3D underwater sensor network localization AY Teymorian, W Cheng, L Ma, X Cheng, X Lu, Z Lu IEEE Transactions on Mobile Computing 8 (12), 2009 | 255 | 2009 |
Underwater localization in sparse 3D acoustic sensor networks W Cheng, AY Teymorian, L Ma, X Cheng, X Lu, Z Lu IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 236-240, 2008 | 233 | 2008 |
Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks K Xing, X Cheng, L Ma, Q Liang Proceedings of the 13th annual ACM international conference on Mobile …, 2007 | 159 | 2007 |
Jamming strategies for physical layer security Y Huo, Y Tian, L Ma, X Cheng, T Jing IEEE Wireless Communications 25 (1), 148-153, 2017 | 124 | 2017 |
A hybrid rogue access point protection framework for commodity Wi-Fi networks L Ma, AY Teymorian, X Cheng IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1220-1228, 2008 | 121 | 2008 |
Architecture and performance of SIGMA: A seamless mobility architecture for data networks S Fu, L Ma, M Atiquzzaman, YJ Lee IEEE International Conference on Communications, 2005. ICC 2005. 2005 5 …, 2005 | 117 | 2005 |
Rogue access point detection by analyzing network traffic characteristics S Shetty, M Song, L Ma MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 97 | 2007 |
Signaling cost and performance of SIGMA: A seamless handover scheme for data networks S Fu, M Atiquzzaman, L Ma, YJ Lee Wireless Communications and Mobile Computing 5 (7), 825-845, 2005 | 93 | 2005 |
On Connected Target k-Coverage in Heterogeneous Wireless Sensor Networks J Yu, Y Chen, L Ma, B Huang, X Cheng Sensors 16 (1), 104, 2016 | 67 | 2016 |
Secure communications in tiered 5G wireless networks with cooperative jamming Y Huo, X Fan, L Ma, X Cheng, Z Tian, D Chen IEEE Transactions on Wireless Communications 18 (6), 3265-3280, 2019 | 65 | 2019 |
A context-aware multiarmed bandit incentive mechanism for mobile crowd sensing systems Y Wu, F Li, L Ma, Y Xie, T Li, Y Wang IEEE Internet of Things Journal 6 (5), 7648-7658, 2019 | 54 | 2019 |
A time fairness-based MAC algorithm for throughput maximization in 802.11 networks Y Le, L Ma, W Cheng, X Cheng, B Chen IEEE Transactions on Computers 64 (1), 19-31, 2013 | 52 | 2013 |
SBK: A self-configuring framework for bootstrapping keys in sensor networks F Liu, X Cheng, L Ma, K Xing IEEE Transactions on Mobile Computing 7 (7), 858-868, 2008 | 50 | 2008 |
A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks Y Wen, Y Huo, L Ma, T Jing, Q Gao IEEE Transactions on Vehicular Technology 68 (4), 3500-3512, 2019 | 43 | 2019 |
iPAK: an in-situ pairwise key bootstrapping scheme for wireless sensor networks L Ma, X Cheng, F Liu, F An, J Rivera IEEE Transactions on Parallel and Distributed Systems 18 (8), 1174-1184, 2007 | 35 | 2007 |
RAP: Protecting commodity wi-fi networks from rogue access points L Ma, AY Teymorian, X Cheng, M Song The fourth international conference on heterogeneous networking for quality …, 2007 | 34 | 2007 |
An enhanced low overhead and stable clustering scheme for crossroads in VANETs Y Huo, Y Liu, L Ma, X Cheng, T Jing EURASIP Journal on Wireless Communications and Networking 2016, 1-13, 2016 | 33 | 2016 |
Worst-case cooperative jamming for secure communications in CIoT networks Z Li, T Jing, L Ma, Y Huo, J Qian Sensors 16 (3), 339, 2016 | 29 | 2016 |
Interference aware metric for dense multi-hop wireless networks L Ma, Q Zhang, Y Xiong, W Zhu IEEE International Conference on Communications, 2005. ICC 2005. 2005 2 …, 2005 | 29 | 2005 |
Diar: A dynamic interference aware routing protocol for ieee 802.11-based mobile ad hoc networks L Ma, Q Zhang, F An, X Cheng Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005 …, 2005 | 28 | 2005 |