关注
Yong Guan
Yong Guan
在 iastate.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, Y Guan
IEEE Transactions on Parallel and Distributed systems 24 (1), 104-117, 2012
4262012
An efficient signature-based scheme for securing network coding against pollution attacks
Z Yu, Y Wei, B Ramkumar, Y Guan
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1409-1417, 2008
3282008
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
Z Yu, Y Guan
Proceedings of the 3rd international conference on Embedded networked sensor …, 2005
2512005
Lightweight mutual authentication and ownership transfer for RFID systems
L Kulseng, Z Yu, Y Wei, Y Guan
2010 proceedings IEEE infocom, 1-5, 2010
2192010
Detecting black-hole attack in mobile ad hoc networks
B Sun, Y Guan, J Chen, UW Pooch
IET Digital Library, 2003
2142003
Detecting click fraud in pay-per-click streams of online advertising networks
L Zhang, Y Guan
2008 The 28th International Conference on Distributed Computing Systems, 77-84, 2008
2012008
An efficient scheme for securing XOR network coding against pollution attacks
Z Yu, Y Wei, B Ramkumar, Y Guan
IEEE INFOCOM 2009, 406-414, 2009
1662009
A key management scheme using deployment knowledge for wireless sensor networks
Z Yu, Y Guan
IEEE Transactions on Parallel and Distributed Systems 19 (10), 1411-1425, 2008
1352008
A dynamic en-route filtering scheme for data reporting in wireless sensor networks
Z Yu, Y Guan
IEEE/ACM transactions on networking 18 (1), 150-163, 2009
1342009
Netcamo: camouflaging network traffic for qos-guaranteed mission critical applications
Y Guan, X Fu, D Xuan, PU Shenoy, R Bettati, W Zhao
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001
1332001
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
Z Yu, Y Guan
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
1062005
A robust group-based key management scheme for wireless sensor networks
Z Yu, Y Guan
IEEE Wireless Communications and Networking Conference, 2005 4, 1915-1920, 2005
1012005
An optimal strategy for anonymous communication protocols
Y Guan, X Fu, R Bettati, W Zhao
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
1012002
Sketch-based streaming PCA algorithm for network-wide traffic anomaly detection
Y Liu, L Zhang, Y Guan
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
832010
Lightweight location verification algorithms for wireless sensor networks
Y Wei, Y Guan
IEEE Transactions on Parallel and Distributed Systems 24 (5), 938-950, 2012
722012
Lightweight secure search protocols for low-cost RFID systems
L Kulseng, Z Yu, Y Wei, Y Guan
2009 29th IEEE International Conference on Distributed Computing Systems, 40-48, 2009
602009
Detection of stepping stone attack under delay and chaff perturbations
L Zhang, AG Persaud, A Johnson, Y Guan
2006 IEEE International Performance Computing and Communications Conference …, 2006
582006
Preventing traffic analysis for real-time communication networks
Y Guan, C Li, D Xuan, R Bettati, W Zhao
MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No …, 1999
541999
Identifying high-cardinality hosts from network-wide traffic measurements
Y Liu, W Chen, Y Guan
IEEE Transactions on Dependable and Secure Computing 13 (5), 547-558, 2015
502015
Location verification algorithms forwireless sensor networks
Y Wei, Z Yu, Y Guan
27th International Conference on Distributed Computing Systems (ICDCS'07), 70-70, 2007
482007
系统目前无法执行此操作,请稍后再试。
文章 1–20