Jing Deng, Ph.D. - Publications

Affiliations: 
2002 Cornell University, Ithaca, NY, United States 
Area:
Electronics and Electrical Engineering

29 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Lin C, Wei S, Deng J, Obaidat MS, Song H, Wang L, Wu G. GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture Ieee Transactions On Vehicular Technology. 67: 12124-12136. DOI: 10.1109/Tvt.2018.2872890  0.311
2018 Yao L, Chen A, Deng J, Wang J, Wu G. A Cooperative Caching Scheme Based on Mobility Prediction in Vehicular Content Centric Networks Ieee Transactions On Vehicular Technology. 67: 5435-5444. DOI: 10.1109/Tvt.2017.2784562  0.368
2018 Lin C, Wang K, Chu Z, Wang K, Deng J, Obaidat MS, Wu G. Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks Journal of Systems and Software. 146: 42-58. DOI: 10.1016/J.Jss.2018.09.002  0.326
2017 Lin C, Han D, Deng J, Wu G. P$^2$S: A Primary and Passer-By Scheduling Algorithm for On-Demand Charging Architecture in Wireless Rechargeable Sensor Networks Ieee Transactions On Vehicular Technology. 66: 8047-8058. DOI: 10.1109/Tvt.2017.2683493  0.311
2016 Yao L, Man Y, Huang Z, Deng J, Wang X. Secure Routing Based on Social Similarity in Opportunistic Networks Ieee Transactions On Wireless Communications. 15: 594-605. DOI: 10.1109/Twc.2015.2476466  0.326
2016 Xia F, Liaqat HB, Deng J, Wan J, Das SK. Overhead control with reliable transmission of popular packets in ad-hoc social networks Ieee Transactions On Vehicular Technology. 65: 7647-7661. DOI: 10.1109/Tvt.2015.2484418  0.343
2016 Khalili-Shoja MR, Amariucai GT, Wei S, Deng J. Secret Common Randomness From Routing Metadata in Ad Hoc Networks Ieee Transactions On Information Forensics and Security. 11: 1674-1684. DOI: 10.1109/Tifs.2016.2550424  0.314
2016 Lin C, Wu G, Qiu T, Deng J. A low-cost node capture attack algorithm for wireless sensor networks International Journal of Communication Systems. 29: 1251-1268. DOI: 10.1002/Dac.3097  0.321
2015 Yao L, Deng J, Wang J, Wu G. A-CACHE: An anchor-based public key caching scheme in large wireless networks Computer Networks. 87: 78-88. DOI: 10.1016/J.Comnet.2015.06.001  0.351
2015 Yao L, Kang L, Deng F, Deng J, Wu G. Protecting source-location privacy based on multirings in wireless sensor networks Concurrency and Computation: Practice and Experience. 27: 3863-3876. DOI: 10.1002/Cpe.3075  0.364
2013 Liu Y, Liu M, Deng J. Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth the Pain? Ieee Journal On Selected Areas in Communications. 31: 2301-2311. DOI: 10.1109/Jsac.2013.131122  0.313
2012 Deng J, Huang SC-, Han YS. An Online Relay Selection Scheme in Power Controllable Wireless Sensor Networks International Journal of Distributed Sensor Networks. 8: 213598. DOI: 10.1155/2012/213598  0.38
2010 Pai H, Deng J, Han YS. Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks Computer Communications. 33: 1524-1530. DOI: 10.1016/J.Comcom.2010.04.021  0.37
2009 Deng J, Han YS, Kulkarni SR. Can multiple subchannels improve the delay performance of RTS/CTS-based MAC schemes? Ieee Transactions On Wireless Communications. 8: 1591-1596. DOI: 10.1109/Twc.2009.060932  0.366
2008 Deng J, Han YS. Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission Ieee Transactions On Dependable and Secure Computing. 5: 177-190. DOI: 10.1109/Tdsc.2007.70233  0.357
2007 Chen D, Deng J, Varshney PK. Selection of a Forwarding Area for Contention-Based Geographic Forwarding in Wireless Multi-Hop Networks Ieee Transactions On Vehicular Technology. 56: 3111-3122. DOI: 10.1109/Tvt.2007.900371  0.334
2007 Liu K, Deng J, Varshney PK, Balakrishnan K. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs Ieee Transactions On Mobile Computing. 6: 536-550. DOI: 10.1109/Tmc.2007.1036  0.381
2007 Deng J, Han YS, Chen P, Varshney PK. Optimal Transmission Range for Wireless Ad Hoc Networks Based on Energy Efficiency Ieee Transactions On Communications. 55: 1772-1782. DOI: 10.1109/Tcomm.2007.904395  0.317
2006 Deng J, Han R, Mishra S. Limiting DoS attacks during multihop data delivery in wireless sensor networks International Journal of Security and Networks. 1: 167-178. DOI: 10.1504/Ijsn.2006.011776  0.346
2006 Han YS, Deng J, Haas ZJ. Analyzing multi-channel medium access control schemes with ALOHA reservation Ieee Transactions On Wireless Communications. 5: 2143-2152. DOI: 10.1109/Twc.2006.1687730  0.557
2006 Deng J, Han YS, Haas ZJ. Analyzing split channel medium access control schemes Ieee Transactions On Wireless Communications. 5: 967-971. DOI: 10.1109/Twc.2006.1633347  0.574
2006 Du W, Deng J, Han YS, Varshney PK. A key predistribution scheme for sensor networks using deployment knowledge Ieee Transactions On Dependable and Secure Computing. 3: 62-77. DOI: 10.1109/Tdsc.2006.2  0.378
2006 Deng J, Han R, Mishra S. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks Pervasive and Mobile Computing. 2: 159-186. DOI: 10.1016/J.Pmcj.2005.12.003  0.357
2006 Deng J, Han R, Mishra S. INSENS: Intrusion-tolerant routing for wireless sensor networks Computer Communications. 29: 216-230. DOI: 10.1016/J.Comcom.2005.05.018  0.361
2005 Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A. A pairwise key predistribution scheme for wireless sensor networks Acm Transactions On Information and System Security (Tissec). 8: 228-258. DOI: 10.1145/1065545.1065548  0.38
2005 Deng J, Han YS, Heinzelman WB, Varshney PK. Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks Computer Communications. 28: 1631-1642. DOI: 10.1016/J.Comcom.2005.02.019  0.342
2005 Deng J, Han YS, Heinzelman WB, Varshney PK. Scheduling sleeping nodes in high density cluster-based sensor networks Mobile Networks and Applications. 10: 825-835. DOI: 10.1007/S11036-005-4441-9  0.34
2003 Haas ZJ, Deng J. On optimizing the backoff interval for random access schemes Ieee Transactions On Communications. 51: 2081-2090. DOI: 10.1109/Tcomm.2003.820754  0.577
2002 Haas ZJ, Deng J. Dual busy tone multiple access (DBTMA) - A multiple access control scheme for ad hoc networks Ieee Transactions On Communications. 50: 975-985. DOI: 10.1109/Tcomm.2002.1010617  0.58
Show low-probability matches.