On calculating connected dominating set for efficient routing in ad hoc wireless networks J Wu, H Li Proceedings of the 3rd international workshop on Discrete algorithms and …, 1999 | 1574 | 1999 |
EECS: an energy efficient clustering scheme in wireless sensor networks M Ye, C Li, G Chen, J Wu PCCC 2005. 24th IEEE International Performance, Computing, and …, 2005 | 1345 | 2005 |
An energy-efficient unequal clustering mechanism for wireless sensor networks C Li, M Ye, G Chen, J Wu IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005 | 1026 | 2005 |
A survey of attacks and countermeasures in mobile ad hoc networks B Wu, J Chen, J Wu, M Cardei Wireless network security, 103-135, 2007 | 927 | 2007 |
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services G Wang, Q Liu, J Wu Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 919 | 2010 |
Energy-efficient coverage problems in wireless ad-hoc sensor networks M Cardei, J Wu Computer communications 29 (4), 413-420, 2006 | 882 | 2006 |
An extended localized algorithm for connected dominating set formation in ad hoc wireless networks F Dai, J Wu IEEE transactions on parallel and distributed systems 15 (10), 908-920, 2004 | 730 | 2004 |
An unequal cluster-based routing protocol in wireless sensor networks G Chen, C Li, M Ye, J Wu Wireless Networks 15, 193-207, 2009 | 689 | 2009 |
The handbook of ad hoc wireless networks M Ilyas, BC Seet, X Hannan, YC Tseng, A Mishra, S Giordano, YJ Suh, ... CRC press, 2017 | 661 | 2017 |
On calculating power-aware connected dominating sets for efficient routing in ad hoc wireless networks J Wu, F Dai, M Gao, I Stojmenovic Journal of communications and networks 4 (1), 59-70, 2002 | 645 | 2002 |
On reducing broadcast redundancy in ad hoc wireless networks W Lou, J Wu 36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003 | 585 | 2003 |
A survey on intrusion detection in mobile ad hoc networks T Anantvalee, J Wu Wireless network security, 159-180, 2007 | 456 | 2007 |
Coverage in wireless sensor networks M Cardei, J Wu Handbook of sensor networks 21, 201-202, 2004 | 446 | 2004 |
Robust network traffic classification J Zhang, X Chen, Y Xiang, W Zhou, J Wu IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014 | 425 | 2014 |
Broadcasting in ad hoc networks based on self-pruning J Wu, F Dai International Journal of Foundations of Computer Science 14 (02), 201-221, 2003 | 413 | 2003 |
A dominating-set-based routing scheme in ad hoc wireless networks J Wu, H Li Telecommunication Systems 18, 13-36, 2001 | 388 | 2001 |
Maximum network lifetime in wireless sensor networks with adjustable sensing ranges M Cardei, J Wu, M Lu, MO Pervaiz WiMob'2005), IEEE International Conference on Wireless And Mobile Computing …, 2005 | 365 | 2005 |
Secure and efficient key management in mobile ad hoc networks B Wu, J Wu, EB Fernandez, S Magliveras 19th IEEE International Parallel and Distributed Processing Symposium, 8 pp., 2005 | 345 | 2005 |
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers G Wang, Q Liu, J Wu, M Guo computers & security 30 (5), 320-331, 2011 | 329 | 2011 |
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Q Liu, G Wang, J Wu Information sciences 258, 355-370, 2014 | 324 | 2014 |