Xiuzhen Cheng
#105,908
Most Influential Person Now
Xiuzhen Cheng's AcademicInfluence.com Rankings
Xiuzhen Chengcomputer-science Degrees
Computer Science
#4026
World Rank
#4234
Historical Rank
Machine Learning
#1898
World Rank
#1923
Historical Rank
Artificial Intelligence
#2147
World Rank
#2183
Historical Rank
Database
#3260
World Rank
#3396
Historical Rank
Download Badge
Computer Science
Xiuzhen Cheng's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Xiuzhen Cheng Influential?
(Suggest an Edit or Addition)According to Wikipedia, Xiuzhen Cheng is a Chinese computer scientist whose research interests include wireless sensor networks, edge computing, and the internet of things. She is a professor of computer science at Shandong University.
Xiuzhen Cheng's Published Works
Published Works
- Relay sensor placement in wireless sensor networks (2008) (494)
- Fog Computing for the Internet of Things: Security and Privacy Issues (2017) (470)
- Localized fault-tolerant event boundary detection in sensor networks (2005) (452)
- TPS: a time-based positioning scheme for outdoor wireless sensor networks (2004) (366)
- A polynomial‐time approximation scheme for the minimum‐connected dominating set in ad hoc wireless networks (2003) (330)
- Dynamic spectrum access: from cognitive radio to network radio (2012) (309)
- Silent Positioning in Underwater Acoustic Sensor Networks (2008) (296)
- Connected Dominating Set in Sensor Networks and MANETs (2004) (282)
- Spectrum prediction in cognitive radio networks (2013) (269)
- Insider Attacker Detection in Wireless Sensor Networks (2007) (229)
- Localized Outlying and Boundary Data Detection in Sensor Networks (2007) (211)
- Edge Computing Security: State of the Art and Challenges (2019) (207)
- 3D Underwater Sensor Network Localization (2009) (201)
- Energy-aware data-centric routing in microsensor networks (2003) (195)
- Real-Time Detection of Clone Attacks in Wireless Sensor Networks (2008) (192)
- Strong Minimum Energy Topology in Wireless Sensor Networks: NP-Completeness and Heuristics (2003) (190)
- Sparse target counting and localization in sensor networks based on compressive sensing (2011) (185)
- Underwater Localization in Sparse 3D Acoustic Sensor Networks (2008) (185)
- Blockchain for Large-Scale Internet of Things Data Storage and Protection (2019) (168)
- A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes (2016) (163)
- A New Heuristic for the Minimum Connected Dominating Set Problem on Ad Hoc Wireless Networks (2004) (159)
- OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks (2013) (147)
- Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme (2013) (145)
- Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks (2007) (134)
- A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications (2018) (134)
- Virtual backbone construction in multihop ad hoc wireless networks (2006) (131)
- Connected Domination in Multihop Ad Hoc Wireless Networks (2002) (130)
- IoT Applications on Secure Smart Shopping System (2017) (120)
- Attacks and Countermeasures in Sensor Networks: A Survey (2010) (116)
- Steiner Trees in Industry (2002) (115)
- Channel quality prediction based on Bayesian inference in cognitive radio networks (2013) (114)
- Achieving privacy preservation in WiFi fingerprint-based localization (2014) (113)
- A surveillance robot with hopping capabilities for home security (2009) (111)
- On the Construction of Virtual Backbone for Ad Hoc Wireless Network (2003) (105)
- An Attribute-Based Encryption Scheme to Secure Fog Communications (2017) (105)
- Coverage Contribution Area Based $k$ -Coverage for Wireless Sensor Networks (2017) (100)
- Opportunistic Sensing in Wireless Sensor Networks: Theory and Application (2011) (99)
- A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks (2008) (99)
- AP Association for Proportional Fairness in Multirate WLANs (2014) (97)
- Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing (2017) (95)
- A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes (2017) (93)
- Cooperative Relay Selection in Cognitive Radio Networks (2015) (92)
- Ad Hoc Wireless Networking (2004) (87)
- A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds (2018) (85)
- FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks (2020) (85)
- Wireless data center networking (2011) (84)
- A Performance Evaluation of a Novel Energy-Aware Data-Centric Routing Algorithm in Wireless Sensor Networks (2005) (82)
- From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks (2010) (81)
- On the Performance of Location-Centric Storage in Sensor Networks (2007) (78)
- Jamming Strategies for Physical Layer Security (2018) (78)
- Utility-Based Cooperative Spectrum Sensing Scheduling in Cognitive Radio Networks (2013) (78)
- Time-Synchronization Free Localization in Large Scale Underwater Acoustic Sensor Networks (2009) (69)
- Developing Prognostic Systems of Cancer Patients by Ensemble Clustering (2009) (68)
- Verifiable multi-secret sharing based on LFSR sequences (2012) (66)
- Cooperative multi-hop relaying via network formation games in cognitive radio networks (2013) (66)
- Learning Graph Structures With Transformer for Multivariate Time-Series Anomaly Detection in IoT (2021) (64)
- Security and privacy in localization for underwater sensor networks (2015) (64)
- Fault-Tolerant Target Localization in Sensor Networks (2007) (62)
- Opportunistic Routing in Intermittently Connected Mobile P2P Networks (2013) (62)
- Partially overlapping channel assignment based on “node orthogonality” for 802.11 wireless networks (2011) (61)
- Fault tolerant target tracking in sensor networks (2009) (61)
- Shortest Link Scheduling Algorithms in Wireless Networks Under the SINR Model (2017) (60)
- NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce (2019) (56)
- On the Design and Deployment of RFID Assisted Navigation Systems for VANETs (2012) (55)
- Fault-Tolerant Topology Control for All-to-One and One-to-All Communication in Wireles Networks (2008) (55)
- iTPS: an improved location discovery scheme for sensor networks with long-range beacons (2005) (52)
- Channel allocation in wireless data center networks (2011) (51)
- Achievable transmission capacity of cognitive mesh networks with different media access control (2012) (51)
- Routing in pocket switched networks (2012) (49)
- NEW: Network-Enabled Electronic Warfare for Target Recognition (2010) (49)
- Optimal Spectrum Sensing Interval in Cognitive Radio Networks (2014) (47)
- Enhancing GPS With Lane-Level Navigation to Facilitate Highway Driving (2017) (46)
- Mining Hard Samples Globally and Efficiently for Person Reidentification (2020) (45)
- SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks (2008) (44)
- Near-Online Tracking With Co-Occurrence Constraints in Blockchain-Based Edge Computing (2021) (43)
- An Android-Based Mechanism for Energy Efficient Localization Depending on Indoor/Outdoor Context (2017) (42)
- Meta Matrix Factorization for Federated Rating Predictions (2019) (42)
- Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming (2019) (42)
- Faster Parallel Core Maintenance Algorithms in Dynamic Graphs (2020) (41)
- Cooperative Spectrum Prediction in Multi-PU Multi-SU Cognitive Radio Networks (2013) (41)
- Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks (2015) (41)
- Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks: A Survey (2020) (41)
- Achieving Proportional Fairness via AP Power Control in Multi-Rate WLANs (2011) (41)
- Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective (2012) (40)
- A Time Fairness-Based MAC Algorithm for Throughput Maximization in 802.11 Networks (2015) (40)
- Stable Local Broadcast in Multihop Wireless Networks Under SINR (2018) (40)
- Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks (2014) (40)
- Securing communications between external users and wireless body area networks (2013) (39)
- A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT (2018) (39)
- RAP: protecting commodity wi-fi networks from rogue access points (2007) (39)
- Dynamic Scheduling for Wireless Data Center Networks (2013) (38)
- Spectrum Assignment and Sharing for Delay Minimization in Multi-Hop Multi-Flow CRNs (2013) (38)
- Implementing The Abstract MAC Layer in Dynamic Networks (2021) (38)
- An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks (2019) (38)
- Safety warning based on highway sensor networks (2005) (37)
- An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications (2015) (37)
- Proof of Federated Learning: A Novel Energy-Recycling Consensus Algorithm (2019) (36)
- Underwater Acoustic Sensor Networks: Target Size Detection and Performance Analysis (2008) (35)
- LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks (2008) (35)
- The Complexity of Channel Scheduling in Multi-Radio Multi-Channel Wireless Networks (2009) (35)
- iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks (2007) (35)
- A Range-Difference Based Self-Positioning Scheme for Underwater Acoustic Sensor Networks (2007) (35)
- Customized privacy preserving for inherent data and latent data (2017) (34)
- An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks (2004) (34)
- Timer-Based CDS Construction in Wireless Ad Hoc Networks (2011) (34)
- Side-channel information leakage of encrypted video stream in video surveillance systems (2016) (33)
- Distributed Spanner Construction With Physical Interference: Constant Stretch and Linear Sparseness (2017) (33)
- A secure and verifiable outsourcing scheme for matrix inverse computation (2017) (33)
- Location-aware key establishment in wireless sensor networks (2006) (33)
- Virtual Backbone-Based Routing in Multihop Ad Hoc Wireless Networks (2002) (31)
- Virtual track: applications and challenges of the RFID system on roads (2014) (31)
- Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach (2019) (30)
- Influence-based community partition for social networks (2014) (29)
- UWB Radar Sensor Networks for Sense-Through-Foliage Target Detection (2008) (28)
- A multi-unit truthful double auction framework for secondary market (2013) (27)
- An asymptotic analysis of some expert fusion methods (2001) (27)
- DIAR: A Dynamic Interference Aware Routing Protocol for IEEE 802.11-Based Mobile Ad Hoc Networks (2005) (27)
- Data Aggregation in Wireless Sensor Networks: From the Perspective of Security (2020) (26)
- Security in wearable communications (2016) (26)
- Analyzing Cognitive Network Access Efficiency Under Limited Spectrum Handoff Agility (2014) (26)
- SecureGuard: A Certificate Validation System in Public Key Infrastructure (2018) (26)
- Robust Event Boundary Detection in Sensor Networks - A Mixture Model Based Approach (2009) (25)
- Quality Control in Crowdsourcing Using Sequential Zero-Determinant Strategies (2020) (25)
- Fault-tolerant target detection in sensor networks (2005) (25)
- A survey on key fields of context awareness for mobile devices (2018) (25)
- An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets (2014) (25)
- SINR based shortest link scheduling with oblivious power control in wireless networks (2017) (25)
- Robust Compressive Data Gathering in Wireless Sensor Networks (2013) (24)
- An enhanced low overhead and stable clustering scheme for crossroads in VANETs (2016) (24)
- Minimum connected dominating set construction in wireless networks under the beeping model (2015) (24)
- Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs (2010) (23)
- TPSS: A Time-Based Positioning Scheme for Sensor Networks with Short Range Beacons (2005) (23)
- Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks (2013) (23)
- Wireless link scheduling for data center networks (2011) (22)
- Efficient Link Scheduling in Wireless Networks Under Rayleigh-Fading and Multiuser Interference (2020) (22)
- A Novel Secure and Efficient Data Aggregation Scheme for IoT (2019) (22)
- Gene selection for multiclass prediction of microarray data (2003) (22)
- Maximizing throughput when achieving time fairness in multi-rate wireless LANs (2012) (22)
- Energy-Efficient MAC Layer protocols in Ad Hoc Networks (2005) (22)
- Compressive sensing in distributed radar sensor networks using pulse compression waveforms (2013) (21)
- Coverage adjustment for load balancing with an AP service availability guarantee in WLANs (2014) (21)
- QueueSense: Collaborative recognition of queuing on mobile phones (2014) (21)
- Time-Bounded Essential Localization for Wireless Sensor Networks (2010) (21)
- Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks (2020) (20)
- Fog Computing Based Ultraviolet Radiation Measurement via Smartphones (2015) (20)
- Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks (2014) (20)
- I Can See Your Brain: Investigating Home-Use Electroencephalography System Security (2019) (20)
- Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory (2020) (20)
- Applications of Differential Privacy in Social Network Analysis: A Survey (2023) (20)
- Achievable transmission capacity of cognitive radio networks with cooperative relaying (2012) (19)
- Anonymization in Online Social Networks Based on Enhanced Equi-Cardinal Clustering (2019) (19)
- Ultraviolet Radiation Measurement via Smart Devices (2017) (19)
- Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services (2018) (19)
- When Blockchain Meets Smart Grids: A Comprehensive Survey (2021) (19)
- Analyzing the potential of mobile opportunistic networks for big data applications (2015) (18)
- Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks (2008) (18)
- A Secure and Practical Authentication Scheme Using Personal Devices (2017) (18)
- Approximate data aggregation in sensor equipped IoT networks (2020) (18)
- Secure multi-unit sealed first-price auction mechanisms (2016) (18)
- Advances on data, information, and knowledge in the internet of things (2014) (18)
- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme (2015) (17)
- Mobility-Assisted Routing in Intermittently Connected Mobile Cognitive Radio Networks (2014) (17)
- The Tempo-Spatial Information Dissemination Properties of Mobile Opportunistic Networks with Levy Mobility (2014) (17)
- Localized and distributed link scheduling algorithms in IoT under rayleigh fading (2019) (17)
- Location-centric storage for safety warning based on roadway sensor networks (2007) (17)
- A power controlled interference aware routing protocol for dense multi-hop wireless networks (2008) (17)
- Detecting driver phone calls in a moving vehicle based on voice features (2016) (17)
- Multi-hop access pricing in public area WLANs (2011) (16)
- A novel verification method for payment card systems (2015) (15)
- Big data routing in D2D communications with cognitive radio capability (2016) (15)
- Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach (2010) (15)
- Secure Auctions without an Auctioneer via Verifiable Secret Sharing (2015) (15)
- CAB: A Cellular Automata-Based Key Management Scheme for Wireless Sensor Networks (2007) (15)
- HERO - A Home Based Routing in Pocket Switched Networks (2012) (14)
- A model for integrating heterogeneous sensory data in IoT systems (2019) (14)
- Emerging WiFi Direct technique in home area networks for Smart Grid: Power consumption and outage performance (2014) (14)
- A novel rate adaptation scheme for 802.11 networks (2009) (14)
- Location discovery for sensor networks with short range beacons (2009) (13)
- Wireless channel modeling in foliage environment: UWB versus narrowband (2008) (13)
- A Game Theoretic Analysis on Block Withholding Attacks Using the Zero-Determinant Strategy (2019) (13)
- An Efficient Scheme for Tag Information Update in RFID Systems on Roads (2016) (13)
- wChain: A Fast Fault-Tolerant Blockchain Protocol for Multihop Wireless Networks (2021) (13)
- Identification of Vulnerable Lines in Smart Grid Systems Based on Affinity Propagation Clustering (2019) (13)
- A statistical approach for target counting in sensor-based surveillance systems (2012) (13)
- Distributed Dominating Set and Connected Dominating Set Construction Under the Dynamic SINR Model (2019) (13)
- Cooperative relay selection in cognitive radio networks (2013) (13)
- Connected dominating set construction in cognitive radio networks (2015) (12)
- Localized Algorithms for Yao Graph-Based Spanner Construction in Wireless Networks Under SINR (2017) (12)
- QuickCash: Secure Transfer Payment Systems (2017) (12)
- IoT Applications on Secure Smart Shopping (2016) (12)
- Distributed deterministic broadcasting algorithms under the SINR model (2016) (12)
- Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks (2017) (12)
- Privacy-Preserving Collaborative Learning for Multiarmed Bandits in IoT (2021) (12)
- Differentially Private k-Anonymity: Achieving Query Privacy in Location-Based Services (2016) (12)
- An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications (2018) (12)
- Load Balancing Access Point Association Schemes for IEEE 802.11 Wireless Networks (2011) (12)
- SSDNet: Small-World Super-Dense Device-to-Device Wireless Networks (2018) (12)
- A concrete statistical realization of Kleinberg's stochastic discrimination for pattern recognition. Part I. Two-class classification (2003) (12)
- Fundamental Analysis on Data Dissemination in Mobile Opportunistic Networks With Lévy Mobility (2017) (11)
- Simultaneous energy and information cooperation in MIMO cooperative cognitive radio systems (2015) (11)
- Connected dominating set algorithms for wireless sensor networks (2013) (11)
- Enabling Technologies for Spectrum and Energy Efficient NOMA-MmWave-MaMIMO Systems (2020) (11)
- BLOWN: A Blockchain Protocol for Single-Hop Wireless Networks under Adversarial SINR (2021) (11)
- Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks (2016) (11)
- Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy (2017) (11)
- Polynomial Time Approximation Scheme for Symmetric Rectilinear Steiner Arborescence Problem (2001) (11)
- Analysis and optimization of delayed channel access for wireless cyber-physical systems (2016) (11)
- CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA (2021) (11)
- A Self-Configured Key Establishment Scheme for Large-Scale Sensor Networks (2006) (10)
- CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids (2018) (10)
- An optimal privacy-preserving mechanism for crowdsourced traffic monitoring (2014) (10)
- An Underwater Positioning Scheme for 3 D Acoustic Sensor Networks (2007) (10)
- Blockchain and Federated Edge Learning for Privacy-Preserving Mobile Crowdsensing (2021) (10)
- PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks (2005) (10)
- General Tricomi–Rassias problem and oblique derivative problem for generalized Chaplygin equations (2007) (9)
- Scalable Decentralized Privacy-Preserving Usage-Based Insurance for Vehicles (2021) (9)
- Efficient Link Scheduling Solutions for the Internet of Things Under Rayleigh Fading (2021) (9)
- Big Data and Knowledge Extraction for Cyber-Physical Systems (2015) (9)
- Understanding Topology Evolving of VANETs from Taxi Traces (2013) (9)
- Secure friend discovery based on encounter history in mobile social networks (2014) (9)
- 3 D Underwater Sensor Network Localization (2009) (9)
- Outage performance evaluation over Rayleigh fading channels of WiFi Direct networks in Smart Grid application (2012) (9)
- MalFox: Camouflaged Adversarial Malware Example Generation Based on C-GANs Against Black-Box Detectors (2020) (9)
- SA Framework based De-anonymization of Social Networks (2017) (9)
- Social Welfare Control in Mobile Crowdsensing Using Zero-Determinant Strategy (2017) (9)
- User Identity De-anonymization Based on Attributes (2019) (9)
- A coalition formation game based relay selection scheme for cooperative cognitive radio networks (2017) (8)
- Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain (2021) (8)
- Cooperative spectrum sharing of multiple primary users and multiple secondary users (2016) (8)
- Connected Dominating Sets (2007) (8)
- Perturbation-Based Private Profile Matching in Social Networks (2017) (8)
- Connected Dominating Set (2008) (8)
- Algorithmic Aspects of Wireless Networks (2007) (8)
- Distributed Core Decomposition in Probabilistic Graphs (2019) (8)
- Decentralized Wireless Federated Learning With Differential Privacy (2021) (8)
- Routing for Information Leakage Reduction in Multi-channel Multi-hop Ad-Hoc Social Networks (2012) (8)
- Routing in user-centric networks (2014) (7)
- Theoretical Analysis of Secrecy Transmission Capacity in Wireless Ad Hoc Networks (2017) (7)
- Fast skyline community search in multi-valued networks (2020) (7)
- Mechanism design games for thwarting malicious behavior in crowdsourcing applications (2017) (7)
- A Simple Implementation of the Stochastic Discrimination for Pattern Recognition (2000) (7)
- Issues in ad hoc wireless networks (2002) (7)
- A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications (2017) (7)
- FedHAR: Semi-Supervised Online Learning for Personalized Federated Human Activity Recognition (2023) (7)
- Target Counting in Wireless Sensor Networks (2014) (7)
- PRIDE: A Private and Decentralized Usage-Based Insurance Using Blockchain (2018) (7)
- A Secure Multi-unit Sealed First-Price Auction Mechanism (2015) (7)
- Towards More Secure Cardholder Verification in Payment Systems (2014) (7)
- A novel contention-on-demand design for WiFi hotspots (2016) (7)
- Inference attacks based on neural networks in social networks (2017) (7)
- Efficient Customized Privacy Preserving Friend Discovery in Mobile Social Networks (2015) (7)
- Utility analysis on privacy-preservation algorithms for online social networks: an empirical study (2019) (7)
- Achieving Privacy Preservation and Billing via Delayed Information Release (2021) (7)
- Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning (2021) (7)
- Location-centric storage and query in wireless sensor networks (2010) (7)
- Distributed Algorithm for Connected Dominating Set Construction in Sensor Networks (2013) (6)
- Batch Processing for Truss Maintenance in Large Dynamic Graphs (2020) (6)
- SPDL: A Blockchain-Enabled Secure and Privacy-Preserving Decentralized Learning System (2023) (6)
- Privacy-Enhancing Preferential LBS Query for Mobile Social Network Users (2020) (6)
- A community based vaccination strategy over mobile phone records (2012) (6)
- Distributed Algorithms for Maximum Clique in Wireless Networks (2015) (6)
- A Misreport- and Collusion-Proof Crowdsourcing Mechanism Without Quality Verification (2020) (6)
- Hypercore Maintenance in Dynamic Hypergraphs (2021) (6)
- Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies (2020) (6)
- Three connected dominating set algorithms for wireless sensor networks (2016) (6)
- An Attribute & Network Coding-Based Secure Multicast Protocol for Firmware Updates in Smart Grid AMI Networks (2017) (6)
- N-in-One: A Novel Location-Based Service (2018) (6)
- VisioMap: Lightweight 3-D Scene Reconstruction Toward Natural Indoor Localization (2019) (6)
- Fast Fault-Tolerant Sampling via Random Walk in Dynamic Networks (2019) (6)
- Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids (2019) (6)
- New advances in data, information, and knowledge in the Internet of Things (2016) (6)
- Location-centric storage for sensor networks (2005) (5)
- Distributed Byzantine-Resilient Multiple-Message Dissemination in Wireless Networks (2021) (5)
- Pattern Recognition and String Matching (2011) (5)
- Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility (2016) (5)
- Improving Macrocell Downlink Throughput in Rayleigh Fading Channel Environment Through Femtocell User Cooperation (2013) (5)
- Distributed Social Learning With Imperfect Information (2021) (5)
- Lightweight Hardware Based Secure Authentication Scheme for Fog Computing (2018) (5)
- Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things (2020) (5)
- Sampling-based approximate skyline query in sensor equipped IoT networks (2021) (5)
- Multi-Task Time Series Forecasting With Shared Attention (2020) (5)
- Cooperative Coverage Extension for Relay-Union Networks (2015) (5)
- Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model (2013) (5)
- WSN09-2: On the Performance of In-Situ Key Establishment Schemes for Wireless Sensor Networks (2006) (5)
- Cost-Efficient Mobile Crowdsensing With Spatial-Temporal Awareness (2021) (5)
- A Polynomial Time Approximation Scheme for the Problem of Interconnecting Highways (2001) (5)
- A Clustering Approach in Developing Prognostic Systems of Cancer Patients (2008) (5)
- A Monte Carlo Method for Mobile Target Counting (2011) (5)
- A Bitcoin Based Incentive Mechanism for Distributed P2P Applications (2017) (5)
- Passive Listening and Intrusion Management in Commodity Wi-Fi Networks (2007) (5)
- Ads dissemination in Vehicular Ad Hoc Networks (2015) (5)
- Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing (2014) (5)
- Differential Privacy and Its Applications in Social Network Analysis: A Survey (2020) (4)
- Distributed Algorithm for Truss Maintenance in Dynamic Graphs (2020) (4)
- Decentralized Parallel SGD With Privacy Preservation in Vehicular Networks (2021) (4)
- Harnessing Context for Budget-Limited Crowdsensing With Massive Uncertain Workers (2021) (4)
- Sparsity and compressive sensing of sense-through-foliage radar signals (2012) (4)
- Quantum Game Analysis of Privacy-Leakage for Application Ecosystems (2017) (4)
- Distributed Consensus for Blockchains in Internet-of-Things Networks (2022) (4)
- Game Theoretic Analysis of Green Spectrum and Infrastructure Leasing on TV Bands (2017) (4)
- Theme issue on identification, information, and knowledge in the Internet of Things (2014) (4)
- Proactive Deployment of Chain-based VNF Backup at the Edge using Online Bandit Learning (2021) (4)
- An Ensemble Method of Discovering Sample Classes Using Gene Expression Profiling (2007) (4)
- An Enhanced Structure-Based De-anonymization of Online Social Networks (2016) (4)
- Crowdsourcee evaluation based on persuasion game (2019) (4)
- Extending On-Chain Trust to Off-Chain – Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE) (2021) (4)
- A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization (2016) (4)
- Majority vote based on weak classifiers (2000) (4)
- Online auction-based relay selection for cooperative communication in CR networks (2015) (4)
- Distributed Broadcasting in Dynamic Networks (2021) (3)
- Structure-Attribute-Based Social Network Deanonymization With Spectral Graph Partitioning (2022) (3)
- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs (2015) (3)
- Ampliude based compressive sensing for UWB noise radar signal (2012) (3)
- Quantum Analysis on Task Allocation and Quality Control for Crowdsourcing With Homogeneous Workers (2020) (3)
- Jamming-Resilient Message Dissemination in Wireless Networks (2023) (3)
- No Silver Bullet: Identifying Security Vulnerabilities in Anonymization Protocols for Hospital Databases (2012) (3)
- X.509 Check: A Tool to Check the Safety and Security of Digital Certificates (2015) (3)
- Wireless Algorithms, Systems, and Applications, First International Conference, WASA 2006, Xi'an, China, August 15-17, 2006, Proceedings (2006) (3)
- Attribute-Enhanced De-anonymization of Online Social Networks (2019) (3)
- DCAP: Deep Cross Attentional Product Network for User Response Prediction (2021) (3)
- Social Communications Assisted Epidemic Disease Influence Minimization (2013) (3)
- CSRF protection in JavaScript frameworks and the security of JavaScript applications (2021) (3)
- AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary (2022) (3)
- I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association (2023) (3)
- Solving the crowdsourcing dilemma using the zero-determinant strategy: poster (2016) (3)
- Extending On-chain Trust to Off-chain - A Trustworthy Vaccine Shipping Example (2021) (3)
- Latent structure models for the analysis of gene expression data (2003) (3)
- Low-Power and Low-Delay WLAN Using Wake-Up Receivers (2020) (3)
- Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks (2015) (3)
- Multi-channel selection maximizing throughput for delay-constrained multi-application secondary users in dynamic cognitive radio networks (2014) (3)
- Mobile phone based social relationship identification for target vaccination in mobile healthcare (2012) (3)
- Fault tolerant event boundary detection and target tracking in sensor networks (2008) (3)
- A Fast Consensus for Permissioned Wireless Blockchains (2021) (3)
- MILLIEAR: Millimeter-wave Acoustic Eavesdropping with Unconstrained Vocabulary (2022) (3)
- Analysis of Antagonistic Dynamics for Rumor Propagation (2019) (3)
- Spectrum Prediction for Supporting IoT Applications over 5G (2020) (3)
- Theme issue on advances in the Internet of Things: identification, information, and knowledge (2015) (3)
- Optimal Rectangular Partitions (2004) (3)
- A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model (2015) (3)
- Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments (2014) (3)
- Radar and Sonar Sensor Networks (2010) (2)
- Ad Hoc Wireless Networking (Network Theory and Applications, V. 14) (2004) (2)
- Topology Inference in Wireless Mesh Networks (2009) (2)
- SeGrid: A Secure Grid Framework for Sensor Networks (2006) (2)
- Spectrum Assignment and Sharing for Delay Minimization in Multi-Hop Multi-Flow Cognitive Radio Networks (2011) (2)
- Curb: Trusted and Scalable Software-Defined Network Control Plane for Edge Computing (2022) (2)
- Private Stochastic Convex Optimization and Sparse Learning with Heavy-tailed Data Revisited (2022) (2)
- Location-Centric Storage for On-Demand Warning in Sensor Networks (2005) (2)
- Localized Flooding Backbone Construction for Location Privacy in Sensor Networks (2007) (2)
- Vehicloak: A Blockchain-Enabled Privacy-Preserving Payment Scheme for Location-Based Vehicular Services (2022) (2)
- EM-MAC: An energy-aware multi-channel MAC protocol for multi-hop wireless networks (2012) (2)
- Implementing the Abstract MAC Layer via Inductive Coloring Under the Rayleigh-Fading Model (2021) (2)
- Quantum Game Analysis on Extrinsic Incentive Mechanisms for P2P Services (2020) (2)
- A Trustless Architecture of Blockchain-enabled Metaverse (2022) (2)
- Information, knowledge, and semantics for interacting with Internet-of-Things (2019) (2)
- Malware-on-the-Brain: Illuminating Malware Byte Codes With Images for Malware Classification (2021) (2)
- An Exact Implementation of the Abstract MAC Layer via Carrier Sensing in Dynamic Networks (2021) (2)
- New advances in data, information, and knowledge in the Internet of Things (2016) (2)
- Editorial for the special issue on routing in smart grid communication networks (2014) (1)
- AERM: An Attribute-Aware Economic Robust Spectrum Auction Mechanism (2021) (1)
- Covert communications with friendly jamming in Internet of vehicles (2022) (1)
- Reinforcement learning based adversarial malware example generation against black-box detectors (2022) (1)
- FileDAG: A Multi-Version Decentralized Storage Network Built on DAG-based Blockchain (2022) (1)
- Fully Dynamic Broadcasting under SINR (2018) (1)
- Truthful Auction Analysis and Design in Multiunit Heterogenous Spectrum Markets With Reserve Prices (2021) (1)
- Micro Analysis of Natural Forking in Blockchain Based on Large Deviation Theory (2021) (1)
- A Model-Based Approach for Outlier Detection in Sensor Networks (2011) (1)
- Enhancing Macrocell Downlink Performance through Femtocell User Cooperation (2011) (1)
- De-anonymizing Scale-Free Social Networks by Using Spectrum Partitioning Method (2018) (1)
- Malice-Aware Transaction Forwarding in Payment Channel Networks (2021) (1)
- Statistical properties of distance estimators (2006) (1)
- From Personalization to Privatization: Meta Matrix Factorization for Private Rating Predictions (2019) (1)
- Guest Editorial Special Issue on Fog Computing in the Internet of Things (2017) (1)
- Editorial for special issue on Big Data and knowledge extraction for Cyber-Physical Systems 2016 (2016) (1)
- Cap the Gap: Solving the Egoistic Dilemma under the Transaction Fee-Incentive Bitcoin (2020) (1)
- A Novel Channel Assignment Approach for Local Broadcast in Multi-radio Multi-channel Wireless Networks (2007) (1)
- Online auction-based relay selection for cooperative communication in CR networks (2014) (1)
- Controlling the Spreads of Infectious Disease and Scare via Utilizing Location and Social Networking Information (2015) (1)
- Energy-Constrained D2D Assisted Federated Learning in Edge Computing (2022) (1)
- Privacy-Aware Data Trading (2020) (1)
- Cross-Channel: Scalable Off-Chain Channels Supporting Fair and Atomic Cross-Chain Operations (2022) (1)
- Principal component analysis based data collection for sustainable internet of things enabled Cyber-Physical Systems (2021) (1)
- A survey of structural representation learning for social networks (2022) (1)
- Hopping-Proof and Fee-Free Pooled Mining in Blockchain (2019) (1)
- Guillotine Cut in Approximation Algorithms (2002) (1)
- Core-GAE: Toward Generation of IoT Networks (2022) (1)
- Relay selection based on social relationship prediction and information leakage reduction for mobile social networks (2018) (1)
- CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems (2022) (1)
- Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing (2016) (1)
- Delay modeling in mobile cognitive radio networks (2012) (1)
- SPDL: Blockchain-secured and Privacy-preserving Decentralized Learning (2022) (1)
- Intermittent jamming for eavesdropping defense in WAVE based vehicular networks (2022) (1)
- Statistical Comparisons of Multiple Classifiers (2003) (1)
- ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks (2016) (0)
- Theme issue on identification, information, and knowledge in the Internet of Things (2014) (0)
- SeGrid: A Secure Grid Infrastructure for Sensor Networks (2005) (0)
- Exact and approximate solutions of the oblique derivative problem for degenerate elliptic systems (2007) (0)
- Fast Core Maintenance in Dynamic Graphs (2022) (0)
- Simulation and Example (2018) (0)
- DUPLICATE: Electrolint and Security of Electron Applications (2021) (0)
- Egoistic Incentives Based on Zero-Determinant Alliances for Large-Scale Systems (2020) (0)
- Advances on data, information, and knowledge in the internet of things (2014) (0)
- An enhanced low overhead and stable clustering scheme for crossroads in VANETs (2016) (0)
- A novel contention-on-demand design for WiFi hotspots (2016) (0)
- Guest Editorial: Special Issue on High-Confidence City IoT for Collaborative Smart City Services (2020) (0)
- A novel verification method for payment card systems (2015) (0)
- Message from the PAC 2018 Chairs (2018) (0)
- zk-PCN: A Privacy-Preserving Payment Channel Network Using zk-SNARKs (2022) (0)
- Editorial for Crowncom 2013 Special Issue (2014) (0)
- Toward maintenance of hypercores in large-scale dynamic hypergraphs (2022) (0)
- Generous or Selfish? Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks (2022) (0)
- Message from KAMIoT Workshop Chairs (2012) (0)
- An Algorithm That Integrates Any Combination and Number of Prognostic Factors and Calculates Survival: A Lung Cancer Demonstration (2010) (0)
- Cooperative Spectrum Prediction in Multi-PU Multi-SU Cognitive Radio Networks (2014) (0)
- Fault-Tolerant Consensus with NOMA in Mobile Networks (2022) (0)
- A Transparent Correlation-Based Scheme for Energy Efficient Context Sensing and Fusion under Android Systems (2014) (0)
- Special issue on cyber security, crime, and forensics of wireless networks and applications (2015) (0)
- Collaborative Learning in General Graphs with Limited Memorization: Learnability, Complexity and Reliability (2022) (0)
- Efficient Connected Dominating Set Construction with Maximum Lifetime in the Cognitive Radio Networks (2018) (0)
- Sampling Based \delta δ -Approximate Data Aggregation in Sensor Equipped IoT Networks (2018) (0)
- Coverage adjustment for load balancing with an AP service availability guarantee in WLANs (2013) (0)
- Message from KAMIoT-2012 Workshop Chairs (2012) (0)
- Electrolint and security of electron applications (2021) (0)
- Abstract 2682: Integration of multiple prognostic factors into the TNM staging system using a new algorithm that censors patients (2010) (0)
- A coalition formation game based relay selection scheme for cooperative cognitive radio networks (2016) (0)
- DP2-Pub: Differentially Private High-Dimensional Data Publication with Invariant Post Randomization (2022) (0)
- Online Learning for Failure-aware Edge Backup of Service Function Chains with the Minimum Latency (2022) (0)
- RFC : A Robust and Fast Rate Control Scheme in IEEE 802 . 11 Wireless Networks (2007) (0)
- A Cloud-Based Framework for Verifiable Privacy-Preserving Spectrum Auction (2021) (0)
- Security in Wearable Communications (Accepted) (2016) (0)
- A Reinforcement Learning Approach for Branch Overload Relief in Power Systems (2020) (0)
- Dominating Set Theory and Algorithms (2018) (0)
- Optimal Clustering for Underwater Acoustic Sensor Networks (2010) (0)
- Poster: Perturbation Based Private Profile Matching in Social Networks (2017) (0)
- Topology Control of Wireless Networks (2018) (0)
- PPAR: A Privacy-Preserving Adaptive Ranking Algorithm for Multi-Armed-Bandit Crowdsourcing (2022) (0)
- Core Decomposition and Maintenance in Bipartite Graphs (2023) (0)
- Session details: Scheduling in wireless networks I (2009) (0)
- Impact of a Deterministic Delay in the DCA Protocol (2015) (0)
- Exploring Truss Maintenance in Fully Dynamic Graphs: A Mixed Structure-Based Approach (2023) (0)
- Personal Information Inference in Social Networks (2017) (0)
- SINR-Q-CSMA: Carrier Sense Multiple Access Based on Queue Length under SINR (2016) (0)
- Guest Editorial Introduction to the Special Section on Network Science for High-Confidence Cyber-Physical Systems (2020) (0)
- Low Price to Win: Interactive scheme in cooperative cognitive radio networks (2015) (0)
- Inaugural issue editorial (2021) (0)
- Cyber security, crime, and forensics of wireless networks and applications (2016) (0)
- Federated Learning Hyper-Parameter Tuning from a System Perspective (2022) (0)
- Compressive sensing in distributed radar sensor networks using pulse compression waveforms (2013) (0)
- Customized privacy preserving for inherent data and latent data (2016) (0)
- Message from AHUC-2006 Workshop Co-Chairs (2006) (0)
- UvA-DARE (Digital Academic Meta Matrix Factorization for Federated Rating Predictions (2020) (0)
- Initial-oblique derivative problem for nonlinear parabolic systems in high dimensional domains (2008) (0)
- Black Swan in Blockchain: Micro Analysis of Natural Forking (2022) (0)
- Analysis and optimization of delayed channel access for wireless cyber-physical systems (2016) (0)
- Cooperative Spectrum and Infrastructure Leasing on TV Bands (2015) (0)
- Efficient Fault-Tolerant Consensus for Collaborative Services in Edge Computing (2023) (0)
- Accurate Contact-Free Material Recognition with Millimeter Wave and Machine Learning (2022) (0)
- Enabling smartphone-based HD video chats by cooperative transmissions in CRNs (2015) (0)
- Towards Unconstrained Vocabulary Eavesdropping With Mmwave Radar Using GAN (2022) (0)
- DCAP (2021) (0)
- Proof of User Similarity: the Spatial Measurer of Blockchain (2022) (0)
- Energy Efficiency in Wireless Networks (2013) (0)
- OF RFID ASSISTED NAVIGATION SYSTEMS FOR VANETS 1269 TABLE 1 The Parameters for a RFID-ANS (2012) (0)
- Theme issue on advances in the Internet of Things: identification, information, and knowledge (2015) (0)
- BLOWN: A Blockchain Protocol for Wireless Networks under Adversarial SINR (2021) (0)
- Session details: Human-machine interactions, reachability, and aggregation (2013) (0)
- Crosslayer study for multipath communication in multi-radio multi-channel wireless networks: topology control and channel scheduling (2010) (0)
- Modeling Sequential Recommendation as Missing Information Imputation (2023) (0)
- Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks (2015) (0)
- Achievable transmission capacity of cognitive radio networks with cooperative relaying (2015) (0)
- Accepted from Open Call Wireless Data Center Networking Motivations for Using Wireless in Dcns (0)
- Introduction to the Special Section on Mobile Ad Hoc and Sensor Networks (2010) (0)
- In Situ Key Establishment in Large-Scale Sensor Networks (2009) (0)
- Maximal Clique Search in Weighted Graphs (2023) (0)
- Editorial for Crowncom 2013 Special Issue (2014) (0)
This paper list is powered by the following services:
Other Resources About Xiuzhen Cheng
What Schools Are Affiliated With Xiuzhen Cheng?
Xiuzhen Cheng is affiliated with the following schools: