Search the dblp DataBase
Yong Guan :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yawen Wei , Zhen Yu , Yong Guan COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] DCOSS, 2006, pp:338-355 [Conf ] Yong Guan , Xinwen Fu , Riccardo Bettati , Wei Zhao An Optimal Strategy for Anonymous Communication Protocols. [Citation Graph (0, 0)][DBLP ] ICDCS, 2002, pp:257-0 [Conf ] Anthony Persaud , Yong Guan A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:79-90 [Conf ] Jian Chen , Yong Guan , Udo W. Pooch A Spatial-Based Multi-Resolution Data Dissemination Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] Zhen Yu , Yong Guan A key pre-distribution scheme using deployment knowledge for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] IPSN, 2005, pp:261-268 [Conf ] Jian Chen , Yong Guan , Udo W. Pooch Customizing a Geographical Routing Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:586-591 [Conf ] William Sears , Zhen Yu , Yong Guan An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP ] NCA, 2005, pp:13-20 [Conf ] Zhen Yu , Yong Guan A dynamic en-route scheme for filtering false data injection in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2005, pp:294-295 [Conf ] Jianqiang Xin , Linfeng Zhang , Brad Aswegan , John Dickerson , Julie A. Dickerson , Thomas Daniels , Yong Guan A testbed for evaluation and analysis of stepping stone attack attribution techniques. [Citation Graph (0, 0)][DBLP ] TRIDENTCOM, 2006, pp:- [Conf ] Peng Li , Yong Guan , Bo Xu , Wenju Liu Monaural Speech Separation Based on Computational Auditory Scene Analysis and Objective Quality Assessment of Speech. [Citation Graph (0, 0)][DBLP ] ICICIC (2), 2006, pp:742-745 [Conf ] Haoli Wang , Joel Cardo , Yong Guan Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2005, v:28, n:14, pp:1618-1630 [Journal ] Daniel Berleant , Mei-Peng Cheong , Chris C. N. Chu , Yong Guan , Ahmed Kamal , Gerald Shedblé , Scott Ferson , James F. Peters Dependable Handling of Uncertainty. [Citation Graph (0, 0)][DBLP ] Reliable Computing, 2003, v:9, n:6, pp:407-418 [Journal ] Yong Guan , Xinwen Fu , Dong Xuan , P. U. Shenoy , Riccardo Bettati , Wei Zhao NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:253-265 [Journal ] Yawen Wei , Zhen Yu , Yong Guan Location Verification Algorithms forWireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICDCS, 2007, pp:70- [Conf ] Zhen Yu , Yong Guan A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Linfeng Zhang , Yong Guan Variance estimation over sliding windows. [Citation Graph (0, 0)][DBLP ] PODS, 2007, pp:225-232 [Conf ] Yong Guan , Xinwen Fu , Riccardo Bettati , Wei Zhao A quantitative analysis of anonymous communications. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Reliability, 2004, v:53, n:1, pp:103-115 [Journal ] An Effective Method for Combating Malicious Scripts Clickbots. [Citation Graph (, )][DBLP ] Embedded Sensor of Forecast Conveyer Belt Breaks. [Citation Graph (, )][DBLP ] Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks. [Citation Graph (, )][DBLP ] Lightweight Secure Search Protocols for Low-cost RFID Systems. [Citation Graph (, )][DBLP ] Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection. [Citation Graph (, )][DBLP ] Frequency Estimation over Sliding Windows. [Citation Graph (, )][DBLP ] Collusion Detection Using Multimedia Fingerprints. [Citation Graph (, )][DBLP ] An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks. [Citation Graph (, )][DBLP ] An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks. [Citation Graph (, )][DBLP ] Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. [Citation Graph (, )][DBLP ] RNFTL: a reuse-aware NAND flash translation layer for flash memory. [Citation Graph (, )][DBLP ] Detection of stepping stone attack under delay and chaff perturbations. [Citation Graph (, )][DBLP ] Research and Design of Digital Synthesizer Based on MATLAB. [Citation Graph (, )][DBLP ] Scattered Points Denoising of TC-Bezier Surface Fitting. [Citation Graph (, )][DBLP ] Pre-Processing of X-Ray Medical Image Based on Improved Temporal Recursive Self-Adaptive Filter. [Citation Graph (, )][DBLP ] Application in Market Basket Research Based on FP-Growth Algorithm. [Citation Graph (, )][DBLP ] Sale Decision-Making Model of United Operation between Hydropower and Thermal Power Considering Uncertain Factors. [Citation Graph (, )][DBLP ] Trigonometric polynomial uniform B-spline surface with shape parameter. [Citation Graph (, )][DBLP ] Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm. [Citation Graph (, )][DBLP ] Research and Design of On-board Dynamic Reconfigurable Router. [Citation Graph (, )][DBLP ] Hyperbolic polynomial uniform B-spline curves and surfaces with shape parameter. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.327secs