| 2008 |
| 13 | EE | Yong Sheng,
Keren Tan,
Guanling Chen,
David Kotz,
Andrew Campbell:
Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength.
INFOCOM 2008: 1768-1776 |
| 12 | EE | Guanling Chen,
Prabhu Govindaswamy,
Nan Li,
Jie Wang:
Continuous camera-based monitoring for assistive environments.
PETRA 2008: 31 |
| 11 | EE | Yi Ouyang,
Yurong Xu,
Zhengyi Le,
Guanling Chen,
Fillia Makedon:
Providing location privacy in assisted living environments.
PETRA 2008: 39 |
| 10 | EE | Guanling Chen,
Ming Li,
David Kotz:
Data-centric middleware for context-aware pervasive computing.
Pervasive and Mobile Computing 4(2): 216-253 (2008) |
| 2007 |
| 9 | EE | Hongda Yin,
Guanling Chen,
Jie Wang:
Detecting protected layer-3 rogue APs.
BROADNETS 2007: 449-458 |
| 8 | EE | Yurong Xu,
Guanling Chen,
James Ford,
Fillia Makedon:
Detecting Wormhole Attacks in Wireless Sensor Networks.
Critical Infrastructure Protection 2007: 267-279 |
| 2006 |
| 7 | EE | Guanling Chen,
Robert S. Gray:
Simulating non-scanning worms on peer-to-peer networks.
Infoscale 2006: 29 |
| 6 | EE | Yi Ouyang,
Zhengyi Le,
Guanling Chen,
James Ford,
Fillia Makedon:
Entrapping Adversaries for Source Protection in Sensor Networks.
WOWMOM 2006: 23-34 |
| 2005 |
| 5 | EE | Guanling Chen,
David Kotz:
Policy-Driven Data Dissemination for Context-Aware Applications.
PerCom 2005: 283-289 |
| 2004 |
| 4 | EE | Guanling Chen,
David Kotz:
Dependency Management in Distributed Settings.
ICAC 2004: 272-273 |
| 3 | EE | Guanling Chen,
Ming Li,
David Kotz:
Design and Implementation of a Large-Scale Context Fusion Network.
MobiQuitous 2004: 246-255 |
| 2003 |
| 2 | EE | Guanling Chen,
David Kotz:
Context-Sensitive Resource Discovery.
PerCom 2003: 243-252 |
| 2002 |
| 1 | EE | Guanling Chen,
David Kotz:
Context Aggregation and Dissemination in Ubiquitous Computing Systems.
WMCSA 2002: 105- |