Modeling and analysis of opportunistic spectrum sharing with unreliable spectrum sensing S Tang, BL Mark IEEE Transactions on Wireless Communications 8 (4), 1934-1943, 2009 | 151 | 2009 |
Scalable fog computing with service offloading in bus networks D Ye, M Wu, S Tang, R Yu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 97 | 2016 |
Analysis of virus spread in wireless sensor networks: An epidemic model S Tang, BL Mark 2009 7th international workshop on design of reliable communication networks …, 2009 | 87 | 2009 |
QoS supporting and optimal energy allocation for a cluster based wireless sensor network S Tang, W Li Computer Communications 29 (13-14), 2569-2577, 2006 | 84 | 2006 |
Analysis of opportunistic spectrum sharing with Markovian arrivals and phase-type service S Tang, BL Mark IEEE Transactions on Wireless Communications 8 (6), 3142-3150, 2009 | 54 | 2009 |
Performance analysis of a wireless network with opportunistic spectrum sharing S Tang, BL Mark IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 4636-4640, 2007 | 54 | 2007 |
A modified SI epidemic model for combating virus spread in wireless sensor networks S Tang International Journal of Wireless Information Networks 18, 319-326, 2011 | 53 | 2011 |
An adaptive bandwidth allocation scheme with preemptive priority for integrated voice/data mobile networks S Tang, W Li IEEE Transactions on Wireless Communications 5 (10), 2874-2886, 2006 | 49 | 2006 |
An analytical traffic flow model for cluster-based wireless sensor networks S Tang 2006 1st International Symposium on Wireless Pervasive Computing (ISWPC’06), 1-5, 2006 | 42 | 2006 |
Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration Y Xie, J Hu, Y Xiang, S Yu, S Tang, Y Wang IEEE Transactions on Parallel and Distributed Systems 24 (9), 1807-1817, 2013 | 38 | 2013 |
An epidemic model with adaptive virus spread control for wireless sensor networks S Tang, W Li International Journal of Security and Networks 6 (4), 201-210, 2011 | 37 | 2011 |
Resisting web proxy-based http attacks by temporal and spatial locality behavior Y Xie, S Tang, Y Xiang, J Hu IEEE transactions on parallel and distributed systems 24 (7), 1401-1410, 2013 | 36 | 2013 |
Modified SIS epidemic model for analysis of virus spread in wireless sensor networks S Tang, D Myers, J Yuan International Journal of Wireless and Mobile Computing 6 (2), 99-108, 2013 | 36 | 2013 |
Reliability modeling of power transformers with maintenance outage S Tang, C Hale, H Thaker Systems Science & Control Engineering: An Open Access Journal 2 (1), 316-324, 2014 | 30 | 2014 |
Anomaly Intrusion Behavior Detection Based on Fuzzy Clustering and Features Selection C Tang, P Liu, S Tang, Y Xie Journal of Computer Research and Development 52 (3), 718-728, 2015 | 29 | 2015 |
An analytical performance model of opportunistic spectrum access in a military environment S Tang, BL Mark 2008 IEEE Wireless Communications and Networking Conference, 2681-2686, 2008 | 29 | 2008 |
Performance analysis of the 3G network with complementary WLANs S Tang, W Li GLOBECOM'05. IEEE Global Telecommunications Conference, 2005. 5, 2637-2641, 2005 | 28 | 2005 |
Detecting latent attack behavior from aggregated Web traffic Y Xie, S Tang, X Huang, C Tang, X Liu Computer Communications 36 (8), 895-907, 2013 | 25 | 2013 |
Online anomaly detection based on web usage mining Y Xie, S Tang 2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012 | 23 | 2012 |
A channel allocation model with preemptive priority for integrated voice/data mobile networks S Tang, W Li First International Conference on Quality of Service in Heterogeneous Wired …, 2004 | 23 | 2004 |