The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jing Deng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jing Deng, Yunghsiang S. Han, Zygmunt J. Haas
    Analyzing Split Channel Medium Access Control Schemas with ALOHA Reservation. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2003, pp:128-139 [Conf]
  2. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney
    A pairwise key pre-distribution scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:42-51 [Conf]
  3. Jing Deng, Richard Han, Shivakant Mishra
    Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:637-0 [Conf]
  4. Irving Dindoyal, Tryphon Lambrou, Jing Deng, Cliff F. Ruff, A. D. Linney, C. H. Rodeck, Andrew Todd-Pokropek
    Level Set Segmentation of the Fetal Heart. [Citation Graph (0, 0)][DBLP]
    FIMH, 2005, pp:123-132 [Conf]
  5. Jing Deng, Chi-Hung Chi
    Local Web Advertisement Through Dynamic Active Proxy. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (II), 2000, pp:1183-1186 [Conf]
  6. Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, Pramod K. Varshney
    A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  7. Jing Deng, Richard Han, Shivakant Mishra
    A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2003, pp:349-364 [Conf]
  8. Jing Deng, Richard Han, Shivakant Mishra
    Secure code distribution in dynamically programmable wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2006, pp:292-300 [Conf]
  9. Thomas Fang Zheng, Zhanjiang Song, Lihong Zhang, Michael Brasser, Wei Wu, Jing Deng
    CCC Speaker Recognition Evaluation 2006: Overview, Methods, Data, Results and Perspective. [Citation Graph (0, 0)][DBLP]
    ISCSLP, 2006, pp:485-493 [Conf]
  10. Jing Deng, Thomas Fang Zheng, Wenhu Wu
    UBM Based Speaker Segmentation and Clustering for 2-Speaker Detection. [Citation Graph (0, 0)][DBLP]
    ISCSLP, 2006, pp:116-125 [Conf]
  11. Jing Deng, Yunghsiang S. Han
    Using MDS Codes for the Key Establishment of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:732-744 [Conf]
  12. Jieying Zhou, Simeng Wang, Jing Deng, Hongda Feng
    ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:113-122 [Conf]
  13. Jing Deng, Richard Han, Shivakant Mishra
    Efficiently Authenticating Code Images in Dynamically ReprogrammedWireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:272-276 [Conf]
  14. Jing Deng, Richard Han, Shivakant Mishra
    Security support for in-network processing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:83-93 [Conf]
  15. Jing Deng, Richard Han, Shivakant Mishra
    Defending against path-based DoS attacks in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:89-96 [Conf]
  16. Hector Abrach, Shah Bhatti, James Carlson, Hui Dai, Jeff Rose, Anmol Sheth, Brian Shucker, Jing Deng, Richard Han
    mantis - system supports for multimodAl neTworks on in-situ sensors. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:336-337 [Conf]
  17. Defeng Chen, Thomas Fang Zheng, Jian Liu, Jing Deng, Wenhu Wu, Zhanjiang Song, Xunyi Zhou
    The dynamically-adjustable histogram pruning method for embedded voice dialing. [Citation Graph (0, 0)][DBLP]
    SIP, 2005, pp:45-50 [Conf]
  18. Chi-Hung Chi, Jing Deng, Yan-Hong Lim
    Compression Proxy Server: Design and Implementation. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf]
  19. Sunil Kumar, Vineet S. Raghavan, Jing Deng
    Medium Access Control protocols for ad hoc wireless networks: A survey. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2006, v:4, n:3, pp:326-358 [Journal]
  20. Chi-Hung Chi, Yan-Hong Lin, Jing Deng, Xiang Li, Tat-Seng Chua
    Automatic proxy-based watermarking for WWW. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2001, v:24, n:2, pp:144-154 [Journal]
  21. Jing Deng, Yunghsiang S. Han, Wendi Beth Heinzelman, Pramod K. Varshney
    Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:14, pp:1631-1642 [Journal]
  22. Jing Deng, Richard Han, Shivakant Mishra
    INSENS: Intrusion-tolerant routing for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:216-230 [Journal]
  23. Jing Deng, Yunghsiang S. Han, Wendi Rabiner Heinzelman, Pramod K. Varshney
    Scheduling Sleeping Nodes in High Density Cluster-based Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2005, v:10, n:6, pp:825-835 [Journal]
  24. Shah Bhatti, James Carlson, Hui Dai, Jing Deng, Jeff Rose, Anmol Sheth, Brian Shucker, Charles Gruenwald, Adam Torgerson, Richard Han
    MANTIS OS: An Embedded Multithreaded Operating System for Wireless Micro Sensor Platforms. [Citation Graph (0, 0)][DBLP]
    MONET, 2005, v:10, n:4, pp:563-579 [Journal]
  25. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney
    A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:62-77 [Journal]
  26. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili
    A pairwise key predistribution scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:2, pp:228-258 [Journal]
  27. Zhenghong Wang, Jing Deng, Ruby B. Lee
    Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2531-2535 [Conf]
  28. Jing Deng, Yi Qian
    The Head-of-Line Blocking Problem on Exposed Terminals in MANETs. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  29. Kejun Liu, Jing Deng, Pramod K. Varshney, Kashyap Balakrishnan
    An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:5, pp:536-550 [Journal]

  30. Level Set Snake Algorithms on the Fetal Heart. [Citation Graph (, )][DBLP]


  31. Key Establishment in Multi-core Parallel Systems. [Citation Graph (, )][DBLP]


  32. Energy Efficient DNA-Based Scheduling Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  33. Modelling the Effects of Operating Conditions on Motor Power Consumption in Single Screw Extrusion. [Citation Graph (, )][DBLP]


  34. Fast Forward RBF Network Construction Based on Particle Swarm Optimization. [Citation Graph (, )][DBLP]


  35. Improved Nonlinear PCA Based on RBF Networks and Principal Curves. [Citation Graph (, )][DBLP]


  36. Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  37. Failure Rate Minimization with Multiple Function Unit Scheduling for Heterogeneous WSNs. [Citation Graph (, )][DBLP]


  38. Jamming ACK Attack to Wireless Networks and a Mitigation Approach. [Citation Graph (, )][DBLP]


  39. Fairness Index Based on Variational Distance. [Citation Graph (, )][DBLP]


  40. A fault tolerant and energy efficient routing protocol for urban sensor networks. [Citation Graph (, )][DBLP]


  41. MANTIS: system support for multimodAl NeTworks of in-situ sensors. [Citation Graph (, )][DBLP]


  42. Fault Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks. [Citation Graph (, )][DBLP]


  43. Self-Fulfillment of Expectation in a Country Fair Model. [Citation Graph (, )][DBLP]


  44. Design and construction of spatial database for internal elements of urban based on TGIS. [Citation Graph (, )][DBLP]


  45. On search sets of expanding ring search in wireless networks. [Citation Graph (, )][DBLP]


  46. Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks. [Citation Graph (, )][DBLP]


Search in 0.013secs, Finished in 0.016secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002