Optimal resource allocation in wireless ad hoc networks: A price-based approach Y Xue, B Li, K Nahrstedt IEEE transactions on mobile computing 5 (4), 347-364, 2006 | 310 | 2006 |
On setting TCP's congestion window limit in mobile ad hoc networks K Chen, Y Xue, K Nahrstedt IEEE International Conference on Communications, 2003. ICC'03. 2, 1080-1084, 2003 | 293 | 2003 |
A scalable location management scheme in mobile ad-hoc networks Y Xue, B Li, K Nahrstedt Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks …, 2001 | 245 | 2001 |
Understanding bandwidth-delay product in mobile ad hoc networks K Chen, Y Xue, SH Shah, K Nahrstedt Computer Communications 27 (10), 923-934, 2004 | 183 | 2004 |
Maximizing lifetime for data aggregation in wireless sensor networks Y Xue, Y Cui, K Nahrstedt Mobile networks and applications 10, 853-864, 2005 | 179 | 2005 |
CareNet: an integrated wireless sensor networking environment for remote healthcare S Jiang, Y Cao, S Iyengar, P Kuryloski, R Jafari, Y Xue, R Bajcsy, ... 3rd international ICST conference on body area networks, 2010 | 166 | 2010 |
Providing fault-tolerant ad hoc routing service in adversarial environments Y Xue, K Nahrstedt Wireless Personal Communications 29, 367-388, 2004 | 162 | 2004 |
Taxonomy for description of cross-domain attacks on CPS M Yampolskiy, P Horvath, XD Koutsoukos, Y Xue, J Sztipanovits Proceedings of the 2nd ACM international conference on High confidence …, 2013 | 155 | 2013 |
Price-based resource allocation in wireless ad hoc networks Y Xue, B Li, K Nahrstedt International Workshop on Quality of Service, 79-96, 2003 | 148 | 2003 |
A location-aided power-aware routing protocol in mobile ad hoc networks Y Xue, B Li GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270 …, 2001 | 143 | 2001 |
A survey on server-side approaches to securing web applications X Li, Y Xue ACM Computing Surveys (CSUR) 46 (4), 1-29, 2014 | 124 | 2014 |
Optimal resource allocation in overlay multicast Y Cui, Y Xue, K Nahrstedt IEEE Transactions on Parallel and Distributed Systems 17 (8), 808-823, 2006 | 120 | 2006 |
Composite bloom filters for secure record linkage EA Durham, M Kantarcioglu, Y Xue, C Toth, M Kuzu, B Malin IEEE transactions on knowledge and data engineering 26 (12), 2956-2968, 2013 | 119 | 2013 |
Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage E Durham, Y Xue, M Kantarcioglu, B Malin Information Fusion 13 (4), 245-259, 2012 | 93 | 2012 |
A language for describing attacks on cyber-physical systems M Yampolskiy, P Horváth, XD Koutsoukos, Y Xue, J Sztipanovits International Journal of Critical Infrastructure Protection 8, 40-52, 2015 | 89 | 2015 |
A utility-based distributed maximum lifetime routing algorithm for wireless networks Y Xue, Y Cui, K Nahrstedt Second International Conference on Quality of Service in Heterogeneous Wired …, 2005 | 87 | 2005 |
Block: a black-box approach for detection of state violation attacks towards web applications X Li, Y Xue Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 79 | 2011 |
Locality-awareness in BitTorrent-like P2P applications B Liu, Y Cui, Y Lu, Y Xue IEEE transactions on multimedia 11 (3), 361-371, 2009 | 78 | 2009 |
A survey on web application security X Li, Y Xue Nashville, TN USA 25 (5), 1-14, 2011 | 77 | 2011 |
Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach M Yampolskiy, P Horvath, XD Koutsoukos, Y Xue, J Sztipanovits 2012 5th International Symposium on Resilient Control Systems, 55-62, 2012 | 74 | 2012 |