The SCEAS System
Navigation Menu

Search the dblp DataBase


Lei Guang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lei Guang, Chadi Assi, Abderrahim Benslimane
    Interlayer Attacks in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:436-448 [Conf]
  2. Lei Guang, Chadi Assi, Abderrahim Benslimane
    Modeling and analysis of predictable random backoff in selfish environments. [Citation Graph (0, 0)][DBLP]
    MSWiM, 2006, pp:86-90 [Conf]
  3. Lei Guang, Chadi Assi
    On the resiliency of mobile ad hoc networks to MAC layer misbehavior. [Citation Graph (0, 0)][DBLP]
    PE-WASUN, 2005, pp:160-167 [Conf]
  4. Lei Guang, Chadi Assi
    Cross-Layer Cooperation to Handle MAC Misbehavior in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    CCECE, 2006, pp:219-222 [Conf]
  5. Lei Guang, Chadi Assi, Yinghua Ye
    DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:8, pp:1841-1853 [Journal]

  6. A Confident Community to Secure Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  7. A Study on the Binary Exponential Backoff in Noisy and Heterogeneous Environment. [Citation Graph (, )][DBLP]

Search in 0.018secs, Finished in 0.018secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002