A semantics aware approach to automated reverse engineering unknown protocols Y Wang, X Yun, MZ Shafiq, L Wang, AX Liu, Z Zhang, D Yao, Y Zhang, ... 2012 20th IEEE International Conference on Network Protocols (ICNP), 1-10, 2012 | 184 | 2012 |
Fast range query processing with strong privacy protection for cloud computing R Li, AX Liu, AL Wang, B Bruhadeshwar Proceedings of the VLDB Endowment 7 (14), 1953-1964, 2014 | 127 | 2014 |
Fast and scalable range query processing with strong privacy protection for cloud computing R Li, AX Liu, AL Wang, B Bruhadeshwar IEEE/ACM Transactions On Networking 24 (4), 2305-2318, 2015 | 82 | 2015 |
Multi-category RFID estimation X Liu, K Li, AX Liu, S Guo, M Shahzad, AL Wang, J Wu IEEE/ACM transactions on networking 25 (1), 264-277, 2016 | 58 | 2016 |
Privacy preserving string matching for cloud computing B Bezawada, AX Liu, B Jayaraman, AL Wang, R Li 2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015 | 34 | 2015 |
Privacy and Integrity Preserving Top- Query Processing for Two-Tiered Sensor Networks R Li, AX Liu, S Xiao, H Xu, B Bruhadeshwar, AL Wang IEEE/ACM Transactions on Networking 25 (4), 2334-2346, 2017 | 25 | 2017 |
Modeling packet loss probability and busy time in multi-hop wireless networks M Zeeshan, A Ali, A Naveed, AX Liu, A Wang, HK Qureshi EURASIP Journal on Wireless Communications and Networking 2016, 1-16, 2016 | 14 | 2016 |
A stochastic frame based approach to RFID tag searching AL Wang, M Shahzad, AX Liu 2016 IFIP Networking Conference (IFIP Networking) and Workshops, 153-161, 2016 | | 2016 |