Secure and efficient access to outsourced data W Wang, Z Li, R Owens, B Bhargava Proceedings of the 2009 ACM workshop on Cloud computing security, 55-66, 2009 | 400 | 2009 |
Visualization of wormholes in sensor networks W Wang, B Bhargava Proceedings of the 3rd ACM workshop on Wireless security, 51-60, 2004 | 397 | 2004 |
Middle School Students’ Social Media Use F Martin, C Wang, T Petty, W Wang, P Wilkins Journal of Educational Technology & Society 21 (1), 213-224, 2018 | 259 | 2018 |
Integrating heterogeneous wireless technologies: a cellular aided mobile ad hoc network (CAMA) B Bhargava, X Wu, Y Lu, W Wang Mobile Networks and Applications 9, 393-408, 2004 | 169 | 2004 |
Defending against wormhole attacks in mobile ad hoc networks W Wang, B Bhargava, Y Lu, X Wu Wireless Communications and Mobile Computing 6 (4), 483-503, 2006 | 166 | 2006 |
Study of distance vector routing protocols for mobile ad hoc networks Y Lu, W Wang, Y Zhong, B Bhargava Proceedings of the First IEEE International Conference on Pervasive …, 2003 | 149 | 2003 |
Visualisation of wormholes in underwater sensor networks: a distributed approach W Wang, J Kong, B Bhargava, M Gerla International Journal of Security and Networks 3 (1), 10-23, 2008 | 100 | 2008 |
On vulnerability and protection of ad hoc on-demand distance vector protocol W Wang, Y Lu, BK Bhargava 10th International Conference on Telecommunications, 2003. ICT 2003. 1, 375-382, 2003 | 90 | 2003 |
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks J Kong, Z Ji, W Wang, M Gerla, R Bagrodia, B Bhargava Proceedings of the 4th ACM workshop on Wireless security, 87-96, 2005 | 85 | 2005 |
Defending against collaborative packet drop attacks on MANETs W Wang, B Bhargava, M Linderman 2nd International Workshop on Dependable Network Computing and Mobile …, 2009 | 84 | 2009 |
Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines R Owens, W Wang 30th IEEE International Performance Computing and Communications Conference, 1-8, 2011 | 75 | 2011 |
Trust-based privacy preservation for peer-to-peer data sharing Y Lu, W Wang, B Bhargava, D Xu IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006 | 71 | 2006 |
Dynamic participant selection for large-scale mobile crowd sensing H Li, T Li, W Wang, Y Wang IEEE Transactions on Mobile Computing 18 (12), 2842-2855, 2018 | 68 | 2018 |
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding. X Xie, W Wang JUSPN 5 (1), 1-8, 2014 | 53 | 2014 |
On security study of two distance vector routing protocols for mobile ad hoc networks W Wang, Y Lu, B Bhargava Proceedings of the First IEEE International Conference on Pervasive …, 2003 | 44 | 2003 |
Scalable Privacy-Preserving Participant Selection in Mobile Crowd Sensing T Li, T Jung, H Li, L Cao, W Wang, XY Li, Y Wang | 42 | 2017 |
Wireless networking security: open issues in trust, management, interoperation and measurement JB Evans, W Wang, BJ Ewy International Journal of Security and Networks 1 (1-2), 84-94, 2006 | 33 | 2006 |
Detecting sybil nodes in wireless networks with physical layer network coding W Wang, D Pu, A Wyglinski 2010 IEEE/IFIP International Conference on Dependable Systems&Networks (DSN …, 2010 | 32 | 2010 |
Key distribution and update for secure inter-group multicast communication W Wang, B Bhargava Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor …, 2005 | 31 | 2005 |
Rootkit detection on virtual machines through deep information extraction at hypervisor-level X Xie, W Wang 2013 IEEE Conference on Communications and Network Security (CNS), 498-503, 2013 | 29 | 2013 |