Wenjing Lou
#91,121
Most Influential Person Now
Wenjing Lou's AcademicInfluence.com Rankings
Wenjing Loucomputer-science Degrees
Computer Science
#3272
World Rank
#3429
Historical Rank
Cloud Computing
#11
World Rank
#11
Historical Rank
Database
#1271
World Rank
#1341
Historical Rank
Download Badge
Computer Science
Wenjing Lou's Degrees
- Bachelors Computer Science University of Science and Technology of China
Similar Degrees You Can Earn
Why Is Wenjing Lou Influential?
(Suggest an Edit or Addition)According to Wikipedia, Wenjing Lou, a professor at the Virginia Polytechnic Institute and State University, Falls Church, Virginia campus since 2011, was named Fellow of the Institute of Electrical and Electronics Engineers in 2015 for contributions to information and network security.
Wenjing Lou's Published Works
Published Works
- Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing (2010) (2134)
- Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing (2010) (1432)
- Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing (2011) (1358)
- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing (2009) (1311)
- Fuzzy Keyword Search over Encrypted Data in Cloud Computing (2010) (1105)
- Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption (2013) (1026)
- Secure Ranked Keyword Search over Encrypted Cloud Data (2010) (959)
- Attribute based data sharing with attribute revocation (2010) (928)
- Toward Secure and Dependable Storage Services in Cloud Computing (2012) (796)
- Secure Deduplication with Efficient and Reliable Convergent Key Management (2014) (681)
- Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data (2012) (653)
- Data security and privacy in wireless body area networks (2010) (624)
- Privacy-preserving multi-keyword ranked search over encrypted cloud data (2011) (597)
- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings (2010) (585)
- Ensuring data storage security in Cloud Computing (2009) (568)
- Toward publicly auditable secure cloud data storage services (2010) (566)
- Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking (2013) (547)
- Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage (2013) (509)
- A Hybrid Cloud Approach for Secure Authorized Deduplication (2015) (495)
- Wireless power transfer and applications to sensor networks (2013) (425)
- Authorized Private Keyword Search over Encrypted Data in Cloud Computing (2011) (419)
- New Algorithms for Secure Outsourcing of Modular Exponentiations (2012) (406)
- Location-based compromise-tolerant security mechanisms for wireless sensor networks (2006) (385)
- A Survey of Distributed Consensus Protocols for Blockchain Networks (2019) (374)
- Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud (2014) (353)
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing (2015) (343)
- DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking (2014) (329)
- Anonymous communications in mobile ad hoc networks (2005) (313)
- Verifiable Computation over Large Database with Incremental Updates (2014) (296)
- SPREAD: enhancing data confidentiality in mobile ad hoc networks (2004) (275)
- LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks (2006) (272)
- Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud (2016) (254)
- MASK: anonymous on-demand routing in mobile ad hoc networks (2006) (239)
- FindU: Privacy-preserving personal profile matching in mobile social networks (2011) (238)
- Securing Mobile Ad Hoc Networks with Certificateless Public Keys (2006) (238)
- LT codes-based secure and reliable cloud storage service (2012) (236)
- New Publicly Verifiable Databases with Efficient Updates (2015) (225)
- Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance (2009) (215)
- CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding (2011) (209)
- Multi-user Broadcast Authentication in Wireless Sensor Networks (2007) (208)
- New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations (2015) (205)
- Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud (2014) (203)
- H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks (2006) (201)
- On Broadcast Authentication in Wireless Sensor Networks (2006) (197)
- FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks (2009) (191)
- On renewable sensor networks with wireless energy transfer: The multi-node case (2012) (169)
- A secure incentive protocol for mobile ad hoc networks (2007) (163)
- An efficient N-to-1 multipath routing protocol in wireless sensor networks (2005) (160)
- Multi-Node Wireless Energy Charging in Sensor Networks (2015) (158)
- Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption (2013) (155)
- Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing (2011) (150)
- A novel privacy preserving authentication and access control scheme for pervasive computing environments (2006) (147)
- Mobile Ad Hoc and Sensor Systems (2006) (145)
- On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks (2008) (137)
- Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply (2009) (133)
- Secure ad hoc trust initialization and key management in wireless body area networks (2013) (126)
- $P^{2}$ : Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid (2011) (126)
- Authorized Private Keyword Search over Encrypted Personal Health Records in Cloud Computing (2010) (119)
- Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data (2015) (117)
- On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks (2007) (117)
- Bundling mobile base station and wireless energy transfer: Modeling and optimization (2013) (111)
- Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks (2012) (110)
- Searchable Symmetric Encryption with Forward Search Privacy (2019) (108)
- On traveling path and related problems for a mobile station in a rechargeable sensor network (2013) (107)
- A multipath routing approach for secure data delivery (2001) (104)
- On Geographic Collaborative Forwarding in Wireless Ad Hoc and Sensor Networks (2007) (103)
- Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks (2010) (102)
- Performance Optimization Using Multipath Routing in Mobile Ad Hoc and Wireless Sensor Networks (2006) (96)
- Securing sensor networks with location-based keys (2005) (96)
- Location-Aided Opportunistic Forwarding in Multirate and Multihop Wireless Networks (2009) (95)
- SPREAD: Improving network security by multipath routing in mobile ad hoc networks (2007) (93)
- Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee (2015) (92)
- Attribute-based content distribution with hidden policy (2008) (92)
- CodePlay: Live multimedia streaming in VANETs using symbol-level network coding (2010) (90)
- Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems (2009) (90)
- CaSE: Cache-Assisted Secure Execution on ARM Processors (2016) (85)
- TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices (2016) (85)
- A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions (2004) (84)
- Secure and Efficient Cloud Data Deduplication With Randomized Tag (2017) (81)
- Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding (2012) (80)
- Toward privacy-assured and searchable cloud data storage services (2013) (79)
- Proximity-Based Security Techniques for Mobile Users in Wireless Networks (2013) (76)
- A Mobile Platform for Wireless Charging and Data Collection in Sensor Networks (2015) (75)
- Jamming Resilient Communication Using MIMO Interference Cancellation (2016) (73)
- Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance (2012) (71)
- Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links (2011) (71)
- Opportunistic Routing in Multi-Radio Multi-Channel Multi-Hop Wireless Networks (2010) (68)
- AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks (2005) (66)
- PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks (2010) (65)
- Predictive Caching Strategy for On-Demand Routing Protocols in Wireless Ad Hoc Networks (2002) (64)
- Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply (2006) (63)
- Capacity of opportunistic routing in multi-rate and multi-hop wireless networks (2008) (61)
- A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications (2017) (61)
- Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks (2008) (58)
- Routing optimization security in mobile IPv6 (2006) (57)
- Attribute-based on-demand multicast group setup with membership anonymity (2008) (57)
- A new approach for random key pre-distribution in large-scale wireless sensor networks (2006) (57)
- SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags (2012) (55)
- OppCast: Opportunistic broadcast ofwarning messages in VANETs with unreliable links (2009) (55)
- Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing (2009) (55)
- SybilShield: An agent-aided social network-based Sybil defense among multiple communities (2013) (54)
- MIMO-based jamming resilient communication in wireless networks (2014) (53)
- DEAR: A Device and Energy Aware Routing protocol for heterogeneous ad hoc networks (2003) (53)
- Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability (2007) (47)
- Spread: improving network security by multipath routing (2003) (46)
- Security, privacy, and accountability in wireless access networks (2009) (45)
- R-Code: Network coding-based reliable broadcast in wireless mesh networks (2011) (44)
- NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning (2020) (44)
- Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks (2013) (42)
- Multi-Rate Geographic Opportunistic Routing in Wireless Ad Hoc Networks (2007) (39)
- Recent Advances of LTE/WiFi Coexistence in Unlicensed Spectrum (2018) (39)
- SIP: a secure incentive protocol against selfishness in mobile ad hoc networks (2004) (38)
- An efficient quality of service routing algorithm for delay-sensitive applications (2005) (38)
- CacheKit: Evading Memory Introspection Using Cache Incoherence (2016) (37)
- Distributed Consensus Protocols and Algorithms (2019) (36)
- A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks (2008) (35)
- Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing (2014) (35)
- Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators (2022) (35)
- Distributed Data Mining with Differential Privacy (2011) (35)
- Location Based Handshake and Private Proximity Test with Location Tags (2017) (34)
- Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT (2019) (33)
- Efficient user revocation for privacy-aware PKI (2008) (33)
- One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage (2017) (31)
- Privacy-preserving pattern matching over encrypted genetic data in cloud computing (2017) (30)
- Cross-Layer Optimization for Multi-Hop Wireless Networks With Successive Interference Cancellation (2016) (30)
- A Deep-Reinforcement-Learning-Based Approach to Dynamic eMBB/URLLC Multiplexing in 5G NR (2020) (29)
- A QoS-enabled MAC architecture for prioritized service in IEEE 802.11 WLANs (2003) (29)
- Geographic On-Demand Disjoint Multipath Routing in Wireless Ad Hoc Networks (2005) (27)
- Managing wireless sensor networks with supply chain strategy (2004) (27)
- PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis (2015) (26)
- GPF: A GPU-based Design to Achieve ~100 μs Scheduling for 5G NR (2018) (25)
- A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags (2007) (25)
- A simulation study of security performance using multipath routing in ad hoc networks (2003) (24)
- Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation (2009) (24)
- Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities (2012) (24)
- New and efficient conditional e-payment systems with transferability (2014) (23)
- An Analytical Model for Interference Alignment in Multi-Hop MIMO Networks (2016) (23)
- Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources (2017) (23)
- Secure three-party computational protocols for triangle area (2016) (23)
- Shark-IA: An Interference Alignment Algorithm for Multi-hop Underwater Acoustic Networks with Large Propagation Delays (2014) (22)
- REARGUARD: Secure Keyword Search Using Trusted Hardware (2018) (21)
- Anonymous ID-Based Group Key Agreement for Wireless Networks (2008) (21)
- TruSense: Information Leakage from TrustZone (2018) (21)
- R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links (2009) (21)
- MAS-Encryption and its Applications in Privacy-Preserving Classifiers (2022) (20)
- Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain (2020) (20)
- On Relay Node Placement and Assignment for Two-tiered Wireless Networks (2008) (20)
- Impact of Full Duplex Scheduling on End-to-End Throughput in Multi-Hop Wireless Networks (2017) (20)
- When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data (2017) (20)
- UPS: A United Cooperative Paradigm for Primary and Secondary Networks (2013) (18)
- MANDA: On Adversarial Example Detection for Network Intrusion Detection System (2021) (18)
- Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming (2014) (18)
- Kronos: A 5G Scheduler for AoI Minimization Under Dynamic Channel Conditions (2019) (18)
- Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution (2019) (18)
- Energy-Efficient Geographic Routing in Environmentally Powered Wireless Sensor Networks (2006) (18)
- DELAR: device/energy/load aware relaying in heterogeneous wireless ad hoc networks (2004) (17)
- Memory Forensic Challenges Under Misused Architectural Features (2018) (17)
- A novel MIMO DoF model for multi-hop networks (2014) (16)
- Cherish every joule: Maximizing throughput with an eye on network-wide energy consumption (2012) (16)
- Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys (2017) (16)
- Non-parametric passive traffic monitoring in cognitive radio networks (2013) (16)
- Tell me the truth: Practically public authentication for outsourced databases with multi-user modification (2017) (15)
- Looks Good To Me: Authentication for Augmented Reality (2016) (15)
- AoI Scheduling with Maximum Thresholds (2020) (15)
- On energy efficiency of geographic opportunistic routing in lossy multihop wireless networks (2012) (15)
- A robust and energy-efficient data dissemination framework for wireless sensor networks (2006) (15)
- A Dynamic Deep-Learning-Based Virtual Edge Node Placement Scheme for Edge Cloud Systems in Mobile Environment (2022) (15)
- Fault-tolerant Event Boundary Detection in Wireless Sensor Networks (2006) (14)
- On interference alignment for multi-hop MIMO networks (2013) (14)
- FSA: A Fast Coordination Scheme for Opportunistic Routing (2009) (14)
- A Distributed Scheduling Algorithm for Underwater Acoustic Networks With Large Propagation Delays (2017) (14)
- Toward simple criteria to establish capacity scaling laws for wireless networks (2012) (14)
- Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security (2015) (14)
- Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks (2015) (14)
- Joint User-AP Association and Resource Allocation in Multi-AP 60-GHz WLAN (2019) (14)
- Throughput Maximization for Multi-Hop Wireless Networks with Network-Wide Energy Constraint (2013) (14)
- Offloading Decision in Edge Computing for Continuous Applications Under Uncertainty (2020) (14)
- On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication (2012) (13)
- An efficient DoF scheduling algorithm for multi-hop MIMO networks (2013) (13)
- Communication Security in Wireless Sensor Networks (2008) (13)
- AugAuth: Shoulder-surfing resistant authentication for augmented reality (2017) (13)
- On cyclostationary analysis of WiFi signals for direction estimation (2015) (13)
- Minimizing Age of Information Under General Models for IoT Data Collection (2020) (12)
- A Scheduling Algorithm for MIMO DoF Allocation in Multi-Hop Networks (2016) (12)
- WSN09-3: Fault-tolerant Event Boundary Detection in Wireless Sensor Networks (2006) (12)
- Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks (2014) (12)
- Coexistence Between Wi-Fi and LTE on Unlicensed Spectrum: A Human-Centric Approach (2017) (12)
- Now You See Me: Hide and Seek in Physical Address Space (2015) (12)
- Beyond interference avoidance: On transparent coexistence for multi-hop secondary CR networks (2013) (11)
- MUSHI: Toward Multiple Level Security cloud with strong Hardware level Isolation (2012) (11)
- Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links (2008) (11)
- Game Theoretical Analysis on Encrypted Cloud Data Deduplication (2019) (10)
- Towards Efficient Fully Randomized Message-Locked Encryption (2016) (10)
- Privacy enhanced access control in pervasive computing environments (2005) (10)
- Multihop Wireless Networks: Opportunistic Routing (2011) (10)
- On efficient key pre-distribution in large scale wireless sensor networks (2005) (10)
- PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution (2018) (10)
- Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation (2019) (10)
- Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution (2021) (10)
- Recent advances in interference management for wireless networks (2015) (9)
- A Practical Downlink NOMA Scheme for Wireless LANs (2020) (9)
- OFDM-Based Interference Alignment in Single-Antenna Cellular Wireless Networks (2017) (9)
- Securing Data Delivery in Ad Hoc Networks (2003) (8)
- Modeling the side-channel attacks in data deduplication with game theory (2015) (8)
- Aion: A Bandwidth Optimized Scheduler with AoI Guarantee (2021) (8)
- The effects of cache organizations on the performance of on-demand routing protocols in ad hoc networks (2002) (8)
- Beyond Overlay: Reaping Mutual Benefits for Primary and Secondary Networks Through Node-Level Cooperation (2017) (8)
- A General Model for DoF-based Interference Cancellation in MIMO Networks With Rank-Deficient Channels (2018) (8)
- Proximity-based security using ambient radio signals (2013) (8)
- On Scheduling with AoI Violation Tolerance (2021) (8)
- A delegation based cross trusted domain direct anonymous attestation scheme (2015) (8)
- MobTrack: Locating indoor interfering radios with a single device (2016) (8)
- Efficient and Secure Outsourcing of Differentially Private Data Publication (2018) (8)
- Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks (2010) (8)
- Context-Free Fine-Grained Motion Sensing Using WiFi (2018) (7)
- Cooperative Interference Neutralization in Multi-Hop Wireless Networks (2018) (7)
- On Passive Wireless Device Fingerprinting using Infinite Hidden Markov Random Field (2012) (7)
- Interference alignment for multihop wireless networks: challenges and research directions (2016) (7)
- Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup (2018) (7)
- Cognitive security: securing the burgeoning landscape of mobile networks (2016) (7)
- A Network Coding Approach to Reliable Broadcast in Wireless Mesh Networks (2009) (7)
- Secure Device Pairing (2011) (7)
- On Throughput Maximization for a Multi-hop MIMO Network (2013) (7)
- Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding (2016) (7)
- On the integration of SIC and MIMO DoF for interference cancellation in wireless networks (2018) (7)
- A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT (2018) (6)
- Scalable and robust data dissemination in wireless sensor networks (2004) (6)
- SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks (2014) (6)
- Cooperative Interference Mitigation for Heterogeneous Multi-Hop Wireless Networks Coexistence (2016) (6)
- Harmonizing SIC and MIMO DoF Interference Cancellation for Efficient Network-Wide Resource Allocation (2015) (6)
- ROSTER: Radio Context Attestation in Cognitive Radio Network (2018) (6)
- DELUXE: A DL-Based Link Adaptation for URLLC/eMBB Multiplexing in 5G NR (2022) (6)
- DEAR: a device and energy aware routing protocol for mobile ad hoc networks (2002) (6)
- CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices (2018) (5)
- PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Networks (2019) (5)
- Privacy-Preserving Link Prediction in Decentralized Online Social Networks (2015) (5)
- A Deep-Learning-based Link Adaptation Design for eMBB/URLLC Multiplexing in 5G NR (2021) (5)
- Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication (2020) (5)
- Turbo-HB: A Novel Design and Implementation to Achieve Ultra-Fast Hybrid Beamforming (2020) (5)
- Increasing user throughput in cellular networks with interference alignment (2014) (5)
- On Throughput Region for Primary and Secondary Networks With Node-Level Cooperation (2016) (5)
- FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning (2022) (4)
- A Real-Time Solution for Underlay Coexistence with Channel Uncertainty (2019) (4)
- A new approach for random key pre-distribution in large-scale wireless sensor networks: Research Articles (2006) (4)
- From Electromyogram to Password (2017) (4)
- Achieving Fair LTE/Wi-Fi Coexistence with Real-Time Scheduling (2020) (4)
- On DoF-Based Interference Cancellation Under General Channel Rank Conditions (2020) (4)
- Ao2I: Minimizing Age of Outdated Information to Improve Freshness in Data Collection (2022) (3)
- FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations (2022) (3)
- On AP Assignment and Transmission Scheduling for Multi-AP 60 GHz WLAN (2017) (3)
- Optimal throughput curve for primary and secondary users with node-level cooperation (2015) (3)
- mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO Systems (2021) (3)
- Anonymous handshakes in mobile ad hoc networks (2004) (3)
- PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications (2020) (3)
- Challenges and New Directions in Securing Spectrum Access Systems (2021) (3)
- CURT: A Real-Time Scheduling Algorithm for Coexistence of LTE and Wi-Fi in Unlicensed Spectrum (2018) (3)
- Task Offloading with Uncertain Processing Cycles (2021) (3)
- Characterization and source modeling of MPEG-2 VBR video source (1997) (3)
- Towards Secure Link Quality Measurement in Multihop Wireless Networks (2008) (3)
- Optimal Power Control with Channel Uncertainty in Ad Hoc Networks (2019) (3)
- Achieving transparent coexistence in a multi-hop secondary network through distributed computation (2014) (2)
- Chapter 15 – Data Security in Cloud Computing (2012) (2)
- Enabling Trusted Data-intensive execution in cloud computing (2014) (2)
- A Distributed Algorithm to Achieve Transparent Coexistence for a Secondary Multi-Hop MIMO Network (2016) (2)
- Scheduling With Age of Information Guarantee (2022) (2)
- CANShield: Signal-based Intrusion Detection for Controller Area Networks (2022) (2)
- A Proactive Data Security Framework for Mission-Critical Wireless Sensor Networks (2006) (2)
- Minimizing AoI in a 5G-Based IoT Network Under Varying Channel Conditions (2021) (2)
- On Multicast Throughput in Multihop MIMO Networks With Interference Alignment (2018) (2)
- Interference Alignment for Multi-hop Wireless Networks : Challenges and Research Directions (2015) (2)
- Cooperative Interference Mitigation for Heterogeneous Multi-hop MIMO Wireless Networks (2013) (2)
- Efficient fine-grained data access control in wireless sensor networks (2009) (2)
- Joint Flow Routing and DoF Allocation in Multihop MIMO Networks (2016) (2)
- Software-Based Attestation (2011) (1)
- Rechargeable Sensor Networks with Magnetic Resonant Coupling (2014) (1)
- Optimal Channel Allocation in the CBRS Band with Shipborne Radar Incumbents (2021) (1)
- Maximize Spectrum Efficiency in Underlay Coexistence With Channel Uncertainty (2021) (1)
- MANDA: On Adversarial Example Detection for Network Intrusion Detection System (2023) (1)
- SpecMonitor : Towards Efficient Passive Traffic Monitoring for Cognitive Radio Networks (2014) (1)
- GPF (2018) (1)
- Supplementary Material — Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption (2012) (1)
- A General Method to Determine Asymptotic Capacity Upper Bounds for Wireless Networks (2019) (1)
- GPF+: A Novel Ultrafast GPU-Based Proportional Fair Scheduler for 5G NR (2022) (1)
- Cost Minimization for Cooperative Traffic Relaying Between Primary and Secondary Networks (2018) (1)
- GPU: A New Enabling Platform for Real-Time Optimization in Wireless Networks (2020) (1)
- Maximizing Energy Efficiency with Channel Uncertainty under Mutual Interference (2022) (1)
- Secure three-party computational protocols for triangle area (2014) (1)
- New access control systems based on outsourced attribute-based encryption (2015) (1)
- Medium Access Control for Opportunistic Routing – Candidate Coordination (2011) (1)
- Public-Key Authenticated Encryption (2011) (1)
- Chapter 1 Distributed Consensus Protocols and Algorithms (2018) (1)
- D2BF—Data-Driven Beamforming in MU-MIMO with Channel Estimation Uncertainty (2022) (1)
- Nullification in the air: Interference neutralization in multi-hop wireless networks (2016) (1)
- Session details: Pricing, billing, and resource allocation in wired, overlay and wireless networks (2007) (0)
- MIMO-Empowered Secondary Networks for Efficient Spectrum Sharing (2019) (0)
- E-LEARNING SYSTEM WITH HIERARCHICAL ATTRIBUTE SET BASED ENCRYPTION ACCESS CONTROL IN CLOUD (2016) (0)
- Taxonomy of Opportunistic Routing: Principles and Behaviors (2011) (0)
- Privacy-Preserving Public Authentication for Shared Data in Cloud (2018) (0)
- A Novel Energy Efficient Authentic Reliable Routing Protocol (EEARRP) for Scalable Mobile Ad Hoc Networks (2020) (0)
- 11. Conclusions and future research (2011) (0)
- A Cloud Approach for Secure Multi Data sharing between the Users (2014) (0)
- Capacity of Multirate Opportunistic Routing (2011) (0)
- Message from the general chair and TPC chairs (2013) (0)
- Group Device Pairing : Secure Communication Bootstrapping for Wireless Body Area Networks (2010) (0)
- A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing (2020) (0)
- Blockchain 2019 Organizing and Program Committees (2019) (0)
- Mobile Tracking in 5G and Beyond Networks: Problems, Challenges, and New Directions (2022) (0)
- An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm (2016) (0)
- Energy Efficiency of Geographic Opportunistic Routing (2011) (0)
- Editor of the WTS 2008 Proceedings (2008) (0)
- DELAR: DevicelEnergylLoad Aware Relaying in Heterogenous Wireless Ad Hoc Networks (2004) (0)
- Interference Alignment in Wireless Networks (2020) (0)
- Aequitas: A Uniformly Fair 5G Scheduler for Minimizing Outdated Information (2022) (0)
- A Service Strategy Selection in Collaboration Model for the Business Growth of Content Providers (2018) (0)
- Speaker Biometrics (2009) (0)
- Secure and Dependable Distributed Data Storage and Access Control in Mission-critical Wireless Sensor Networks (2009) (0)
- A selection function based distributed algorithm for delay-constraint least-cost unicast routing (2003) (0)
- Design of Distributed Multi Agent Servers for Efficient Treatment of Health Care Issues (2015) (0)
- Multirate Geographic Opportunistic Routing Protocol Design (2011) (0)
- Black penguin: On the feasibility of detecting intrusion with homogeneous memory (2017) (0)
- Private Key Cryptosystem (2006) (0)
- Bus-bar Splitting on Enhancing Static Voltage Stability for The Base and Contingency Cases (2020) (0)
- A Study of Efficient Anonymous Routing Protocols in MANET (2019) (0)
- Learning in Your “Pocket”: Secure Collaborative Deep Learning with Membership Privacy (2022) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- Opportunistic Broadcasts in Vehicular Networks (2011) (0)
- Optimized User Revocation for Group Signature Based Privacy-Aware PKI (2008) (0)
- Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data (2019) (0)
- Effective Multi-user Broadcast Authentication in Wireless Sensor Networks (2009) (0)
- Securing Wireless Sensor Networks with Location Based Keys (2006) (0)
- On DoF Conservation in MIMO Interference Cancellation Based on Signal Strength in the Eigenspace (2023) (0)
- Chapter 5 . 3 : Data Security in Cloud Computing (2011) (0)
- Multiradio Multichannel Opportunistic Routing (2011) (0)
- Spectrum attacks aimed at minimizing spectrum opportunities (2017) (0)
- Opportunistic Routing Security (2011) (0)
- Blockchain 2020 Organizing Committee (2020) (0)
- Integration of Opportunistic Routing and Network Coding (2011) (0)
- Privacy-Preserving Authentication in Wireless Access Networks (2011) (0)
- Accountable Attribute-Based Broadcast (2009) (0)
- Achieving Real-Time Spectrum Sharing in 5G Underlay Coexistence With Channel Uncertainty (2021) (0)
- Subgroup Cryptosystems (2011) (0)
- Welcome message (2009) (0)
- Real-time DoA Estimation for Automotive Radar (2022) (0)
- On the integration of SIC and MIMO DoF for interference cancellation in wireless networks (2017) (0)
- The transmission of MPEG‐2 VBR video under usage parameter control (2001) (0)
- Transferability of Adversarial Examples in Machine Learning-based Malware Detection (2022) (0)
- Wireless Scheduling to Optimize Age of Information Based on Earliest Update Time (2023) (0)
- Hector: A Reinforcement Learning-based Scheduler for Minimizing Casualties of a Military Drone Swarm (2022) (0)
- Enhancing Resilience in Mobile Edge Computing Under Processing Uncertainty (2023) (0)
- The efficient and effective transmission of MPEG-2 VBR video over ATM networks (1997) (0)
- Aion: A Bandwidth Conserving Scheduler With Data Freshness Guarantee (2022) (0)
- CANtropy: Time Series Feature Extraction-Based Intrusion Detection Systems for Controller Area Networks (2023) (0)
- M3: A Sub-Millisecond Scheduler for Multi-Cell MIMO Networks under C-RAN Architecture (2022) (0)
- BD-SAS: Enabling Dynamic Spectrum Sharing in Low-trust Environment (2023) (0)
- Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning (2022) (0)
- mCore $+$: A Real-Time Design Achieving $\sim 500~\mu$ s Scheduling for 5G MU-MIMO Systems (2022) (0)
- Turbo-HB: A Sub-millisecond Hybrid Beamforming Design for 5G mmWave Systems (2022) (0)
- On energy efficiency of geographic opportunistic routing in lossy multihop wireless networks (2012) (0)
This paper list is powered by the following services:
Other Resources About Wenjing Lou
What Schools Are Affiliated With Wenjing Lou?
Wenjing Lou is affiliated with the following schools: