Time and location-critical emergency message dissemination for vehicular ad-hoc networks Y Zhuang, J Pan, Y Luo, L Cai IEEE Journal on Selected Areas in Communications 29 (1), 187-196, 2010 | 117 | 2010 |
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots D Oliveira, M Rosenthal, N Morin, KC Yeh, J Cappos, Y Zhuang Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 107 | 2014 |
Minimizing energy consumption with probabilistic distance models in wireless sensor networks Y Zhuang, J Pan, L Cai 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 105 | 2010 |
Evaluating on-demand data collection with mobile elements in wireless sensor networks L He, Y Zhuang, J Pan, J Xu 2010 IEEE 72nd Vehicular Technology Conference-Fall, 1-5, 2010 | 84 | 2010 |
Understanding misunderstandings in source code D Gopstein, J Iannacone, Y Yan, L DeLong, Y Zhuang, MKC Yeh, ... Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 68 | 2017 |
On the uplink MAC performance of a drive-thru Internet Y Zhuang, J Pan, V Viswanathan, L Cai IEEE Transactions on Vehicular Technology 61 (4), 1925-1935, 2012 | 60 | 2012 |
A first look at vehicle data collection via smartphone sensors M Reininger, S Miller, Y Zhuang, J Cappos 2015 IEEE Sensors Applications Symposium (SAS), 1-6, 2015 | 52 | 2015 |
A geometric probability model for capacity analysis and interference estimation in wireless mobile cellular systems Y Zhuang, Y Luo, L Cai, J Pan 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011 | 49 | 2011 |
A probabilistic model for message propagation in two-dimensional vehicular ad-hoc networks Y Zhuang, J Pan, L Cai Proceedings of the seventh ACM international workshop on VehiculAr …, 2010 | 46 | 2010 |
Energy-optimal grid-based clustering in wireless microsensor networks Y Zhuang, J Pan, G Wu 2009 29th IEEE International Conference on Distributed Computing Systems …, 2009 | 45 | 2009 |
NetCheck: Network Diagnoses from Blackbox Traces Y Zhuang, E Gessiou, S Portzer, F Fund, M Muhammad, I Beschastnikh, ... 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014 | 41 | 2014 |
Future Internet bandwidth trends: An investigation on current and future disruptive technologies Y Zhuang, J Cappos, TS Rappaport, R McGeer Secure Systems Lab, Dept. Comput. Sci. Eng., Polytech. Inst. New York Univ …, 2013 | 32 | 2013 |
Random distances associated with hexagons Y Zhuang, J Pan arXiv preprint arXiv:1106.2200, 2011 | 32 | 2011 |
Detecting and comparing brain activity in short program comprehension using EEG MKC Yeh, D Gopstein, Y Yan, Y Zhuang 2017 IEEE Frontiers in Education Conference (FIE), 1-5, 2017 | 30 | 2017 |
Accelerating software engineering research adoption with analysis bots I Beschastnikh, MF Lungu, Y Zhuang 2017 IEEE/ACM 39th International Conference on Software Engineering: New …, 2017 | 29 | 2017 |
Blursense: Dynamic fine-grained access control for smartphone privacy J Cappos, L Wang, R Weiss, Y Yang, Y Zhuang 2014 IEEE Sensors Applications Symposium (SAS), 329-332, 2014 | 28 | 2014 |
Random distances associated with rhombuses Y Zhuang, J Pan arXiv preprint arXiv:1106.1257, 2011 | 25 | 2011 |
A Dual Lockstep Processor System-on-a-Chip for Fast Error Recovery in Safety-Critical Applications M Sim, Y Zhuang The 46th Annual Conference of the IEEE Industrial Electronics Society (IECON), 2020 | 23 | 2020 |
Tradeoffs in cross platform solutions for mobile assistive technology Y Zhuang, J Baldwin, L Antunna, YO Yazir, S Ganti, Y Coady 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2013 | 22 | 2013 |
Vulnerabilities as blind spots in developer's heuristic-based decision-making processes J Cappos, Y Zhuang, D Oliveira, M Rosenthal, KC Yeh Proceedings of the 2014 new security paradigms workshop, 53-62, 2014 | 21 | 2014 |