The SCEAS System
Navigation Menu

Search the dblp DataBase


Weichao Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jianxue Wang, Weichao Wang, Xifan Wang, Haoyong Chen, Xiuli Wang
    Cooperative Co-evolutionary Approach Applied in Reactive Power Optimization of Power System. [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2006, pp:620-628 [Conf]
  2. Yi Lu, Weichao Wang, Yuhui Zhong, Bharat K. Bhargava
    Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    PerCom, 2003, pp:187-194 [Conf]
  3. Weichao Wang, Yi Lu, Bharat K. Bhargava
    On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    PerCom, 2003, pp:179-186 [Conf]
  4. Weichao Wang, Bharat K. Bhargava
    Key distribution and update for secure inter-group multicast communication. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:43-52 [Conf]
  5. Weichao Wang, Aidong Lu
    Visualization assisted detection of sybil attacks in wireless networks. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2006, pp:51-60 [Conf]
  6. Weichao Wang, Bharat K. Bhargava
    Visualization of wormholes in sensor networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:51-60 [Conf]
  7. Bharat K. Bhargava, Xiaoxin Wu, Yi Lu, Weichao Wang
    Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA). [Citation Graph (0, 0)][DBLP]
    MONET, 2004, v:9, n:4, pp:393-408 [Journal]
  8. Yi Lu, Weichao Wang, B. Bhargava, Dongyan Xu
    Trust-based privacy preservation for peer-to-peer data sharing. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2006, v:36, n:3, pp:498-502 [Journal]
  9. Weichao Wang, Bharat K. Bhargava, Yi Lu, Xiaoxin Wu
    Defending against wormhole attacks in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:483-503 [Journal]
  10. Weichao Wang, Tylor Stransky
    Stateless key distribution for secure intra and inter-group multicast in mobile wireless network. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:15, pp:4303-4321 [Journal]

  11. Secure Group-Based Information Sharing in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  12. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002