Weichao Wang
Weichao Wang
Verified email at uncc.edu - Homepage
Title
Cited by
Cited by
Year
Visualization of wormholes in sensor networks
W Wang, B Bhargava
Proceedings of the 3rd ACM workshop on Wireless security, 51-60, 2004
3922004
Secure and efficient access to outsourced data
W Wang, Z Li, R Owens, B Bhargava
Proceedings of the 2009 ACM workshop on Cloud computing security, 55-66, 2009
3802009
Defending against wormhole attacks in mobile ad hoc networks
W Wang, B Bhargava, Y Lu, X Wu
Wireless Communications and Mobile Computing 6 (4), 483-503, 2006
1592006
Integrating heterogeneous wireless technologies: a cellular aided mobile ad hoc network (CAMA)
B Bhargava, X Wu, Y Lu, W Wang
Mobile Networks and Applications 9 (4), 393-408, 2004
1592004
Study of distance vector routing protocols for mobile ad hoc networks
Y Lu, W Wang, Y Zhong, B Bhargava
Proceedings of the First IEEE International Conference on Pervasive …, 2003
1392003
Middle School Students’ Social Media Use
F Martin, C Wang, T Petty, W Wang, P Wilkins
Journal of Educational Technology & Society 21 (1), 213-224, 2018
1242018
On vulnerability and protection of ad hoc on-demand distance vector protocol
W Wang, Y Lu, BK Bhargava
10th International Conference on Telecommunications, 2003. ICT 2003. 1, 375-382, 2003
862003
Defending against collaborative packet drop attacks on MANETs
W Wang, B Bhargava, M Linderman
2nd International Workshop on Dependable Network Computing and Mobile …, 2009
822009
Visualisation of wormholes in underwater sensor networks: a distributed approach
W Wang, J Kong, B Bhargava, M Gerla
International Journal of Security and Networks 3 (1), 10-23, 2008
812008
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks
J Kong, Z Ji, W Wang, M Gerla, R Bagrodia, B Bhargava
Proceedings of the 4th ACM workshop on Wireless security, 87-96, 2005
802005
Trust-based privacy preservation for peer-to-peer data sharing
Y Lu, W Wang, B Bhargava, D Xu
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006
672006
Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines
R Owens, W Wang
30th IEEE International Performance Computing and Communications Conference, 1-8, 2011
632011
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding.
X Xie, W Wang
JUSPN 5 (1), 1-8, 2014
462014
On security study of two distance vector routing protocols for mobile ad hoc networks
W Wang, Y Lu, B Bhargava
Proceedings of the First IEEE International Conference on Pervasive …, 2003
442003
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding
X Xie, W Wang
Procedia Computer Science 21, 430-435, 2013
392013
Key distribution and update for secure inter-group multicast communication
W Wang, B Bhargava
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor …, 2005
342005
Wireless networking security: open issues in trust, management, interoperation and measurement
JB Evans, W Wang, BJ Ewy
International Journal of Security and Networks 1 (1-2), 84-94, 2006
332006
Scalable Privacy-Preserving Participant Selection in Mobile Crowd Sensing
T Li, T Jung, H Li, L Cao, W Wang, XY Li, Y Wang
312017
Interactive wormhole detection and evaluation
W Wang, A Lu
Information Visualization 6 (1), 3-17, 2007
292007
Detecting sybil nodes in wireless networks with physical layer network coding
W Wang, D Pu, A Wyglinski
2010 IEEE/IFIP International Conference on Dependable Systems&Networks (DSN …, 2010
282010
The system can't perform the operation now. Try again later.
Articles 1–20