Honglong Chen 陈鸿龙
Cited by
Cited by
Privacy-preserving crowd-sourced statistical data publishing with an untrusted server
Z Wang, X Pang, Y Chen, H Shao, Q Wang, L Wu, H Chen, H Qi
IEEE Transactions on Mobile Computing, 2018
On Protecting End-to-End Location Privacy against Local Eavesdropper in Wireless Sensor Networks
H Chen, W Lou
Elsevier Pervasive and Mobile Computing, 2015
Narrowband Internet of Things systems with opportunistic D2D communication
Y Li, K Chi, H Chen, Z Wang, Y Zhu
IEEE Internet of Things Journal 5 (3), 1474-1484, 2017
Achieving Location Error Tolerant Barrier Coverage for Wireless Sensor Networks
Z Wang, H Chen, Q Cao, H Qi, Z Wang, Q Wang.
Computer Networks, 2016
Securing DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
H Chen, W Lou, J Wu, Z Wang, A Xia
Elsevier Pervasive and Mobile Computing, 2015
From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks
H Chen, W Lou
International Performance Computing and Communications Conference, 1-8, 2010
A novel mobility management scheme for target tracking in cluster-based sensor networks
Z Wang, W Lou, Z Wang, J Ma, H Chen
Distributed Computing in Sensor Systems: 6th IEEE International Conference …, 2010
Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks
Z Wang, Q Cao, H Qi, H Chen, Q Wang
Ad Hoc Networks, 2017
OPAT: Optimized Allocation of Time Dependent Tasks for Mobile Crowdsensing
Y Huang, H Chen*, G Ma, K Lin, Z Ni, N Yan, Z Wang
IEEE Transactions on Industrial Informatics, 2022
Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems with Unknown Tags
H Chen, G Xue, Z Wang
IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2017.2664810, 2017
A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks
Z Wang, W Lou, Z Wang, J Ma, H Chen
International Journal of Distributed Sensor Networks 2013, 2013
A social-based watchdog system to detect selfish nodes in opportunistic mobile networks
B Jedari, F Xia, H Chen, SK Das, A Tolba, ALM Zafer
Future Generation Computer Systems 92, 777-788, 2019
When mobile crowdsensing meets privacy
Z Wang, X Pang, J Hu, W Liu, Q Wang, Y Li, H Chen
IEEE Communications Magazine 57 (9), 72-78, 2019
CRPD: a novel clustering routing protocol for dynamic wireless sensor networks
S Wang, J Yu, M Atiquzzaman, H Chen, L Ni
Personal and Ubiquitous Computing 22, 545-559, 2018
A secure localization approach against wormhole attacks using distance consistency
H Chen, W Lou, X Sun, Z Wang
EURASIP Journal on Wireless Communications and Networking 2010 (1), 1, 2010
Contact expectation based routing for delay tolerant networks
H Chen, W Lou
Ad Hoc Networks 36, 244-257, 2016
Label-based DV-Hop localization against wormhole attacks in wireless sensor networks
J Wu, H Chen, W Lou, Z Wang, Z Wang
2010 IEEE Fifth International Conference on Networking, Architecture, and …, 2010
Dynamic distributed honeypot based on blockchain
L Shi, Y Li, T Liu, J Liu, B Shan, H Chen
IEEE Access 7, 72234-72246, 2019
Fault Tolerant Barrier Coverage for Wireless Sensor Networks
Z Wang, H Chen, Q Cao, H Qi, Z Wang
IEEE International Conference on Computer Communications (IEEE INFOCOM 2014), 2014
GAR: Group Aware Cooperative Routing Protocol for Resource- Constraint Opportunistic Networks
H Chen, W Lou
Elsevier Computer Communications, 2014
The system can't perform the operation now. Try again later.
Articles 1–20