Privacy-preserving crowd-sourced statistical data publishing with an untrusted server Z Wang, X Pang, Y Chen, H Shao, Q Wang, L Wu, H Chen, H Qi IEEE Transactions on Mobile Computing, 2018 | 132 | 2018 |
On Protecting End-to-End Location Privacy against Local Eavesdropper in Wireless Sensor Networks H Chen, W Lou Elsevier Pervasive and Mobile Computing, 2015 | 99 | 2015 |
Narrowband Internet of Things systems with opportunistic D2D communication Y Li, K Chi, H Chen, Z Wang, Y Zhu IEEE Internet of Things Journal 5 (3), 1474-1484, 2017 | 77 | 2017 |
Achieving Location Error Tolerant Barrier Coverage for Wireless Sensor Networks Z Wang, H Chen, Q Cao, H Qi, Z Wang, Q Wang. Computer Networks, 2016 | 77 | 2016 |
Securing DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks H Chen, W Lou, J Wu, Z Wang, A Xia Elsevier Pervasive and Mobile Computing, 2015 | 77 | 2015 |
From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks H Chen, W Lou International Performance Computing and Communications Conference, 1-8, 2010 | 70 | 2010 |
A novel mobility management scheme for target tracking in cluster-based sensor networks Z Wang, W Lou, Z Wang, J Ma, H Chen Distributed Computing in Sensor Systems: 6th IEEE International Conference …, 2010 | 68 | 2010 |
Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks Z Wang, Q Cao, H Qi, H Chen, Q Wang Ad Hoc Networks, 2017 | 65 | 2017 |
OPAT: Optimized Allocation of Time Dependent Tasks for Mobile Crowdsensing Y Huang, H Chen*, G Ma, K Lin, Z Ni, N Yan, Z Wang IEEE Transactions on Industrial Informatics, 2022 | 64 | 2022 |
Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems with Unknown Tags H Chen, G Xue, Z Wang IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2017.2664810, 2017 | 57 | 2017 |
A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks Z Wang, W Lou, Z Wang, J Ma, H Chen International Journal of Distributed Sensor Networks 2013, 2013 | 56 | 2013 |
A social-based watchdog system to detect selfish nodes in opportunistic mobile networks B Jedari, F Xia, H Chen, SK Das, A Tolba, ALM Zafer Future Generation Computer Systems 92, 777-788, 2019 | 55 | 2019 |
When mobile crowdsensing meets privacy Z Wang, X Pang, J Hu, W Liu, Q Wang, Y Li, H Chen IEEE Communications Magazine 57 (9), 72-78, 2019 | 54 | 2019 |
CRPD: a novel clustering routing protocol for dynamic wireless sensor networks S Wang, J Yu, M Atiquzzaman, H Chen, L Ni Personal and Ubiquitous Computing 22, 545-559, 2018 | 54 | 2018 |
A secure localization approach against wormhole attacks using distance consistency H Chen, W Lou, X Sun, Z Wang EURASIP Journal on Wireless Communications and Networking 2010 (1), 1, 2010 | 53 | 2010 |
Contact expectation based routing for delay tolerant networks H Chen, W Lou Ad Hoc Networks 36, 244-257, 2016 | 51 | 2016 |
Label-based DV-Hop localization against wormhole attacks in wireless sensor networks J Wu, H Chen, W Lou, Z Wang, Z Wang 2010 IEEE Fifth International Conference on Networking, Architecture, and …, 2010 | 51 | 2010 |
Dynamic distributed honeypot based on blockchain L Shi, Y Li, T Liu, J Liu, B Shan, H Chen IEEE Access 7, 72234-72246, 2019 | 44 | 2019 |
Fault Tolerant Barrier Coverage for Wireless Sensor Networks Z Wang, H Chen, Q Cao, H Qi, Z Wang IEEE International Conference on Computer Communications (IEEE INFOCOM 2014), 2014 | 44 | 2014 |
GAR: Group Aware Cooperative Routing Protocol for Resource- Constraint Opportunistic Networks H Chen, W Lou Elsevier Computer Communications, 2014 | 43 | 2014 |