Yanyong Zhang
Yanyong Zhang
University of Science and Technology of China ; Rutgers University (Adjunct Visiting Professor)
Bestätigte E-Mail-Adresse bei ustc.edu.cn - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
14412005
Enhancing source-location privacy in sensor network routing
P Kamat, Y Zhang, W Trappe, C Ozturk
25th IEEE international conference on distributed computing systems (ICDCS …, 2005
7092005
Jamming Sensor Networks: Attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE Network 20 (3), 41-47, 2006
7062006
Robust statistical methods for securing wireless localization in sensor networks
Z Li, W Trappe, Y Zhang, B Nath
Information Processing in Sensor Networks, 2005. IPSN 2005. Fourth …, 2005
5982005
Source-location privacy in energy-constrained sensor network routing
C Ozturk, Y Zhang, W Trappe
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
4842004
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
4452004
BlueGene/L Failure Analysis and Prediction Models
Y Liang, Y Zhang, A Sivasubramaniam, RK Sahoo, M Jette
Proceedings of the 2006 International Conference on Dependable Systems and …, 2006
3672006
Failure data analysis of a large-scale heterogeneous server environment
RK Sahoo, MS Squillante, A Sivasubramaniam, Y Zhang
International Conference on Dependable Systems and Networks, 2004, 772-781, 2004
3172004
Channel surfing: defending wireless sensor networks from interference
W Xu, Y Zhang, W Trappe
Information Processing in Sensor Networks, 2007. IPSN 2007. 6th …, 2007
2512007
SCPL: Indoor device-free multi-subject counting and localization using radio signal strength
C Xu, B Firner, RS Moore, Y Zhang, W Trappe, R Howard, F Zhang, N An
Proceedings of the 12th international conference on Information Processing …, 2013
2392013
Speech emotion recognition using Fourier parameters
K Wang, N An, BN Li, Y Zhang, L Li
IEEE Transactions on affective computing 6 (1), 69-75, 2015
2332015
IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?
L Xiao, X Wan, X Lu, Y Zhang, D Wu
IEEE Signal Processing Magazine 35 (5), 41-49, 2018
2282018
TARA: Topology-aware resource adaptation to alleviate congestion in sensor networks
J Kang, Y Zhang, B Nath
IEEE Transactions on Parallel and Distributed Systems 18 (7), 919-931, 2007
1982007
Failure prediction in ibm bluegene/l event logs
Y Liang, Y Zhang, H Xiong, R Sahoo
Seventh IEEE International Conference on Data Mining (ICDM 2007), 583-588, 2007
1922007
Filtering failure logs for a bluegene/l prototype
Y Liang, Y Zhang, A Sivasubramaniam, RK Sahoo, J Moreira, M Gupta
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
1882005
Performance implications of failures in large-scale cluster scheduling
Y Zhang, M Squillante, A Sivasubramaniam, R Sahoo
Job Scheduling Strategies for Parallel Processing, 23-38, 2005
1712005
Performance implications of failures in large-scale cluster scheduling
Y Zhang, M Squillante, A Sivasubramaniam, R Sahoo
Job Scheduling Strategies for Parallel Processing, 23-38, 2005
1712005
Popularity-driven coordinated caching in named data networking
J Li, H Wu, B Liu, J Lu, Y Wang, X Wang, Y Zhang, L Dong
2012 ACM/IEEE Symposium on Architectures for Networking and Communications …, 2012
1402012
An integrated approach to parallel scheduling using gang-scheduling, backfilling, and migration
Y Zhang, H Franke, J Moreira, A Sivasubramaniam
IEEE Transactions on Parallel and Distributed Systems 14 (3), 236-247, 2003
1402003
Anti-jamming timing channels for wireless networks
W Xu, W Trappe, Y Zhang
Proceedings of the first ACM conference on Wireless network security, 203-213, 2008
1372008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20