Jing Yang Koh
TitleCited byYear
Geo-spatial location spoofing detection for Internet of Things
JY Koh, I Nevat, D Leong, WC Wong
IEEE Internet of Things Journal 3 (6), 971-978, 2016
Distributed event detection under byzantine attack in wireless sensor networks
P Zhang, JY Koh, S Lin, I Nevat
2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor …, 2014
Rate limiting client puzzle schemes for denial-of-service mitigation
JY Koh, JTC Ming, D Niyato
2013 IEEE Wireless Communications and Networking Conference (WCNC), 1848-1853, 2013
Optimal privacy-preserving probabilistic routing for wireless networks
JY Koh, D Leong, GW Peters, I Nevat, WC Wong
IEEE Transactions on Information Forensics and Security 12 (9), 2105-2114, 2017
Privacy-aware incentive mechanism for mobile crowd sensing
JY Koh, GW Peters, D Leong, I Nevat, WC Wong
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
Reliable privacy-preserving communications for wireless ad hoc networks
JY Koh, JCM Teo, D Leong, WC Wong
2015 IEEE International Conference on Communications (ICC), 6271-6276, 2015
Localizing Wireless Jamming Attacks with Minimal Network Resources
JY Koh, P Zhang
International Conference on Security, Privacy and Anonymity in Computation …, 2017
Mitigating byzantine attacks in data fusion process for wireless sensor networks using witnesses
JY Koh, JCM Teo, WC Wong
2014 IEEE International Conference on Communication Systems, 263-267, 2014
Probabilistic routing in wireless networks with privacy guarantees
JY Koh, GW Peters, I Nevat, D Leong
Computer Communications, 2020
Spatial Stackelberg Incentive Mechanism for Privacy-Aware Mobile Crowd Sensing
JY Koh, G Peters, I Nevat, D Leong
Journal of Machine Learning Research 1, 1-48, 2000
The system can't perform the operation now. Try again later.
Articles 1–10