The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yong Guan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yawen Wei, Zhen Yu, Yong Guan
    COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DCOSS, 2006, pp:338-355 [Conf]
  2. Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
    An Optimal Strategy for Anonymous Communication Protocols. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:257-0 [Conf]
  3. Anthony Persaud, Yong Guan
    A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:79-90 [Conf]
  4. Jian Chen, Yong Guan, Udo W. Pooch
    A Spatial-Based Multi-Resolution Data Dissemination Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  5. Zhen Yu, Yong Guan
    A key pre-distribution scheme using deployment knowledge for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2005, pp:261-268 [Conf]
  6. Jian Chen, Yong Guan, Udo W. Pooch
    Customizing a Geographical Routing Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:586-591 [Conf]
  7. William Sears, Zhen Yu, Yong Guan
    An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:13-20 [Conf]
  8. Zhen Yu, Yong Guan
    A dynamic en-route scheme for filtering false data injection in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2005, pp:294-295 [Conf]
  9. Jianqiang Xin, Linfeng Zhang, Brad Aswegan, John Dickerson, Julie A. Dickerson, Thomas Daniels, Yong Guan
    A testbed for evaluation and analysis of stepping stone attack attribution techniques. [Citation Graph (0, 0)][DBLP]
    TRIDENTCOM, 2006, pp:- [Conf]
  10. Peng Li, Yong Guan, Bo Xu, Wenju Liu
    Monaural Speech Separation Based on Computational Auditory Scene Analysis and Objective Quality Assessment of Speech. [Citation Graph (0, 0)][DBLP]
    ICICIC (2), 2006, pp:742-745 [Conf]
  11. Haoli Wang, Joel Cardo, Yong Guan
    Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:14, pp:1618-1630 [Journal]
  12. Daniel Berleant, Mei-Peng Cheong, Chris C. N. Chu, Yong Guan, Ahmed Kamal, Gerald Shedblé, Scott Ferson, James F. Peters
    Dependable Handling of Uncertainty. [Citation Graph (0, 0)][DBLP]
    Reliable Computing, 2003, v:9, n:6, pp:407-418 [Journal]
  13. Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao
    NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:253-265 [Journal]
  14. Yawen Wei, Zhen Yu, Yong Guan
    Location Verification Algorithms forWireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:70- [Conf]
  15. Zhen Yu, Yong Guan
    A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  16. Linfeng Zhang, Yong Guan
    Variance estimation over sliding windows. [Citation Graph (0, 0)][DBLP]
    PODS, 2007, pp:225-232 [Conf]
  17. Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
    A quantitative analysis of anonymous communications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2004, v:53, n:1, pp:103-115 [Journal]

  18. An Effective Method for Combating Malicious Scripts Clickbots. [Citation Graph (, )][DBLP]


  19. Embedded Sensor of Forecast Conveyer Belt Breaks. [Citation Graph (, )][DBLP]


  20. Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks. [Citation Graph (, )][DBLP]


  21. Lightweight Secure Search Protocols for Low-cost RFID Systems. [Citation Graph (, )][DBLP]


  22. Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection. [Citation Graph (, )][DBLP]


  23. Frequency Estimation over Sliding Windows. [Citation Graph (, )][DBLP]


  24. Collusion Detection Using Multimedia Fingerprints. [Citation Graph (, )][DBLP]


  25. An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks. [Citation Graph (, )][DBLP]


  26. An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks. [Citation Graph (, )][DBLP]


  27. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. [Citation Graph (, )][DBLP]


  28. RNFTL: a reuse-aware NAND flash translation layer for flash memory. [Citation Graph (, )][DBLP]


  29. Detection of stepping stone attack under delay and chaff perturbations. [Citation Graph (, )][DBLP]


  30. Research and Design of Digital Synthesizer Based on MATLAB. [Citation Graph (, )][DBLP]


  31. Scattered Points Denoising of TC-Bezier Surface Fitting. [Citation Graph (, )][DBLP]


  32. Pre-Processing of X-Ray Medical Image Based on Improved Temporal Recursive Self-Adaptive Filter. [Citation Graph (, )][DBLP]


  33. Application in Market Basket Research Based on FP-Growth Algorithm. [Citation Graph (, )][DBLP]


  34. Sale Decision-Making Model of United Operation between Hydropower and Thermal Power Considering Uncertain Factors. [Citation Graph (, )][DBLP]


  35. Trigonometric polynomial uniform B-spline surface with shape parameter. [Citation Graph (, )][DBLP]


  36. Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm. [Citation Graph (, )][DBLP]


  37. Research and Design of On-board Dynamic Reconfigurable Router. [Citation Graph (, )][DBLP]


  38. Hyperbolic polynomial uniform B-spline curves and surfaces with shape parameter. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.327secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002