Security and privacy in cloud computing Z Xiao, Y Xiao IEEE communications surveys & tutorials 15 (2), 843-859, 2012 | 848 | 2012 |
A survey of key management schemes in wireless sensor networks Y Xiao, VK Rayi, B Sun, X Du, F Hu, M Galloway Computer communications 30 (11-12), 2314-2341, 2007 | 733 | 2007 |
Cyber security and privacy issues in smart grids J Liu, Y Xiao, S Li, W Liang, CLP Chen IEEE Communications surveys & tutorials 14 (4), 981-997, 2012 | 707 | 2012 |
A survey of communication/networking in smart grids J Gao, Y Xiao, J Liu, W Liang, CLP Chen Future generation computer systems 28 (2), 391-404, 2012 | 671 | 2012 |
Throughput and delay limits of IEEE 802.11 Y Xiao, J Rosdahl IEEE Communications letters 6 (8), 355-357, 2002 | 611 | 2002 |
An effective key management scheme for heterogeneous sensor networks X Du, Y Xiao, M Guizani, HH Chen Ad hoc networks 5 (1), 24-34, 2007 | 588 | 2007 |
Home M2M networks: Architectures, standards, and QoS improvement Y Zhang, R Yu, S Xie, W Yao, Y Xiao, M Guizani IEEE Communications Magazine 49 (4), 44-52, 2011 | 557 | 2011 |
Secure data aggregation in wireless sensor networks: A comprehensive overview S Ozdemir, Y Xiao Computer Networks 53 (12), 2022-2037, 2009 | 550 | 2009 |
A survey of energy-efficient scheduling mechanisms in sensor networks L Wang, Y Xiao Mobile Networks and Applications 11, 723-740, 2006 | 518 | 2006 |
Cognitive radio networks Y Xiao, F Hu CRC press, 2008 | 507 | 2008 |
Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11 e wireless LANs Y Xiao IEEE transactions on wireless communications 4 (4), 1506-1515, 2005 | 496 | 2005 |
IEEE 802.11 n: enhancements for higher throughput in wireless LANs Y Xiao IEEE Wireless Communications 12 (6), 82-91, 2005 | 474 | 2005 |
Internet protocol television (IPTV): the killer application for the next-generation internet Y Xiao, X Du, J Zhang, F Hu, S Guizani IEEE Communications Magazine 45 (11), 126-134, 2007 | 457 | 2007 |
Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks X Du, M Guizani, Y Xiao, HH Chen IEEE Transactions on Wireless Communications 8 (3), 1223-1229, 2009 | 411 | 2009 |
Energy saving mechanism in the IEEE 802.16 e wireless MAN Y Xiao IEEE Communications Letters 9 (7), 595-597, 2005 | 402 | 2005 |
Authentication and access control in the internet of things J Liu, Y Xiao, CLP Chen 2012 32nd international conference on distributed computing systems …, 2012 | 386 | 2012 |
Game theory for network security X Liang, Y Xiao IEEE Communications Surveys & Tutorials 15 (1), 472-486, 2012 | 381 | 2012 |
A survey of distributed denial-of-service attack, prevention, and mitigation techniques T Mahjabin, Y Xiao, G Sun, W Jiang International Journal of Distributed Sensor Networks 13 (12), 1550147717741463, 2017 | 368 | 2017 |
Distributed collaborative control for industrial automation with wireless sensor and actuator networks J Chen, X Cao, P Cheng, Y Xiao, Y Sun IEEE Transactions on Industrial Electronics 57 (12), 4219-4230, 2010 | 353 | 2010 |
A survey of cross-layer designs in wireless networks B Fu, Y Xiao, H Deng, H Zeng IEEE Communications Surveys & Tutorials 16 (1), 110-126, 2013 | 351 | 2013 |