2008 |
12 | EE | Kai Xing,
Fang Liu,
Xiuzhen Cheng,
David Hung-Chang Du:
Real-Time Detection of Clone Attacks in Wireless Sensor Networks.
ICDCS 2008: 3-10 |
11 | EE | Kai Xing,
Wei Cheng,
E. K. Park,
Shmuel Rotenstreich:
Distributed Connected Dominating Set Construction in Geometric k-Disk Graphs.
ICDCS 2008: 673-680 |
10 | EE | Wei Cheng,
Kai Xing,
Xiuzhen Cheng,
Xicheng Lu,
Zexin Lu,
Jinshu Su,
Baosheng Wang,
Yujun Liu:
Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks.
MobiHoc 2008: 209-220 |
9 | EE | Fang Liu,
Xiuzhen Cheng,
Liran Ma,
Kai Xing:
SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks.
IEEE Trans. Mob. Comput. 7(7): 858-868 (2008) |
8 | EE | Liran Ma,
Amin Y. Teymorian,
Kai Xing,
Ding-Zhu Du:
An one-way function based framework for pairwise key establishment in sensor networks.
IJSN 3(4): 217-225 (2008) |
2007 |
7 | EE | Kai Xing,
Xiuzhen Cheng,
Liran Ma,
Qilian Liang:
Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks.
MOBICOM 2007: 15-26 |
6 | EE | Yingchang Xiang,
Dechang Chen,
Xiuzhen Cheng,
Kai Xing,
Min Song:
Localized Flooding Backbone Construction for Location Privacy in Sensor Networks.
SNPD (3) 2007: 167-171 |
5 | EE | Weili Wu,
Xiuzhen Cheng,
Min Ding,
Kai Xing,
Fang Liu,
Ping Deng:
Localized Outlying and Boundary Data Detection in Sensor Networks.
IEEE Trans. Knowl. Data Eng. 19(8): 1145-1157 (2007) |
4 | EE | Kai Xing,
Xiuzhen Cheng,
Fang Liu,
Shmuel Rotenstreich:
Location-centric storage for safety warning based on roadway sensor networks.
J. Parallel Distrib. Comput. 67(3): 336-345 (2007) |
2006 |
3 | EE | Dechang Chen,
Xilong Mao,
Xia Fei,
Kai Xing,
Fang Liu,
Min Song:
A Convex-Hull Based Algorithm to Connect the Maximal Independent Set in Unit-Disk Graphs.
WASA 2006: 363-370 |
2 | EE | Liran Ma,
Weidong Jiang,
Kai Xing,
E. K. Park:
The Effective Radius Model for Multi-hop Wireless Networks.
WASA 2006: 643-651 |
2005 |
1 | EE | Bangqi Liu,
Dechang Chen,
Chengjie Xiong,
Kai Xing:
New methods for binary multiplication.
Int. J. Comput. Math. 82(1): 13-22 (2005) |