Follow
Weichao Wang
Weichao Wang
Verified email at uncc.edu - Homepage
Title
Cited by
Cited by
Year
Secure and efficient access to outsourced data
W Wang, Z Li, R Owens, B Bhargava
Proceedings of the 2009 ACM workshop on Cloud computing security, 55-66, 2009
4002009
Visualization of wormholes in sensor networks
W Wang, B Bhargava
Proceedings of the 3rd ACM workshop on Wireless security, 51-60, 2004
3972004
Middle School Students’ Social Media Use
F Martin, C Wang, T Petty, W Wang, P Wilkins
Journal of Educational Technology & Society 21 (1), 213-224, 2018
2592018
Integrating heterogeneous wireless technologies: a cellular aided mobile ad hoc network (CAMA)
B Bhargava, X Wu, Y Lu, W Wang
Mobile Networks and Applications 9, 393-408, 2004
1692004
Defending against wormhole attacks in mobile ad hoc networks
W Wang, B Bhargava, Y Lu, X Wu
Wireless Communications and Mobile Computing 6 (4), 483-503, 2006
1662006
Study of distance vector routing protocols for mobile ad hoc networks
Y Lu, W Wang, Y Zhong, B Bhargava
Proceedings of the First IEEE International Conference on Pervasive …, 2003
1492003
Visualisation of wormholes in underwater sensor networks: a distributed approach
W Wang, J Kong, B Bhargava, M Gerla
International Journal of Security and Networks 3 (1), 10-23, 2008
1002008
On vulnerability and protection of ad hoc on-demand distance vector protocol
W Wang, Y Lu, BK Bhargava
10th International Conference on Telecommunications, 2003. ICT 2003. 1, 375-382, 2003
902003
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks
J Kong, Z Ji, W Wang, M Gerla, R Bagrodia, B Bhargava
Proceedings of the 4th ACM workshop on Wireless security, 87-96, 2005
852005
Defending against collaborative packet drop attacks on MANETs
W Wang, B Bhargava, M Linderman
2nd International Workshop on Dependable Network Computing and Mobile …, 2009
842009
Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines
R Owens, W Wang
30th IEEE International Performance Computing and Communications Conference, 1-8, 2011
752011
Trust-based privacy preservation for peer-to-peer data sharing
Y Lu, W Wang, B Bhargava, D Xu
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006
712006
Dynamic participant selection for large-scale mobile crowd sensing
H Li, T Li, W Wang, Y Wang
IEEE Transactions on Mobile Computing 18 (12), 2842-2855, 2018
682018
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding.
X Xie, W Wang
JUSPN 5 (1), 1-8, 2014
532014
On security study of two distance vector routing protocols for mobile ad hoc networks
W Wang, Y Lu, B Bhargava
Proceedings of the First IEEE International Conference on Pervasive …, 2003
442003
Scalable Privacy-Preserving Participant Selection in Mobile Crowd Sensing
T Li, T Jung, H Li, L Cao, W Wang, XY Li, Y Wang
422017
Wireless networking security: open issues in trust, management, interoperation and measurement
JB Evans, W Wang, BJ Ewy
International Journal of Security and Networks 1 (1-2), 84-94, 2006
332006
Detecting sybil nodes in wireless networks with physical layer network coding
W Wang, D Pu, A Wyglinski
2010 IEEE/IFIP International Conference on Dependable Systems&Networks (DSN …, 2010
322010
Key distribution and update for secure inter-group multicast communication
W Wang, B Bhargava
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor …, 2005
312005
Rootkit detection on virtual machines through deep information extraction at hypervisor-level
X Xie, W Wang
2013 IEEE Conference on Communications and Network Security (CNS), 498-503, 2013
292013
The system can't perform the operation now. Try again later.
Articles 1–20