关注
Chen Lyu
标题
引用次数
引用次数
年份
PBA: Prediction-based authentication for vehicle-to-vehicle communications
C Lyu, D Gu, Y Zeng, P Mohapatra
IEEE transactions on dependable and secure computing 13 (1), 71-83, 2015
1002015
Selective authentication based geographic opportunistic routing in wireless sensor networks for Internet of Things against DoS attacks
C Lyu, X Zhang, Z Liu, CH Chi
IEEE Access 7, 31068-31082, 2019
642019
SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs
C Lyu, D Gu, X Zhang, S Sun, Y Zhang, A Pande
Computer Communications 59, 37-51, 2015
362015
Efficient, fast and scalable authentication for VANETs
C Lyu, D Gu, X Zhang, S Sun, Y Tang
2013 IEEE Wireless Communications and Networking Conference (WCNC), 1768-1773, 2013
262013
Reliable multiservice delivery in fog-enabled VANETs: Integrated misbehavior detection and tolerance
X Zhang, C Lyu, Z Shi, D Li, NN Xiong, CH Chi
IEEE Access 7, 95762-95778, 2019
192019
Privacy-preserving data sharing scheme over cloud for social applications
C Lyu, SF Sun, Y Zhang, A Pande, H Lu, D Gu
Journal of Network and Computer Applications 74, 44-55, 2016
192016
Rumor detection of COVID-19 pandemic on online social networks
A Shi, Z Qu, Q Jia, C Lyu
2020 IEEE/ACM Symposium on Edge Computing (SEC), 376-381, 2020
172020
CLIP: Continuous location integrity and provenance for mobile phones
C Lyu, A Pande, X Wang, J Zhu, D Gu, P Mohapatra
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems …, 2015
172015
Mush: Multi-stimuli hawkes process based sybil attacker detector for user-review social networks
Z Qu, C Lyu, CH Chi
IEEE Transactions on Network and Service Management 19 (4), 4600-4614, 2022
102022
Predictable model for detecting sybil attacks in mobile social networks
C Lyu, D Huang, Q Jia, X Han, X Zhang, CH Chi, Y Xu
2021 IEEE wireless communications and networking conference (WCNC), 1-6, 2021
62021
Towards efficient, secure, and fine-grained access control system in msns with flexible revocations
SF Sun, C Lyu, D Gu, Y Zhang, Y Ren
International Journal of Distributed Sensor Networks 11 (1), 857405, 2015
62015
Towards efficient and secure geographic routing protocol for hostile wireless sensor networks
C Lyu, D Gu, Y Zhang, T Lin, X Zhang
International Journal of Distributed Sensor Networks 9 (8), 491973, 2013
52013
Detecting fake reviews with generative adversarial networks for mobile social networks
Z Qu, Q Jia, C Lyu, J Liu, X Liu, K Zheng
Security and Communication Networks 2022 (1), 1164125, 2022
42022
FastTrust: Fast and anonymous spatial-temporal trust for connected cars on expressways
C Lyu, A Pande, Y Zhang, D Gu, P Mohapatra
2018 15th Annual IEEE International Conference on Sensing, Communication …, 2018
42018
Fault activity aware service delivery in wireless sensor networks for smart cities
X Zhang, X Dong, J Wu, Z Cao, C Lyu
Wireless Communications and Mobile Computing 2017 (1), 9394613, 2017
42017
Bandwidth Allocation for Low-Latency Wireless Federated Learning: An Evolutionary Game Approach
S Zhang, Y Xu, J Liu, H Takakura, L Chen, N Shiratori
ICC 2023-IEEE International Conference on Communications, 1628-1633, 2023
12023
Enabling fast and privacy-preserving broadcast authentication with efficient revocation for inter-vehicle connections
C Lyu, A Pande, Y Zhang, D Gu, P Mohapatra
IEEE Transactions on Mobile Computing 23 (4), 3309-3327, 2023
12023
Multi-task learning framework for detecting hashtag hijack attack in mobile social networks
Z Qu, C Lyu, CH Chi
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems …, 2022
12022
Fuzzy SVM With Mahalanobis Distance for Situational Awareness-Based Recognition of Public Health Emergencies
D Li, Z Qu, C Lyu, L Zhang, W Zuo
International Journal of Fuzzy System Applications (IJFSA) 13 (1), 1-21, 2024
2024
Availability Based Multiservice Delivery for Wireless Sensor Networks in Adversarial Environments
X Zhang, CH Chi, C Lyu, Z Fang, X Dong, Q Chen
2017 IEEE International Conference on Services Computing (SCC), 180-187, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–20