Follow
Yuan Xue
Title
Cited by
Cited by
Year
Optimal resource allocation in wireless ad hoc networks: A price-based approach
Y Xue, B Li, K Nahrstedt
IEEE transactions on mobile computing 5 (4), 347-364, 2006
3072006
On setting TCP's congestion window limit in mobile ad hoc networks
K Chen, Y Xue, K Nahrstedt
IEEE International Conference on Communications, 2003. ICC'03. 2, 1080-1084, 2003
2942003
A scalable location management scheme in mobile ad-hoc networks
Y Xue, B Li, K Nahrstedt
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks …, 2001
2442001
Understanding bandwidth-delay product in mobile ad hoc networks
K Chen, Y Xue, SH Shah, K Nahrstedt
Computer Communications 27 (10), 923-934, 2004
1852004
Maximizing lifetime for data aggregation in wireless sensor networks
Y Xue, Y Cui, K Nahrstedt
Mobile networks and applications 10, 853-864, 2005
1802005
CareNet: an integrated wireless sensor networking environment for remote healthcare.
S Jiang, Y Cao, S Iyengar, P Kuryloski, R Jafari, Y Xue, R Bajcsy, ...
BODYNETS, 9, 2008
1732008
Taxonomy for description of cross-domain attacks on CPS
M Yampolskiy, P Horvath, XD Koutsoukos, Y Xue, J Sztipanovits
Proceedings of the 2nd ACM international conference on High confidence …, 2013
1642013
Providing fault-tolerant ad hoc routing service in adversarial environments
Y Xue, K Nahrstedt
Wireless Personal Communications 29, 367-388, 2004
1602004
Price-based resource allocation in wireless ad hoc networks
Y Xue, B Li, K Nahrstedt
International Workshop on Quality of Service, 79-96, 2003
1472003
A location-aided power-aware routing protocol in mobile ad hoc networks
Y Xue, B Li
GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270 …, 2001
1402001
A survey on server-side approaches to securing web applications
X Li, Y Xue
ACM Computing Surveys (CSUR) 46 (4), 1-29, 2014
1332014
Composite bloom filters for secure record linkage
EA Durham, M Kantarcioglu, Y Xue, C Toth, M Kuzu, B Malin
IEEE transactions on knowledge and data engineering 26 (12), 2956-2968, 2013
1232013
Optimal resource allocation in overlay multicast
Y Cui, Y Xue, K Nahrstedt
IEEE Transactions on Parallel and Distributed Systems 17 (8), 808-823, 2006
1222006
A language for describing attacks on cyber-physical systems
M Yampolskiy, P Horváth, XD Koutsoukos, Y Xue, J Sztipanovits
International Journal of Critical Infrastructure Protection 8, 40-52, 2015
932015
Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage
E Durham, Y Xue, M Kantarcioglu, B Malin
Information Fusion 13 (4), 245-259, 2012
932012
Neuromorphic Photonic Memory Devices Using Ultrafast, Non‐Volatile Phase‐Change Materials
X Chen, Y Xue, Y Sun, J Shen, S Song, M Zhu, Z Song, Z Cheng, P Zhou
Advanced Materials 35 (37), 2203909, 2023
902023
BLOCK: a black-box approach for detection of state violation attacks towards web applications
X Li, Y Xue
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
872011
A utility-based distributed maximum lifetime routing algorithm for wireless networks
Y Xue, Y Cui, K Nahrstedt
Second International Conference on Quality of Service in Heterogeneous Wired …, 2005
852005
A survey on web application security
X Li, Y Xue
Nashville, TN USA 25 (5), 1-14, 2011
832011
Locality-awareness in BitTorrent-like P2P applications
B Liu, Y Cui, Y Lu, Y Xue
IEEE transactions on multimedia 11 (3), 361-371, 2009
782009
The system can't perform the operation now. Try again later.
Articles 1–20