关注
Kewei Sha
Kewei Sha
Associate Professor, University of North Texas
在 unt.edu 的电子邮件经过验证 - 首页
标题
引用次数
年份
: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs
K Sha, S Wang, W Shi
IEEE Transactions on Vehicular Technology 59 (3), 1183-1190, 2010
332010
5.2 LOAD-BALANCED QUERY PROTOCOLS FOR WIRELESS SENSOR NETWORKS
K Sha, W Shi, S Sellamuthu
Sensor Network Operations, 264, 2006
112006
A Gender-Inclusive Holistic Approach for IAS Education
MA Park, G Qian, M Hepner, K Sha
Proceedings of the International Conference on Frontiers in Education …, 2012
12012
A novel and efficient approach to evaluate biometric features for user identification
N Kayastha, K Sha
2019 IEEE/ACM International Conference on Connected Health: Applications …, 2019
32019
A proactive on-demand content placement strategy in edge intelligent gateways
H Sun, Y Chen, K Sha, S Huang, X Wang, W Shi
IEEE Transactions on Parallel and Distributed Systems 34 (7), 2072-2090, 2023
42023
A record linkage-based data deduplication framework with datacleaner extension
O Azeroual, M Jha, A Nikiforova, K Sha, M Alsmirat, S Jha
Multimodal Technologies and Interaction 6 (4), 27, 2022
162022
A secure and efficient framework to read isolated smart grid devices
K Sha, N Alatrash, Z Wang
IEEE Transactions on Smart Grid 8 (6), 2519-2531, 2016
922016
A secure dynamic mix zone pseudonym changing scheme based on traffic context prediction
Y Li, Y Yin, X Chen, J Wan, G Jia, K Sha
IEEE Transactions on Intelligent Transportation Systems 23 (7), 9492-9505, 2021
172021
A survey of edge computing-based designs for IoT security
K Sha, TA Yang, W Wei, S Davari
Digital Communications and Networks 6 (2), 195-202, 2020
2862020
ActID: An efficient framework for activity sensor based user identification
SRV Sudhakar, N Kayastha, K Sha
Computers & Security 108, 102319, 2021
172021
Adaptive privacy-preserving authentication in vehicular networks
K Sha, Y Xi, W Shi, L Schwiebert, T Zhang
2006 First International Conference on Communications and Networking in …, 2006
1112006
Advances in computer communications and networks
K Sha, A Striegel, M Song
22016
Advances in Computer Communications and Networks From Green, Mobile, Pervasive Networking to Big Data Computing
K Sha, A Striegel, M Song
CRC Press, 2022
2022
An efficient identity-based privacy-preserving authentication scheme for vanets
J Cui, W Xu, K Sha, H Zhong
Collaborative Computing: Networking, Applications and Worksharing: 13th …, 2018
32018
An overview of access control mechanisms for internet of things
M Alramadhan, K Sha
2017 26th International Conference on Computer Communication and Networks …, 2017
452017
Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi Cameras
Z Neal, K Sha
2023 32nd International Conference on Computer Communications and Networks …, 2023
22023
Applying blockchain technology on model-based systems engineering
KB Yue, M Guerra, H Wagner, JS Thamarai Selvan, K Collector, V Tang, ...
AIAA Scitech 2021 forum, 0093, 2021
92021
Asymmetry-aware link quality services in wireless sensor networks
J Du, W Shi, K Sha
Embedded and Ubiquitous Computing–EUC 2005: International Conference EUC …, 2005
22*2005
Asymmetry-Aware Link Quality Services in Wireless Sensor Networks Technical Report: MIST-TR-2005-006
J Du, W Shi, K Sha
Augmented Reality Based Therapy System for Social Skill Deficits
K Sha, Z Liu, J Dempsey
2019 IEEE/ACM International Conference on Connected Health: Applications …, 2019
12019
系统目前无法执行此操作,请稍后再试。
文章 1–20