An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks. D He, Y Gao, S Chan, C Chen, J Bu Ad Hoc & Sensor Wireless Networks 10 (4), 361-371, 2010 | 265 | 2010 |
ReTrust: Attack-resistant and lightweight trust management for medical sensor networks D He, C Chen, S Chan, J Bu, AV Vasilakos IEEE Transactions on Information Technology in Biomedicine 16 (4), 623-632, 2012 | 189 | 2012 |
Secure and efficient handover authentication based on bilinear pairing functions D He, C Chen, S Chan, J Bu IEEE Transactions on Wireless Communications 11 (1), 48-53, 2012 | 183 | 2012 |
PD-RED: to improve the performance of RED J Sun, KT Ko, G Chen, S Chan, M Zukerman IEEE Communications letters 7 (8), 406-408, 2003 | 147 | 2003 |
Lightweight and provably secure user authentication with anonymity for the global mobility network C Chen, D He, S Chan, J Bu, Y Gao, R Fan International Journal of Communication Systems 24 (3), 347-362, 2011 | 129 | 2011 |
Cascading failure spreading on weighted heterogeneous networks ZX Wu, G Peng, WX Wang, S Chan, EWM Wong Journal of Statistical Mechanics: Theory and Experiment 2008 (05), P05013, 2008 | 121 | 2008 |
Privacy-preserving universal authentication protocol for wireless communications D He, J Bu, S Chan, C Chen, M Yin IEEE Transactions on Wireless Communications 10 (2), 431-436, 2011 | 120 | 2011 |
PD-controller: a new active queue management scheme J Sun, G Chen, KT Ko, S Chan, M Zukerman Global Telecommunications Conference, 2003. GLOBECOM'03. IEEE 6, 3103-3107, 2003 | 108 | 2003 |
Iterative decoding of multi-dimensional concatenated single parity check codes L Ping, S Chan, KL Yeung Communications, 1998. ICC 98. Conference Record. 1998 IEEE International …, 1998 | 97 | 1998 |
Distributed access control with privacy support in wireless sensor networks D He, J Bu, S Zhu, S Chan, C Chen IEEE Transactions on Wireless Communications 10 (10), 3472-3481, 2011 | 93 | 2011 |
User privacy and data trustworthiness in mobile crowd sensing D He, S Chan, M Guizani IEEE Wireless Communications 22 (1), 28-34, 2015 | 91 | 2015 |
Communication Security of Unmanned Aerial Vehicles D He, S Chan, M Guizani IEEE Wireless Communications, 2016 | 90 | 2016 |
HySense: A Hybrid Mobile CrowdSensing Framework for Sensing Opportunities Compensation under Dynamic Coverage Constraint G Han, L Liu, S Chan, R Yu, Y Yang IEEE Communications Magazine 55 (3), 93-99, 2017 | 88 | 2017 |
Mobile application security: malware threats and defenses D He, S Chan, M Guizani IEEE Wireless Communications 22 (1), 138-144, 2015 | 88 | 2015 |
A distributed trust evaluation model and its application scenarios for medical sensor networks D He, C Chen, S Chan, J Bu, AV Vasilakos IEEE Transactions on Information Technology in Biomedicine 16 (6), 1164-1175, 2012 | 86 | 2012 |
Secure service provision in smart grid communications D He, C Chen, J Bu, S Chan, Y Zhang, M Guizani IEEE Communications Magazine 50 (8), 53-61, 2012 | 86 | 2012 |
A novel and lightweight system to secure wireless medical sensor networks D He, S Chan, S Tang IEEE journal of biomedical and health informatics 18 (1), 316-326, 2014 | 79 | 2014 |
Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks D He, C Chen, S Chan, J Bu, LT Yang IEEE Transactions on Industrial Electronics 60 (11), 5348-5354, 2013 | 77 | 2013 |
DiCode: DoS-resistant and distributed code dissemination in wireless sensor networks D He, C Chen, S Chan, J Bu IEEE Transactions on Wireless Communications 11 (5), 1946-1956, 2012 | 75 | 2012 |
A simple and robust vertical handoff algorithm for heterogeneous wireless mobile networks D He, C Chi, S Chan, C Chen, J Bu, M Yin Wireless Personal Communications 59 (2), 361-373, 2011 | 75 | 2011 |