Search the dblp DataBase
Jing Deng :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jing Deng , Yunghsiang S. Han , Zygmunt J. Haas Analyzing Split Channel Medium Access Control Schemas with ALOHA Reservation. [Citation Graph (0, 0)][DBLP ] ADHOC-NOW, 2003, pp:128-139 [Conf ] Wenliang Du , Jing Deng , Yunghsiang S. Han , Pramod K. Varshney A pairwise key pre-distribution scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:42-51 [Conf ] Jing Deng , Richard Han , Shivakant Mishra Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:637-0 [Conf ] Irving Dindoyal , Tryphon Lambrou , Jing Deng , Cliff F. Ruff , A. D. Linney , C. H. Rodeck , Andrew Todd-Pokropek Level Set Segmentation of the Fetal Heart. [Citation Graph (0, 0)][DBLP ] FIMH, 2005, pp:123-132 [Conf ] Jing Deng , Chi-Hung Chi Local Web Advertisement Through Dynamic Active Proxy. [Citation Graph (0, 0)][DBLP ] IEEE International Conference on Multimedia and Expo (II), 2000, pp:1183-1186 [Conf ] Wenliang Du , Jing Deng , Yunghsiang S. Han , Shigang Chen , Pramod K. Varshney A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2004, pp:- [Conf ] Jing Deng , Richard Han , Shivakant Mishra A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] IPSN, 2003, pp:349-364 [Conf ] Jing Deng , Richard Han , Shivakant Mishra Secure code distribution in dynamically programmable wireless sensor networks. [Citation Graph (0, 0)][DBLP ] IPSN, 2006, pp:292-300 [Conf ] Thomas Fang Zheng , Zhanjiang Song , Lihong Zhang , Michael Brasser , Wei Wu , Jing Deng CCC Speaker Recognition Evaluation 2006: Overview, Methods, Data, Results and Perspective. [Citation Graph (0, 0)][DBLP ] ISCSLP, 2006, pp:485-493 [Conf ] Jing Deng , Thomas Fang Zheng , Wenhu Wu UBM Based Speaker Segmentation and Clustering for 2-Speaker Detection. [Citation Graph (0, 0)][DBLP ] ISCSLP, 2006, pp:116-125 [Conf ] Jing Deng , Yunghsiang S. Han Using MDS Codes for the Key Establishment of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] MSN, 2005, pp:732-744 [Conf ] Jieying Zhou , Simeng Wang , Jing Deng , Hongda Feng ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] MSN, 2005, pp:113-122 [Conf ] Jing Deng , Richard Han , Shivakant Mishra Efficiently Authenticating Code Images in Dynamically ReprogrammedWireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2006, pp:272-276 [Conf ] Jing Deng , Richard Han , Shivakant Mishra Security support for in-network processing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] SASN, 2003, pp:83-93 [Conf ] Jing Deng , Richard Han , Shivakant Mishra Defending against path-based DoS attacks in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] SASN, 2005, pp:89-96 [Conf ] Hector Abrach , Shah Bhatti , James Carlson , Hui Dai , Jeff Rose , Anmol Sheth , Brian Shucker , Jing Deng , Richard Han mantis - system supports for m ultimodA l n eT works on in-situ sensors. [Citation Graph (0, 0)][DBLP ] SenSys, 2003, pp:336-337 [Conf ] Defeng Chen , Thomas Fang Zheng , Jian Liu , Jing Deng , Wenhu Wu , Zhanjiang Song , Xunyi Zhou The dynamically-adjustable histogram pruning method for embedded voice dialing. [Citation Graph (0, 0)][DBLP ] SIP, 2005, pp:45-50 [Conf ] Chi-Hung Chi , Jing Deng , Yan-Hong Lim Compression Proxy Server: Design and Implementation. [Citation Graph (0, 0)][DBLP ] USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf ] Sunil Kumar , Vineet S. Raghavan , Jing Deng Medium Access Control protocols for ad hoc wireless networks: A survey. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2006, v:4, n:3, pp:326-358 [Journal ] Chi-Hung Chi , Yan-Hong Lin , Jing Deng , Xiang Li , Tat-Seng Chua Automatic proxy-based watermarking for WWW. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2001, v:24, n:2, pp:144-154 [Journal ] Jing Deng , Yunghsiang S. Han , Wendi Beth Heinzelman , Pramod K. Varshney Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2005, v:28, n:14, pp:1631-1642 [Journal ] Jing Deng , Richard Han , Shivakant Mishra INSENS: Intrusion-tolerant routing for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:2, pp:216-230 [Journal ] Jing Deng , Yunghsiang S. Han , Wendi Rabiner Heinzelman , Pramod K. Varshney Scheduling Sleeping Nodes in High Density Cluster-based Sensor Networks. [Citation Graph (0, 0)][DBLP ] MONET, 2005, v:10, n:6, pp:825-835 [Journal ] Shah Bhatti , James Carlson , Hui Dai , Jing Deng , Jeff Rose , Anmol Sheth , Brian Shucker , Charles Gruenwald , Adam Torgerson , Richard Han MANTIS OS: An Embedded Multithreaded Operating System for Wireless Micro Sensor Platforms. [Citation Graph (0, 0)][DBLP ] MONET, 2005, v:10, n:4, pp:563-579 [Journal ] Wenliang Du , Jing Deng , Yunghsiang S. Han , Pramod K. Varshney A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:62-77 [Journal ] Wenliang Du , Jing Deng , Yunghsiang S. Han , Pramod K. Varshney , Jonathan Katz , Aram Khalili A pairwise key predistribution scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:2, pp:228-258 [Journal ] Zhenghong Wang , Jing Deng , Ruby B. Lee Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:2531-2535 [Conf ] Jing Deng , Yi Qian The Head-of-Line Blocking Problem on Exposed Terminals in MANETs. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Kejun Liu , Jing Deng , Pramod K. Varshney , Kashyap Balakrishnan An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2007, v:6, n:5, pp:536-550 [Journal ] Level Set Snake Algorithms on the Fetal Heart. [Citation Graph (, )][DBLP ] Key Establishment in Multi-core Parallel Systems. [Citation Graph (, )][DBLP ] Energy Efficient DNA-Based Scheduling Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Modelling the Effects of Operating Conditions on Motor Power Consumption in Single Screw Extrusion. [Citation Graph (, )][DBLP ] Fast Forward RBF Network Construction Based on Particle Swarm Optimization. [Citation Graph (, )][DBLP ] Improved Nonlinear PCA Based on RBF Networks and Principal Curves. [Citation Graph (, )][DBLP ] Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Failure Rate Minimization with Multiple Function Unit Scheduling for Heterogeneous WSNs. [Citation Graph (, )][DBLP ] Jamming ACK Attack to Wireless Networks and a Mitigation Approach. [Citation Graph (, )][DBLP ] Fairness Index Based on Variational Distance. [Citation Graph (, )][DBLP ] A fault tolerant and energy efficient routing protocol for urban sensor networks. [Citation Graph (, )][DBLP ] MANTIS: system support for multimodAl NeTworks of in-situ sensors. [Citation Graph (, )][DBLP ] Fault Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks. [Citation Graph (, )][DBLP ] Self-Fulfillment of Expectation in a Country Fair Model. [Citation Graph (, )][DBLP ] Design and construction of spatial database for internal elements of urban based on TGIS. [Citation Graph (, )][DBLP ] On search sets of expanding ring search in wireless networks. [Citation Graph (, )][DBLP ] Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.007secs