The feasibility of launching and detecting jamming attacks in wireless networks W Xu, W Trappe, Y Zhang, T Wood Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005 | 1723 | 2005 |
Jamming Sensor Networks: Attack and defense strategies W Xu, K Ma, W Trappe, Y Zhang IEEE Network 20 (3), 41-47, 2006 | 843 | 2006 |
IoT security techniques based on machine learning: How do IoT devices use AI to enhance security? L Xiao, X Wan, X Lu, Y Zhang, D Wu IEEE Signal Processing Magazine 35 (5), 41-49, 2018 | 804 | 2018 |
Enhancing source-location privacy in sensor network routing P Kamat, Y Zhang, W Trappe, C Ozturk 25th IEEE international conference on distributed computing systems (ICDCS …, 2005 | 783 | 2005 |
Voxel r-cnn: Towards high performance voxel-based 3d object detection J Deng, S Shi, P Li, W Zhou, Y Zhang, H Li Proceedings of the AAAI conference on artificial intelligence 35 (2), 1201-1209, 2021 | 709 | 2021 |
Robust statistical methods for securing wireless localization in sensor networks Z Li, W Trappe, Y Zhang, B Nath Information Processing in Sensor Networks, 2005. IPSN 2005. Fourth …, 2005 | 640 | 2005 |
Source-location privacy in energy-constrained sensor network routing C Ozturk, Y Zhang, W Trappe Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004 | 541 | 2004 |
Channel surfing and spatial retreats: defenses against wireless denial of service W Xu, T Wood, W Trappe, Y Zhang Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004 | 498 | 2004 |
Speech emotion recognition using Fourier parameters K Wang, N An, BN Li, Y Zhang, L Li IEEE Transactions on affective computing 6 (1), 69-75, 2015 | 439 | 2015 |
BlueGene/L Failure Analysis and Prediction Models Y Liang, Y Zhang, A Sivasubramaniam, RK Sahoo, M Jette Proceedings of the 2006 International Conference on Dependable Systems and …, 2006 | 405 | 2006 |
Failure data analysis of a large-scale heterogeneous server environment RK Sahoo, MS Squillante, A Sivasubramaniam, Y Zhang International Conference on Dependable Systems and Networks, 2004, 772-781, 2004 | 334 | 2004 |
Failure prediction in ibm bluegene/l event logs Y Liang, Y Zhang, H Xiong, R Sahoo Seventh IEEE International Conference on Data Mining (ICDM 2007), 583-588, 2007 | 328 | 2007 |
SCPL: Indoor device-free multi-subject counting and localization using radio signal strength C Xu, B Firner, RS Moore, Y Zhang, W Trappe, R Howard, F Zhang, N An Proceedings of the 12th international conference on Information Processing …, 2013 | 307 | 2013 |
Channel surfing: defending wireless sensor networks from interference W Xu, Y Zhang, W Trappe Information Processing in Sensor Networks, 2007. IPSN 2007. 6th …, 2007 | 277 | 2007 |
Mobile edge cloud system: Architectures, challenges, and approaches H Liu, F Eldarrat, H Alqahtani, A Reznik, X De Foy, Y Zhang IEEE Systems Journal 12 (3), 2495-2508, 2017 | 238 | 2017 |
TARA: topology-aware resource adaptation to alleviate congestion in sensor networks J Kang, Y Zhang, B Nath IEEE Transactions on Parallel and Distributed Systems 18 (7), 919-931, 2007 | 210 | 2007 |
Filtering failure logs for a bluegene/l prototype Y Liang, Y Zhang, A Sivasubramaniam, RK Sahoo, J Moreira, M Gupta 2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005 | 199 | 2005 |
Performance implications of failures in large-scale cluster scheduling Y Zhang, M Squillante, A Sivasubramaniam, R Sahoo Job Scheduling Strategies for Parallel Processing, 23-38, 2005 | 179 | 2005 |
Popularity-driven coordinated caching in named data networking J Li, H Wu, B Liu, J Lu, Y Wang, X Wang, Y Zhang, L Dong Proceedings of the eighth ACM/IEEE symposium on Architectures for networking …, 2012 | 176 | 2012 |
Crowd++ unsupervised speaker count with smartphones C Xu, S Li, G Liu, Y Zhang, E Miluzzo, YF Chen, J Li, B Firner Proceedings of the 2013 ACM international joint conference on Pervasive and …, 2013 | 171 | 2013 |