Random-walk based approach to detect clone attacks in wireless sensor networks Y Zeng, J Cao, S Zhang, S Guo, L Xie IEEE Journal on selected areas in communications 28 (5), 677-691, 2010 | 183 | 2010 |
Secure localization and location verification in wireless sensor networks: a survey Y Zeng, J Cao, J Hong, S Zhang, L Xie the Journal of Supercomputing 64, 685-701, 2013 | 137 | 2013 |
Attribute-based signature scheme G Shanqing, Z Yingpei 2008 International Conference on Information Security and Assurance (ISA …, 2008 | 134 | 2008 |
Attribute-based re-encryption scheme in the standard model S Guo, Y Zeng, J Wei, Q Xu Wuhan University Journal of Natural Sciences 13 (5), 621-625, 2008 | 44 | 2008 |
On accuracy of region based localization algorithms for wireless sensor networks S Zhang, J Cao, Y Zeng, Z Li, L Chen, D Chen Computer Communications 33 (12), 1391-1403, 2010 | 27 | 2010 |
SWCA: A secure weighted clustering algorithm in wireless ad hoc networks Y Zeng, J Cao, S Guo, K Yang, L Xie 2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009 | 24 | 2009 |
DRLgencert: Deep learning-based automated testing of certificate verification in SSL/TLS implementations C Chen, W Diao, Y Zeng, S Guo, C Hu 2018 IEEE International Conference on Software Maintenance and Evolution …, 2018 | 23 | 2018 |
Multifuzz: A coverage-based multiparty-protocol fuzzer for iot publish/subscribe protocols Y Zeng, M Lin, S Guo, Y Shen, T Cui, T Wu, Q Zheng, Q Wang Sensors 20 (18), 5194, 2020 | 22 | 2020 |
移动传感器网络中定位算法的性能评测 张士庚, 曾英佩, 陈力军, 陈道蓄, 谢立 软件学报 7, 2011 | 22* | 2011 |
Secure hop-count based localization in wireless sensor networks Y Zeng, S Zhang, S Guo, X Li 2007 International conference on computational intelligence and security …, 2007 | 21 | 2007 |
SecMCL: A secure monte carlo localization algorithm for mobile sensor networks Y Zeng, J Cao, J Hong, S Zhang, L Xie 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009 | 19 | 2009 |
Pollution attack: A new attack against localization in wireless sensor networks Y Zeng, J Cao, S Zhang, S Guo, L Xie 2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009 | 14 | 2009 |
入侵检测在线规则生成模型 郭山清, 谢立, 曾英佩 计算机学报 29 (9), 1523-1532, 2006 | 14 | 2006 |
A location-free prediction-based sleep scheduling protocol for object tracking in sensor networks J Hong, J Cao, Y Zeng, S Lu, D Chen, Z Li 2009 17th IEEE International Conference on Network Protocols, 63-72, 2009 | 13 | 2009 |
Multi-step attack detection based on pre-trained hidden Markov models X Zhang, T Wu, Q Zheng, L Zhai, H Hu, W Yin, Y Zeng, C Cheng Sensors 22 (8), 2874, 2022 | 11 | 2022 |
Identification of private ics protocols based on raw traffic L Zhai, Q Zheng, X Zhang, H Hu, W Yin, Y Zeng, T Wu Symmetry 13 (9), 1743, 2021 | 5 | 2021 |
GSA‐Fuzz: Optimize Seed Mutation with Gravitational Search Algorithm M Lin, Y Zeng, T Wu, Q Wang, L Fang, S Guo Security and Communication Networks 2022 (1), 1505842, 2022 | 4 | 2022 |
Deep packet inspection with delayed signature matching in network auditing Y Zeng, S Guo Information and Communications Security: 20th International Conference …, 2018 | 4 | 2018 |
Secure localization and location verification inwireless sensor networks Y Zeng, J Cao, J Hong, L Xie 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 0 | 4 | |
Survey of the security alerts correlation algorithms SQ Guo, XL Yang, YP Zeng, L Xie, C Gao Computer Applications 25 (10), 2276-2278, 2005 | 3 | 2005 |