Security and privacy in cloud computing Z Xiao, Y Xiao IEEE communications surveys & tutorials 15 (2), 843-859, 2012 | 810 | 2012 |
A survey of key management schemes in wireless sensor networks Y Xiao, VK Rayi, B Sun, X Du, F Hu, M Galloway Computer communications 30 (11-12), 2314-2341, 2007 | 711 | 2007 |
A survey of communication/networking in smart grids J Gao, Y Xiao, J Liu, W Liang, CLP Chen Future generation computer systems 28 (2), 391-404, 2012 | 628 | 2012 |
Cyber security and privacy issues in smart grids J Liu, Y Xiao, S Li, W Liang, CLP Chen IEEE Communications Surveys & Tutorials 14 (4), 981-997, 2012 | 624 | 2012 |
Throughput and delay limits of IEEE 802.11 Y Xiao, J Rosdahl IEEE Communications letters 6 (8), 355-357, 2002 | 598 | 2002 |
An effective key management scheme for heterogeneous sensor networks X Du, Y Xiao, M Guizani, HH Chen Ad hoc networks 5 (1), 24-34, 2007 | 563 | 2007 |
Home M2M networks: Architectures, standards, and QoS improvement Y Zhang, R Yu, S Xie, W Yao, Y Xiao, M Guizani IEEE Communications Magazine 49 (4), 44-52, 2011 | 538 | 2011 |
Secure data aggregation in wireless sensor networks: A comprehensive overview S Ozdemir, Y Xiao Computer Networks 53 (12), 2022-2037, 2009 | 524 | 2009 |
A survey of energy-efficient scheduling mechanisms in sensor networks L Wang, Y Xiao Mobile Networks and Applications 11, 723-740, 2006 | 507 | 2006 |
Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11 e wireless LANs Y Xiao IEEE transactions on wireless communications 4 (4), 1506-1515, 2005 | 493 | 2005 |
Cognitive radio networks Y Xiao, F Hu CRC press, 2008 | 479 | 2008 |
IEEE 802.11 n: enhancements for higher throughput in wireless LANs Y Xiao IEEE Wireless Communications 12 (6), 82-91, 2005 | 467 | 2005 |
Internet protocol television (IPTV): the killer application for the next-generation internet Y Xiao, X Du, J Zhang, F Hu, S Guizani IEEE Communications Magazine 45 (11), 126-134, 2007 | 444 | 2007 |
Energy saving mechanism in the IEEE 802.16 e wireless MAN Y Xiao IEEE Communications Letters 9 (7), 595-597, 2005 | 403 | 2005 |
Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks X Du, M Guizani, Y Xiao, HH Chen IEEE Transactions on Wireless Communications 8 (3), 1223-1229, 2009 | 394 | 2009 |
Authentication and access control in the internet of things J Liu, Y Xiao, CLP Chen 2012 32nd international conference on distributed computing systems …, 2012 | 346 | 2012 |
Distributed collaborative control for industrial automation with wireless sensor and actuator networks J Chen, X Cao, P Cheng, Y Xiao, Y Sun IEEE Transactions on Industrial Electronics 57 (12), 4219-4230, 2010 | 343 | 2010 |
Game theory for network security X Liang, Y Xiao IEEE Communications Surveys & Tutorials 15 (1), 472-486, 2012 | 334 | 2012 |
A survey of cross-layer designs in wireless networks B Fu, Y Xiao, H Deng, H Zeng IEEE Communications Surveys & Tutorials 16 (1), 110-126, 2013 | 314 | 2013 |
Random coverage with guaranteed connectivity: joint scheduling for wireless sensor networks C Liu, K Wu, Y Xiao, B Sun IEEE Transactions on parallel and distributed systems 17 (6), 562-575, 2006 | 314 | 2006 |