Computing. 9: 1437-1450. DOI: 10.1109/Tmc.2010.98 |
0.314 |
|
2010 |
Wang H, Li Q. Achieving robust message authentication in sensor networks: a public-key based approach Wireless Networks. 16: 999-1009. DOI: 10.1007/S11276-009-0184-Z |
0.337 |
|
2009 |
Wang H, Sheng B, Li Q. Privacy-aware routing in sensor networks Computer Networks. 53: 1512-1529. DOI: 10.1016/J.Comnet.2009.02.002 |
0.343 |
|
2007 |
Ren S, Li Q, Wang H, Chen X, Zhang X. Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 18: 334-350. DOI: 10.1109/Tpds.2007.41 |
0.329 |
|
2006 |
Wang H, Sheng B, Li Q. Elliptic curve cryptography-based access control in sensor networks International Journal of Security and Networks. 1: 127-137. DOI: 10.1504/Ijsn.2006.011772 |
0.341 |
|
2005 |
Li Q, Rus D. Navigation protocols in sensor networks Acm Transactions On Sensor Networks (Tosn). 1: 3-35. DOI: 10.1145/1077391.1077393 |
0.479 |
|
2005 |
Ren S, Li Q, Wang H, Chen X, Zhang X. A study on object tracking quality under probabilistic coverage in sensor networks Acm Sigmobile Mobile Computing and Communications Review. 9: 73-76. DOI: 10.1145/1055959.1055971 |
0.306 |
|
2004 |
Li Q, Rus D. Global clock synchronization in sensor networks Proceedings - Ieee Infocom. 1: 564-574. DOI: 10.1109/Tc.2006.25 |
0.466 |
|
2003 |
Li Q, Peterson R, DeRosa M, Rus D. MobiCom poster Acm Sigmobile Mobile Computing and Communications Review. 7: 56-58. DOI: 10.1145/881978.881995 |
0.346 |
|
2003 |
Aslam J, Li Q, Rus D. Three power-aware routing algorithms for sensor networks Wireless Communications and Mobile Computing. 3: 187-208. DOI: 10.1002/Wcm.111 |
0.45 |
|
Show low-probability matches. |