The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yingying Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin
    The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study. [Citation Graph (0, 0)][DBLP]
    DCOSS, 2006, pp:546-563 [Conf]
  2. Yingying Chen, John-Austen Francisco, Konstantinos Kleisouris, Hongyi Xue, Richard P. Martin, Eiman Elnahrawy, Xiaoyan Li
    GRAIL: general real-time adaptable indoor localization. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:351-352 [Conf]
  3. Yingying Chen, Wade Trappe, Richard P. Martin
    Attack Detection in Wireless Localization. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1964-1972 [Conf]

  4. Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks. [Citation Graph (, )][DBLP]


  5. Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges. [Citation Graph (, )][DBLP]


  6. IP Hierarchy Stack: A New Network Architecture. [Citation Graph (, )][DBLP]


  7. A Virtual Private Overlay Network Model. [Citation Graph (, )][DBLP]


  8. ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks. [Citation Graph (, )][DBLP]


  9. Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks. [Citation Graph (, )][DBLP]


  10. Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments. [Citation Graph (, )][DBLP]


  11. A theoretical analysis of wireless localization using RF-based fingerprint matching. [Citation Graph (, )][DBLP]


  12. ADLS: Attack Detection for Wireless Localization Using Least Squares. [Citation Graph (, )][DBLP]


  13. Exploiting Environmental Properties for Wireless Localization and Location Aware Applications. [Citation Graph (, )][DBLP]


  14. Localizing Jammers in Wireless Networks. [Citation Graph (, )][DBLP]


  15. Exploiting various information for knowledge element relation recognition. [Citation Graph (, )][DBLP]


  16. Indoor Localization Using Improved RSS-Based Lateration Methods. [Citation Graph (, )][DBLP]


  17. The Impact of Using Multiple Antennas on Wireless Localization. [Citation Graph (, )][DBLP]


  18. Detecting and Localizing Wireless Spoofing Attacks. [Citation Graph (, )][DBLP]


  19. MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks. [Citation Graph (, )][DBLP]


  20. The concept of decentralized and secure electronic marketplace. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002