Outlier detection in sensor networks B Sheng, Q Li, W Mao, W Jin Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007 | 268 | 2007 |
Elliptic curve cryptography-based access control in sensor networks H Wang, B Sheng, Q Li International Journal of Security and Networks 1 (3), 127-137, 2006 | 253 | 2006 |
Secure and serverless RFID authentication and search protocols CC Tan, B Sheng, Q Li Wireless Communications, IEEE Transactions on 7 (4), 1400-1407, 2008 | 231 | 2008 |
Counting RFID tags efficiently and anonymously H Han, B Sheng, CC Tan, Q Li, W Mao, S Lu INFOCOM, 2010 Proceedings IEEE, 1-9, 2010 | 190 | 2010 |
A timing-based scheme for rogue AP detection H Han, B Sheng, CC Tan, Q Li, S Lu IEEE Transactions on parallel and distributed Systems 22 (11), 1912-1925, 2011 | 185 | 2011 |
How to monitor for missing RFID tags CC Tan, B Sheng, Q Li Distributed Computing Systems, 2008. ICDCS'08. The 28th International …, 2008 | 180 | 2008 |
Verifiable privacy-preserving range query in two-tiered sensor networks B Sheng, Q Li IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 46-50, 2008 | 178 | 2008 |
Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control H Wang, B Sheng, CC Tan, Q Li Distributed Computing Systems, 2008. ICDCS'08. The 28th International …, 2008 | 151 | 2008 |
Data storage placement in sensor networks B Sheng, Q Li, W Mao Proceedings of the 7th ACM international symposium on Mobile ad hoc …, 2006 | 148 | 2006 |
Efficient tag identification in mobile RFID systems L Xie, B Sheng, CC Tan, H Han, Q Li, D Chen INFOCOM, 2010 Proceedings IEEE, 1-9, 2010 | 133 | 2010 |
Severless search and authentication protocols for RFID CC Tan, B Sheng, Q Li Pervasive Computing and Communications, 2007. PerCom'07. Fifth Annual IEEE …, 2007 | 132 | 2007 |
Efficient continuous scanning in RFID systems B Sheng, Q Li, W Mao 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 125 | 2010 |
Finding popular categories for RFID tags B Sheng, CC Tan, Q Li, W Mao Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008 | 121 | 2008 |
Wizi-cloud: Application-transparent dual zigbee-wifi radios for low power internet access T Jin, G Noubir, B Sheng 2011 Proceedings IEEE INFOCOM, 1593-1601, 2011 | 120 | 2011 |
Privacy-aware routing in sensor networks H Wang, B Sheng, Q Li Computer Networks 53 (9), 1512-1529, 2009 | 119 | 2009 |
A measurement based rogue ap detection scheme H Han, B Sheng, CC Tan, Q Li, S Lu INFOCOM 2009, IEEE, 1593-1601, 2009 | 96 | 2009 |
On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming G Noubir, R Rajaraman, B Sheng, B Thapa Proceedings of the fourth ACM conference on Wireless network security, 97-108, 2011 | 88 | 2011 |
Haste: Hadoop yarn scheduling based on task-dependency and resource-demand Y Yao, J Wang, B Sheng, J Lin, N Mi 2014 IEEE 7th international conference on cloud computing, 184-191, 2014 | 83 | 2014 |
Microsearch: A search engine for embedded devices used in pervasive computing CC Tan, B Sheng, H Wang, Q Li ACM Transactions on Embedded Computing Systems (TECS) 9 (4), 1-29, 2010 | 81 | 2010 |
Efficient techniques for monitoring missing RFID tags CC Tan, B Sheng, Q Li IEEE Transactions on Wireless Communications 9 (6), 1882-1889, 2010 | 73 | 2010 |