: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs K Sha, S Wang, W Shi IEEE Transactions on Vehicular Technology 59 (3), 1183-1190, 2010 | 33 | 2010 |
5.2 LOAD-BALANCED QUERY PROTOCOLS FOR WIRELESS SENSOR NETWORKS K Sha, W Shi, S Sellamuthu Sensor Network Operations, 264, 2006 | 11 | 2006 |
A Gender-Inclusive Holistic Approach for IAS Education MA Park, G Qian, M Hepner, K Sha Proceedings of the International Conference on Frontiers in Education …, 2012 | 1 | 2012 |
A novel and efficient approach to evaluate biometric features for user identification N Kayastha, K Sha 2019 IEEE/ACM International Conference on Connected Health: Applications …, 2019 | 3 | 2019 |
A proactive on-demand content placement strategy in edge intelligent gateways H Sun, Y Chen, K Sha, S Huang, X Wang, W Shi IEEE Transactions on Parallel and Distributed Systems 34 (7), 2072-2090, 2023 | 4 | 2023 |
A record linkage-based data deduplication framework with datacleaner extension O Azeroual, M Jha, A Nikiforova, K Sha, M Alsmirat, S Jha Multimodal Technologies and Interaction 6 (4), 27, 2022 | 16 | 2022 |
A secure and efficient framework to read isolated smart grid devices K Sha, N Alatrash, Z Wang IEEE Transactions on Smart Grid 8 (6), 2519-2531, 2016 | 92 | 2016 |
A secure dynamic mix zone pseudonym changing scheme based on traffic context prediction Y Li, Y Yin, X Chen, J Wan, G Jia, K Sha IEEE Transactions on Intelligent Transportation Systems 23 (7), 9492-9505, 2021 | 17 | 2021 |
A survey of edge computing-based designs for IoT security K Sha, TA Yang, W Wei, S Davari Digital Communications and Networks 6 (2), 195-202, 2020 | 286 | 2020 |
ActID: An efficient framework for activity sensor based user identification SRV Sudhakar, N Kayastha, K Sha Computers & Security 108, 102319, 2021 | 17 | 2021 |
Adaptive privacy-preserving authentication in vehicular networks K Sha, Y Xi, W Shi, L Schwiebert, T Zhang 2006 First International Conference on Communications and Networking in …, 2006 | 111 | 2006 |
Advances in computer communications and networks K Sha, A Striegel, M Song | 2 | 2016 |
Advances in Computer Communications and Networks From Green, Mobile, Pervasive Networking to Big Data Computing K Sha, A Striegel, M Song CRC Press, 2022 | | 2022 |
An efficient identity-based privacy-preserving authentication scheme for vanets J Cui, W Xu, K Sha, H Zhong Collaborative Computing: Networking, Applications and Worksharing: 13th …, 2018 | 3 | 2018 |
An overview of access control mechanisms for internet of things M Alramadhan, K Sha 2017 26th International Conference on Computer Communication and Networks …, 2017 | 45 | 2017 |
Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi Cameras Z Neal, K Sha 2023 32nd International Conference on Computer Communications and Networks …, 2023 | 2 | 2023 |
Applying blockchain technology on model-based systems engineering KB Yue, M Guerra, H Wagner, JS Thamarai Selvan, K Collector, V Tang, ... AIAA Scitech 2021 forum, 0093, 2021 | 9 | 2021 |
Asymmetry-aware link quality services in wireless sensor networks J Du, W Shi, K Sha Embedded and Ubiquitous Computing–EUC 2005: International Conference EUC …, 2005 | 22* | 2005 |
Asymmetry-Aware Link Quality Services in Wireless Sensor Networks Technical Report: MIST-TR-2005-006 J Du, W Shi, K Sha | | |
Augmented Reality Based Therapy System for Social Skill Deficits K Sha, Z Liu, J Dempsey 2019 IEEE/ACM International Conference on Connected Health: Applications …, 2019 | 1 | 2019 |