Yong Guan
Yong Guan
Verified email at iastate.edu
Title
Cited by
Cited by
Year
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, Y Guan
IEEE Transactions on Parallel and Distributed systems 24 (1), 104-117, 2012
3292012
An efficient signature-based scheme for securing network coding against pollution attacks
Z Yu, Y Wei, B Ramkumar, Y Guan
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1409-1417, 2008
2982008
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
Z Yu, Y Guan
Proceedings of the 3rd international conference on Embedded networked sensor …, 2005
2372005
Detecting black-hole attack in mobile ad hoc networks
B Sun, Y Guan, J Chen, UW Pooch
IET Digital Library, 2003
1992003
Lightweight mutual authentication and ownership transfer for RFID systems
L Kulseng, Z Yu, Y Wei, Y Guan
2010 Proceedings IEEE INFOCOM, 1-5, 2010
1892010
Detecting click fraud in pay-per-click streams of online advertising networks
L Zhang, Y Guan
2008 The 28th International Conference on Distributed Computing Systems, 77-84, 2008
1532008
An efficient scheme for securing XOR network coding against pollution attacks
Z Yu, Y Wei, B Ramkumar, Y Guan
IEEE INFOCOM 2009, 406-414, 2009
1462009
A key management scheme using deployment knowledge for wireless sensor networks
Z Yu, Y Guan
IEEE Transactions on Parallel and Distributed Systems 19 (10), 1411-1425, 2008
1252008
Netcamo: camouflaging network traffic for qos-guaranteed mission critical applications
Y Guan, X Fu, D Xuan, PU Shenoy, R Bettati, W Zhao
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001
1232001
A dynamic en-route filtering scheme for data reporting in wireless sensor networks
Z Yu, Y Guan
IEEE/ACM transactions on networking 18 (1), 150-163, 2009
1172009
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
Z Yu, Y Guan
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
1042005
A robust group-based key management scheme for wireless sensor networks
Z Yu, Y Guan
IEEE Wireless Communications and Networking Conference, 2005 4, 1915-1920, 2005
962005
An optimal strategy for anonymous communication protocols
Y Guan, X Fu, R Bettati, W Zhao
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
932002
Sketch-based streaming pca algorithm for network-wide traffic anomaly detection
Y Liu, L Zhang, Y Guan
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
702010
Lightweight location verification algorithms for wireless sensor networks
Y Wei, Y Guan
IEEE Transactions on Parallel and Distributed Systems 24 (5), 938-950, 2012
682012
Lightweight secure search protocols for low-cost RFID systems
L Kulseng, Z Yu, Y Wei, Y Guan
2009 29th IEEE International Conference on Distributed Computing Systems, 40-48, 2009
592009
Detection of stepping stone attack under delay and chaff perturbations
L Zhang, AG Persaud, A Johnson, Y Guan
2006 IEEE International Performance Computing and Communications Conference …, 2006
552006
Preventing traffic analysis for real-time communication networks
Y Guan, C Li, D Xuan, R Bettati, W Zhao
MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No …, 1999
531999
Location verification algorithms forwireless sensor networks
Y Wei, Z Yu, Y Guan
27th International Conference on Distributed Computing Systems (ICDCS'07), 70-70, 2007
472007
A quantitative analysis of anonymous communications
Y Guan, X Fu, R Bettati, W Zhao
IEEE Transactions on Reliability 53 (1), 103-115, 2004
452004
The system can't perform the operation now. Try again later.
Articles 1–20