Segueix
Weichao Wang
Weichao Wang
Correu electrònic verificat a uncc.edu - Pàgina d'inici
Títol
Citada per
Citada per
Any
Secure and efficient access to outsourced data
W Wang, Z Li, R Owens, B Bhargava
Proceedings of the 2009 ACM workshop on Cloud computing security, 55-66, 2009
4022009
Visualization of wormholes in sensor networks
W Wang, B Bhargava
Proceedings of the 3rd ACM workshop on Wireless security, 51-60, 2004
3982004
Middle School Students’ Social Media Use
F Martin, C Wang, T Petty, W Wang, P Wilkins
Journal of Educational Technology & Society 21 (1), 213-224, 2018
2882018
Integrating heterogeneous wireless technologies: a cellular aided mobile ad hoc network (CAMA)
B Bhargava, X Wu, Y Lu, W Wang
Mobile Networks and Applications 9, 393-408, 2004
1732004
Defending against wormhole attacks in mobile ad hoc networks
W Wang, B Bhargava, Y Lu, X Wu
Wireless Communications and Mobile Computing 6 (4), 483-503, 2006
1622006
Study of distance vector routing protocols for mobile ad hoc networks
Y Lu, W Wang, Y Zhong, B Bhargava
Proceedings of the First IEEE International Conference on Pervasive …, 2003
1512003
Visualisation of wormholes in underwater sensor networks: a distributed approach
W Wang, J Kong, B Bhargava, M Gerla
International Journal of Security and Networks 3 (1), 10-23, 2008
982008
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks
J Kong, Z Ji, W Wang, M Gerla, R Bagrodia, B Bhargava
Proceedings of the 4th ACM workshop on Wireless security, 87-96, 2005
892005
On vulnerability and protection of ad hoc on-demand distance vector protocol
W Wang, Y Lu, BK Bhargava
10th International Conference on Telecommunications, 2003. ICT 2003. 1, 375-382, 2003
892003
Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines
R Owens, W Wang
30th IEEE International Performance Computing and Communications Conference, 1-8, 2011
792011
Defending against collaborative packet drop attacks on MANETs
W Wang, B Bhargava, M Linderman
2nd International Workshop on Dependable Network Computing and Mobile …, 2009
792009
Dynamic participant selection for large-scale mobile crowd sensing
H Li, T Li, W Wang, Y Wang
IEEE Transactions on Mobile Computing 18 (12), 2842-2855, 2018
772018
Trust-based privacy preservation for peer-to-peer data sharing
Y Lu, W Wang, B Bhargava, D Xu
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006
702006
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding.
X Xie, W Wang
JUSPN 5 (1), 1-8, 2014
542014
On security study of two distance vector routing protocols for mobile ad hoc networks
W Wang, Y Lu, B Bhargava
Proceedings of the First IEEE International Conference on Pervasive …, 2003
452003
Scalable Privacy-Preserving Participant Selection in Mobile Crowd Sensing
T Li, T Jung, H Li, L Cao, W Wang, XY Li, Y Wang
442017
Examining K-12 educator experiences from digital citizenship professional development
F Martin, T Gezer, WC Wang, T Petty, C Wang
Journal of Research on Technology in Education 54 (1), 143-160, 2022
402022
Examining Parents Perception on Elementary School Children Digital Safety
F Martin, T Gezer, J Anderson, D Polly, WC Wang
Educational Media International 58 (1), 60-77, 2021
382021
Wireless networking security: open issues in trust, management, interoperation and measurement
JB Evans, W Wang, BJ Ewy
International Journal of Security and Networks 1 (1-2), 84-94, 2006
332006
Detecting sybil nodes in wireless networks with physical layer network coding
W Wang, D Pu, A Wyglinski
2010 IEEE/IFIP International Conference on Dependable Systems&Networks (DSN …, 2010
312010
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20