The handbook of technology management: Supply chain management, marketing and advertising, and global management JRTLH Bidgoli | 186 | 2010 |
Bitcoin and blockchain: Security and privacy E Zaghloul, T Li, MW Mutka, J Ren IEEE Internet of Things Journal 7 (10), 10288-10313, 2020 | 170 | 2020 |
Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard A Alahmadi, M Abdelhakim, J Ren, T Li IEEE transactions on information forensics and security 9 (5), 772-781, 2014 | 121 | 2014 |
Cost-aware secure routing (CASER) protocol design for wireless sensor networks D Tang, T Li, J Ren, J Wu IEEE Transactions on Parallel and Distributed Systems 26 (4), 960-973, 2014 | 102 | 2014 |
Anti-jamming message-driven frequency hopping—Part I: System design L Zhang, H Wang, T Li IEEE transactions on wireless communications 12 (1), 70-79, 2012 | 96 | 2012 |
Blind detection of asynchronous CDMA signals in multipath channels using code-constrained inverse filter criterion JK Tugnait, T Li IEEE transactions on signal processing 49 (7), 1300-1309, 2001 | 66 | 2001 |
Distributed detection in mobile access wireless sensor networks under byzantine attacks M Abdelhakim, LE Lightfoot, J Ren, T Li IEEE Transactions on Parallel and Distributed Systems 25 (4), 950-959, 2013 | 64 | 2013 |
Secure wireless monitoring and control systems for smart grid and smart home T Li, J Ren, X Tang IEEE Wireless Communications 19 (3), 66-73, 2012 | 62 | 2012 |
Blind identification of the aortic pressure waveform from multiple peripheral artery pressure waveforms G Swamy, Q Ling, T Li, R Mukkamala American Journal of Physiology-Heart and Circulatory Physiology 292 (5 …, 2007 | 61 | 2007 |
How much do metamemory beliefs contribute to the font-size effect in judgments of learning? X Hu, T Li, J Zheng, N Su, Z Liu, L Luo PloS one 10 (11), e0142351, 2015 | 60 | 2015 |
Anti-jamming message-driven frequency hopping—Part II: Capacity analysis under disguised jamming L Zhang, T Li IEEE transactions on wireless communications 12 (1), 80-88, 2012 | 57 | 2012 |
Blind asynchronous multiuser CDMA receivers for ISI channels using code-aided CMA JK Tugnait, T Li IEEE Journal on Selected Areas in Communications 19 (8), 1520-1530, 2001 | 57 | 2001 |
Message-driven frequency hopping: Design and analysis Q Ling, T Li IEEE transactions on wireless communications 8 (4), 1773-1782, 2009 | 54 | 2009 |
An energy efficient link-layer security protocol for wireless sensor networks LE Lighfoot, J Ren, T Li 2007 IEEE International Conference on Electro/Information Technology, 233-238, 2007 | 47 | 2007 |
d-BAME: Distributed Blockchain-Based Anonymous Mobile Electronic Voting E Zaghloul, T Li, J Ren IEEE Internet of Things Journal 8 (22), 16585-16597, 2021 | 44 | 2021 |
Security and privacy of electronic health records: Decentralized and hierarchical data sharing using smart contracts E Zaghloul, T Li, J Ren 2019 international conference on computing, networking and communications …, 2019 | 44 | 2019 |
On phy-layer security of cognitive radio: Collaborative sensing under malicious attacks H Wang, L Lightfoot, T Li 2010 44th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2010 | 44 | 2010 |
Classification of Alzheimer’s disease, mild cognitive impairment and normal control subjects using resting-state fMRI based network connectivity analysis Z Wang, Y Zheng, DC Zhu, AC Bozoki, T Li IEEE journal of translational engineering in health and medicine 6, 1-9, 2018 | 42 | 2018 |
Overlapping user grouping in IoT oriented massive MIMO systems R Tian, Y Liang, X Tan, T Li IEEE Access 5, 14177-14186, 2017 | 37 | 2017 |
Resource allocation with load balancing for cognitive radio networks H Wang, J Ren, T Li 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 37 | 2010 |