Network traffic classification using correlation information J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, Y Guan IEEE Transactions on Parallel and Distributed systems 24 (1), 104-117, 2012 | 426 | 2012 |
An efficient signature-based scheme for securing network coding against pollution attacks Z Yu, Y Wei, B Ramkumar, Y Guan IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1409-1417, 2008 | 328 | 2008 |
A dynamic en-route scheme for filtering false data injection in wireless sensor networks Z Yu, Y Guan Proceedings of the 3rd international conference on Embedded networked sensor …, 2005 | 251 | 2005 |
Lightweight mutual authentication and ownership transfer for RFID systems L Kulseng, Z Yu, Y Wei, Y Guan 2010 proceedings IEEE infocom, 1-5, 2010 | 219 | 2010 |
Detecting black-hole attack in mobile ad hoc networks B Sun, Y Guan, J Chen, UW Pooch IET Digital Library, 2003 | 214 | 2003 |
Detecting click fraud in pay-per-click streams of online advertising networks L Zhang, Y Guan 2008 The 28th International Conference on Distributed Computing Systems, 77-84, 2008 | 201 | 2008 |
An efficient scheme for securing XOR network coding against pollution attacks Z Yu, Y Wei, B Ramkumar, Y Guan IEEE INFOCOM 2009, 406-414, 2009 | 166 | 2009 |
A key management scheme using deployment knowledge for wireless sensor networks Z Yu, Y Guan IEEE Transactions on Parallel and Distributed Systems 19 (10), 1411-1425, 2008 | 135 | 2008 |
A dynamic en-route filtering scheme for data reporting in wireless sensor networks Z Yu, Y Guan IEEE/ACM transactions on networking 18 (1), 150-163, 2009 | 134 | 2009 |
Netcamo: camouflaging network traffic for qos-guaranteed mission critical applications Y Guan, X Fu, D Xuan, PU Shenoy, R Bettati, W Zhao IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001 | 133 | 2001 |
A key pre-distribution scheme using deployment knowledge for wireless sensor networks Z Yu, Y Guan IPSN 2005. Fourth International Symposium on Information Processing in …, 2005 | 106 | 2005 |
A robust group-based key management scheme for wireless sensor networks Z Yu, Y Guan IEEE Wireless Communications and Networking Conference, 2005 4, 1915-1920, 2005 | 101 | 2005 |
An optimal strategy for anonymous communication protocols Y Guan, X Fu, R Bettati, W Zhao Proceedings 22nd International Conference on Distributed Computing Systems …, 2002 | 101 | 2002 |
Sketch-based streaming PCA algorithm for network-wide traffic anomaly detection Y Liu, L Zhang, Y Guan 2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010 | 83 | 2010 |
Lightweight location verification algorithms for wireless sensor networks Y Wei, Y Guan IEEE Transactions on Parallel and Distributed Systems 24 (5), 938-950, 2012 | 72 | 2012 |
Lightweight secure search protocols for low-cost RFID systems L Kulseng, Z Yu, Y Wei, Y Guan 2009 29th IEEE International Conference on Distributed Computing Systems, 40-48, 2009 | 60 | 2009 |
Detection of stepping stone attack under delay and chaff perturbations L Zhang, AG Persaud, A Johnson, Y Guan 2006 IEEE International Performance Computing and Communications Conference …, 2006 | 58 | 2006 |
Preventing traffic analysis for real-time communication networks Y Guan, C Li, D Xuan, R Bettati, W Zhao MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No …, 1999 | 54 | 1999 |
Identifying high-cardinality hosts from network-wide traffic measurements Y Liu, W Chen, Y Guan IEEE Transactions on Dependable and Secure Computing 13 (5), 547-558, 2015 | 50 | 2015 |
Location verification algorithms forwireless sensor networks Y Wei, Z Yu, Y Guan 27th International Conference on Distributed Computing Systems (ICDCS'07), 70-70, 2007 | 48 | 2007 |