2008 |
36 | EE | Lei Tang,
Susan V. Vrbsky,
Xiaoyan Hong:
Collaborated Camouflaging Mobility for Mobile Privacy.
GLOBECOM 2008: 2154-2158 |
35 | | Dana Steil,
Xiaoyan Hong:
A Trooper Selection Strategy on a Milepost Network.
ICWN 2008: 241-247 |
34 | EE | Lei Tang,
Xiaoyan Hong,
Bo Gu:
A locally-optimizing approach for multichannel assignment and routing.
IPDPS 2008: 1-8 |
33 | EE | Lei Tang,
Xiaoyan Hong,
Susan V. Vrbsky:
Camouflaging mobility for itinerary privacy in mobile ad-hoc networks.
WOWMOM 2008: 1-7 |
32 | EE | Ming Lei,
Susan V. Vrbsky,
Xiaoyan Hong:
An on-line replication strategy to increase availability in Data Grids.
Future Generation Comp. Syst. 24(2): 85-98 (2008) |
31 | EE | Xiaoxin Wu,
Jun Liu,
Xiaoyan Hong,
Elisa Bertino:
Anonymous Geo-Forwarding in MANETs through Location Cloaking.
IEEE Trans. Parallel Distrib. Syst. 19(10): 1297-1309 (2008) |
30 | EE | Qunwei Zheng,
Xiaoyan Hong,
Pu Wang,
Lei Tang,
Jun Liu:
Delay management in delay-tolerant networks.
Int. Journal of Network Management 18(6): 521-537 (2008) |
29 | EE | Lei Tang,
Xiaoyan Hong,
Phillip G. Bradford:
Privacy-preserving secure relative localization in vehicular networks.
Security and Communication Networks 1(3): 195-204 (2008) |
2007 |
28 | EE | Qunwei Zheng,
Sibabrata Ray,
Xiaoyan Hong,
Lei Tang,
Li Gao:
Integrity and its applications.
ACM Southeast Regional Conference 2007: 350-354 |
27 | EE | Jiejun Kong,
Xiaoyan Hong,
Dapeng Wu,
Mario Gerla:
Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks.
BIBE 2007: 914-921 |
26 | EE | Lei Tang,
Qunwei Zheng,
Jun Liu,
Xiaoyan Hong:
SMART: A selective controlled-flooding routing for delay tolerant networks.
BROADNETS 2007: 356-365 |
25 | EE | Qunwei Zheng,
Xiaoyan Hong,
Jun Liu,
Lei Tang:
A Secure Data Transmission Scheme for Mobile Ad Hoc Networks.
GLOBECOM 2007: 1006-1010 |
24 | EE | Ming Lei,
Xiaoyan Hong,
Susan V. Vrbsky:
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks.
GLOBECOM 2007: 49-53 |
23 | EE | Daniel A. Ray,
Charles B. Ward,
Bogdan Munteanu,
Jonathan Blackwell,
Xiaoyan Hong,
Jun Li:
Investigating the Impact of Real-World Factors on Internet Worm Propagation.
ICISS 2007: 10-24 |
22 | EE | Ming Lei,
Zijie Qi,
Xiaoyan Hong,
Susan V. Vrbsky:
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks.
ISI 2007: 377 |
21 | EE | Jiejun Kong,
Xiaoyan Hong,
Mario Gerla:
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput. 6(8): 888-902 (2007) |
2006 |
20 | EE | Qunwei Zheng,
Xiaoyan Hong,
Jun Liu:
An Agenda Based Mobility Model21.
Annual Simulation Symposium 2006: 188-195 |
19 | EE | Ming Lei,
Susan V. Vrbsky,
Xiaoyan Hong:
A Dynamic Data Grid Replication Strategy to Minimize the Data Missed.
BROADNETS 2006 |
18 | EE | Jun Liu,
Xiaoyan Hong,
Qunwei Zheng,
Lei Tang:
Privacy-Preserving Quick Authentication in Fast Roaming Networks.
LCN 2006: 975-982 |
17 | EE | Xiaoxin Wu,
Jun Liu,
Xiaoyan Hong,
Elisa Bertino:
Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information.
MSN 2006: 461-472 |
16 | EE | Lei Tang,
Xiaoyan Hong,
Phillip G. Bradford:
Secure Relative Location Determination in Vehicular Network.
MSN 2006: 543-554 |
15 | EE | Jiejun Kong,
Xiaoyan Hong,
Mario Gerla:
Modeling Ad-hoc rushing attack in a negligibility-based security framework.
Workshop on Wireless Security 2006: 55-64 |
14 | EE | Qunwei Zheng,
Sibabrata Ray,
Xiaoyan Hong:
Resource allocation for restoration of compromised systems.
J. Comb. Optim. 12(1-2): 35-56 (2006) |
13 | EE | Xiaoyan Hong,
Jiejun Kong,
Mario Gerla:
Mobility changes anonymity: new passive threats in mobile ad hoc networks.
Wireless Communications and Mobile Computing 6: 281-293 (2006) |
2005 |
12 | | Xiaoyan Hong,
Jun Liu,
Randy Smith,
Yeng-Zhong Lee:
Distributed Naming System for Mobile Ad Hoc Network.
ICWN 2005: 509-515 |
11 | EE | Jiejun Kong,
Xiaoyan Hong,
M. Y. Sanadidi,
Mario Gerla:
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing.
ISCC 2005: 57-62 |
10 | EE | Jiejun Kong,
Xiaoyan Hong,
Yunjung Yi,
Joon-Sang Park,
Jun Liu,
Mario Gerla:
A secure ad-hoc routing approach using localized self-healing communities.
MobiHoc 2005: 254-265 |
9 | EE | Jiejun Kong,
Dapeng Wu,
Xiaoyan Hong,
Mario Gerla:
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes.
SASN 2005: 97-106 |
2004 |
8 | EE | Qunwei Zheng,
Xiaoyan Hong,
Sibabrata Ray:
Recent advances in mobility modeling for mobile ad hoc network research.
ACM Southeast Regional Conference 2004: 70-75 |
2003 |
7 | EE | Jiejun Kong,
Xiaoyan Hong:
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks.
MobiHoc 2003: 291-302 |
6 | EE | Kaixin Xu,
Xiaoyan Hong,
Mario Gerla:
Landmark routing in ad hoc networks with mobile backbones.
J. Parallel Distrib. Comput. 63(2): 110-122 (2003) |
2002 |
5 | EE | Xiaoyan Hong,
N. Nguyen,
Shaorong Liu,
Ying Teng:
Dynamic group support in LANMAR routing ad hoc networks.
MWCN 2002: 304-308 |
4 | | Yunjung Yi,
Xiaoyan Hong,
Mario Gerla:
Scalable Team Multicast in Wireless Ad hoc Networks Exploiting Coordinated Motion.
Networked Group Communication 2002: 97-104 |
2001 |
3 | EE | Xiaoyan Hong,
Taek Jin Kwon,
Mario Gerla,
Daniel Lihui Gu,
Guangyu Pei:
A Mobility Framework for Ad Hoc Wireless Networks.
Mobile Data Management 2001: 185-196 |
2 | | Ronn Ritke,
Xiaoyan Hong,
Mario Gerla:
Contradictory relationship between Hurst parameter and queueing performance (extended version).
Telecommunication Systems 16(1-2): 159-175 (2001) |
2000 |
1 | EE | Guangyu Pei,
Mario Gerla,
Xiaoyan Hong:
LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility.
MobiHoc 2000: 11-18 |