Secure data collection in wireless sensor networks using randomized dispersive routes T Shu, S Liu, M Krunz IEEE INFOCOM 2009, 2009 | 242 | 2009 |
Power balanced coverage-time optimization for clustered wireless sensor networks T Shu, M Krunz, S Vrudhula Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005 | 150 | 2005 |
Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors T Shu, M Krunz Proceedings of the 15th annual international conference on Mobile computing …, 2009 | 138 | 2009 |
Coverage-time optimization for clustered wireless sensor networks: a power-balancing approach T Shu, M Krunz IEEE/ACM Transactions On Networking 18 (1), 202-215, 2009 | 107 | 2009 |
Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks T Shu, M Krunz IEEE Transactions on mobile computing 14 (4), 813-828, 2014 | 102 | 2014 |
WLC05-3: Medium access control for multi-channel parallel transmission in cognitive radio networks T Shu, S Cui, M Krunz IEEE Globecom 2006, 1-5, 2006 | 101 | 2006 |
A vacation queue with setup and close-down times and batch Markovian arrival processes Z Niu, T Shu, Y Takahashi Performance Evaluation 54 (3), 225-248, 2003 | 80 | 2003 |
Joint optimization of transmit power-time and bit energy efficiency in CDMA wireless sensor networks T Shu, M Krunz, S Vrudhula IEEE Transactions on Wireless Communications 5 (11), 3109-3118, 2006 | 67 | 2006 |
Multi-lateral privacy-preserving localization in pervasive environments T Shu, Y Chen, J Yang, A Williams IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2319-2327, 2014 | 63 | 2014 |
Energy-efficient power/rate control and scheduling in hybrid TDMA/CDMA wireless sensor networks T Shu, M Krunz Computer Networks 53 (9), 1395-1408, 2009 | 61 | 2009 |
Coordinated channel access in cognitive radio networks: A multi-level spectrum opportunity perspective T Shu, M Krunz IEEE INFOCOM 2009, 2976-2980, 2009 | 45 | 2009 |
Metaslicing: A novel resource allocation framework for metaverse NH Chu, DT Hoang, DN Nguyen, KT Phan, E Dutkiewicz, D Niyato, T Shu IEEE Transactions on Mobile Computing 23 (5), 4145-4162, 2023 | 39 | 2023 |
Protecting multi-lateral localization privacy in pervasive environments T Shu, Y Chen, J Yang IEEE/ACM transactions on networking 23 (5), 1688-1701, 2015 | 38 | 2015 |
Spatial and temporal contextual multi-armed bandit handovers in ultra-dense mmWave cellular networks L Sun, J Hou, T Shu IEEE Transactions on Mobile Computing, 2020 | 34 | 2020 |
Multi-operator network sharing for massive IoT Y Xiao, M Krunz, T Shu IEEE Communications Magazine 57 (4), 96-101, 2019 | 33 | 2019 |
Adaptive cross-layer MAC design for improved energy-efficiency in multi-channel wireless sensor networks HB Salameh, T Shu, M Krunz Ad Hoc Networks 5 (6), 844-854, 2007 | 29 | 2007 |
Privacy-by-decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services G Corser, H Fu, T Shu, P D'Errico, W Ma, S Leng, Y Zhu 2014 IEEE Intelligent Vehicles Symposium Proceedings, 1030-1036, 2014 | 28 | 2014 |
Statistical modeling and analysis on the confidentiality of indoor VLC systems J Chen, T Shu IEEE Transactions on Wireless Communications 19 (7), 4744-4757, 2020 | 26 | 2020 |
Adversarial false data injection attack against nonlinear ac state estimation with ann in smart grid T Liu, T Shu Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 25 | 2019 |
Exploiting microscopic spectrum opportunities in cognitive radio networks via coordinated channel access T Shu, M Krunz IEEE transactions on mobile computing 9 (11), 1522-1534, 2010 | 22 | 2010 |