Trust architecture and reputation evaluation for internet of things J Chen, Z Tian, X Cui, L Yin, X Wang Journal of Ambient Intelligence and Humanized Computing 10, 3099-3107, 2019 | 115 | 2019 |
Continuous indoor positioning fusing WiFi, smartphone sensors and landmarks ZA Deng, G Wang, D Qin, Z Na, Y Cui, J Chen Sensors 16 (9), 1427, 2016 | 55 | 2016 |
A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding J Chen, BX Fang, LH Yin, S Su Jisuanji Xuebao(Chinese Journal of Computers) 33 (9), 1736-1747, 2010 | 49 | 2010 |
An efficient anonymous communication protocol for wireless sensor networks J Chen, X Du, B Fang Wireless Communications and Mobile Computing 12 (14), 1302-1312, 2012 | 45 | 2012 |
Hiding the source based on limited flooding for sensor networks J Chen, Z Lin, Y Hu, B Wang Sensors 15 (11), 29129-29148, 2015 | 23 | 2015 |
Towards efficient anonymous communications in sensor networks J Chen, H Zhang, B Fang, X Du, L Yin, X Yu 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011 | 14 | 2011 |
Accurate indoor tracking using a mobile phone and non-overlapping camera sensor networks Q Wang, Y Liu, J Chen 2012 IEEE International Instrumentation and Measurement Technology …, 2012 | 12 | 2012 |
An efficient and effective localization method for networked disjoint top-view cameras Y Liu, Q Wang, J Liu, J Chen, T Wark IEEE Transactions on Instrumentation and Measurement 62 (9), 2526-2537, 2013 | 11 | 2013 |
Sink location protection protocols based on packet sending rate adjustment J Chen, Z Lin, Y Liu, Y Hu, X Du International Journal of Distributed Sensor Networks 12 (1), 6354514, 2016 | 10 | 2016 |
Designing robust routing protocols to protect base stations in wireless sensor networks J Chen, H Zhang, X Du, B Fang, L Yan Wireless Communications and Mobile Computing 14 (17), 1613-1626, 2014 | 9 | 2014 |
Fast-flux botnet detection based on weighted svm X Yu, B Zhang, L Kang, J Chen Information Technology Journal 11 (8), 1048, 2012 | 8 | 2012 |
Base station location protection in wireless sensor networks: Attacks and defense. J Chen, H Zhang, X Du, B Fang, Y Liu, H Yu ICC, 554-559, 2012 | 5 | 2012 |
Protecting sink location against global traffic monitoring attacker J Chen, Z Lin, X Du 2016 International Conference on Computing, Networking and Communications …, 2016 | 3 | 2016 |
An efficient and sustainable self-healing protocol for unattended wireless sensor networks J Chen, H Zhang, B Fang, X Du, H Yu, X Yu 2012 IEEE Global Communications Conference (GLOBECOM), 5356-5361, 2012 | 3 | 2012 |
Towards privacy-preserving location sharing over mobile online social networks J Chen, S Su, X Wang IEICE TRANSACTIONS on Information and Systems 102 (1), 133-146, 2019 | 2 | 2019 |
WLAN indoor positioning based on D-LDA feature extraction algorithm J Yu, Z Deng, X Liu, J Chen, Z Na International Conference in Communications, Signal Processing, and Systems …, 2017 | 2 | 2017 |
Enhancing source location protection in wireless sensor networks J Chen, Z Lin, D Wu, B Wang Sixth International Conference on Electronics and Information Engineering …, 2015 | 1 | 2015 |
Semantic surface representation of physical entity in the WEB of things H Yu, B Fang, X Yu, J Chen 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012 | 1 | 2012 |
Data Storage Method for Fast Retrieval in IoT J Chen, L Yin, T Zhang, Y Liu, Z Deng Communications, Signal Processing, and Systems: Proceedings of the 8th …, 2020 | | 2020 |
Enhancing the Source Node Security in Wireless Sensor Networks C Juan, L Zhengkui CN Patent CN104,811,933 A, 2019 | | 2019 |