-
1
-
-
80052863987
-
Cognitive radio networking and communications: An overview
-
Y.-C. Liang, K.-C. Chen, G. Y. Li, and P. Mahonen, "Cognitive radio networking and communications: An overview," IEEE Transactions on Vehicular Technology, vol. 60, no. 7, pp. 3386-3407, 2011.
-
(2011)
IEEE Transactions on Vehicular Technology
, vol.60
, Issue.7
, pp. 3386-3407
-
-
Liang, Y.-C.1
Chen, K.-C.2
Li, G.Y.3
Mahonen, P.4
-
2
-
-
84875053216
-
Sensing-performance tradeoff in cognitive radio enabled smart grid
-
R. Deng, J. Chen, X. Cao, Y. Zhang, S. Maharjan, and S. Gjessing, "Sensing-performance tradeoff in cognitive radio enabled smart grid," IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 302-310, 2013.
-
(2013)
IEEE Transactions on Smart Grid
, vol.4
, Issue.1
, pp. 302-310
-
-
Deng, R.1
Chen, J.2
Cao, X.3
Zhang, Y.4
Maharjan, S.5
Gjessing, S.6
-
3
-
-
84919475079
-
Dynamic channel assignment for wireless sensor networks: A regret matching based approach
-
J. Chen, Q. Yu, B. Chai, Y. Sun, Y. Fan, and X. Shen, "Dynamic channel assignment for wireless sensor networks: a regret matching based approach," IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 1, pp. 95-106, 2015.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
, vol.26
, Issue.1
, pp. 95-106
-
-
Chen, J.1
Yu, Q.2
Chai, B.3
Sun, Y.4
Fan, Y.5
Shen, X.6
-
4
-
-
78651372721
-
Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks
-
A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney, "Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks," IEEE Transactions on Signal Processing, vol. 59, no. 2, pp. 774-786, 2011.
-
(2011)
IEEE Transactions on Signal Processing
, vol.59
, Issue.2
, pp. 774-786
-
-
Rawat, A.S.1
Anand, P.2
Chen, H.3
Varshney, P.K.4
-
5
-
-
84890331378
-
On energy-efficient trap coverage in wireless sensor networks
-
J. Chen, J. Li, S. He, T. He, Y. Gu, and Y. Sun, "On energy-efficient trap coverage in wireless sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 10, no. 1, p. 2, 2013.
-
(2013)
ACM Transactions on Sensor Networks (TOSN)
, vol.10
, Issue.1
, pp. 2
-
-
Chen, J.1
Li, J.2
He, S.3
He, T.4
Gu, Y.5
Sun, Y.6
-
6
-
-
84884907077
-
Energy-efficient intrusion detection with a barrier of probabilistic sensors: Global and local
-
J. Chen, J. Li, and T. H. Lai, "Energy-efficient intrusion detection with a barrier of probabilistic sensors: Global and local," IEEE Transactions on Wireless Communications, vol. 12, no. 9, pp. 4742-4755, 2013.
-
(2013)
IEEE Transactions on Wireless Communications
, vol.12
, Issue.9
, pp. 4742-4755
-
-
Chen, J.1
Li, J.2
Lai, T.H.3
-
7
-
-
84884380171
-
Trapping mobile targets in wireless sensor networks: An energy-efficient perspective
-
-, "Trapping mobile targets in wireless sensor networks: An energy-efficient perspective," IEEE Transactions on Vehicular Technology, vol. 62, no. 7, pp. 3287-3300, 2013.
-
(2013)
IEEE Transactions on Vehicular Technology
, vol.62
, Issue.7
, pp. 3287-3300
-
-
Chen, J.1
Li, J.2
Lai, T.H.3
-
8
-
-
52949148861
-
Radio environment map enabled situation-aware cognitive radio learning algorithms
-
Y. Zhao, J. Gaeddert, K. K. Bae, and J. H. Reed, "Radio environment map enabled situation-aware cognitive radio learning algorithms," in Proceedings of SDR Forum Technical Conference'06, 2006.
-
(2006)
Proceedings of SDR Forum Technical Conference'06
-
-
Zhao, Y.1
Gaeddert, J.2
Bae, K.K.3
Reed, J.H.4
-
9
-
-
84874570518
-
Distributed resource map: A database-driven network support architecture for cognitive radio ad hoc networks
-
S. N. Khan, M. A. Kalil, and A. Mitschele-Thiel, "Distributed resource map: A database-driven network support architecture for cognitive radio ad hoc networks," in Proceedings of ICUMT'12, 2012, pp. 188-194.
-
(2012)
Proceedings of ICUMT'12
, pp. 188-194
-
-
Khan, S.N.1
Kalil, M.A.2
Mitschele-Thiel, A.3
-
10
-
-
84555187531
-
Senseless: A database-driven white spaces network
-
R. Murty, R. Chandra, T. Moscibroda, and P. Bahl, "Senseless: A database-driven white spaces network," IEEE Transactions on Mobile Computing, vol. 11, no. 2, pp. 189-203, 2012.
-
(2012)
IEEE Transactions on Mobile Computing
, vol.11
, Issue.2
, pp. 189-203
-
-
Murty, R.1
Chandra, R.2
Moscibroda, T.3
Bahl, P.4
-
11
-
-
84883081776
-
Location privacy in database-driven cognitive radio networks: Attacks and countermea-sures
-
Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao, "Location privacy in database-driven cognitive radio networks: Attacks and countermea-sures," in Proceedings of IEEE INFOCOM'13, 2013, pp. 2751-2759.
-
(2013)
Proceedings of IEEE INFOCOM'13
, pp. 2751-2759
-
-
Gao, Z.1
Zhu, H.2
Liu, Y.3
Li, M.4
Cao, Z.5
-
12
-
-
84902175417
-
Protecting the primary users' operational privacy in spectrum sharing
-
B. Bahrak, S. Bhattarai, A. Ullah, J.-M. J. Park, J. Reed, and D. Gurney, "Protecting the primary users' operational privacy in spectrum sharing," in Proceedings of IEEE DYSPAN'14, 2014, pp. 236-247.
-
(2014)
Proceedings of IEEE DYSPAN'14
, pp. 236-247
-
-
Bahrak, B.1
Bhattarai, S.2
Ullah, A.3
Park, J.-M.J.4
Reed, J.5
Gurney, D.6
-
14
-
-
84889037772
-
Geo-indistinguishability: Differential privacy for location-based systems
-
M. E. Andres, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, "Geo-indistinguishability: Differential privacy for location-based systems," in Proceedings of ACM SIGSAC conference on Computer & communications security, 13, 2013, pp. 901-914.
-
(2013)
Proceedings of ACM SIGSAC Conference on Computer & Communications Security
, vol.13
, pp. 901-914
-
-
Andres, M.E.1
Bordenabe, N.E.2
Chatzikokolakis, K.3
Palamidessi, C.4
-
16
-
-
34648875254
-
The history of the solution of the cubic equation
-
L. Guilbeau, "The history of the solution of the cubic equation," Mathematics News Letter, pp. 8-12, 1930.
-
(1930)
Mathematics News Letter
, pp. 8-12
-
-
Guilbeau, L.1
-
17
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557-570, 2002.
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
18
-
-
79952992733
-
Network coding based privacy preservation against traffic analysis in multi-hop wireless networks
-
Y. Fan, Y Jiang, H. Zhu, J. Chen, and X. Shen, "Network coding based privacy preservation against traffic analysis in multi-hop wireless networks," IEEE Transactions on Wireless Communications, vol. 10, no. 3, pp. 834-843, 2011.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.3
, pp. 834-843
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Chen, J.4
Shen, X.5
-
19
-
-
84860731130
-
The impact of trace and adversary models on location privacy provided by k-anonymity
-
V. Cambazoglu, C. Rohner, and B. Victor, "The impact of trace and adversary models on location privacy provided by k-anonymity," in Proceedings of the First Workshop on Measurement, Privacy, and Mobility'12, 2012, p. 6.
-
(2012)
Proceedings of the First Workshop on Measurement, Privacy, and Mobility'12
, pp. 6
-
-
Cambazoglu, V.1
Rohner, C.2
Victor, B.3
-
20
-
-
70450207983
-
Privately querying location-based services with sybilquery
-
P. Shankar, V. Ganapathy, and L. Iftode, "Privately querying location-based services with sybilquery," in Proceedings of the international conference on Ubiquitous computing'09, 2009, pp. 31-40.
-
(2009)
Proceedings of the International Conference on Ubiquitous computing'09
, pp. 31-40
-
-
Shankar, P.1
Ganapathy, V.2
Iftode, L.3
-
21
-
-
78650182778
-
Unraveling an old cloak: K-anonymity for location privacy
-
R. Shokri, C. Troncoso, C. Diaz, J. Freudiger, and J.-P Hubaux, "Unraveling an old cloak: k-anonymity for location privacy," in Proceedings of annual ACM workshop on Privacy in the electronic society'10, 2010, pp. 115-118.
-
(2010)
Proceedings of Annual ACM Workshop on Privacy in the Electronic society'10
, pp. 115-118
-
-
Shokri, R.1
Troncoso, C.2
Diaz, C.3
Freudiger, J.4
Hubaux, J.-P.5
-
22
-
-
79951509728
-
Location privacy: Going beyond k-anonymity, cloaking and anonymizers
-
A. Khoshgozaran, C. Shahabi, and H. Shirani-Mehr, "Location privacy: going beyond k-anonymity, cloaking and anonymizers," Knowledge and Information Systems, vol. 26, no. 3, pp. 435-465, 2011.
-
(2011)
Knowledge and Information Systems
, vol.26
, Issue.3
, pp. 435-465
-
-
Khoshgozaran, A.1
Shahabi, C.2
Shirani-Mehr, H.3
-
23
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramani-am, "l-diversity: Privacy beyond k-anonymity," ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 1, no. 1, p. 3, 2007.
-
(2007)
ACM Transactions on Knowledge Discovery from Data (TKDD)
, vol.1
, Issue.1
, pp. 3
-
-
MacHanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramani-Am, M.4
-
24
-
-
37849018331
-
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
-
Springer
-
A. Khoshgozaran and C. Shahabi, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy," in Advances in Spatial and Temporal Databases. Springer, 2007, pp. 239-257.
-
(2007)
Advances in Spatial and Temporal Databases
, pp. 239-257
-
-
Khoshgozaran, A.1
Shahabi, C.2
-
25
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private queries in location based services: anonymizers are not necessary," in Proceedings of the ACM SIGMOD international conference on Management of data'08, 2008, pp. 121-132.
-
(2008)
Proceedings of the ACM SIGMOD International Conference on Management of data'08
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
26
-
-
84905991151
-
The algorithmic foundations of differential privacy
-
C. Dwork and A. Roth, "The algorithmic foundations of differential privacy," Theoretical Computer Science, vol. 9, no. 3-4, pp. 211-407, 2013.
-
(2013)
Theoretical Computer Science
, vol.9
, Issue.3-4
, pp. 211-407
-
-
Dwork, C.1
Roth, A.2
-
27
-
-
85002409724
-
Privacy and performance trade-off in cyber-physical systems
-
to appear
-
H. Zhang, Y Shu, P. Cheng, and J. Chen, "Privacy and performance trade-off in cyber-physical systems," IEEE Networks, to appear.
-
IEEE Networks
-
-
Zhang, H.1
Shu, Y.2
Cheng, P.3
Chen, J.4
-
29
-
-
84893523202
-
Differentially private filtering
-
J. Le Ny and G. J. Pappas, "Differentially private filtering," IEEE Transactions on Automatic Control, vol. 59, no. 2, pp. 341-354, 2014.
-
(2014)
IEEE Transactions on Automatic Control
, vol.59
, Issue.2
, pp. 341-354
-
-
Le Ny, J.1
Pappas, G.J.2
|