2008 |
9 | EE | Ning Liu,
Jianhua Li,
Liming Hao,
Yue Wu,
Ping Yi:
Group-Based Trust Model in P2P System Based on Trusted Computing.
CSSE (3) 2008: 797-801 |
8 | EE | Junhua Tang,
Yue Wu,
Linsen Li,
Ping Yi:
The Effect of Opportunistic Scheduling on TCP Performance over Shared Wireless Downlink.
GLOBECOM 2008: 5091-5095 |
7 | EE | Linchun Li,
Jianhua Li,
Yue Wu,
Ping Yi:
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks.
PerCom 2008: 324-329 |
2005 |
6 | EE | Ping Yi,
YiPing Zhong,
Shiyong Zhang:
A Novel Intrusion Detection Method for Mobile Ad Hoc Networks.
EGC 2005: 1183-1192 |
5 | EE | Yang Li,
Ping Yi,
Qiyan Li:
Optimizing Path Expression Queries of XML Data.
ICEBE 2005: 497-504 |
4 | | Ping Yi,
Shiyong Zhang,
YiPing Zhong:
An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks.
ICEIS (4) 2005: 220-226 |
3 | EE | Ping Yi,
Zhoulin Dai,
YiPing Zhong,
Shiyong Zhang:
Resisting Flooding Attacks in Ad Hoc Networks.
ITCC (2) 2005: 657-662 |
2 | EE | Ping Yi,
YiPing Zhong,
Shiyong Zhang:
Applying Mobile Agent to Intrusion Response for Ad Hoc Networks.
International Conference on Computational Science (2) 2005: 593-600 |
1 | EE | Ping Yi,
Yichuan Jiang,
YiPing Zhong,
Shiyong Zhang:
Distributed Intrusion Detection for Mobile Ad Hoc Networks.
SAINT Workshops 2005: 94-97 |