2008 |
26 | EE | Yong Guan,
Jie Zhang,
Yuanyuan Shang,
Minhua Wu,
Xumin Liu:
Embedded Sensor of Forecast Conveyer Belt Breaks.
FSKD (5) 2008: 617-621 |
25 | EE | Linfeng Zhang,
Yong Guan:
Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks.
ICDCS 2008: 77-84 |
24 | EE | Linfeng Zhang,
Yong Guan:
Frequency Estimation over Sliding Windows.
ICDE 2008: 1385-1387 |
23 | EE | Hong Zhu,
Weizhen Sun,
Minhua Wu,
Guixia Guan,
Yong Guan:
Pre-Processing of X-Ray Medical Image Based on Improved Temporal Recursive Self-Adaptive Filter.
ICYCS 2008: 758-763 |
22 | EE | Zhen Yu,
Yawen Wei,
Bhuvaneswari Ramkumar,
Yong Guan:
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks.
INFOCOM 2008: 1409-1417 |
21 | EE | Chunjing Mao,
Yong Guan,
Yongmei Liu:
Research and Design of Digital Synthesizer Based on MATLAB.
ISICA 2008: 849-857 |
20 | EE | Zhen Yu,
Yong Guan:
A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst. 19(10): 1411-1425 (2008) |
2007 |
19 | EE | Yawen Wei,
Zhen Yu,
Yong Guan:
Location Verification Algorithms forWireless Sensor Networks.
ICDCS 2007: 70 |
18 | EE | Linfeng Zhang,
Yong Guan:
Variance estimation over sliding windows.
PODS 2007: 225-232 |
2006 |
17 | EE | Yawen Wei,
Zhen Yu,
Yong Guan:
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks.
DCOSS 2006: 338-355 |
16 | EE | Peng Li,
Yong Guan,
Bo Xu,
Wenju Liu:
Monaural Speech Separation Based on Computational Auditory Scene Analysis and Objective Quality Assessment of Speech.
ICICIC (2) 2006: 742-745 |
15 | | Anthony G. Persaud,
Yong Guan:
Collusion Detection Using Multimedia Fingerprints.
IFIP Int. Conf. Digital Forensics 2006: 105-118 |
14 | EE | Zhen Yu,
Yong Guan:
A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks.
INFOCOM 2006 |
13 | EE | Linfeng Zhang,
Anthony G. Persaud,
Alan Johnson,
Yong Guan:
Detection of stepping stone attack under delay and chaff perturbations.
IPCCC 2006 |
12 | | Jianqiang Xin,
Linfeng Zhang,
Brad Aswegan,
John Dickerson,
Julie A. Dickerson,
Thomas Daniels,
Yong Guan:
A testbed for evaluation and analysis of stepping stone attack attribution techniques.
TRIDENTCOM 2006 |
2005 |
11 | | Anthony G. Persaud,
Yong Guan:
A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery.
IFIP Int. Conf. Digital Forensics 2005: 79-90 |
10 | EE | Jian Chen,
Yong Guan,
Udo W. Pooch:
A Spatial-Based Multi-Resolution Data Dissemination Scheme for Wireless Sensor Networks.
IPDPS 2005 |
9 | EE | Zhen Yu,
Yong Guan:
A key pre-distribution scheme using deployment knowledge for wireless sensor networks.
IPSN 2005: 261-268 |
8 | EE | Jian Chen,
Yong Guan,
Udo W. Pooch:
Customizing a Geographical Routing Protocol for Wireless Sensor Networks.
ITCC (2) 2005: 586-591 |
7 | EE | William Sears,
Zhen Yu,
Yong Guan:
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications.
NCA 2005: 13-20 |
6 | EE | Zhen Yu,
Yong Guan:
A dynamic en-route scheme for filtering false data injection in wireless sensor networks.
SenSys 2005: 294-295 |
5 | EE | Haoli Wang,
Joel Cardo,
Yong Guan:
Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs.
Computer Communications 28(14): 1618-1630 (2005) |
2004 |
4 | EE | Yong Guan,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
A quantitative analysis of anonymous communications.
IEEE Transactions on Reliability 53(1): 103-115 (2004) |
2003 |
3 | EE | Daniel Berleant,
Mei-Peng Cheong,
Chris C. N. Chu,
Yong Guan,
Ahmed Kamal,
Gerald Shedblé,
Scott Ferson,
James F. Peters:
Dependable Handling of Uncertainty.
Reliable Computing 9(6): 407-418 (2003) |
2002 |
2 | EE | Yong Guan,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
An Optimal Strategy for Anonymous Communication Protocols.
ICDCS 2002: 257- |
2001 |
1 | | Yong Guan,
Xinwen Fu,
Dong Xuan,
P. U. Shenoy,
Riccardo Bettati,
Wei Zhao:
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(4): 253-265 (2001) |