Follow
Bo Sheng
Title
Cited by
Cited by
Year
Outlier detection in sensor networks
B Sheng, Q Li, W Mao, W Jin
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
2682007
Elliptic curve cryptography-based access control in sensor networks
H Wang, B Sheng, Q Li
International Journal of Security and Networks 1 (3), 127-137, 2006
2532006
Secure and serverless RFID authentication and search protocols
CC Tan, B Sheng, Q Li
Wireless Communications, IEEE Transactions on 7 (4), 1400-1407, 2008
2312008
Counting RFID tags efficiently and anonymously
H Han, B Sheng, CC Tan, Q Li, W Mao, S Lu
INFOCOM, 2010 Proceedings IEEE, 1-9, 2010
1902010
A timing-based scheme for rogue AP detection
H Han, B Sheng, CC Tan, Q Li, S Lu
IEEE Transactions on parallel and distributed Systems 22 (11), 1912-1925, 2011
1852011
How to monitor for missing RFID tags
CC Tan, B Sheng, Q Li
Distributed Computing Systems, 2008. ICDCS'08. The 28th International …, 2008
1802008
Verifiable privacy-preserving range query in two-tiered sensor networks
B Sheng, Q Li
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 46-50, 2008
1782008
Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control
H Wang, B Sheng, CC Tan, Q Li
Distributed Computing Systems, 2008. ICDCS'08. The 28th International …, 2008
1512008
Data storage placement in sensor networks
B Sheng, Q Li, W Mao
Proceedings of the 7th ACM international symposium on Mobile ad hoc …, 2006
1482006
Efficient tag identification in mobile RFID systems
L Xie, B Sheng, CC Tan, H Han, Q Li, D Chen
INFOCOM, 2010 Proceedings IEEE, 1-9, 2010
1332010
Severless search and authentication protocols for RFID
CC Tan, B Sheng, Q Li
Pervasive Computing and Communications, 2007. PerCom'07. Fifth Annual IEEE …, 2007
1322007
Efficient continuous scanning in RFID systems
B Sheng, Q Li, W Mao
2010 Proceedings IEEE INFOCOM, 1-9, 2010
1252010
Finding popular categories for RFID tags
B Sheng, CC Tan, Q Li, W Mao
Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008
1212008
Wizi-cloud: Application-transparent dual zigbee-wifi radios for low power internet access
T Jin, G Noubir, B Sheng
2011 Proceedings IEEE INFOCOM, 1593-1601, 2011
1202011
Privacy-aware routing in sensor networks
H Wang, B Sheng, Q Li
Computer Networks 53 (9), 1512-1529, 2009
1192009
A measurement based rogue ap detection scheme
H Han, B Sheng, CC Tan, Q Li, S Lu
INFOCOM 2009, IEEE, 1593-1601, 2009
962009
On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming
G Noubir, R Rajaraman, B Sheng, B Thapa
Proceedings of the fourth ACM conference on Wireless network security, 97-108, 2011
882011
Haste: Hadoop yarn scheduling based on task-dependency and resource-demand
Y Yao, J Wang, B Sheng, J Lin, N Mi
2014 IEEE 7th international conference on cloud computing, 184-191, 2014
832014
Microsearch: A search engine for embedded devices used in pervasive computing
CC Tan, B Sheng, H Wang, Q Li
ACM Transactions on Embedded Computing Systems (TECS) 9 (4), 1-29, 2010
812010
Efficient techniques for monitoring missing RFID tags
CC Tan, B Sheng, Q Li
IEEE Transactions on Wireless Communications 9 (6), 1882-1889, 2010
732010
The system can't perform the operation now. Try again later.
Articles 1–20