A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications J Lin, W Yu, N Zhang, X Yang, H Zhang, W Zhao IEEE Internet of Things Journal 4 (5), 1125-1142, 2017 | 3012 | 2017 |
Mobile communications handbook JD Gibson CRC press, 2012 | 1211 | 2012 |
Algorithms for scheduling imprecise computations JWS Liu, KJ Lin, WK Shih, AC Yu, JY Chung, W Zhao Foundations of Real-Time Computing: Scheduling and Resource Management, 203-249, 1991 | 830 | 1991 |
Distributed scheduling of tasks with deadlines and resource requirements K Ramamritham, JA Stankovic, W Zhao IEEE Transactions on Computers 38 (8), 1110-1123, 1989 | 518 | 1989 |
On false data-injection attacks against power system state estimation: Modeling and countermeasures Q Yang, J Yang, W Yu, D An, N Zhang, W Zhao IEEE Transactions on Parallel and Distributed Systems 25 (3), 717-729, 2013 | 450 | 2013 |
Preemptive scheduling under time and resource constraints W Zhao, K Ramamritham, JA Stankovic IEEE Transactions on computers 100 (8), 949-960, 1987 | 367 | 1987 |
Scheduling tasks with resource requirements in hard real-time systems W Zhao, K Ramamritham, JA Stankovic IEEE transactions on software engineering, 564-577, 1987 | 359 | 1987 |
A Survey on Big Data Market: Pricing, Trading and Protection F Liang, W Yu, D An, Q Yang, X Fu, W Zhao IEEE Access 6, 15132-15154, 2018 | 352 | 2018 |
DSSS-based flow marking technique for invisible traceback W Yu, X Fu, S Graham, D Xuan, W Zhao 2007 IEEE Symposium on Security and Privacy (SP'07), 18-32, 2007 | 259 | 2007 |
On flow correlation attacks and countermeasures in mix networks Y Zhu, X Fu, B Graham, R Bettati, W Zhao Privacy Enhancing Technologies: 4th International Workshop, PET 2004 …, 2005 | 239 | 2005 |
Guaranteeing synchronous message deadlines with the timed token medium access control protocol G Agrawal, B Chen, W Zhao, S Davari IEEE transactions on Computers 43 (3), 327-339, 1994 | 224 | 1994 |
Migration modeling and learning algorithms for containers in fog computing Z Tang, X Zhou, F Zhang, W Jia, W Zhao IEEE Transactions on Services Computing 12 (5), 712-725, 2018 | 221 | 2018 |
Hard real-time communication in multiple-access networks N Malcolm, W Zhao Real-Time Systems 8 (1), 35-77, 1995 | 207 | 1995 |
Protection of query privacy for continuous location based services A Pingley, N Zhang, X Fu, HA Choi, S Subramaniam, W Zhao 2011 Proceedings IEEE INFOCOM, 1710-1718, 2011 | 204 | 2011 |
Virtual time CSMA protocols for hard real-time communication W Zhao, K Ramamritham IEEE Transactions on Software Engineering, 938-952, 1987 | 200 | 1987 |
The timed-token protocol for real-time communications N Malcolm, W Zhao Computer 27 (1), 35-41, 1994 | 196 | 1994 |
On false data injection attacks against distributed energy routing in smart grid J Lin, W Yu, X Yang, G Xu, W Zhao 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 183-192, 2012 | 191 | 2012 |
Guaranteeing synchronous message deadlines with the timed token protocol G Agrawal, B Chen, W Zhao, S Davari [1992] Proceedings of the 12th International Conference on Distributed …, 1992 | 182 | 1992 |
On real-time transactions JA Stankovic, W Zhao ACM Sigmod Record 17 (1), 4-18, 1988 | 163 | 1988 |
A window protocol for transmission of time-constrained messages W Zhao, JA Stankovic, K Ramamritham IEEE Transactions on computers 39 (9), 1186-1203, 1990 | 161 | 1990 |